Journal articles on the topic 'Computer security – Technological innovations'

To see the other types of publications on this topic, follow the link: Computer security – Technological innovations.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer security – Technological innovations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Helander, Martin G., and Kow Yong Ming. "Identifying the Needs of Elderly for Technological Innovations in the Smart Home." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 2 (September 2005): 158–62. http://dx.doi.org/10.1177/154193120504900202.

Full text
Abstract:
The study used Projective Testing techniques to identify the needs of elderly users of various features in a smart home, including: telemedicine, customized computer, teleconferencing, teleshopping, event reminder, robot helper and smart pets. Drawings of home scenarios and a male user were shown to 18 elderly users of service apartments. Altogether 192 different needs were identified. These were sorted by HF experts into broad categories. Nine categories of needs emerged relating to: Health, Communication, Security, Mobility, Mental Activities, Physical Activities, Prestige, Independence and Dependence. These were compared to needs structures documented in the literature including: Transcendent, Optimization, Anti-ageing, Dependency Avoidance and Nurturance Seeking. These needs structures are expressed at a higher level of abstraction then our nine categories. In addition the nine needs categories identified in this study can be used as a point of departure for the design of a smart home.
APA, Harvard, Vancouver, ISO, and other styles
2

Niu, Jun Tao, and Dong Hong Liu. "Security Mechanism Design on the Embedded Computer System." Applied Mechanics and Materials 651-653 (September 2014): 1937–40. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1937.

Full text
Abstract:
With the constant innovation and development of micro-electronics technology, and large scale integrated circuit in-depth research, more advanced embedded microcontroller processors are applied to all kinds of instruments and equipment, which has brought a new technological revolution to the modern industrial control field. And it results to the embedded system, as an important field of computer application, has gone deep in all aspects of society, and got more and more attention from people. Now the designing and implementation technique of dependable computer is one of the most important research fields. The research on security, one of the important characters of dependable computer, is becoming increasingly important.
APA, Harvard, Vancouver, ISO, and other styles
3

Abasova, Samira. "Analysis and assessment of ICT innovations impact on competitiveness of foreign economic relations: Azerbaijan's experience." Technology audit and production reserves 5, no. 4(67) (November 30, 2022): 29–36. http://dx.doi.org/10.15587/2706-5448.2022.268042.

Full text
Abstract:
Considering that the modified and improved ICT service becomes a commodity in the domestic and foreign markets, it can be said with complete certainty that the improved service in the domestic market, i. e. as a commodity, meets the demand of domestic consumers. But the updated and improved ICT services’ entering foreign markets necessarily complete with other similar services available in those markets. Thus, the object of the study is new innovative ICT services that join the competition in the field of foreign trade and act as the main criterion for measuring the competitiveness of international economic relations. Different factors affect a competitive economy, which include the innovation activity, investment environment, effective spending, existing infrastructure, business security, human capital, social stability, political stability. World experience demonstrates that the competitiveness indicator of developed countries is based on technological advantages, while the competitiveness indicator of developing countries is based on resource advantages. The study aims to analyze and assess of Azerbaijan's ICT innovations impact on competitiveness of foreign economic relations. In this article are studied: 1) the role of innovations in the ICT sector like as high-tech field of economy; 2) the disclosure of the position of the ICT sector in the foreign economic activity field; 3) analysis and assessment of ICT innovations impact on competitiveness of foreign economic relations in Azerbaijan. In conclusion, author suggested some recommendations for Azerbaijan ICT sector activity improving by innovations in sphere of foreign economic relations. Author used to foreign statistical sources, as well as state statistical collections of Azerbaijan in this article.
APA, Harvard, Vancouver, ISO, and other styles
4

Ratten, Vanessa. "The effect of cybercrime on open innovation policies in technology firms." Information Technology & People 32, no. 5 (October 7, 2019): 1301–17. http://dx.doi.org/10.1108/itp-03-2018-0119.

Full text
Abstract:
Purpose Open innovation is important for technology firms as they can use freely available resources to source creative and innovative ideas. Despite the usefulness of open innovation for technological advancements, few studies have focused on the role of cybercrime in affecting an organizations strategic direction. The purpose of this paper is to examine the effect of open innovation on cybercrime in technology firms. Design/methodology/approach Semi-structured in-depth interviews were conducted on technology firms to understand the role of open innovation in terms of technology scouting, horizontal collaboration and vertical collaboration on cybercrime activity. Findings The study found that there is a dilemma most technology firm’s face in having an open innovation strategy and how to manage cybercrime. This means that a coopetition strategy is utilized that helps to not only balance the need to have open innovation but also protect intellectual property. Research limitations/implications The study has implications for emerging technology innovations that not only need to have cyber security but also harness the use of Big Data. Practical implications Managers of technology firms need to encourage open innovation as a strategy but manage the cybercrime that comes from sharing too much information in an online context. Originality/value This paper is one of the first to link open innovation strategy to cybercrime activity in technology firms. Thus, it contributes to the literature on open innovation and cyber theft and security.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Zhenyu, and Zhuanzhuan Ge. "Protection and Restriction of Grain-Related Intellectual Property Rights in the Context of Food Security Based on Industrial Internet of Things." Mobile Information Systems 2022 (June 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/4554447.

Full text
Abstract:
New technologies such as the internet of things and cloud computing are expected to leverage farming development and introduce more robots and artificial intelligence in farming. Food security is an important strategic issue for national economy and security. Intellectual property is a matter of food security. Its power not only plays a role of promoting food scientific and technological innovation, stimulating private and multinational seed industry investment, saving the cost of research and development, and improving agricultural management capacity but also may damage the biodiversity, increase farmers’ burden, block food technological innovation and diffusion, increase the farmers’ litigation risks, etc. Therefore, from legislation, on the one hand, we should rationally use the current intellectual property system to protect the source of grain-related intellectual property rights, set up the concept of “great protection” of grain-related intellectual property rights, and establish the protection system and operation mechanism with the participation of multiple-related institutions. On the other hand, we should restrict grain-related intellectual property rights according to law to prevent it from controlling the market, restricting competition, hindering innovation, and seeking illegitimate interests. We need to coordinate the relationship between intellectual property rights, food rights and farmers’ rights, and rationally control the genetic utilization restriction technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 1, no. 2 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.1.2.393.

Full text
Abstract:
At present, information technology has been widely used in many fields. Although it has gradually got rid of the restrictions of traditional management mode, more security problems have emerged, which has created a new way for network crime and caused a negative impact on the steady development of society. In order to fully demonstrate the application value of computer technology under the background of big data era, strengthening privacy and protection and control based on information security risks are the main contents of current scientific research and discussion. In this article, therefore, understand the era of big data and information security problems and influencing factors of the computer, according to the accumulated experience of technological innovation in recent years, the key analysis certificate authority system, credit mechanism, comprehensive protection, these three aspects of the privacy protection technology, and from the perspective of the current computer technology application, this paper puts forward the effective protective measures
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 2, no. 1 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.2.1.393.

Full text
Abstract:
At present, information technology has been widely used in many fields. Although it has gradually got rid of the restrictions of traditional management mode, more security problems have emerged, which has created a new way for network crime and caused a negative impact on the steady development of society. In order to fully demonstrate the application value of computer technology under the background of big data era, strengthening privacy and protection and control based on information security risks are the main contents of current scientific research and discussion. In this article, therefore, understand the era of big data and information security problems and influencing factors of the computer, according to the accumulated experience of technological innovation in recent years, the key analysis certificate authority system, credit mechanism, comprehensive protection, these three aspects of the privacy protection technology, and from the perspective of the current computer technology application, this paper puts forward the effective protective measures
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Minfeng. "Optimal Management of Computer Network Security in the Era of Big Data." Journal of Computer Networks and Communications 2022 (October 5, 2022): 1–10. http://dx.doi.org/10.1155/2022/9049420.

Full text
Abstract:
As the “new oil of the future,” big data is becoming the leading industry of the new economy, the core asset of the country and enterprises, the “new blue ocean” to be pursued, and the national strategy to be developed by all countries. The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. In the era of big data, what kind of challenges and impacts will information security face? and is it crucial to explore the response strategies? At present, China has risen to become the world’s largest number of Internet users and the largest number of people using smartphones, but because China’s information security is the initial stage, involving information security, especially national information security laws and regulations are not much, the national social supervision and monitoring mechanisms are not much, the application level of science and technology content is relatively backward, the core technology has a patent technology not much, resulting in the flood of network data nowadays. Therefore, the underground illegal “data industry chain” activities are rampant. Therefore, this paper proposes a security-aware model based on the combination of distributed data analysis technology and data features. The model uses data features to dynamically generate a library of situational anomalies, effectively solving the problem of analyzing and processing rapidly and dynamically generated data streams, increasing the detection rate to more than 98%, effectively reducing the possibility of false detection, and having good results on large-scale datasets.
APA, Harvard, Vancouver, ISO, and other styles
9

VINOKUROV, ILYA. "DIGITAL ECONOMY IN THE RUSSIAN FEDERATION. PROBLEMS AND PROSPECTS FOR DEVELOPMENT." Public Administration 23, no. 5 (2021): 60–66. http://dx.doi.org/10.22394/2070-8378-2021-23-5-60-66.

