26,318 research outputs found

    A Decentralised Digital Identity Architecture

    Get PDF
    Current architectures to validate, certify, and manage identity are based on centralised, top-down approaches that rely on trusted authorities and third-party operators. We approach the problem of digital identity starting from a human rights perspective, with a primary focus on identity systems in the developed world. We assert that individual persons must be allowed to manage their personal information in a multitude of different ways in different contexts and that to do so, each individual must be able to create multiple unrelated identities. Therefore, we first define a set of fundamental constraints that digital identity systems must satisfy to preserve and promote privacy as required for individual autonomy. With these constraints in mind, we then propose a decentralised, standards-based approach, using a combination of distributed ledger technology and thoughtful regulation, to facilitate many-to-many relationships among providers of key services. Our proposal for digital identity differs from others in its approach to trust in that we do not seek to bind credentials to each other or to a mutually trusted authority to achieve strong non-transferability. Because the system does not implicitly encourage its users to maintain a single aggregated identity that can potentially be constrained or reconstructed against their interests, individuals and organisations are free to embrace the system and share in its benefits.Comment: 30 pages, 10 figures, 3 table

    Future challenges and recommendations

    Get PDF
    Rapid advances in information technology and telecommunications, and in particular mobile and wireless communications, converge towards the emergence of a new type of “infostructure” that has the potential of supporting a large spectrum of advanced services for healthcare and health. Currently the ICT community produces a great effort to drill down from the vision and the promises of wireless and mobile technologies and provide practical application solutions. Research and development include data gathering and omni-directional transfer of vital information, integration of human machine interface technology into handheld devices and personal applications, security and interoperability of date and integration with hospital legacy systems and electronic patient record. The ongoing evolution of wireless technology and mobile device capabilities is changing the way healthcare providers interact with information technologies. The growth and acceptance of mobile information technology at the point of care, coupled with the promise and convenience of data on demand, creates opportunities for enhanced patient care and safety. The developments presented in this section demonstrate clearly the innovation aspects and trends towards user oriented applications

    Network strategies for the new economy

    Get PDF
    In this paper we argue that the pace and scale of development in the information and communication technology industries (ICT) has had and continues to have major effects on the industry economics and competitive dynamics generally. We maintain that the size of changes in demand and supply conditions is forcing companies to make significant changes in the way they conceive and implement their strategies. We decompose the ICT industries into four levels, technology standards, supply chains, physical platforms, and consumer networks. The nature of these technologies and their cost characteristics coupled with higher degrees of knowledge specialisation is impelling companies to radical revisions of their attitudes towards cooperation and co-evolution with suppliers and customers. Where interdependencies between customers are particularly strong, we anticipate the possibility of winner-takes-all strategies. In these circumstances industry risks become very high and there will be significant consequences for competitive markets

    Simple identification tools in FishBase

    Get PDF
    Simple identification tools for fish species were included in the FishBase information system from its inception. Early tools made use of the relational model and characters like fin ray meristics. Soon pictures and drawings were added as a further help, similar to a field guide. Later came the computerization of existing dichotomous keys, again in combination with pictures and other information, and the ability to restrict possible species by country, area, or taxonomic group. Today, www.FishBase.org offers four different ways to identify species. This paper describes these tools with their advantages and disadvantages, and suggests various options for further development. It explores the possibility of a holistic and integrated computeraided strategy

    A history and future of Web APIs

    Get PDF

    A cooperative cellular and broadcast conditional access system for Pay-TV systems

    Get PDF
    This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.The lack of interoperability between Pay-TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay-TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay-TV systems. As a result, this paper presents the Mobile Conditional Access System (MICAS) as an end-to-end access control solution for Pay-TV systems. It incorporates the mobile and broadcasting systems and provides a platform whereby service providers can effectively interact with their customers, personalize their services and adopt appropriate security measurements. This would result in the decrease of operating expenses and increase of customers' satisfaction in the system. The paper provides an overview of state-of-the-art conditional access solutions followed by detailed description of design, reference model implementation and analysis of possible MICAS security architectures.Strategy & Technology (S&T) Lt

    Approaches to Using e- and m-Business Components in Business

    Get PDF
    This paper discusses using e- and m-business components in supporting and enhancing existing businesses and in creating new business innovations. A framework illustrating two different approaches companies have to adoption of e- and m-business components is proposed. Three cases of how Finnish companies have, in an innovative way, used e- and m-business components to support, to enhance, and to launch businesses are presented. Based on the illustrative framework and the cases, some rules of thumb for using e- and m-business components in business are proposed. The aim of this paper is to offer managers helpful insights for planning e- and m-business component investments.e-Business; m-Business; Business Models; Case Studies

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Review and comparison of conceptual frameworks on digital business transformation

    Get PDF
    This paper applies an academic approach in assessing various conceptual and theoretical frameworks considered relevant to the subject of digital business transformation and that contribute to increasing the general understanding of the subject. A review and comparison of several conceptual and theoretical frameworks that were identified to be relevant to the subject of digital business transformation was conducted with the aim of assessing their suitability and robustness in addressing the subject, which is gaining prominence as a pathway for achieving and maintaining competitiveness for businesses as digital technologies continue to shape and transform the business landscape. The background information required for the comparison of the frameworks was obtained after a comprehensive review of each of the frameworks, and based on the insights obtained following the review, their relevance and applicability to the subject of digital business transformation was determined. A qualitative approach was adopted in conducting desk research using reputable business and scientific data sources. The output of the literature search was narrowed down by applying elimination parameters that ensured only relevant articles and journals were included in the final comparison of literatures that contained relevant conceptual and theoretical frameworks. The research established that there is a lack of alignment between industry-based research and academic-based research on the subject of digital business transformation. The research findings and agenda of the study have important implications for organisational transformation as it relates to digital technologies and their transformative effects on industry segments and organisational structures through digitalisation.[IGA/FaME/2018/005
    corecore