12,008 research outputs found

    Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges

    Get PDF
    open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that deal with smart agriculture. Then, we provide a classification of threat models against green IoT-based agriculture into five categories, including, attacks against privacy, authentication, confidentiality, availability, and integrity properties. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward secure and privacy-preserving technologies for IoT applications and how they will be adapted for green IoT-based agriculture. In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the security and privacy of green IoT-based agriculture

    Using computer simulation in operating room management: impacts of information quality on process performance

    Get PDF
    High quality information has a significant impact on improving operation performance and patient satisfaction, as well as resolving patient disputes. Based on the analysis of the perioperative process, information quality is considered as an important contributory factor in improving patient throughput. In this paper, we propose a conceptual framework to use computer simulations in modeling information flow of hospital process for operating room management (ORM). Additionally, we conduct simulation studies in different levels of the information quality for ORM. The results of our studies provide evidence that information quality can drive process performance in several phases of the ORM

    Inter-firm Alliances during Pre-standardization in ICT

    Get PDF
    alliances, ICT, standardization

    Rethinking blockchains in the Internet of Things era from a wireless communication perspective

    Get PDF
    Due to the rapid development of the internet of Things (ioT), a massive number of devices are connected to the internet. For these distributed devices in ioT networks, how to ensure their security and privacy becomes a significant challenge. Blockchain technology provides a promising solution to protect the data integrity, provenance, privacy, and consistency for ioT networks. in blockchains, communication is a prerequisite for participants, which are distributed in the system, to reach consensus. However, in ioT networks, most of the devices communicate through wireless links, which are not always reliable. Hence, the communication reliability of ioT devices influences the system security. in this article, we rethink the roles of communication and computing in blockchains by accounting for communication reliability. We analyze the trade-off between communication reliability and computing power in blockchain security, and present a lower bound to the computing power that is needed to conduct an attack with a given communication reliability. Simulation results show that adversarial nodes can succeed in tampering with a block with less computing power by hindering the propagation of blocks from other nodes

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
    • …
    corecore