Full text
Abstract:
The main advantages of the digital economy include the widespread use of the Internet and growth of digital skills, increased innovation and investment activity, expansion of markets for knowledge-intensive services and technologies, diversification of labor and service markets, inclusive development in regions, etc. The digital economy benefits productivity and competition between companies, reduces production costs, increases the number of high-performance jobs, enhances public welfare, and ensures national security. The purpose of the study is to identify the main problems of the digitalization process in Russia, which the Russian society may meet or have already faced during the introduction and use of new technologies and knowledge obtained as a result of the fourth scientific and technological revolution. Active business development in the field of computer information technology and telecommunications, as well as the creation of the necessary economic environment, contributes to an increase in the supply of information, technical and technological products that are associated with the use of computers and computer networks, strengthening the state scientific and technological potential, increase in demand for domestic information products, which are created and used for the production of information and computer technology, increase investment in information and computer sphere, as well as areas of implementation of such technologies in various economic sectors. Digitalization of economy will raise the quality of life for citizens, introduce new jobs, reduce regional disparities, increase labor productivity and corporate profitability, as well as ensure economic growth.
APA, Harvard, Vancouver, ISO, and other styles
10

Ilyash, Olha, Liubov Smoliar, Ruslan Lupak, Nataliia Duliaba, Iryna Dzhadan, Maryana Kohut, and Denys Radov. "Multidimensional analysis and forecasting the relationship between indicators of industrial-technological development and the level of economic security." Eastern-European Journal of Enterprise Technologies 5, no. 13 (113) (October 31, 2021): 14–25. http://dx.doi.org/10.15587/1729-4061.2021.243262.

Full text
Abstract:
A theoretical-applied model has been built for analyzing industrial-technological development directly within the system of economic security. A system of indicators has been constructed that are mutually agreed in the context of the analysis of the state of economic security and components of industrial-technological development (investment, international, environmental, educational, scientific, industrial, innovative, technological). Based on the system of indicators, analysis of variance in the industrial-technological development and level of economic security was carried out. The levels of correlation of indicators (high, medium, low) have been determined, based on which the interrelations of industrial-technological development and economic security were systematized. A graphic-analytical and regression procedure was used to define the correlation dependence of industrial-technological development on economic security. The industrial-technological development has been forecasted in terms of the indicators with high correlation (the level of investment, openness of the economy, export of high-tech products, industrial products index) and medium correlation (the share of renewable energy consumption, the level of expenditures on education to GDP, the share of specialists performing scientific and technical work). The system of indicators of economic security assessment has been expanded in terms of its individual components (investment-innovative, foreign economic, energy, social, macroeconomic security), taking into consideration aspects in the industrial-technological development. Using the reported analytical and predictive results makes it possible to establish groups of factors that influence the industrial-technological development and economic security. In this way, it becomes possible to identify those tools and means whose application could ensure an increase in the level of industrial-technological development and economic security
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Mu, Li Li, and Wadim Strielkowski. "The Impact of Urbanization and Industrialization on Energy Security: A Case Study of China." Energies 12, no. 11 (June 9, 2019): 2194. http://dx.doi.org/10.3390/en12112194.

Full text
Abstract:
Currently, due to the recent unprecedented urbanization and industrialization, energy consumption in China is increasing at an enormous speed. However, this process should go hand in hand with sustainable energy development that is based on three interconnected dimensions: (i) energy security, (ii) energy affordability, and (iii) environmental sustainability. It becomes very obvious that an increase in energy efficiency leads to the increase in both energy security and environmental sustainability. Therefore, inadequate energy efficiency causes energy security and environmental sustainability issues, and thus negatively influences economic development of China (or any other country for that matter). This paper explores the intrinsic relationship among urbanization, industrialization, and energy security, as well as the influencing mechanisms of urbanization and industrialization on energy efficiency using a fixed effect model. The paper employs panel data from 30 provinces in mainland China collected in the time range from 2006 to 2015. Our results demonstrate that urbanization and industrialization can significantly improve energy efficiency. Although energy security level decreases considerably with the rise of energy consumption and population growth, the increase in urbanization and industrialization levels can increase energy security through energy efficiency improvements. Moreover, it appears that changes in disposable income and population structure do not alter the effects of industrialization and urbanization on energy security. We conclude that Chinese provinces with high and low urbanization levels should focus on technological innovation and increase industrial development and technological input, respectively. Local governments in China can formulate policies and regulations and promote urbanization according to local economic development and industrial and population structure. The paper also presents theoretical references and decision support that might help in developing local laws and regulations promoting energy efficiency during urbanization and industrialization.
APA, Harvard, Vancouver, ISO, and other styles
12

Dobrova, V., P. Labzina, N. Ageenko, and S. Menshenina. "Language Education in the Age of Globalization and Innovation." SHS Web of Conferences 71 (2019): 05010. http://dx.doi.org/10.1051/shsconf/20197105010.

Full text
Abstract:
Globalization and innovation have recently resulted in the extensive use of the latest technological products practically everywhere, and in education especially. Various technologies are now employed in different spheres of education. Virtual Reality (VR) is a global innovative technology with great potentials and enormous pedagogical possibilities that offers new methods and techniques for education. The main features of it are visibility, security, involvement, presence and focusing. It enables to combine the computer-generated virtual information and the real environment in real time. The presented VR language program is based on the concept of 3D modeling and semantic frame method.
APA, Harvard, Vancouver, ISO, and other styles
13

Lysenko, Serhii. "INFORMATION SECURITY UPGRADE ACCORDING TO ARTIFICIAL INTELLIGENCE TECHNOLOGIES." Actual Problems of Economics 1, no. 223 (January 22, 2020): 129–39. http://dx.doi.org/10.32752/1993-6788-2020-1-223-129-139.

Full text
Abstract:
The article is devoted to the problems of the growing role of artificial intelligence technologies and the need for legal regulation of the processes of interaction between artificial intelligence and humans, in the context of information security. According to the author, without a full and timely regulatory regulation of the development of technological innovations that can make independent decisions, society runs the risk of suffering serious losses. Therefore, it is extremely important already now, to develop and implement for information technologies such administrative and legal regulation, in which the development of technologies will not lead to risks for society and will retain control over what is happening to the person. The author suggests that in future artificial intelligence is deprived of the status of a computer program or technology, and it will become an independent subject of law, citing as an example of acquiring legal capacity by another artificial, abstract entity � the state. In the publication examines the existing attempts to form a legal framework for interaction between humans and artificial intelligence, which took place in the European Union, Japan and the PRC. This includes the precedent for recognizing artificial intelligence as an independent creative unit, which has already taken place in the Chinese city of Shenzhen, where the court ruled that some articles written using artificial intelligence are protected by copyright. Special attention is devoted to the analysis of domestic studies of the prospects for the use of artificial intelligence and its interaction with humans. The author proposes an approach to the regulation of legal relations associated with artificial intelligence, built around the principle � technology for the benefit of a person, to respect his rights and freedoms. The author predicts a shift in priorities in the field of information security from the protection of personal data and the security of their use, to the prevention of uncontrolled use of artificial intelligence, in the areas related to the implementation of human rights and freedoms.
APA, Harvard, Vancouver, ISO, and other styles
14

Cao, Hui, Hui He, and Jiahe Tian. "A Scientific Research Information System via Intelligent Blockchain Technology for the Applications in University Management." Mobile Information Systems 2022 (May 27, 2022): 1–14. http://dx.doi.org/10.1155/2022/7512692.

Full text
Abstract:
The scientific research information system plays an essential role in improving management efficiency and promoting technological innovation in universities. With the increasing computational demand for human-centric research management, blockchain technology, with distributed storage, consensus sharing, and security traceability, has efficiently assisted the research information system in dealing with various issues such as big-data scale, information security, interconnection, rapid response, and private security. A novel scientific information system framework based on intelligent blockchain technology is proposed to promote university scientific research’s information level and management efficiency. Moreover, four smart data contracts, including data collection, verification, sharing, and supervision, are custom-designed under an efficient scientific research information system. Those intelligent contracts provide reliable data security and traceability algorithms to guarantee the practical application of the scientific research information system. The results show that the constructed system can relieve the centralized storage pressure of scientific research information and solve the cross-subject sharing obstacle of massive safety data among different systems. Thereby, the system increases the transparency of scientific evaluation and realizes the credible supervision of scientific research information, which provides a way to promote the innovative application of blockchain technology in scientific research management in colleges and universities.
APA, Harvard, Vancouver, ISO, and other styles
15

Mishchuk, Ievgeniia, Olha Serdiuk, Lilija Bekhter, and Olena Bondarenko. "Ensuring security of economic and informational interests of mining enterprises taking into account innovative technological trends." Eastern-European Journal of Enterprise Technologies 2, no. 13 (110) (April 30, 2021): 42–54. http://dx.doi.org/10.15587/1729-4061.2021.230308.

Full text
Abstract:
It was revealed that mining enterprises are poorly focused on rapid introduction of innovative technologies and developments in line with modern technological trends. Conceptual approach to ensuring the security of economic and informational enterprises` interests with innovative technological trends has been developed. Developed approach, in contrast to existing ones, makes it possible to determine directions of ensuring security in current period from perspective of future. It has been substantiated that proposed approach has high scientific explanatory potential for revealing substantive factors that determine current and desired enterprises` economic and informational interests’ security state. Highlighting security of economic and informational interests as component which is one of the first is responding to integration of innovation and technology degree will help to improve entire enterprise`s economic security ensuring quality. It is proposed to use ratio indicator of IT capital value to sum of fixed and intangible assets as indicator of security state of enterprise`s economic and informational interests. Verification of this indicator has been implemented. It is shown that automation of verification makes it possible to exclude subjective decision factor. On basis of verified indicator, state of economic and informational interest’s security of mining enterprises was assessed. The value obtained at PrJSC Northern GZK is 1, which corresponds to very high security state. Estimated values at all enterprises in sample are 0 and so they correspond to catastrophic security state. Obtained results are important, since they allow to reasonably make management decisions regarding the directions of ensuring the economic and informational interests security of mining enterprises on basis of IT capital value increasing
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Tang, Pengyu Chen, and Guang Chen. "Deconstruction of the Innovation Path of Digital Transformation Based on Network Big Data Security in the Context of Smart City." Security and Communication Networks 2022 (October 11, 2022): 1–10. http://dx.doi.org/10.1155/2022/8800489.

Full text
Abstract:
Digital transformation means that traditional enterprises have combined commerce, administration, and manufacturing with cloud services, the use of big data, and the web to advance the modern transformation of their research and development, creation, manufacturing and assembly, administration of operations, commercial support, and more tasks. Digital transformation showed that only companies can radically and completely (or substantially and completely) redefine their business—not just IT but all aspects of organizational activities, processes, business models, and employee capabilities. Only then can success be achieved. This paper aimed to study the innovative path of digital transformation and propose a network-based big data security method. Combined with the experimental analysis, it was concluded that using network big data security to monitor computer and network security (CNS), the attack detection accuracy rate is up to 99.8%. It can be seen that this method can accurately capture the shortcomings and leaks in the process of digital transformation, help achieve targeted path innovation, and improve the technological improvement and asset income growth of enterprises in the context of smart cities.
APA, Harvard, Vancouver, ISO, and other styles
17

Widiyanto, Wahyu Wijaya. "SIMRS Network Security Simulation Using Snort IDS and IPS Methods." Indonesian of Health Information Management Journal (INOHIM) 10, no. 1 (June 30, 2022): 10–17. http://dx.doi.org/10.47007/inohim.v10i1.396.

Full text
Abstract:
AbstractHospital information systems have an essential role in clinical and administrative services. This triggers an innovation that supports an integrated quality measurement data management system by integrating the Hospital Management Information System (SIMRS). SIMRS can be implemented locally or in the cloud, using the network to exchange data and information. Along with the current development of Information Technology, information security is very important, especially on a network connected to the internet. But what is unfortunate is that developments in the security system itself do not accompany the imbalance between each technological development. This study aims to overview techniques for securing network computers from various attacks through network security simulations. The research method used is using Snort as a detector to perform security on computer networks, while as a system for detecting and preventing intruders on computer network servers using the Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) methods. This study concludes that the IDS system with Snort simulated can detect attacks with the same average accuracy value of 99.97% and produce an average server response time value by good snort rules (1 client is 0.50 seconds, 2 clients are 0.32) seconds.Keywords: network security, snort, IDS, IPS AbstrakSistem informasi rumah sakit memiliki peran penting dalam pelayanan klinis dan administrasi. Hal ini memicu inovasi yang mendukung sistem pengelolaan data pengukuran mutu yang terintegrasi dengan mengintegrasikan Sistem Informasi Manajemen Rumah Sakit (SIMRS). Implementasi SIMRS dapat dilakukan secara lokal maupun cloud, keduanya menggunakan jaringan untuk bertukar data dan informasi. Seiring dengan perkembangan Teknologi Informasi saat ini, keamanan suatu informasi menjadi sangat penting terutama pada suatu jaringan yang terkoneksi dengan internet. Namun yang disayangkan, ketimpangan antara setiap perkembangan teknologi tersebut tidak dibarengi dengan perkembangan sistem keamanan itu sendiri. Penelitian ini bertujuan untuk memberikan gambaran tentang teknik pengamanan jaringan komputer dari berbagai jenis serangan melalui simulasi keamanan jaringan. Metode penelitian yang digunakan adalah menggunakan Snort sebagai pendeteksi untuk melakukan pengamanan pada jaringan komputer, sedangkan sebagai sistem untuk mendeteksi dan mencegah penyusup pada server jaringan komputer menggunakan metode Intrusion Detection Systems (IDS) dan Intrusion Prevention Systems (IPS). Kesimpulan dari penelitian ini adalah sistem IDS dengan simulasi Snort dapat mendeteksi serangan dengan nilai akurasi rata-rata yang sama yaitu 99,97%, dan menghasilkan nilai rata-rata waktu respon server dengan aturan snort yang baik (1 client adalah 0,50 detik, 2 client adalah 0,32) detik.Kata Kunci: keamanan jaringan, snort, IDS, IPS
APA, Harvard, Vancouver, ISO, and other styles
18

Mohammad, Abdulghafour, and Sergio Vargas. "Challenges of Using Blockchain in the Education Sector: A Literature Review." Applied Sciences 12, no. 13 (June 23, 2022): 6380. http://dx.doi.org/10.3390/app12136380.

Full text
Abstract:
Blockchain is one of the latest innovations that is increasingly attracting the attention of various stakeholders in different fields, including the education sector. This is primarily due to its attractive features, such as decentralization, transparency, traceability, security, and reliability. Despite its advantages, blockchain still faces several challenges, and the acceptance rate of this technology is still low. Thus, the purpose of this study was to conduct a review of published articles that have discussed the challenges of adopting blockchain in the education sector. The review contained scientific papers published from 2017 to 2022 and, from the screened records, 32 articles were analyzed in full-text form. In this review, 14 challenges were reported and classified, based on the technology-organization-environment (TOE) framework. In addition, this review showed that organizational and environmental barriers received little attention in the literature, compared to technological barriers.
APA, Harvard, Vancouver, ISO, and other styles
19

Lakishyk, Dmytro. "Features of the legal and military dimension of US foreign policy." American History & Politics: Scientific edition, no. 12 (2021): 9–22. http://dx.doi.org/10.17721/2521-1706.2021.12.1.

Full text
Abstract:
The role of the United States in the security system of the global international space is difficult to overestimate. At the same time, the question of the degree to which America’s national security strategies are consistent with the requirements of international security is increasingly being questioned. On the one hand, the shift in emphasis to humanitarian values has made it more logical to use modern force to address issues such as the spread of WMD or genocide. On the other hand, the practice of American action in the Middle East and Central Asia has demonstrated the limits of power policy through the use of high technology in the use of traditional structures and strategies. The aim of the article is to analyze the transformational aspect of US security and defense policy, the impact of which becomes more significant than technological innovation. The study, based on the methods of political analysis, identified the main characteristics of American world leadership, which includes military power, economic competitiveness, moral authority, active participation in international political processes on a global scale and efforts to streamline the international system. Conclusions. Responding to change must begin with an analysis of the social foundations of threats and, above all, the role of the social factor in modern wars. In case of unsuccessful application, technological power not only does not solve the problem, but also strengthens its social roots. Such a scenario creates a very dangerous situation for the United States, where counteraction can be crystallized or cover conflict sectors that are unusual for Americans. It is important to keep in mind that today’s security threats extend to specific citizens and communities more than to the state as a whole. That is why the world community’s acceptance of the American vision of international development in areas such as human rights and development is so important to America. While security is based on military capabilities in today’s world, its new forms and configurations require the embodiment of types of forceful intervention that are not always consistent with classical doctrines and strategic approaches.
APA, Harvard, Vancouver, ISO, and other styles
20

Gupta, Chetna, Jose Maria Fernandez-Crehuet, and Varun Gupta. "A novel value-based multi-criteria decision making approach to evaluate new technology adoption in SMEs." PeerJ Computer Science 8 (December 9, 2022): e1184. http://dx.doi.org/10.7717/peerj-cs.1184.

Full text
Abstract:
The modern competition is moving quickly toward incorporating cutting-edge technological improvements to support Small and Medium Enterprises (SMEs) in enhancing their business models. Making decisions regarding implementing new technologies in SMEs is a challenging process driven by the continuous new advances in the technology industry. Important operational process decisions, such as organizational investment costs, technology acquisition, maintenance, customer experience, employee training for the proper use of each technology, reliability requirements, and security needs, must be made very carefully for such adoptions. In this research, a novel multi-criteria decision-making process model is presented to help SME decision-makers choose the optimal technology from a list of desirable choices. The proposed approach makes use of a weighted multi-criteria decision model to rank parameters by combining many criteria that are crucial in choosing the best-suited technology. A literature review and expert opinion are utilized to pinpoint key decision-makers for the adoption of technological innovation. Specialists had reviewed the proposal in the field, and early findings suggest that it might be helpful to SME decision-makers in promoting customer value and firm performance.
APA, Harvard, Vancouver, ISO, and other styles
21

Alazeb, Abdulwahab, Brajendra Panda, Sultan Almakdi, and Mohammed Alshehri. "Data Integrity Preservation Schemes in Smart Healthcare Systems That Use Fog Computing Distribution." Electronics 10, no. 11 (May 30, 2021): 1314. http://dx.doi.org/10.3390/electronics10111314.

Full text
Abstract:
The volume of data generated worldwide is rapidly growing. Cloud computing, fog computing, and the Internet of things (IoT) technologies have been adapted to compute and process this high data volume. In coming years information technology will enable extensive developments in the field of healthcare and offer health care providers and patients broadened opportunities to enhance their healthcare experiences and services owing to heightened availability and enriched services through real-time data exchange. As promising as these technological innovations are, security issues such as data integrity and data consistency remain widely unaddressed. Therefore, it is important to engineer a solution to these issues. Developing a damage assessment and recovery control model for fog computing is critical. This paper proposes two models for using fog computing in healthcare: one for private fog computing distribution and one for public fog computing distribution. For each model, we propose a unique scheme to assess the damage caused by malicious attack, to accurately identify affected transactions and recover damaged data if needed. A transaction-dependency graph technique is used for both models to observe and monitor all transactions in the whole system. We conducted a simulation study to assess the applicability and efficacy of the proposed models. The evaluation rendered these models practicable and effective.
APA, Harvard, Vancouver, ISO, and other styles
22

Ahmed, Mohammed Imtyaz, and G. Kannan. "Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications." Journal of Information & Knowledge Management 20, Supp01 (January 30, 2021): 2140004. http://dx.doi.org/10.1142/s0219649221400049.

Full text
Abstract:
Radio frequency is the technology which enables smart labels to things. Thus, even physical things can participate in computing process. It is becoming popular due to its technological innovation and ability to overcome line of sight problem. With Internet of Things (IoT) technology, RFID usage became ubiquitous in smart applications or IoT use the cases like smart education, smart homes, smart healthcare and smart cities to mention a few. Integration of digital and physical worlds is made possible with IoT, RFID and host of other technologies and standards. When connected devices and things are uniquely identified using RFID technology, it is essential to know its utility in authentication process and security challenges thrown as well. RFID tag and RFID reader are involved in wireless communication and identification. RFID tags may carry sensitive information and its vulnerabilities if any are exploited by adversaries. Moreover, heavy computation is involved in RFID-based authentication. To overcome issues like privacy, security and overhead improvements have been proposed as found in the literature. Researchers used cryptographic tools, hash functions and symmetric key encryption for secure RFID communications. However, the level of security is still inadequate. In this paper, we proposed a cloud-based remote RFID authentication scheme with smart home as the case study. The proposed scheme has features like forward secrecy, anonymity and untraceability besides being light weight. It can withstand various security attacks. Our simulation study revealed that the proposed system model and the cloud-based remote RFID authentication scheme are effective in providing privacy and security as part of access control system in smart home IoT use case.
APA, Harvard, Vancouver, ISO, and other styles
23

Yao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things." Security and Communication Networks 2022 (October 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.

Full text
Abstract:
At present, the level of modernization and informatization is constantly improving, especially in rapidly developing China. A large amount of information is collected every second, forming a huge database and making people live in the “big data era.” Following cloud computing and the Internet of things, big data technology has become another revolutionary change in the global society, changing global development and becoming a new development point for technological innovation, industrial policy, and national information security. Big data in the new age poses new challenges and perspectives for the nation’s infosec development. Big data is a renewed tool for state security. Nations use big data to create state infosec, offering great facilitation, potential for adoption, and business value. This is a “new blue ocean” for competition among countries. Although big data brings convenience to public life, it also poses a serious threat to national information security. After the research and experiment of the model design of big data information security management of the Internet of things, the experimental data have shown that 86.67% set passwords in communication devices and storage devices. 66.67% installed firewalls, and 76.67% ran antivirus software. Compared with before, the total ratio of setting a password increased by 53.34% and the total ratio of installing a firewall and running antivirus software both increased by 26.67%. It can be seen from the above data that the protection of big data information under the Internet of things has been significantly improved. From the above data, through the big data information security management of the Internet of things, a new development direction is proposed for the development of information security.
APA, Harvard, Vancouver, ISO, and other styles
24

Anwar ul Hassan, Ch, Muhammad Hammad, Jawaid Iqbal, Saddam Hussain, Syed Sajid Ullah, Hussain AlSalman, Mogeeb A. A. Mosleh, and Muhammad Arif. "A Liquid Democracy Enabled Blockchain-Based Electronic Voting System." Scientific Programming 2022 (January 13, 2022): 1–10. http://dx.doi.org/10.1155/2022/1383007.

Full text
Abstract:
Developing an electronic voting system that meets the practical needs of administrators has been a difficult task for a long time. Now, blockchain technologies solve this problem by providing a distributed ledger with immutable, encrypted, and secure transactions. Distributed ledger technologies are an interesting technological leap in the field of data innovation, transparency, and trustability. In public blockchain, distributed ledger technology is widely used. The blockchain technology can be used in an almost infinite number of ways to benefit from sharing economies. The purpose of this study is to assess how blockchain may be utilized to build electronic voting systems that can be used as a service. The purpose of electronic voting systems is explained in this article, as are the technological and legal limitations of employing blockchain as a service. Then, using blockchain as a foundation, we propose a new electronic voting system that fixes the flaws we observed. In general, this paper evaluates the capabilities of distributed ledger technologies by depicting a contextual investigation in order to fine-tune the process of political election decisions and employing a blockchain-based application that improves security and lowers the cost of conducting nationwide elections.
APA, Harvard, Vancouver, ISO, and other styles
25

Pransky, Joanne. "The Pransky interview: Dr Rodney Brooks, Robotics Entrepreneur, Founder and CTO of Rethink Robotics." Industrial Robot: An International Journal 42, no. 1 (January 19, 2015): 1–4. http://dx.doi.org/10.1108/ir-10-2014-0406.

Full text
Abstract:
Purpose – This article, a “Q&A interview” conducted by Joanne Pransky of Industrial Robot Journal, aims to impart the combined technological, business, and personal experience of a prominent, robotic industry engineer-turned entrepreneur regarding the evolution, commercialization, and challenges of bringing a technological invention to market. Design/methodology/approach – The interviewee is Dr Rodney Brooks, the Panasonic Professor of Robotics (emeritus), Massachusetts Institute of Technology (MIT), Computer Science and Artificial Intelligence Lab; Founder, Chief Technical Officer (CTO) and Chairman of Rethink Robotics. Dr Brooks shares some of his underlying principles in technology, academia and business, as well as past and future challenges. Findings – Dr Brooks received degrees in pure mathematics from the Flinders University of South Australia and a PhD in computer science from Stanford University in 1981. He held research positions at Carnegie Mellon University and MIT, and a faculty position at Stanford before joining the faculty of MIT in 1984. He is also a Founder, Board Member and former CTO (1991-2008) of iRobot Corp (Nasdaq: IRBT). Dr Brooks is the former Director (1997-2007) of the MIT Artificial Intelligence Laboratory and then the MIT Computer Science & Artificial Intelligence Laboratory. He founded Rethink Robotics (formerly Heartland Robotics) in 2008. Originality/value – While at MIT, in 1988, Dr Brooks built Genghis, a hexapodal walker, designed for space exploration (which was on display for ten years in the Smithsonian National Air and Space Museum in Washington, D.C.). Genghis was one of the first robots that utilized Brooks’ pioneering subsumption architecture. Dr Brooks’ revolutionary behavior-based approach underlies the autonomous robots of iRobot, which has sold more than 12 million home robots worldwide, and has deployed more than 5,000 defense and security robots; and Rethink Robotics’ Baxter, the world’s first interactive production robot. Dr Brooks has won the Computers and Thought Award at the 1991 International Joint Conference on Artificial Intelligence, the 2008 IEEE Inaba Technical Award for Innovation Leading to Production, the 2014 Robotics Industry Association’s Engelberger Robotics Award for Leadership and the 2015 IEEE Robotics and Automation Award.
APA, Harvard, Vancouver, ISO, and other styles
26

Heidari, Arash, Mohammad Ali Jabraeil Jamali, Nima Jafari Navimipour, and Shahin Akbarpour. "Deep Q-Learning Technique for Offloading Offline/Online Computation in Blockchain-Enabled Green IoT-Edge Scenarios." Applied Sciences 12, no. 16 (August 17, 2022): 8232. http://dx.doi.org/10.3390/app12168232.

Full text
Abstract:
The number of Internet of Things (IoT)-related innovations has recently increased exponentially, with numerous IoT objects being invented one after the other. Where and how many resources can be transferred to carry out tasks or applications is known as computation offloading. Transferring resource-intensive computational tasks to a different external device in the network, such as a cloud, fog, or edge platform, is the strategy used in the IoT environment. Besides, offloading is one of the key technological enablers of the IoT, as it helps overcome the resource limitations of individual objects. One of the major shortcomings of previous research is the lack of an integrated offloading framework that can operate in an offline/online environment while preserving security. This paper offers a new deep Q-learning approach to address the IoT-edge offloading enabled blockchain problem using the Markov Decision Process (MDP). There is a substantial gap in the secure online/offline offloading systems in terms of security, and no work has been published in this arena thus far. This system can be used online and offline while maintaining privacy and security. The proposed method employs the Post Decision State (PDS) mechanism in online mode. Additionally, we integrate edge/cloud platforms into IoT blockchain-enabled networks to encourage the computational potential of IoT devices. This system can enable safe and secure cloud/edge/IoT offloading by employing blockchain. In this system, the master controller, offloading decision, block size, and processing nodes may be dynamically chosen and changed to reduce device energy consumption and cost. TensorFlow and Cooja’s simulation results demonstrated that the method could dramatically boost system efficiency relative to existing schemes. The findings showed that the method beats four benchmarks in terms of cost by 6.6%, computational overhead by 7.1%, energy use by 7.9%, task failure rate by 6.2%, and latency by 5.5% on average.
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Kai, Cheng Xu, Hongzhe Liu, Pengfei Wang, and Ziyi Chen. "Blockchain-Based Dangerous Driving Map Data Cognitive Model in 5G-V2X for Smart City Security." Security and Communication Networks 2022 (April 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/8922289.

Full text
Abstract:
The development of 5G network communication has brought technological innovation to smart city communication, making the realization of V2X (vehicle to everything) technology possible. Vehicles wirelessly communicate with other vehicles, sensors, pedestrians, and roadside units, raising data security issues while driving. In order to ensure driving safety, the risk map cognitive model is established with the help of blockchain technology. In this model, the key map data and personal privacy information are encrypted and uploaded to form a blockchain, and the smart contract technology is used for automatic script processing. Then, according to different risk scenarios, cognitive learning is carried out for different risk levels, the cognitive results and corresponding operations are fed back to the intelligent vehicle, and these operations ensure the safe operation of the vehicle according to the intelligent vehicle. Finally, the feasibility of the model was verified by comparing different dangerous scenarios. The experimental results show that this risk cognition model can cognize the data of the intelligent vehicle according to different danger scenarios, and the model can transmit acceleration, deceleration, braking, and other behaviors to the intelligent vehicle to ensure smart city driving safety.
APA, Harvard, Vancouver, ISO, and other styles
28

Alasbali, Nada, Saaidal Razalli Bin Azzuhri, Rosli Bin Salleh, Miss Laiha Mat Kiah, Ahmad Aliff A. S. Ahmad Shariffuddin, Nik Muhammad Izwan bin Nik Mohd Kamel, and Leila Ismail. "Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization." Mobile Information Systems 2022 (February 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/9109300.

Full text
Abstract:
Motivation. Standardization in smart city applications is restricted by the competitive pressures of proprietary innovation and technological compartmentalization. Interoperability across networks, databases, and APIs is essential to achieving the smart objectives of technology-supported urban environments. Methodology. The issues that smart cities face, as well as the usage of blockchain in Internet of Things (IoT) applications, are discussed in this research paper. Problem Statement. The study shows the obstacles to the establishment of an IoT-driven smart city agenda, including system security, dispersed node interoperability, data resource management, and scalability of a diverse IoT network. Results. To resolve these challenges, this research proposes a working infinite loop model for establishing a standardized, intermediary cloud-based blockchain for IoT networking within smart cities. The blockchain intermediary function will resolve critical gaps in the existing, distributed IoT-based smart cities’ standards, drawing connections between nodes, users, and service providers that are enabled through autonomous, immutable, and nonrepudiated transactions.
APA, Harvard, Vancouver, ISO, and other styles
29

Kochański, Maksymilian, Katarzyna Korczak, and Tadeusz Skoczkowski. "Technology Innovation System Analysis of Electricity Smart Metering in the European Union." Energies 13, no. 4 (February 18, 2020): 916. http://dx.doi.org/10.3390/en13040916.

Full text
Abstract:
Between 2018 and 2023 the penetration rate of electricity smart meters in the European Union (EU) is expected to grow from approximately 44% to 71%. The unprecedently rapid development of smart metering (SM) as an ICT-enabled technological novelty is progressing in a complex, multi-actor innovation system, which is strongly driven by EU-level institutions and policies. This paper presents the comprehensive Technology Innovation System (TIS) analysis of electricity SM development in the EU, with a focus placed on regulatory aspects. The article identifies the key elements of the SM innovation system (technologies and infrastructures; actors and networks; institutions and policies) and characterises their interaction based on an in-depth desk research and a critical assessment of regulations, statistics and primary and grey literature sources (e.g., market reports). The main enablers and barriers for EU-level SM TIS development are studied. The major driving force for EU-level SM TIS is the clear, yet evolving vision of EU-level actors for the SM deployment, founded on the grounds of energy conservation and empowerment of customers. On the other hand, the major inhibitor is the insufficient regulatory framework for roll-outs at the level of a Member State, which does not fully ensure interoperability, data protection and security standards or organisational effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
30

Yan, Chaosong, Jun Zhu, Yinglong Ouyang, and Xingyu Zeng. "Marketing Method and System Optimization Based on the Financial Blockchain of the Internet of Things." Wireless Communications and Mobile Computing 2021 (June 9, 2021): 1–11. http://dx.doi.org/10.1155/2021/9354569.

Full text
Abstract:
This article makes relevant research and analysis from theory and practice, respectively. At the same time, with reference to the current state of the Internet, relative analysis was used to focus on the state of commercial banks. The analysis mainly focuses on the problems encountered in the current Internet development in various forms such as the bank’s sales status and customer products. In addition, it really made a reasonable opinion about the relevant sales status of this bank. It systematically studied the development history of marketing products of financial blockchain in China’s financial blockchain and analyzed the process of gradual improvement of the functions and characteristics of marketing products of financial blockchain in China. The characteristics and shortcomings of the marketing products of the financial blockchain were discussed in detail, and from the perspective of technological innovation, the application of emerging technologies in the marketing of China’s financial blockchain was analyzed. This article analyzes the many challenges and opportunities faced by security firms in the development of the Internet. Under the new situation, what kind of development model to adopt and how to transform and upgrade is the strategic proposition that security firms must think about. Based on Internet finance, this article finds that the equity crowdfunding model can be selected in the future development of security companies. On the one hand, the use of equity crowdfunding by security firms can enhance their direct financing capabilities, which will benefit the security industry, especially Internet security firms. On the other hand, through equity crowdfunding, security companies can expand direct financing channels for small, medium, and micro enterprises to promote entrepreneurship. The paper promotes the development of Internet finance, thereby improving the ability of the capital market to serve the real economy.
APA, Harvard, Vancouver, ISO, and other styles
31

Peng, Licheng, Xiaowei Ma, Wanwan Ma, and Yuanxiang Zhou. "Evaluation of Economic Security of Water Resources and Analysis of Influencing Factors." Journal of Global Information Management 30, no. 6 (September 2022): 1–19. http://dx.doi.org/10.4018/jgim.20221101.oa2.

Full text
Abstract:
To effectively evaluate the level of economic security of water resources (WES) in China and analyze its influencing factors, a comprehensive evaluation model of WES and a regression analysis model of influencing factors are established based on the panel data of 30 provinces in China from 2011 to 2017. It is found that, first, WES in China presents a fluctuating upward trend. Second, different regions have different economic security levels for their water resources in China, among which WES in the central region is the highest. Third, there is a U-shaped correlation between economic development and WES, and the population, pollution control level, technological innovation have negative impacts on WES. Moreover, this study also finds that with upgrades to the industrial structure and level of human capital, there will be improvements to WES. However, the external coefficient and the investment scale of fixed assets have a negative impact on the economic security of water resources. This is helpful to utilize the water resources, and improve the water resources safety management.
APA, Harvard, Vancouver, ISO, and other styles
32

Romansky, Radi, and Irina Noninska. "Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection." International Journal of Human Capital and Information Technology Professionals 7, no. 3 (July 2016): 89–106. http://dx.doi.org/10.4018/ijhcitp.2016070107.

Full text
Abstract:
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.
APA, Harvard, Vancouver, ISO, and other styles
33

Brown, J. Owen, James A. Marcum, and Martin T. Stuebs. "Professional Virtue Reinforcements: A Necessary Complement to Technological and Policy Reforms." Journal of Information Systems 31, no. 2 (January 1, 2017): 5–23. http://dx.doi.org/10.2308/isys-51664.

Full text
Abstract:
ABSTRACT Rapid advances in technology within accounting information systems (AIS) accompanied by an increase in information accessibility render organizations vulnerable to the misuse of confidential data. AIS professionals are uniquely equipped and positioned to address these information security risks and to strengthen the trust stakeholders and the public place in the AIS function. We contend that reforms to control and protect intelligence with improved systemic controls must be complemented with reforms to control and protect professional integrity. We propose a Systems Trust Model that elevates professional virtue as a fundamental and necessary control element that complements information technology governance and systemic controls. We then analyze the necessity and sufficiency of the trust model elements for creating and protecting system trust—regardless of additional opportunities and incentives present in new and evolving technologies in AIS. Implications for future research, AIS curriculum, and the AIS profession at large are discussed.
APA, Harvard, Vancouver, ISO, and other styles
34

Patro, Chandra Sekhar. "Managing Retention as a Stratagem for Employee Job Satisfaction and Organizational Competitiveness in the ITeS Sector." International Journal of Human Capital and Information Technology Professionals 13, no. 1 (January 1, 2022): 1–20. http://dx.doi.org/10.4018/ijhcitp.305232.

Full text
Abstract:
In this continuously changing contemporary economy, organizations, particularly ITeS, have to be able to antedate technological innovations and compete with other enterprises globally. This need makes important a company's ability to evolve through its employees' learning and continuous development. Securing and retaining skilled employees plays a significant role in this process, as employees' knowledge and skills are essential to an organizations capability to be economically competitive. This is possible only when the employees are satisfied with the work and the organizational strategies adopted to retain them. Therefore, the study focuses on the organizational retention strategies that influence employee job satisfaction. The results indicate that the six constructs have a significant positive association with job satisfaction. Further, the demographic variables have a significant association with the employee retention constructs. The ITeS organizations could use the conclusions to identify the downsides and make necessary improvements in enhancing employee job satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
35

Thavorn, Jakkrit, Veera Muangsin, Chupun Gowanit, and Nongnuj Muangsin. "A Scientometric Assessment of Agri-Food Technology for Research Activity and Productivity." Publications 9, no. 4 (December 20, 2021): 57. http://dx.doi.org/10.3390/publications9040057.

Full text
Abstract:
In accordance with the UN Sustainable Development Goals (SDGs), several SDGs target global food issues, including zero hunger (food security and sustainable agriculture), responsible consumption and production (food losses), climate action (greenhouse gas emissions from food waste), and partnerships for the goals (research collaboration). As such, it is vital to identify technology and market opportunities to support advanced development by exploring scientific and technological research on such SDGs. The significance of technological innovation and evaluations of activity, productivity, and collaboration aids and guides future research streams. Motivated by the growing severity of the global food waste crisis, this paper focuses on the case study of shelf-life extension technology for food and applies a scientometric analysis of patents based on text mining. VantagePoint was used to analyze 2516 patents issued between 2000 and 2020, with the aim of understanding the conceptual structure of knowledge and the social relationships among key players. The results indicate that the technology is experiencing a period of growth, and it can be clustered into five technology sectors. Across all technology clusters, China outperformed other countries in terms of the number of patents. Almost all of China’s patents applied for technology commercialization domestically, whereas other countries tended to apply for patents overseas to exploit opportunities. The findings have implications for both policymaking and strategic decision-making using a multi-layered network innovation system.
APA, Harvard, Vancouver, ISO, and other styles
36

Wakjira, Kibebew, Taye Negera, Aleksejs Zacepins, Armands Kviesis, Vitalijs Komasilovs, Sascha Fiedler, Sascha Kirchner, et al. "Smart apiculture management services for developing countries—the case of SAMS project in Ethiopia and Indonesia." PeerJ Computer Science 7 (April 9, 2021): e484. http://dx.doi.org/10.7717/peerj-cs.484.

Full text
Abstract:
The European Union funded project SAMS (Smart Apiculture Management Services) enhances international cooperation of ICT (Information and Communication Technologies) and sustainable agriculture between EU and developing countries in pursuit of the EU commitment to the UN Sustainable Development Goal “End hunger, achieve food security and improved nutrition and promote sustainable agriculture”. The project consortium comprises four partners from Europe (two from Germany, Austria, and Latvia) and two partners each from Ethiopia and Indonesia. Beekeeping with small-scale operations provides suitable innovation labs for the demonstration and dissemination of cost-effective and easy-to-use open source ICT applications in developing countries. SAMS allows active monitoring and remote sensing of bee colonies and beekeeping by developing an ICT solution supporting the management of bee health and bee productivity as well as a role model for effective international cooperation. By following the user centered design (UCD) approach, SAMS addresses requirements of end-user communities on beekeeping in developing countries, and includes findings in its technological improvements and adaptation as well as in innovative services and business creation based on advanced ICT and remote sensing technologies. SAMS enhances the production of bee products, creates jobs (particularly youths/women), triggers investments, and establishes knowledge exchange through networks and initiated partnerships.
APA, Harvard, Vancouver, ISO, and other styles
37

Poltorak, Anastasiia, Natalia Potryvaieva, Vitalii Kuzoma, Yuriy Volosyuk, and Nadia Bobrovska. "Development of doctrinal model for state financial security management and forecasting its level." Eastern-European Journal of Enterprise Technologies 5, no. 13 (113) (October 31, 2021): 26–33. http://dx.doi.org/10.15587/1729-4061.2021.243056.

Full text
Abstract:
A doctrinal model of state financial security management in the context of globalization changes has been developed. The model is formed at five levels (doctrinal, conceptual, strategic, programmatic, planned), contains a logical continuum of mission, priorities in the financial sector and the level of technological innovation, influencing factors and a system of actions aimed at achieving goals. This model accumulates a set of solutions aimed at adapting to transformational processes in the economy associated with new needs of states, globalization processes in the world financial space, technology development, new challenges and threats. As a result of the study, forecasting is carried out and the effectiveness of the results of modifying approaches to managing the financial security of the state using a polynomial algorithm for extrapolating the parameters of stochastic systems is proved. A polynomial correlation-regression model is presented, the input data of which were specific indicators of the effectiveness of innovative development of the state, perception of corruption and debt dependence. In fact, this is a set of those indicators at which the strategic directions of strengthening the financial security of the state are directed in the context of globalization changes. The generalized values of the state of financial security of the state, determined on the basis of the developed polynomial correlation-regression model, are obtained, as well as the absolute and relative amounts of error indicate the accuracy of the forecasts obtained. So, the mean level of error is 0.005 %, which means that the totality of these indicators can characterize the state of financial security of the state. Accordingly, this model is useful in the process of predicting the results of modifying approaches to the formation of the financial security of the state
APA, Harvard, Vancouver, ISO, and other styles
38

Pronoza, Pavlo, Tаtyana Kuzenko, and Nataliіa Sablina. "Implementation of strategic tools in the process of financial security management of industrial enterprises in Ukraine." Eastern-European Journal of Enterprise Technologies 2, no. 13 (116) (April 28, 2022): 15–23. http://dx.doi.org/10.15587/1729-4061.2022.254234.

Full text
Abstract:
The results reported in this paper proved the need to develop strategic measures of the financial security management of enterprises. Approaches to understanding the essence of "management" and "financial security of an enterprise" concepts were analyzed; the author's vision of the essence of "management of the financial security of an enterprise" concept was generalized. Trends in the development of industrial enterprises were studied in order to identify the main indicators that determine the safety level of enterprises in the industry. Strategic directions in the financial security management of industrial enterprises were investigated. It was established that the construction of a regression model would allow an enterprise management to track the effect of deterministic factors on a change in the level of financial security of the enterprise and adjust the process of making managerial decisions related to the financial security of the enterprise. Given this, it became possible to build a tree of goals, which grouped and divided the strategic measures to manage the financial security of an enterprise. A strategic map was built, which reflected the relationship of all the processes at an enterprise and contributes to improving the level of management of the financial security of the enterprise. An expert study into the search for an optimal approach ensuring the financial security of an enterprise was conducted. It is confirmed that in order to improve the level of financial security management of an enterprise, it is necessary to optimize the trade and technological process in order to obtain maximum profit in the future, which could improve the state of all elements of the financial security management system of an enterprise. Thus, there is reason to assert that it is appropriate to define the strategic directions for managing the financial security of industrial enterprises by using regression and hierarchy models
APA, Harvard, Vancouver, ISO, and other styles
39

González, Daniel Pérez, and Pedro Solana González. "Interactions and Effects of CRM 2.0 in Public Administration." International Journal of Human Capital and Information Technology Professionals 3, no. 1 (January 2012): 26–41. http://dx.doi.org/10.4018/ijhcitp.2012010103.

Full text
Abstract:
This article analyzes how CRM are affected from technological and social changes that involves the new paradigm of knowledge sharing and collaborative Web 2.0, giving rise to what is defined as CRM 2.0, and how the public administration - institutions that despite economic and social importance have been little studied in relation to the incorporation of technologies - can take advantage of these technologies. This requires provide knowledge to public administrations about the benefits they can get and which difficulties may be encountered in these projects. In this sense, from an exploratory research through the application of a Delphi to senior managers of public administrations, the authors have identified as positive effects of implementing CRM projects with Web 2.0; improved productivity, increased citizen satisfaction, and better integration of the information and as main barriers highlight the measurement of the ROI, security and organizational issues. Questions of interest are to be considered by IT professionals who have to develop these initiatives in the future.
APA, Harvard, Vancouver, ISO, and other styles
40

Dai, Qiongyao. "System Resource Allocation and Rural Industry Revitalization Based on Max-Min Algorithm." Computational Intelligence and Neuroscience 2022 (May 31, 2022): 1–10. http://dx.doi.org/10.1155/2022/7983802.

Full text
Abstract:
At this stage, the research hotspots on wireless multimedia sensor networks mainly include MAC protocol, network security, and node positioning. Research on resource allocation is scarce. Due to the lack of an effective wireless resource allocation strategy, even the most advanced transmission technology will not be able to fully utilize its unique advantages due to unreasonable resource allocation. Therefore, in-depth research on wireless resource allocation strategies is of great significance for the better application of wireless transmission technology. The entire network uses OFDMA mechanism to divide time slots. According to this method, resource allocation can be divided into intercluster and intracluster, and then the Max-Min subcarrier allocation algorithm is innovated and perfected to ensure maximum information transmission speed and throughput and promote information data efficient transmission. Based on the research of wireless sensor system resource allocation technology, China has emphasized industrial prosperity as the key point in its rural revitalization strategy, and doing a good job in technological innovation and industrial innovation is of great significance to economic development. At this stage, the capacity of rural industrial economic development is poor, and the economic level of most rural areas is not high. This situation is inseparable from problems such as limited industrial development and insufficient technological innovation capabilities. In order to promote the prosperity of rural industries and achieve the goal of rural revitalization, we must proceed from the fundamentals and give priority to solving the outstanding problems encountered in the process of rural industrial revitalization. Promoting the revitalization of rural industries can effectively solve the current plight of agricultural development and is an inherent requirement for rural prosperity and the country's prosperity. Aiming at the problems in the process of restricting the revitalization of rural industries, this article adheres to the principle of integrating theory with practice and puts forward practical and feasible measures to solve the problem in a targeted manner.
APA, Harvard, Vancouver, ISO, and other styles
41

Mazieri, Marcos Rogério, Isabel Cristina Scafuto, and Priscila Rezende Da Costa. "Tokenization, blockchain and web 3.0 technologies as research objects in innovation management." International Journal of Innovation 10, no. 1 (March 17, 2022): 1–5. http://dx.doi.org/10.5585/iji.v10i1.21768.

Full text
Abstract:
The e-mail allegedly attributed to Satoshi Nakamoto (supposedly a pseudonym) was transmitted 14 years ago, describing the development of an electronic currency (Nakamoto, 2008). The design of this electronic currency represented the solution of the general Byzantine problem, a well-known problem in computing, which, in general terms, defines that one of the parts of a system can intentionally fail, and with that, make the entire network unavailable. Therefore, the premise is that part of the system is corrupt (Dolev et al., 1982). In the few lines of the email, Satoshi Nakamoto described such a solution and published an article with the details made available on the same date. The article describes how to transmit information within a chain of blocks that are: synchronized with date and time (time stamp); combined with code that depends on a previous block (hash code); can be validated with public and private key cryptography framework anonymously and decentrally; but highly resilient to any tampering attempt and with public record. The concept of digital currency, in this case Bitcoin, consisted at that time of a code or token resulting from encryption and that could be included in these blocks. Blocks registered definitively in the ledgers distributed along the blockchain network that could be traced. The digital framework developed by Satoshi Nakamoto, although it emerged to make Bitcoin viable as a digital currency, has been separated over the last 14 years. Blockchain can be understood as a decentralized communication technology that gave rise to a family of other technological structures of encrypted communication such as ecosystems, public blockchain, private blockchain and blockchain networks, mainly (Mazumdar Ruj, 2022). Digital currencies, on the other hand, have also developed in variety and quantity, so much so that as we write this editorial there are over 10,000 digital currencies in operation. The total capitalization value of digital currencies rose from USD 18 billion at the beginning of 2017, surpassing USD 1.4 trillion by mid-2021 (Su et al., 2022). Currently, there is no technological impediment for companies to create their own digital currencies using a Bitcoin network or an Etherium network, for example, as well as many other networks available.Obviously, even today, there are technical challenges related, mainly, to the scalability of these networks and currencies. Bitcoin, when created, had a capacity of 7 transactions per second, currently, as we write this editorial, the transaction capacity of the Bitcoin network (BTS) is 14 transactions per second. The Etherium (ETH) network was born with a capacity of 20 transactions per second and currently has a capacity of 35 transactions per second. For comparison purposes, the VISA network has a capacity of 1700 transactions per second, which shows that there is still some way to make blockchain networks the new communication backbone, scalable for more mass uses (Chauhan Patel, 2022). There are implementations of the Solana network, for example, which promises to reach 50,000 transactions per second, still in the confirmation phase from a practical point of view, which could allow running Internet of Things (IoT) applications on this blockchain network (Duffy et al., 2021).At the same time, since 2013, the reorganization of the TCP IP structure from IPv4 (4.2 billion IP addresses) to IPv6 (79 octillion IP addresses or 7.9 x ) more than the total number of IPv4 addresses) has been implemented. Such implementation made it possible to expand connectivity to a level sufficient for the world demand, which is 56 octillion (56 x ) addresses per human being on earth. In terms of addressing, the possibilities of connecting new and future elements on the internet/blockchain communication network are guaranteed, making the IoT (Internet of Things) a real possibility.In addition to the traditional applications dedicated to making digital currency viable, especially in the last 5 years, certain works resulting from the combination of information technology and human creativity (also known as creative economy) brought NFT (Non-Fungible Token) to the management field. NFT are tokens (produced through encrypted code, subscribed in some blockchain network) that express the ownership of their author. Whoever acquires an NFT, has his/her record recorded in a ledger and, therefore, can exercise the rights or benefits related to the possession of that NFT. There are two main origins of an NFT, digital games and works of art or graphic expressions (Vasan et al., 2022). In the case of digital games, NFT can be used to record permanently and nominally the “achievements achieved” within a given game. Its owner now takes possession of a certain item that, previously, would only exist within the game itself, a virtual (digital) environment. In the case of graphic, artistic expressions, and other works of art, it is possible to make your possession digital. Works from the natural environment (physical), the result of expressions of human creativity, are now registered in an NFT-type token, coming to exist in the virtual world (digital). In this way, the works, and the data of their authorship and ownership, are permanently registered in the ledger of a blockchain network specialized in transacting NFT. As in the game, the possession of an NFT of a work of art allows the author to trade or use the benefits related to the possession of this NFT.From the convergence of connectivity technologies such as cloud computing, the advent of IPV6 and technologies based on tokens (blockchain, crypto assets and NFT not exhaustively) the concept of Web 3.0 becomes viable. Web 3.0 can be understood as a network of people and physical objects, making the integration between the natural world and the virtual world more intense (augmented, virtual and mixed reality). The idea of a Metaverse (Web 3.0 Application) depends on the technological availability that we describe here very succinctly and on the realization of new social behaviors that are underway (Korkmaz et al., 2022).The context described is not new to most practitioners and academics involved with innovation. However, by describing it in general terms, we can identify different research objects that may be of interest to the community working in the field of innovation management. Evidently, within the research perspectives, especially in innovation management, parallel logics can be established with the more established theories or concepts, which allow an approximation with the new technological objects available to people and companies. Such technologies have permeated traditional companies and startups that have a specific focus on these connectivity technologies described as core business or as business support.The idea of this editorial comment is to recognize the possibility of receiving more technological articles or scientific articles, perspectives and book reviews that consider connectivity and tokenization technologies as research objects. Such technologies can be positioned in research both as objects of analysis and as contextual and organizational objects. Whether contextual and organizational can bring research involving routines, capabilities, competencies and business models, whose core business process is innovation at different scales, natures, degrees of novelty, stages of diffusion or adoption. To cite just one possibility, as an example, the model by Tidd and Bessant from 2009, which describes the construct of orientation to innovation strategy, used in several research in the field of innovation since then, can be revised in the new contexts or in the face of new technologies (Ferreira et al., 2015). If such technologies are positioned as objects of analysis, research can involve every part of the innovation management process such as searching for innovations, selecting innovations, implementing innovations, generating value with innovations, and capturing value with innovations in analysis of single level or multilevel. In addition to the direct positioning of token and blockchain-based technologies, as an object or as a contextual aspect, adjacent effects are expected, for instance, involving intellectual property, environmental and social sustainability, technological governance, people management and other consequences that may be the focus of research, considering the emerging technologies mentioned above. There is also the field of research that is dedicated to the development of new products, both defining new models of digital product development and methods derived from these models, without forgetting all the implications related to the issues of information security management involved in these contexts of token transactions (Baudier et al., 2022). Although the possibilities for theoretical and managerial development for the area of innovation research, involving technologies based on tokens and blockchain, are broad, there is research that can be very relevant, but that would be better received in journals in mathematics, computer science or even software engineering and not in journals dedicated to innovation. Research that develops a new way of doing encryption, or even a more efficient algorithm that allows increasing the capacity of transactions per second, the design of a new network or a new ecosystem based on blockchain or even research that develops improvements in consensus protocols of blockchain undoubtedly has great value but would be expected in engineering or math journals. On the other hand, there are studies that bring reports of implementations of a business application on a blockchain basis, either as a business support application, or in the form of designing a blockchain-based product that will be taken to the market (Wan et al., 2022). In these cases, applied research, from the point of view of innovation research, what is expected to be found in the article is the development of knowledge that demonstrates how, why or to what extent the innovation processes were sensitized, or in what way the process of innovation contributed or presented limitations to support the reported implementation. In this way, such research can be received as technological articles, since the theoretical elements that relate the innovation process, or the management of the innovation process with the implementation based on token or blockchain, will be present, which are the bases of analysis used to support the expansion of innovation theories, innovation management or management practices in innovation contexts.Finally, we invite the entire community to submit papers with theoretical discussions related to paradigm shifts, involving the dematerialized nature of new products and their tendency towards a service-oriented view (Jain et al., 2022).As it should be clear, this editorial comment did not explore all the possibilities of research in innovation management involving technologies based on tokens and blockchain, but only a few examples that can help to obtain insights. We intend, in some way, to encourage the innovation community to develop studies considering new technologies, developing, or expanding theories and knowledge of innovation.
APA, Harvard, Vancouver, ISO, and other styles
42

Ng-Kruelle, Grace, Paul Swatman, J. Felix Hampe, and Douglas Rebne. "Biometrics and e-Identity (e-Passport) in the European Union: End-User Perspectives on the Adoption of a Controversial Innovation." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 12–35. http://dx.doi.org/10.3390/jtaer1020010.

Full text
Abstract:
This study deals with user acceptability of a proposed e-Passport in the European Union (EU). E-passport is an advanced version of a combined national identity card and travelling document which holds digitised biometric features of its associated individual for enhanced security of personal authentication. We attempt here to investigate the nature of the innovation and citizens’ attitudes to an e-Passport (or analogous innovation) in a range of socio-political-contexts within which the implementation occur. This paper reports the findings of an Internet Survey, conducted as the second part following a larger research program on biometrics-based e- Identity (e-Passport) acceptability and deployment issues. The data collected are interpreted under the guidance of the theoretic framework ‘Price of Convenience’ briefly described and fully referenced herein and theories of national culture after Hofstede [15], [16]. We found that although a direct and complete extrapolation of results from countries of similar cultural dimensions to another is not possible, limited referencing is still possible and provides a rather rich understanding of a country when it is used together with other dimensions of study. Although useful in helping to draw parallels between different countries, Hofstede’s work is not all encompassing. Thus we also proposed other contingency factors and indicators for e-Passport acceptance which can make countries with similar cultural dimensions appear very different in biometric technological adoption.
APA, Harvard, Vancouver, ISO, and other styles
43

Poonsuph, Rattakorn. "The Design Blueprint for a Large-Scale Telehealth Platform." International Journal of Telemedicine and Applications 2022 (January 5, 2022): 1–15. http://dx.doi.org/10.1155/2022/8486508.

Full text
Abstract:
Technological innovation plays a crucial role in digital healthcare services. A growing number of telehealth platforms are concentrating on using digital tools to improve the quality and availability of care. Virtual care solutions employ not only advanced telehealth technology but also a comprehensive range of healthcare services. As a result, these can reduce patient healthcare costs as well as increase accessibility and convenience. At the same time, the healthcare service provider can leverage healthcare professionals to get a better perspective into the needs of their patients. The objective of this research is to provide a comprehensive design blueprint for a large-scale telehealth platform. Telehealth is the digital healthcare service combining online services and offline access for healthcare facilities to offer various healthcare services directly to patients. This design blueprint covers the digital healthcare ecosystem, new patient journey design for digital health services, telehealth functionality design, and an outline of the platform infrastructure and security design. Ultimately, telehealth platforms establish a completed digital healthcare service and new ecosystem that provides better care for every patient worldwide.
APA, Harvard, Vancouver, ISO, and other styles
44

Awa, Hart O., and Ojiabo Ukoha Ojiabo. "A model of adoption determinants of ERP within T-O-E framework." Information Technology & People 29, no. 4 (November 7, 2016): 901–30. http://dx.doi.org/10.1108/itp-03-2015-0068.

Full text
Abstract:
Purpose The purpose of this paper is to attempts to provide further insight into IS adoption by investigating how 12 factors within the technology-organization-environment framework explain small- and medium-sized enterprises’ (SMEs) adoption of enterprise resource planning (ERP) software. Design/methodology/approach The approach for data collection was questionnaire survey involving executives of SMEs drawn from six fast service enterprises with strong operations in Port Harcourt. The mode of sampling was purposive and snow ball and analysis involves logistic regression test; the likelihood ratios, Hosmer and Lemeshow’s goodness of fit, and Nagelkerke’s R2 provided the necessary lenses. Findings The 12 hypothesized relationships were supported with each factor differing in its statistical coefficient and some bearing negative values. ICT infrastructures, technical know-how, perceived compatibility, perceived values, security, and firm’s size were found statistically significant adoption determinants. Although, scope of business operations, trading partners’ readiness, demographic composition, subjective norms, external supports, and competitive pressures were equally critical but their negative coefficients suggest they pose less of an obstacle to adopters than to non-adopters. Thus, adoption of ERP by SMEs is more driven by technological factors than by organizational and environmental factors. Research limitations/implications The study is limited by its scope of data collection and phases, therefore extended data are needed to apply the findings to other sectors/industries and to factor in the implementation and post-adoption phases in order to forge a more integrated and holistic adoption framework. Practical implications The model may be used by IS vendors to make investment decisions, to meet customers’ needs, and to craft informed marketing programs that would appeal to actual and potential adopters and cause them to progress in the customer loyalty ladder. Originality/value The paper contributes to the growing research on IS innovations’ adoption by using factors within the T-O-E framework to explains SMEs’ adoption of ERP.
APA, Harvard, Vancouver, ISO, and other styles
45

Sayibu, Muhideen, Jianxun Chu, Akintunde Tosin Yinka, Olayemi Hafeez Rufai, Riffat Shahani, and MA Jin. "COVID-19 smart surveillance: Examination of Knowledge of Apps and mobile thermometer detectors (MTDs) in a high-risk society." DIGITAL HEALTH 8 (January 2022): 205520762211320. http://dx.doi.org/10.1177/20552076221132092.

Full text
Abstract:
Background Technological innovations gained momentum and supported COVID-19 intelligence surveillance among high-risk populations globally. We examined technology surveillance using mobile thermometer detectors (MTDs), knowledge of App, and self-efficacy as a means of sensing body temperature as a measure of COVID-19 risk mitigation. In a cross-sectional survey, we explored COVID-19 risk mitigation, mobile temperature detectable by network syndromic surveillance mobility, detachable from clinicians, and laboratory diagnoses to elucidate the magnitude of community monitoring. Materials and Methods In a cross-sectional survey, we create in-depth comprehension of risk mitigation, mobile temperature Thermometer detector, and other variables for surveillance and monitoring among 850 university students and healthcare workers. An applied structural equation model was adopted for analysis with Amos v.24. We established that mobile usability knowledge of APP could effectively aid in COVID-19 intelligence risk mitigation. Moreover, both self-efficacy and mobile temperature positively strengthened data visualization for public health decision-making. Results The algorithms utilize a validated point-of-center test to ascertain the HealthCode scanning system for a positive or negative COVID-19 notification. The MTD is an alternative personal self-testing procedure used to verify temperature rates based on previous SARS-CoV-2 and future mobility digital health. Personal self-care of MTD mobility and knowledge of mHealth apps can specifically manage COVID-19 mitigation in high or low terrestrial areas. We found mobile usability, mobile self-efficacy, and app knowledge were statistically significant to COVID-19 mitigation. Additionally, interaction strengthened the positive relationship between self-efficacy and COVID-19. Data aggregation is entrusted with government database agencies, using natural language processing and machine learning mechanisms to validate and analyze. Conclusion The study shows that temperature thermometer detectors, mobile usability, and knowledge of App enhanced COVID-19 risk mitigation in a high or low-risk environment. The standardizing dataset is necessary to ensure privacy and security preservation of data ethics.
APA, Harvard, Vancouver, ISO, and other styles
46

Stashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (March 25, 2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.

Full text
Abstract:
The article identifies the essence of the concept of banking innovations and their role in the financial security of banking institutions. Features of development of technological banking innovations in Ukraine, including in the conditions of influence of COVID-19 are considered. The characteristics of banking innovations are considered, the criteria to be met by banking innovations both on the part of the client and on the part of the bank are identified. The classification of banking innovations according to such features as: by time aspect, by novelty, by causes of occurrence, by volume of influence, by influence on behavior, by scale of innovation, etc. is given. It is proved that the financial security of a banking institution should provide protection of banks from the impact of external and internal threats, as well as minimize the level of their negative impact. The basic principles of financial security of banking innovations in order to ensure the stable development of the latter are described. It is established that the most relevant and in demand in the market in the development of coronavirus infection were such technological innovations of remote capabilities as: contactless payments, online services, mobile banking applications, electronic money transfers, virtual cards. The peculiarities of the use of technological innovations by banking institutions in Ukraine and their impact on the security of banking institutions and customers are noted. In order to conduct the study, such general scientific and specific research methods were used as: the logical method, the method of analysis and synthesis, the system method, the method of theoretical generalization, the grouping method, the expert method and the method of logical analysis.
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Yu. "Analyzing the Construction of University ELT Resource Base Using Cloud Platform." Mobile Information Systems 2022 (May 18, 2022): 1–10. http://dx.doi.org/10.1155/2022/4986923.

Full text
Abstract:
The design and application of multimedia and network technology provide opportunities for students and teachers to use the latest technological trends. It effectively promotes the information technology to enter the classroom and integrate it into subject teaching. To improve the teaching quality of higher education and the level of running a school, universities and colleges have started the innovation and strengthening school projects and quality engineering construction. One of these is the construction of excellent resource courses. It uses an information platform to build several high-quality teaching resources and promote the co-construction and sharing of high-quality educational resources. It also promotes education and teaching refinement in universities and colleges. The subjective difficulties encountered by college English teachers in the process of developing and utilizing English curriculum resources are mainly reflected in their lack of professional knowledge and existing resources. The professional knowledge is 45.4%, while the existing resources are only 36.3%. However, every person is confident in their own development consciousness and ability. This paper studies the building of the university ELT resource base based on a cloud platform. The cloud platform has the ability to enrich teaching resources by optimizing the management and evaluation of these resources and provide much broader space and viable options for the learning of students and facilitation of teachers. The suggested platform in this article implements unified data management, security, application, and other management in the “cloud” and helps consumers focus on their core business rather than on management. This concept significantly reduces the amount of money spent on education informatization and alters the way the government invests in education. It will produce more cost-effective and realistic solutions, as well as increase economic benefits.
APA, Harvard, Vancouver, ISO, and other styles
48

Tangjuan, Mou, and Kim Il-Tae. "Research on Children’s Education App Network Transmission Based on 5G Mobile Computing Technology." Scientific Programming 2022 (February 8, 2022): 1–11. http://dx.doi.org/10.1155/2022/7781604.

Full text
Abstract:
With the continuous improvement of China’s scientific and technological level, the popularity of mobile network technology is becoming more and more widespread. Many big data technologies and wireless sensor technologies have brought new changes to people’s lives. At present, the functions of communication technology and network transmission have moved from perfection to new innovation and development. 5G mobile network technology has played an important role in various fields. When China’s economy and science and technology develop better and better, people pay more and more attention to children’s education. The research on children’s education has become a hot topic. From the above background, this paper studies the network transmission function and network transmission path of children’s education app in 5G era mobile computing technology. First, starting from the development trend and main functions of 5G, this paper briefly describes the functional requirements of children’s education app. The efficient data transmission in the 5G mobile wireless sensor network is applied to children’s education app. Starting from the distance of network transmission nodes, the data transmission optimization algorithm is adopted, and the network transmission module is composed of the best transmission path of nodes. Combined with the energy-saving effect of mobile computing technology, the problem of excessive consumption of network transmission resources is optimized. Finally, the data transmission path is studied in the 5G mobile network. The results show that 5G mobile computing technology can optimize the network transmission performance, improve the operation efficiency of the server, and has a good effect in solving the problems of delay and low coverage. In the process of children’s education app network transmission under 5G mobile computing technology, it can ensure the user’s personal information and improve the security of system feedback.
APA, Harvard, Vancouver, ISO, and other styles
49

Ananadharaj, G., and K. Balaji*. "A Study Internet of Things Is A Revolutionary Approach for Future Technology Enhancement." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 114–19. http://dx.doi.org/10.35940/ijeat.d2387.0410421.

Full text
Abstract:
The creation is pushing ahead on a quick leap, and the recognition goes to regularly developing innovation. One such idea is Internet of things with which robotization is never again an augmented simulation. IOT interfaces different nonliving articles through the web and empowers them to impart data to their locale system to computerize forms for people and makes their lives simpler. The paper shows what's to come difficulties of IoT ,, for example, the specialized (network , similarity and life span , guidelines , insightful investigation and activities , security), business ( venture , unassuming income model and so forth ), cultural (evolving requests , new gadgets, cost, client certainty and so forth ) and lawful difficulties ( laws, guidelines, methodology, approaches and so on ). An area additionally examines the different fantasies that may hamper the advancement of Internet of things, security of information being the most basic factor of all. An idealistic way to deal with individuals in embracing the unfurling changes brought by IOT will likewise benefit in its development. Internet of Things (IoT) is a new paradigm that has changed the traditional way of living into a high tech life style. Smart city, smart homes, pollution control, energy saving, smart transportation, smart industries are such transformations due to IoT. A lot of crucial research studies and investigations have been done in order to enhance the technology through IoT. However, there are still a lot of challenges and issues that need to be addressed to achieve the full potential of IoT. These challenges and issues must be considered from various aspects of IoT such as applications, challenges, enabling technologies, social and environmental impacts etc. The main goal of this review article is to provide a detailed discussion from both technological and social perspective. The article discusses different challenges and key issues of IoT, architecture and important application domains. Also, the article bring into light the existing literature and illustrated their contribution in different aspects of IoT. Moreover, the importance of big data and its analysis with respect to IoT has been discussed. This article would help the readers and researcher to understand the IoT and its applicability to the real world.
APA, Harvard, Vancouver, ISO, and other styles
50

Sheharyar, Muhammad, Alamgir Naushad, Imran Khan, Muhammad Abid Hussain, and Faizullah Khan Kakar. "Study on Fixed and Dynamic Spectrum Access Models for Cellular Networks." Journal of Telecommunications and the Digital Economy 10, no. 2 (June 29, 2022): 267–87. http://dx.doi.org/10.18080/jtde.v10n2.395.

Full text
Abstract:
Radio frequency spectrum is a scarce resource, hence its effective and efficient utilization for contemporary and future technologies is of paramount importance. This paper mainly focuses on analysing conventional models for spectrum management, such as command and control and market-based models, and their inefficacy to serve the upcoming technological demands globally. Generally outlined observations concerning spectrum mismanagement include lesser availability of unassigned spectrum and under-utilization of spectrum allocated to passive users. Due to the considerable urge for flexible spectrum assignment framework models and policies, new spectrum assignment approaches, such as Dynamic Spectrum Access, are investigated. Moreover, models such as Licensed Shared Access (LSA), which evolved from Europe, and Citizen Bands Radio Service (CBRS) from North America are also evaluated in this paper as potential choices for future spectrum management in Pakistan. In the aforesaid models, spectrum is shared among multiple users as per time, place and dimensions, keeping in view the security and priority of incumbent and licensed users. In addition, the efficiency of spectrum utilization and economic advantages of these models have also been analysed. Lastly, LSA and CBRS are studied comparatively, and spectrum management suggestions are made for effective implementation in Pakistan.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography