Articles de revues sur le sujet « Software Supply Chain Security »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Software Supply Chain Security.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Software Supply Chain Security ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Morkūnas, Mangirdas, Elzė Rudienė et Aleksander Ostenda. « CAN CLIMATE-SMART AGRICULTURE HELP TO ASSURE FOOD SECURITY THROUGH SHORT SUPPLY CHAINS ? A SYSTEMATIC BIBLIOMETRIC AND BIBLIOGRAPHIC LITERATURE REVIEW ». Journal Business, Management and Economics Engineering 20, no 02 (14 juillet 2022) : 207–23. http://dx.doi.org/10.3846/bmee.2022.17101.

Texte intégral
Résumé :
Purpose – This paper aims to reveal potential research possibilities for enhancing climate-smart agriculture through short supply chains. Research question – How can short supply chains assure food security and the promotion of climate-smart agriculture? Research methodology – Bibliographic and bibliometric coupling techniques were employed using data from 1990–2022. The raw data was processed using the VOSviewer 1.6.18 software version. Findings – The results confirm the positive effect of the systemically important relationship between the short supply chain and food security. Research limitations – Climate-smart agriculture is a complex and multifaceted phenomenon. Additional variables may have moderating and mediating effects on the impact of short supply chains on food security. Practical implications – The results establish the importance of having a short supply chain for food security in different aspects of the process from the harvest to the table. Originality and value – This study confirms the rationale for developing shorter food supply chains to assure food security and climate-smart agriculture when possible.
Styles APA, Harvard, Vancouver, ISO, etc.
2

P.N., Sindhuja. « The impact of information security initiatives on supply chain robustness and performance : an empirical study ». Information & ; Computer Security 29, no 2 (10 juin 2021) : 365–91. http://dx.doi.org/10.1108/ics-07-2020-0128.

Texte intégral
Résumé :
Purpose Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information security has widened as information has become a critical supply chain asset, making it more important to protect the organization’s data. Today’s global supply chains rely upon the speedy and robust dissemination of information among supply chain partners. Hence, processing of accurate supply chain information is quintessential to ensure the robustness and performance of supply chains. An effective information security management (ISM) is deemed to ensure the robustness of supply chains. The purpose of the paper is to examine the impact of information security initiatives on supply chain robustness and performance. Design/methodology/approach Based on extant literature, a research model was developed and validated using a questionnaire survey instrument administered among information systems/information technology managers. Data collected were analyzed using exploratory and confirmatory factor analysis. Further, to test the hypotheses and to fit the theoretical model, Structural equation modeling techniques were used. Findings Results of this study indicated that information security initiatives are positively associated with supply chain robustness and performance. These initiatives are likely to enhance the robustness and performance of the supply chains. Originality/value With the advancements in internet technologies and capabilities as well as considering the dynamic environment of supply chains, this study is relevant in terms of the capability that an organization needs to acquire with regards to ISM. Benefiting from the resource dependency theory, information security initiatives could be considered as a critical resource having an influence on the internal and external environment of supply chains.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kaczorowski, Maya, Falcon Momot, George V. Neville-Neil et Chris McCubbin. « OSS Supply-chain Security : What Will It Take ? » Queue 20, no 5 (31 octobre 2022) : 86–102. http://dx.doi.org/10.1145/3570923.

Texte intégral
Résumé :
While enterprise security teams naturally tend to turn their focus primarily to direct attacks on their own infrastructure, cybercrime exploits now are increasingly aimed at easier targets upstream. This has led to a perfect storm, since virtually all significant codebase repositories at this point include at least some amount of open-source software. But opportunities also abound there for the authors of malware. The broader cybercrime world, meanwhile, has noted that open-source supply chains are generally easy to penetrate. What's being done at this point to address the apparent risks?
Styles APA, Harvard, Vancouver, ISO, etc.
4

Barabanov, Alexander V., Alexey S. Markov et Valentin L. Tsirlov. « Information security systematics of software supply chains ». Bezopasnost informacionnyh tehnology 26, no 3 (septembre 2019) : 68–79. http://dx.doi.org/10.26583/bit.2019.3.06.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Turjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur et Atef Zaguia. « Smart Supply Chain Management Using the Blockchain and Smart Contract ». Scientific Programming 2021 (28 septembre 2021) : 1–12. http://dx.doi.org/10.1155/2021/6092792.

Texte intégral
Résumé :
The manufacture of raw materials to deliver the product to the consumer in a traditional supply chain system is a manual process with insufficient data and transaction security. It also takes a significant amount of time, making the entire procedure lengthy. Overall, the undivided process is ineffective and untrustworthy for consumers. If blockchain and smart contract technologies are integrated into traditional supply chain management systems, data security, authenticity, time management, and transaction processes will all be significantly improved. Blockchain is a revolutionary, decentralized technology that protects data from unauthorized access. The entire supply chain management (SCM) will be satisfied with the consumer once smart contracts are implemented. The plan becomes more trustworthy when the mediator is contracted, which is doable in these ways. The tags employed in the conventional SCM process are costly and have limited possibilities. As a result, it is difficult to maintain product secrecy and accountability in the SCM scheme. It is also a common target for wireless attacks (reply attacks, eavesdropping, etc.). In SCM, the phrase “product confidentiality” is very significant. It means that only those who have been validated have access to the information. This paper emphasizes reducing the involvement of third parties in the supply chain system and improving data security. Traditional supply chain management systems have a number of significant flaws. Lack of traceability, difficulty maintaining product safety and quality, failure to monitor and control inventory in warehouses and shops, rising supply chain expenses, and so on, are some of them. The focus of this paper is on minimizing third-party participation in the supply chain system and enhancing data security. This improves accessibility, efficiency, and timeliness throughout the whole process. The primary advantage is that individuals will feel safer throughout the payment process. However, in this study, a peer-to-peer encrypted system was utilized in conjunction with a smart contract. Additionally, there are a few other features. Because this document makes use of an immutable ledger, the hacker will be unable to get access to it. Even if they get access to the system, they will be unable to modify any data. If the goods are defective, the transaction will be halted, and the customer will be reimbursed, with the seller receiving the merchandise. By using cryptographic methods, transaction security will be a feasible alternative for recasting these issues. Finally, this paper will demonstrate how to maintain the method with the maximum level of safety, transparency, and efficiency.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ehsan, Ibtisam, Muhammad Irfan Khalid, Laura Ricci, Jawaid Iqbal, Amerah Alabrah, Syed Sajid Ullah et Taha M. Alfakih. « A Conceptual Model for Blockchain-Based Agriculture Food Supply Chain System ». Scientific Programming 2022 (28 février 2022) : 1–15. http://dx.doi.org/10.1155/2022/7358354.

Texte intégral
Résumé :
In agriculture supply chain management, traceability is a crucial aspect to ensure food safety for increasing customer loyalty and satisfaction. Lack of quality assurance in centralized data storage makes us move towards a new approach based on a decentralized system in which transparency and quality assurance is guaranteed throughout the supply chain from producer to consumer. The current supply chain model has some disadvantages like a communication gap between the entities of the supply chain and no information about the travel history and origin of the product. The use of technology improves the communication and relation between various farmers and stakeholders. Blockchain technology acquires transparency and traceability in the supply chain, provides transaction records traceability, and enhances security for the whole supply chain. In this paper, we present a blockchain-based, fully decentralized traceability model that ensures the integrity and transparency of the system. This new model eliminated most of the disadvantages of the traditional supply chain. For the coordination of all transactions in the supply chain, we proposed a decentralized supply chain model along with a smart contract.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Wang, Lai-Wang, Chen-Chih Hung et Ching-Tang Hsieh. « Security Strategy Optimization and Algorithm Based on 3D Economic Sustainable Supply Chain ». Scientific Programming 2022 (10 septembre 2022) : 1–11. http://dx.doi.org/10.1155/2022/9972658.

Texte intégral
Résumé :
Based on the background of system intelligence in the Internet of things era, this paper applied the design field of interaction design and user experience in the early days, and conducted further in-depth investigation through a large number of case studies and the use of quantitative and qualitative investigation methods. Based on this, the theories and strategies of the interaction design between enterprise members and intelligent machines were put forward and tested by actual design. At present, air pollution, energy shortage, and other issues are becoming more and more prominent, and calls for energy conservation, emission reduction, strengthening corporate social responsibility, and reducing the impact of economic development on the environment and society are growing. Therefore, companies must rethink their strategies and adapt their supply chains. Based on limited resources, enterprise machines have traditionally acted as a tool or a communication tool for a person. Yet, at the same time as the economy develops, the direct interaction between human and machine gradually emerges, and the economic development of an enterprise is bound to contradict environmental protection and social responsibility. Therefore, for enterprises, in different periods, different priority strategies will be adopted for the three dimensions of economy, environment, and society. The results showed that the economic benefit has increased by about 30% or more, and the ecological pollution has been reduced by about 40% on the original basis. Under the action of a sustainable supply chain, consumer satisfaction tends to be full and can be maintained at about 97%. In this context, the comparative analysis of the strategic optimization of enterprises in the supply chain is the focus of this thesis.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Marjanovic, Jelena, Nikola Dalcekovic et Goran Sladic. « Blockchain-based model for tracking compliance with security requirements ». Computer Science and Information Systems, no 00 (2022) : 60. http://dx.doi.org/10.2298/csis210923060m.

Texte intégral
Résumé :
The increasing threat landscape in Industrial Control Systems (ICS) brings different risk profiles with comprehensive impacts on society and safety. The complexity of cybersecurity risk assessment increases with a variety of third-party software components that comprise a modern ICS supply chain. A central issue in software supply chain security is the evaluation whether the secure development lifecycle process (SDL) is being methodologically and continuously practiced by all vendors. In this paper, we investigate the possibility of using a decentralized, tamper-proof system that will provide trustworthy visibility of the SDL metrics over a certain period, to any authorized auditing party. Results of the research provide a model for creating a blockchain-based approach that allows inclusion of auditors through a consortium decision while responding to SDL use cases defined by this paper. The resulting blockchain architecture successfully responded to requirements mandated by the security management practice as defined by IEC 62443-4-1 standard.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Kusumastuti, Ratna Yulia, Heti Mulyati et Gendut Suprayitno. « Disclosure Integration of Lean Six Sigma Principles in Sustainable Supply Chain in Poultry Industry ». Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE) 4, no 1 (6 octobre 2021) : 300–312. http://dx.doi.org/10.31538/iijse.v4i1.1706.

Texte intégral
Résumé :
The poultry industry has been in the spotlight for its enormous potential economic development. However, poultry industry is still not implementing the concept of sustainability properly. There are still many wastes that have not been managed properly and there are still many problems in the supply chain that require more systematic handling. Many studies have shown that the implementation of Lean Six Sigma (LSS) and sustainability has positive results on the company's bottom line performance. This research tried to integrate the application of LSS principles and sustainability along the supply chain in the poultry industry in Indonesia. Data were collected from 4 listed poultry firms in Indonesia. The research method used SEM PLS with SmartPLS software. The results showed that supply chain security management system disclosure as the principle of LSS had a positive effect on the collaboration of supply chain disclosure and collaboration of supply chain disclosure had a positive effect on sustainability. The results also showed that risk management disclosure had a negative effect on the collaboration of supply chain disclosure and economic sustainability had a negative effect on environmental sustainability, but social sustainability had a positive effect on environmental sustainability. Based on the results of this study, there is a need to improve supply chain security management system and supply chain collaboration in order to advance sustainable poultry industry.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Куликов, Сергей Сергеевич, Владимир Иванович Белоножкин et Николай Алексеевич Ююкин. « ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS ». ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no 1(-) (5 avril 2022) : 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.

Texte intégral
Résumé :
В данной статье представлен анализ угроз информационной безопасности, связанных с атаками на цепи поставок, которые могут использоваться для нарушения информационной безопасности организации без прямых воздействий на ее информационно-технологическую инфраструктуру. В контексте информационной безопасности, атака на цепь поставки предполагает целенаправленные злоумышленные воздействия на активы поставщика с целью последующего нарушения информационной безопасности потребителя. Этот тип атак сегодня приобретает особую актуальность как наиболее эффективный среди всего множества угроз информационной безопасности ввиду принципиальных особенностей, существенно затрудняющих противодействие им: возможность злоумышленника по выбору наиболее незащищенного элемента для атаки, необходимость координации действий нескольких организационных структур для противодействия таким атакам, устранения последствий от их реализации и расследования их причин. Также приведен анализ научной, методической и технической литературы, описывающей сценарии известных атак на цепи поставок программного и аппаратного обеспечения. This article presents an analysis of information security threats associated with attacks on the supply chain, which can be used to violate the information security of an organization without direct impacts on its information technology infrastructure. In the context of information security, an attack on the supply chain involves targeted malicious impacts on the supplier's assets with the aim of further violating the consumer's information security. This type of attacks is becoming particularly relevant today as the most effective among all the many threats to information security due to the fundamental features that significantly complicate countering them: the possibility of choosing the most unprotected element of the chain for an attack, the need to coordinate the actions of several organizational structures to counter such attacks, eliminate the consequences of their implementation and investigate their causes. The analysis of scientific, methodological and technical literature describing scenarios of known attacks on the supply chain of software and hardware is also given.
Styles APA, Harvard, Vancouver, ISO, etc.
11

P N, Sindhuja, et Anand S. Kunnathur. « Information security in supply chains : a management control perspective ». Information & ; Computer Security 23, no 5 (9 novembre 2015) : 476–96. http://dx.doi.org/10.1108/ics-07-2014-0050.

Texte intégral
Résumé :
Purpose – This paper aims to discuss the need for management control system for information security management that encapsulates the technical, formal and informal systems. This motivated the conceptualization of supply chain information security from a management controls perspective. Extant literature on information security mostly focused on technical security and managerial nuances in implementing and enforcing technical security through formal policies and quality standards at an organizational level. However, most of the security mechanisms are difficult to differentiate between businesses, and there is no one common platform to resolve the security issues pertaining to varied organizations in the supply chain. Design/methodology/approach – The paper was conceptualized based on the review of literature pertaining to information security domain. Findings – This study analyzed the need and importance of having a higher level of control above the already existing levels so as to cover the inter-organizational context. Also, it is suggested to have a management controls perspective for an all-encompassing coverage to the information security discipline in organizations that are in the global supply chain. Originality/value – This paper have conceptualized the organizational and inter-organizational challenges that need to be addressed in the context of information security management. It would be difficult to contain the issues of information security management with the existing three levels of controls; hence, having a higher level of security control, namely, the management control that can act as an umbrella to the existing domains of security controls was suggested.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Chen, Bing-Chang, Her-Tyan Yeh et Che-Chiang Wang. « The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain ». Engineering Computations 33, no 6 (1 août 2016) : 1825–34. http://dx.doi.org/10.1108/ec-08-2015-0252.

Texte intégral
Résumé :
Purpose – The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the transfer mechanism in supply chain. Design/methodology/approach – In order to transfer RFID tag information to others safely in mobile RFID supply chain circumstances, the authors propose a RFID authentication mechanism which can ensure the identity and make the mutual authentication. Moreover, the authors propose a secure transfer method of ownership for the specific role in different regions under the structure of Mobile RFID. Findings – The task of administrator server is to check the order, store the merchandise information, distribute the authority, certify the security and transfer the ownership. It can make the whole supply chain more mobility, and transfer faster. Originality/value – The goals of this research are to achieve mainly: using mobile RFID system to design secure mutual authentication mechanism, transfer mechanisms with faster transfer and authority distribution. The authors introduce the security authentication and competence transfer mechanism in supply chain.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Curran, Kevin, et Stephen Norrby. « RFID-Enabled Location Determination Within Indoor Environments ». International Journal of Ambient Computing and Intelligence 1, no 4 (octobre 2009) : 63–86. http://dx.doi.org/10.4018/jaci.2009062205.

Texte intégral
Résumé :
The ability to track the real-time location and movement of items or people offers a broad range of useful applications in areas such as safety, security and the supply chain. Current location determination technologies, however, have limitations that heavily restrict how and where these applications are implemented, including the cost, accuracy of the location calculation and the inherent properties of the system. The Global Positioning System (GPS), for example, cannot function indoors and is useful only over large-scaled areas such as an entire city. Radio Frequency Identification (RFID) is an automatic identification technology which has seen increasingly prominent use over the last few decades. The technology uses modulated Radio Frequency signals to transfer data between its two main components, the reader and the transponder. Its many applications include supply chain management, asset tracking, security clearance and automatic toll collection. In recent years, advancements in the technology have allowed the location of transponders to be calculated while interfacing with the reader. This article documents an investigation into using an active RFID based solution for tracking.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Enck, William, Laurie Williams, William Enck, Samuel King et Angelos Stavrou. « Top Five Challenges in Software Supply Chain Security : Observations From 30 Industry and Government Organizations ». IEEE Security & ; Privacy 20, no 2 (mars 2022) : 96–100. http://dx.doi.org/10.1109/msec.2022.3142338.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Mattioli, Michael, Tom Garrison et Baiju V. Patel. « The Next Security Frontier : Taking the Mystery Out of the Supply Chain ». IEEE Micro 41, no 3 (1 mai 2021) : 103–7. http://dx.doi.org/10.1109/mm.2021.3072174.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kakhki, Mohammad Daneshvar, Hamid Nemati et Farhad Hassanzadeh. « A Virtual Supply Chain System for Improved Information Sharing and Decision Making ». International Journal of Business Analytics 5, no 1 (janvier 2018) : 16–32. http://dx.doi.org/10.4018/ijban.2018010102.

Texte intégral
Résumé :
Integrated supply chain information systems (ISCIS) face various barriers including lack of alignment between IT and business model, security and privacy concerns, behavioral and cultural issues, and heterogeneous software applications. This paper develops an architecture for ISCIS and validate it by interviewing experts. The proposed architecture is an intermediary to integrate in-house information systems as well as cloud-based systems across distributed heterogeneous supply chain networks. The developed ISCIS architecture works in three layers of data, processes, and knowledge and facilitates the alignment of information systems and decision making with business.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Gaci, Omar, Hervé Mathieu, Jean-Pierre Deutsch et Laurent Gomez. « Dynamic Risk Assessment by Communicating Objects in Supply Chain of Chemicals ». International Journal of Applied Logistics 4, no 2 (avril 2013) : 34–45. http://dx.doi.org/10.4018/jal.2013040103.

Texte intégral
Résumé :
In this paper, a wireless sensor network is deployed to improve the security of goods, environment and persons along a supply chain manipulating chemicals in the European Union. Pallets are equipped with a RFID tag and a set of sensors that monitor in real-time the environment state. By defining and monitoring constraints that must satisfy pallet environments, a real-time risk assessment is proposed. Then, sensors send accident risks in case of unusual values to a centralized software. Supply chain actors responsible for goods are thus contacted and in parallel emergency services are contacted to plan and organize their interventions.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Klievink, Bram, Eveline van Stijn, David Hesketh, Huib Aldewereld, Sietse Overbeek, Frank Heijmann et Yao-Hua Tan. « Enhancing Visibility in International Supply Chains ». International Journal of Electronic Government Research 8, no 4 (octobre 2012) : 14–33. http://dx.doi.org/10.4018/jegr.2012100102.

Texte intégral
Résumé :
With increasing global trade and growing emphasis on security, enhanced information sharing between actors in global supply chains is required. Currently, the data about cargo available in the supply chain does not provide a timely and accurate description of the goods. To solve this data quality issue, data should be captured upstream at the point where goods are packed for transport to the buyer. Without ICT, it was not possible to get timely access to the original trade data. The data pipeline concept is an IT innovation to enable capturing data at the source. The data pipeline accesses existing information systems used by the parties in international supply chains. This paper explores the data pipeline concept and the benefits that businesses and governments could obtain from such an innovation. This study also identifies the need for a public-private governance model that has to accompany the technical innovation.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Raja, Hifsa Hussain, Fozia Mehboob, Dr Raza Naqvia, Aqsa Hussain Raja et Samavia Hussain Raja. « Impact of Customer Awareness and Buying Behavior on Sustainability Capability of Nestle SSCM ». Journal of Intelligent Systems and Computing 2, no 1 (31 mars 2021) : 6–11. http://dx.doi.org/10.51682/jiscom.00201002.2021.

Texte intégral
Résumé :
Firm sustainability has been becoming increasingly significant for firms and has been considered as the main constituent of the social contract between society and business. We specifically chose Nestlé food and beverages and define sustainable development as a means to increase global access to nutritious food so that future generations will be able to contribute to sustainable social and economic stability and climate security. Our core business approach is to create long-term sustainable equity across Nestlé's 135-year existence for our customers, buyers, workers, shareholders, and the world as a whole. The Nestlé Values of the group say openly that we support long-term market growth in the short term. We urge managers not to do so at the risk of efficient, long-term growth while pledging ourselves to safe profits. Awareness of the consumers is important for improving the company's sustainable environmental development and supply chain management. To evaluate the role of client understanding in a sustainable supply chain we would like to examine the specific connection between consumer knowledge and their durability in the sustained management of the supply chain. In addition, the effect of customers on the viability of the supply chain processes in Nestle is strengthening. A computational model is proposed to test the importance and influence of customer awareness. It is necessary to increase knowledge about how sustainable supply chain management operates to boost organizations’ capacity to create a social and environmental difference in supply chains. We use SPSS software for data analysis and P-test, F-test, and T-test for analysis.
Styles APA, Harvard, Vancouver, ISO, etc.
20

P, Anitha, et Srimathi Chandrasekaran. « Isogency Hosmer–Lemeshow Logistic Regression-Based Secured Information Sharing for Pharma Supply Chain ». Electronics 11, no 19 (2 octobre 2022) : 3170. http://dx.doi.org/10.3390/electronics11193170.

Texte intégral
Résumé :
Counterfeit drugs are forgery-tagged medicines that are considered to be drugs without vigorous active pharmaceutical ingredients (API). India, being the world’s largest producer of drugs, faces a crucial issue of counterfeits. Moreover, counterfeits identify their path into the pharmaceutical supply chain (PSC) effortlessly owing to the dearth of security and traceability in the prevailing system. This is because the software applications currently in use stockpile the information about drugs on centralized servers and are accessed by manufacturers, distributors and retailers via the internet. The security of such systems is found to be weak. To address these issues, in this work, a novel method called Supersingular Isogeny and Hosmer–Lemeshow Logistic Regression-based (SI-HLLR) secured information sharing for the pharmaceutical supply chain is proposed. The SI-HLLR method is split into two sections, block validation and authentication. First, with the pharmaceutical sales data provided as input, the supersingular isogeny Diffie–Hellman key exchange model is applied for block validation and then is implemented using a blockchain. Next, with the validated blocks, the authentication mechanism is performed using Hosmer–Lemeshow logistic regression-based authentication that in turn eliminates the counterfeit drugs from the pharmaceutical supply chain. The hyperledger fabric blockchain solution using SI-HLLR leads to improved security ensuring data integrity and better authentication accuracy in the proposed method.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Shinkar, Sonali V., et Dolly Thankachan. « SCMBQA : Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios ». International Journal on Recent and Innovation Trends in Computing and Communication 10, no 1s (10 décembre 2022) : 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.

Texte intégral
Résumé :
Storing& processing data for supply chain management (SCM) systems requires design of high-security and quality of service (QoS) aware models. These modelsassist in improving traceability performance of SCM deployments via integration of transparent & distributed mechanisms. A wide variety of security models are proposed by researchers to perform these tasks, and it is observed that blockchain-based SCM implementations outperform other models in terms of security & QoS metrics.But most of these implementationsare general-purpose and do not incorporate SCM-specific consensus & mining rules. It is also observed that, mining speed& throughput performance of these blockchain-based implementations reduces exponentially w.r.t. number of SCM transactions. To resolve these issues, this paper discusses design of a novel Proof-of-Supply Chain (PoSC) based consensus model, which is specifically designed for sidechain based SCM deployments. The PoSC consensus model is used for high-efficiency SCM-based data storage and communication scenarios. The proposed PoSC consensus model is capable of resisting selfish mining, time jacking, and sybil attacks, which are targeted towards SCM deployments. The model uses temporal performance metrics of miner nodes, and combines them with relationship graphs to form an SCM miner rank. Based on this rank, miner nodes are selected, and their consensus responses are recorded. These responses are processed using an augmented deep learning model, that is trained over 8 different SCM implementations via machine learning. After successful mining, responses obtained from these miners are used to incrementally train the machine learning model which assists in continuous performance improvement. The SCMBQA model was tested on milk supply chain, agriculture supply chain, and electronic supply chain applications, in terms of computational speed, throughput, energy requirement, retrieval & verification delay, and storage requirements. It was observed that the proposed PoSC consensus was capable of improving the computational speed by 8.5%, reduce energy consumption by 4.9%, improve throughput by 9.6%, and reduce storage costs by 15.4% when compared with standard blockchain-based SCM consensus models. This is because the proposed model deploys an intelligent sidechaining approach, that is capable of optimizing number of generated sidechains via temporal QoS & security performance metrics. Due to use of smaller chain lengths, the proposed model is capable of integrating privacy-aware & secure approaches depending upon different SCM stages. Thus, distributor-level security models are different than retailer-level security models, which assists in context-sensitive block deployments. Due to use of PoSC, the proposed model was observed to be 99.5% resilient against internal and external attacks, which makes it useful for real-time SCM deployments.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Aryatwijuka, Wilbroad, Nsambu Kijjambu Frederick, Aloysius Rukundo et Nixon Kamukama. « Exploration of Accountability as a Mediator between Managerial Competencies and Supply Chain Performance of Relief Aid Organisations in Western Uganda ». International Journal of Economics, Business and Management Studies 9, no 2 (2 novembre 2022) : 104–19. http://dx.doi.org/10.55284/ijebms.v9i2.733.

Texte intégral
Résumé :
The study investigated whether accountability mediates the relationship between managerial competencies and the supply chain performance of relief aid organizations in western Uganda. A cross-sectional and correlational design was used involving a sample of 108 relief aid organizations operating in western Uganda. Organizations were stratified according to the humanitarian clusters of food security, logistics, education, water and sanitation, health, and education. Self-administered questionnaires were used to collect primary data. Data were analysed using SPSSv22, while mediation was tested using Analysis of Moments Structure (AMOS) v22 software. Accountability was found to partially mediate the association between managerial competencies and supply chain performance in relief aid organizations in western Uganda. A mediation effect of accountability in the relationship between managerial competencies and supply chain performance was tested. Previous studies tended to focus on direct relationships between the aforementioned variables. The current study enriches literature, especially in the developing country’s context and more so in the downstream of the supply chain. Future studies could take a longitudinal approach since the current study was cross-sectional. The study guides humanitarian actors to recruit staff with managerial competencies to ensure transparency and effectiveness in the delivery of relief activities hence achieving the desired supply chain performance.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Jiang, Nan, Erlin Tian, Fattaneh Daneshmand Malayeri et Alireza Balali. « A new model for investigating the impact of urban knowledge, urban intelligent transportation systems and IT infrastructures on the success of SCM systems in the distributed organizations ». Kybernetes 49, no 11 (2 janvier 2020) : 2799–818. http://dx.doi.org/10.1108/k-04-2019-0288.

Texte intégral
Résumé :
Purpose A fundamental concept of the smart city is to get the right information at the right place to make city-related decisions easier and quicker. The main goal of supply chain management (SCM) systems is to enhance the supply chain process for delivering the identified products to customers correctly in distributed organizations. In addition, new IT infrastructure such as cloud-based systems and internet of things (IoT) have changed many organizations and firms. Hence, this study aims to assess the factors that contribute to the success of SCM systems. Design/methodology/approach In this paper, the usage of urban knowledge, urban intelligent transportation systems and IT infrastructure was considered as a key factor for the success of SCM systems. For assessing the features of the model, a comprehensive questionnaire was designed. The survey questionnaires were sent to critical informers who are practical heads associated with SCM and urbanism. Of these, 315 usable responses were received, resulting in a response rate of 82.03%. The data were examined using Smart-PLS version 3.2 and IBM SPSS version 25. Findings The obtained results showed the high strength of the proposed model. This study found that the impact of urban ITS (safety, accessibility, information management and flexibility) is important to the success of supply chain management systems. Another important finding is that the cloud-based system (cloud security, resource virtualization, on-demand self-service and scalability) has a very important role in the success of supply chain management systems. The finding showed that the effect of IoT service variable (commercialization, mobility features, infrastructure capabilities and security and privacy) on the success of supply chain management systems is significant and positive. The findings also showed that urban knowledge (usage skills, awareness, experience and knowledge sharing) is viewed as a significant factor in the success of supply chain management systems. Research limitations/implications The inductive nature of research methodology has introduced limitations on the generalizability of results. Therefore, it is recommended to examine the validity of this research model in other supply chains. Practical implications The statistical results support the crucial role of urban knowledge, urban intelligent transportation systems, IoT services and cloud-based systems. Therefore, aspects relating to these factors must be the focus of attention of any distributed organization in their endeavor to develop supply chain management systems. Implementing cloud based IoT through accurate and timely availability of information, can predict forecasting and planning processes, resources, logistics and support, service management and spare parts and many sub-processes in the supply chain. These technologies allow organizations to invest in manufacturing and operating processes rather than paying for the software section, which will generate more cash flow. Originality/value One of the most crucial and fundamental parts of an organization’s management is the supply chain management. The department is responsible for coordinating all units from the initial stages, such as supplying materials to the final stages, such as delivery and after-sales service. Comprehensive and credible information platforms are essential for managing a supply chain. Therefore, it is important to use integrated information systems such as IoT, cloud computing, intelligent transportation systems and more in this part of the organization management. Covering this information in a timely and accurate manner will facilitate the process and make the process more transparent. For this purpose, a model is needed to determine the relationship between technologies and supply chain management, which this study has provided a comprehensive model.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Lee, JongHyup, et Taekyoung Kwon. « Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things ». Sensors 21, no 13 (26 juin 2021) : 4393. http://dx.doi.org/10.3390/s21134393.

Texte intégral
Résumé :
The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications. This is due to at least the intrinsic lack of software protection mechanisms in legacy industrial systems. In this paper, to address the challenges in building a secure software supply chain for industrial environments, we propose a new approach that leverages distributed watchdogs with blockchain systems in protecting software supply chains. For this purpose, we bind every entity with a unique identity in the blockchain and employ the blockchain as a delegated authenticator by mapping every reporting action to a non-fungible token transfer. Moreover, we present a detailed specification to clearly define the behavior of systems and to apply model checking.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Wünsche, Julia Francesca, et Fredrik Fernqvist. « The Potential of Blockchain Technology in the Transition towards Sustainable Food Systems ». Sustainability 14, no 13 (24 juin 2022) : 7739. http://dx.doi.org/10.3390/su14137739.

Texte intégral
Résumé :
Food systems are both contributing to and affected by environmental degradation and climate change. The transition towards resilient and sustainable food systems is essential to ensure food security and minimise negative environmental impacts. Innovative technologies can accelerate this transition. Blockchain technology (BCT) is attracting attention as it can deliver transparency to complex global food supply chains and has the potential to guide current food production towards better sustainability and efficiency. This case study investigated the opportunities that BCT can offer to food supply chains. Qualitative interviews with eight main BCT providers were conducted to evaluate the current state of BCT and put it into perspective by mapping out advantages, disadvantages, incentives, motives, and expectations connected to its implementation in global food systems. A thematic analysis showed that, while BCT was considered beneficial by all interviewees, uptake is slow due to high implementation costs and the lack of incentives for companies throughout the food chain from farms to food industry and retail. Results further revealed that the advantages of BCT go beyond communication of trustworthy information and development of closer producer–consumer relationships. In fact, it can provide the opportunity to decrease food waste, enhance working conditions throughout the supply chain, and promote sustainable consumption habits. As BCT may be increasingly used in the food supply chain, the results give a basis for future research that may leverage both qualitative and quantitative methods to examine actors’ behaviours. Also, the importance of improving user experiences through functional applications and software to facilitate the adoption of the technology is stressed.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Phan, Xuan Thang, Hoai Nam Ngo, Thuy Linh Nguyen, Duc Tai Pham, Ngoc Chan Truong, Ngoc Anh Pham et Thi Kim Thu Do. « The effects of dynamic employee capabilities, fintech and innovative work behavior on employee and supply chain performance : Evidence from Vietnamese financial industry ». Uncertain Supply Chain Management 10, no 4 (2022) : 1305–14. http://dx.doi.org/10.5267/j.uscm.2022.7.009.

Texte intégral
Résumé :
FinTech has become a popular term which describes novel technologies adopted by the financial service institutions. This term covers a large scope of techniques, from data security to financial service deliveries. An accurate and up-to-date awareness of FinTech has an urgent demand for both academics and professionals. The goal of the study is to assess the impact of dynamic employee capabilities on fintech applications, employees’ innovation work behavior, thereby creating employee performance and supply chain finance performance for financial institutions in Vietnam. The data was collected through 189 mid-level managers of 189 financial institutions in Vietnam. The results of analysis using SPSS and Smart PLS software show that dynamic employee capabilities had a positive impact on fintech application, employees’ innovative work behavior and improve employee performance while improving supply chain finance performance of financial institutions in Vietnam.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Bayramova, Aya, David J. Edwards et Chris Roberts. « The Role of Blockchain Technology in Augmenting Supply Chain Resilience to Cybercrime ». Buildings 11, no 7 (30 juin 2021) : 283. http://dx.doi.org/10.3390/buildings11070283.

Texte intégral
Résumé :
Using a systematic review of literature, this study identifies the potential impact of blockchain solutions for augmenting supply chain resilience (SCR) to cybercrime. This rich literature synthesis forms the basis of a novel theoretical framework that provides guidance and insight for blockchain adopters and vendors as well as delineate palpable benefits of this novel technology. An interpretivist philosophical design and inductive reasoning are adopted to conduct the systematic review of literature. A total of 867 papers were retrieved from Scopus database between the years of 2016 and 2020 and subsequently analysed via abductive reasoning, grounded theory and a thematic meta-analysis; where the latter was achieved using a scientometric approach and software tools such as VOS viewer and NVivo. Scientometric analysis revealed the most prolific countries, sources, publications and authors who reside at the vanguard of blockchain developments and adoption. Subsequent grounded theory analysis identified six main clusters of research endeavour viz: “case study”, “challenges and opportunity”, “traceability”, “smart contract” “blockchain and IoT” and “data security”. From 28 SCR metrics identified within literature, five were found to have been positively impacted by blockchain technology solutions, namely: “visibility”, “collaboration”, “integration”, “risk management” and “information sharing.” Prominent applications of blockchain technology in practice were “traceability systems” and “smart contracts” which are often implemented separately or in combination and primarily in food supply chains. This research constitutes the first study to critically synthesise extant literature for evaluation of blockchain solutions’ implication on SCR metrics. New perspectives obtained provided a basis for the novel theoretical framework for implementation that will be valued by software developers and adopting organizations, whilst creating new direction for researchers interested in blockchain technology.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Bahl, Sanjay, et O. P. Wali. « Perceived significance of information security governance to predict the information security service quality in software service industry ». Information Management & ; Computer Security 22, no 1 (4 mars 2014) : 2–23. http://dx.doi.org/10.1108/imcs-01-2013-0002.

Texte intégral
Résumé :
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers. Design/methodology/approach – The paper provides a framework built upon the existing dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies. Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality, which can be predicted. The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality. Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer. Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust. Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Sunarto, Hari. « Menuju Integrasi Peng awasan Pupuk Bersubsidi : Sebuah Rancang Bangun Prototipe E-Suplay Chain Management ». Jurnal Manajemen 18, no 1 (16 octobre 2018) : 51. http://dx.doi.org/10.24912/jm.v18i1.377.

Texte intégral
Résumé :
Misappropiation of subsidized fertilizer is one source of disturbance factors that may lead to scarcity of fertilizer supply to farmer and ultimately disturb to national food security program. Along with this, there are many other sources of disturbance in achieving high standard of key performance indicators, namely, 6-precision - precise in fertilizer types, volume, place, time, quality and price. It is a need to minimize disturbances by supervision. By law, fertilizer and pestiside supervisory committees (KP3) at national, provicial and district level asigned to supervice fertilizer acquisition, distribution and usage by farmers. Under the frame of thinking an e-supply chain management and management control system, the KP3 remains head on some issues, among others (a) not refer to Regulation 60/2008 on the System of Internal Control Government, (b) fragmented business processses in reporting, (c) in this digital age still relies on written (paperworks) reports. Triangulation research method is being used in longitudinal study at a time span 2008-2013 to identify the real needs of KP3 then to set up an appropriate prototype of application software. The software integrates the business process among authorities and it works online, During the focus group discussion, KP3 appreciated these efforts. Knowingly finalization process is still long way to go, because it needs to build information technology infrastructure, protocol management and database support, among others, 4.29 million family farmers with attributes. In the early stages, the software can be used to replace paper-based reports with an online electronic statements and a simple diviation analysis.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Ramadhan, Syaiful, Anang Dwi Kuncoro et Asep Iwa Soemantri. « THE EFFECT OF SUPPLY CHAIN MANAGEMENT (SCM) AND DECISION SUPPORT SYSTEM (DSS) WARSHIP SPARE PARTS ON OPERATION READINESS NAVAL FLEET COMMAND II ». Ekspektra : Jurnal Bisnis dan Manajemen 5, no 1 (12 avril 2021) : 51–58. http://dx.doi.org/10.25139/ekt.v5i1.3669.

Texte intégral
Résumé :
The importance of maritime defense and State Diplomacy is faced with the problems that exist in Koarmada II, especially related to the maintenance of warship, especially related to the support of On Board Spare (OBS) spare parts. Problem solving solutions are needed, among others, the first is to streamline and streamline the operation degree so that it is right on target against the reemergence of potential threats to maritime defense and security, the second is to evaluate, record, record and record everything related to spare parts needs OBS warship which carries out operational tasks, and improves the professionalism of soldiers based on technology and information, as well as increasing the ability to observe and supervise up to the ability to take action against perpetrators of violations of sovereignty at sea. The research approach used is descriptive quantitative method, which examines how Supply Chain Management (SCM) and Decision Support System (DSS) using the Structural Equation Modeling-Partial Least Square (SEM-PLS) analysis approach which originates from questionnaires. Data analysis was assisted by SmartPLS 2.0 software. The research samples were soldiers who served in Koarmada II based in Surabaya. The results showed that Supply Chain Management had a significant effect on Operational Readiness. These results indicate that Supply Chain Management has a positive and significant direct effect on Operational Readiness. Decision Support System has a significant effect on Operational Readiness. These results indicate that the Decision Support System has a positive and significant direct effect on Koarmada II Operational Readiness. Supply Chain Management and Decision Support System for Warship Spare Parts do not have a positive and significant direct effect on Koarmada II Operation Readiness.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Khushboo-E-Fatima, Rasoul Khandan, Amin Hosseinian-Far, Dilshad Sarwar et Hareer Fatima Ahmed. « Adoption and Influence of Robotic Process Automation in Beef Supply Chains ». Logistics 6, no 3 (12 juillet 2022) : 48. http://dx.doi.org/10.3390/logistics6030048.

Texte intégral
Résumé :
This paper aims to critically examine the potential barriers to the implementation and adoption of Robotic Process Automation (RPA) in the beef supply chain. The beef supply chain has been challenging due to its complex processes, activities, and management. The beef industry has relied heavily on the human workforce in the past; however, RPA adoption allows automating tasks that are repetitive and strenuous in nature to enhance beef quality, safety and security. There are considerable potential barriers to RPA adoption as organisations have not focused on trying to eliminate them due to various reasons. Previous studies lack knowledge related to potential barriers to RPA adoption, so this creates a research gap and requires attention. Statistical data and information are extracted using secondary data relevant to RPA adoption in the beef supply chain. A business process model is formed which uses values or variables using existing statistical data and information. Simulation of the process model is carried out using Simul8 software and analyses of different scenarios help in choosing the best approach for RPA adoption. Results have identified the potential barriers in RPA adoption through the simulation process thus ensuring RPA performs with more potential. Analysis of ‘what-if’ scenarios allows organizational and employee-level improvements along with enhancing RPA’s accuracy. The process model is a generic model for use in real-life scenarios and can be modified by organisations according to their own business needs and requirements. The study contributes in theoretical and practical aspects as it allows decision-makers and managers to adopt RPA in a robust manner and adds to scientific knowledge by identification of potential barriers to RPA adoption.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Kajtez, Nemanja, Yue Zhang et Basel Halak. « Lockit : A Logic Locking Automation Software ». Electronics 10, no 22 (17 novembre 2021) : 2817. http://dx.doi.org/10.3390/electronics10222817.

Texte intégral
Résumé :
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. The multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat these, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches has been rather slow due to the lack of integration with the IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist, which can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile when trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Sun, Pingping, et Lingang Gu. « Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology ». Complexity 2021 (27 mai 2021) : 1–11. http://dx.doi.org/10.1155/2021/4582838.

Texte intégral
Résumé :
Based on the Internet of Things technology, this paper proposes building a cross-border e-commerce logistics supervision system and determines the evaluation index system from the overall framework design of the system, supply chain supervision process optimization, risk supervision optimization, and system order degree optimization. First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence contract, legal anonymous identity authentication, intelligent transaction matching, abnormal data analysis and detection, privacy protection, and traceability are realized under the framework of the supervision system. Then, the security analysis and transaction supervision component software are used to verify the security, control, and operating efficiency of the transaction supervision framework. Finally, in a real crowd sourcing logistics enterprise platform to run on the software component, the actual measurement, the measured results show that the proposed cross-border supervision system is safe and controllable, and electronic business logistics protects users and data privacy, prevents forgery and fraud, and realizes the user behavior and user data in addition to auditability and traceability.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Liao, Han-Teng, Tsung-Ming Lo et Chung-Lien Pan. « Knowledge Mapping Analysis of Intelligent Ports : Research Facing Global Value Chain Challenges ». Systems 11, no 2 (8 février 2023) : 88. http://dx.doi.org/10.3390/systems11020088.

Texte intégral
Résumé :
Integrated technology management in building smart ports or intelligent ports is a crucial concern for global sustainable development, especially when human societies are facing increasing risks from climate change, sea-levels rising, and supply chain disruptions. By mapping the knowledge base of 103 papers on intelligent ports, retrieved in late December 2022 from the Web of Science, this study conducted a roadmapping exercise using knowledge mapping findings, assisted by Bibliometrix, VoSviewer, and customized Python scripts. The three structural (intellectual, social, and conceptual) aspects of knowledge structure reveal the significance of the internet of things (IoT), the fourth industrial revolution (Industry 4.0), digitalization and supply chains, and the need for digital transformation alignment across various stakeholders with Industry 4.0 practices. Furthermore, an even geographical distribution and institutional representation was observed across major continents. The results of the analysis of the conceptual structure demonstrated the existence of several established and emerging clusters of research, namely (1) industry data, IoT, and ICT, (2) industry 4.0, (3) smart airports, (4) automation; and (5) protocol and security. The overall empirical findings revealed the underlying technology and innovation management issues of digital transformation alignment across stakeholders in IoT, Industry 4.0, 5G, Big Data, and AI integrated solutions. In relation to roadmapping, this study proposed a socio-technical transition framework for prototyping ecosystem innovations surrounding smart sustainable ports, focusing on contributing to valuable carbon or greenhouse gas emission data governance, management, and services in global value chains.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Lam, Ching, Michelle Helena van Velthoven et Edward Meinert. « Developing a Blockchain-Based Supply Chain System for Advanced Therapies : Protocol for a Feasibility Study ». JMIR Research Protocols 9, no 12 (14 décembre 2020) : e17005. http://dx.doi.org/10.2196/17005.

Texte intégral
Résumé :
Background Advanced therapies, including cell and gene therapies, have shown therapeutic promise in curing life-threatening diseases, such as leukemia and lymphoma. However, these therapies can be complicated and expensive to deliver due to their sensitivity to environment; troublesome tissue, cell, or genetic material sourcing; and complicated regulatory requirements. Objective This study aims to create a novel connected supply chain logistics and manufacturing management platform based on blockchain, with cell and gene therapy as a use case. Objectives are to define the requirements and perform feasibility evaluations on the use of blockchain for standardized manufacturing and establishment of a chain of custody for the needle-to-needle delivery of autologous cell and gene therapies. A way of lowering overall regulatory compliance costs for running a network of facilities operating similar or parallel processes will be evaluated by lowering the monitoring costs through publishing zero-knowledge proofs and product release by exception. Methods The study will use blockchain technologies to digitally connect and integrate supply chain with manufacturing to address the security, scheduling, and communication issues between advanced therapy treatment centers and manufacturing facilities in order to realize a transparent, secure, automated, and cost-effective solution to the delivery of these life-saving therapies. An agile software development methodology will be used to develop, implement, and evaluate the system. The system will adhere to the EU and US good manufacturing practices and regulatory requirements. Results This is a proposed study protocol, and upon acceptance, grant funding will be pursued for its execution in 2021. Conclusions The successful implementation of the integrated blockchain solution to supply chain and manufacturing of advanced therapies can push the industry standards toward a safer and more secure therapy delivery process. International Registered Report Identifier (IRRID) PRR1-10.2196/17005
Styles APA, Harvard, Vancouver, ISO, etc.
36

Kang, Yang, et Qiang Li. « Design and Implementation of Data Sharing Traceability System Based on Blockchain Smart Contract ». Scientific Programming 2021 (15 novembre 2021) : 1–14. http://dx.doi.org/10.1155/2021/1455814.

Texte intégral
Résumé :
“Traceability” is an important method often used in modern supply management. The traceability system is a system based on the Internet of Things technology. In this process, users will share resources through cloud service providers, so how to ensure data security is also one of the issues we consider. Blockchain technology is an emerging technology in the field of information technology. Its decentralized nature, distributed storage, and difficult data modification provide us with fair exchange and sharing of data. Feasible solutions: in this article, we have studied the key issues of fair exchange and safe sharing of data based on blockchain and designed a multigroup data sharing scheme based on alliance chain. To solve the various existing traceability systems problem, this paper designs a new traceability system based on blockchain technology and implements a system prototype to verify the feasibility of the system.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Deyannis, Dimitris, Eva Papadogiannaki, Grigorios Chrysos, Konstantinos Georgopoulos et Sotiris Ioannidis. « The Diversification and Enhancement of an IDS Scheme for the Cybersecurity Needs of Modern Supply Chains ». Electronics 11, no 13 (22 juin 2022) : 1944. http://dx.doi.org/10.3390/electronics11131944.

Texte intégral
Résumé :
Despite the tremendous socioeconomic importance of supply chains (SCs), security officers and operators are faced with no easy and integrated way for protecting their critical, and interconnected, infrastructures from cyber-attacks. As a result, solutions and methodologies that support the detection of malicious activity on SCs are constantly researched into and proposed. Hence, this work presents the implementation of a low-cost reconfigurable intrusion detection system (IDS), on the edge, that can be easily integrated into SC networks, thereby elevating the featured levels of security. Specifically, the proposed system offers real-time cybersecurity intrusion detection over high-speed networks and services by offloading elements of the security check workloads on dedicated reconfigurable hardware. Our solution uses a novel framework that implements the Aho–Corasick algorithm on the reconfigurable fabric of a multi-processor system-on-chip (MPSoC), which supports parallel matching for multiple network packet patterns. The initial performance evaluation of this proof-of-concept shows that it holds the potential to outperform existing software-based solutions while unburdening SC nodes from demanding cybersecurity check workloads. The proposed system performance and its efficiency were evaluated using a real-life environment in the context of European Union’s Horizon 2020 research and innovation program, i.e., CYRENE.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Watney, Murdoch. « Cybersecurity Threats to and Cyberattacks on Critical Infrastructure : a Legal Perspective ». European Conference on Cyber Warfare and Security 21, no 1 (8 juin 2022) : 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.

Texte intégral
Résumé :
Over the years cybersecurity threats to and cyberattacks on the critical infrastructure by state and non-state actors have escalated in intensity and sophistication. Cyberattacks, such as the 2017 NotPetya ransomware attack, the 2020 SolarWinds software supply chain attack and the 2021 Colonial Pipeline ransomware attack, illustrate the vulnerability of critical infrastructure to cyberattacks. Most cyberattacks are committed across borders involving criminal hackers or state supported hackers. Furthermore, critical infrastructure is increasingly interconnected and interdependent. Connectivity brings about the risk of a cyberattack, demonstrated by the 2021 Colonial Pipeline ransomware attack. Interconnectedness also means that the compromise of one critical infrastructure asset can have a domino effect that degrades or disrupts others and results in cascading consequences across the economy and national security. Operational continuity is essential and this may have been one of the reasons why Colonial Pipeline paid a ransom to cyber-attackers. A cyberattack on the critical infrastructure of a state cannot be seen in isolation as the consequences of the attack may impact other states, this was illustrated by the 2017 WannaCry and NotPetya ransomware attacks. The level of sophistication of cyberattacks has increased over the years as shown by the 2020 SolarWinds software supply chain attack. The escalation of attacks has served as a catalyst for governments to address the risk to critical infrastructure. Countries need to have strong government bodies which supervise cybersecurity in their country and work together with their counterparts in other countries by sharing information regarding threats and attacks against critical infrastructure. The discussion focuses on the challenges that threats to and attacks on critical infrastructure present, the possible solutions a government may implement in addressing cyberattacks on critical infrastructure and the accountability of state and non-state actors of cyberattacks on critical infrastructure. The issues are discussed from a legal perspective.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Liu, Yang, Yang Zhang, Yongsheng Yang et Yan Ma. « DOCS : A Data Ownership Confirmation Scheme for Distributed Data Trading ». Systems 10, no 6 (19 novembre 2022) : 226. http://dx.doi.org/10.3390/systems10060226.

Texte intégral
Résumé :
Data assets trading can encourage owners to distribute data and achieve large-scale data aggregation to promote the development of the supply chain system. Blockchain is a promising platform for constructing a decentralized data marketplace. The data may face risks in the marketplace, such as illegal theft, malicious tampering, or illegal distribution in the transactions process. The data ownership confirmation in a blockchain-empowered marketplace has attracted much attention in recent years. However, challenges still remain, including maintaining data integrity, traceability of illegal data, and accountability. In this paper, we propose a new data ownership confirmation scheme (DOCS) in the transaction scenario of blockchain-empowered distributed data assets trading. It integrates smart contracts, data-embedding technology, and data fingerprint to realize ownership confirmation and protection of data assets in transactions. DOCS ensures reliable mapping between on-chain data ownership information and off-chain data entities, which assists with the accurate prosecution of the illegal distribution of data assets. We demonstrate that DOCS can have desirable security properties in multiple attack models.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Mkrttchian, Vardan, et Viacheslav Voronin. « Digitalization of Lifecycle Management of Domestic Russian Tour Products Based on Problem-Oriented Digital Twins-Avatars, Supply Chain, 3D-Hybrid, Federated, and Coordinated Blockchain ». International Journal of Digital Strategy, Governance, and Business Transformation 11, no 1 (1 janvier 2021) : 1–13. http://dx.doi.org/10.4018/ijdsgbt.20210101.oa2.

Texte intégral
Résumé :
The Article fits into a moment of operational uncertainty and theoretical redevelopment of the nature of tourism in a society marked by geopolitical turmoil and declining international security, as well as rapid changes at the global level, including the pandemic, which is currently posing new challenges for the sector. Today, it is more relevant and appropriate than ever to reflect on them, with the new, digital energy of blockchain technology, using a fundamental approach to digitalizing the decentralized lifecycle management of the domestic Russian tour product with problem-oriented digital twin avatars, supply chain, volumetric hybrid and federated-consistent blockchain. The goal of the article is theoretical study and practical implementation, in the form of basic models and software modules, artificial intelligence algorithms in managing the life cycle of an internal Russian tour product use Laboratory for digitalization and management, using multi-agent models of intelligent digital twins-avatars, is being created, the purpose of these studies is to solve a scientific problem.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Xie, Zhenjun, Hua Kong et Bin Wang. « Dual-Chain Blockchain in Agricultural E-Commerce Information Traceability Considering the Viniar Algorithm ». Scientific Programming 2022 (10 février 2022) : 1–10. http://dx.doi.org/10.1155/2022/2604216.

Texte intégral
Résumé :
In this paper, we consider the Vennia algorithm to conduct in-depth research and analysis on the traceability of dual-chain blockchain agricultural products' E-commerce information. This paper adds a collaborative verification module to the traceability system and carries out a detailed design of information storage, traceability consensus algorithm, and smart contract for agricultural products according to the characteristics of the agricultural products supply chain, among which the collaborative verification module adopts dynamic data storage technology; the ConsiderVinia consensus algorithm is improved by introducing the way of integral penalty mechanism to ensure the block data validity. After a comparative study of the features and differences of the three major blockchain technology platforms, this paper selects the super ledger to implement the agricultural traceability system based on blockchain technology, introduces the partitioning and credit mechanism into the ConsiderVinia algorithm, and elaborates the improvement process of the algorithm. The improved algorithm reduces the malicious behavior of nodes and maintains the system security through a credit mechanism while maintaining the consistency of blockchain. In the event of a transaction dispute, the third-party platform will determine the party at fault based on the transaction records and other evidence and make corresponding punishments and compensations. The experiment proves that the algorithm proposed in this paper can reduce the amount of network data transmission in the process of node consensus, which is better than the ConsiderVinia algorithm in terms of both throughput and latency, improves the consensus efficiency, and alleviates the communication bottleneck caused by the increase of users in blockchain applications, and the solution of applying the blockchain technology to the agricultural products traceability system is practical and feasible. The blockchain-based agricultural products information traceability system solves the problems of information asymmetry, difficult sharing, easy tampering, and storage centralization in the traditional IoT-based agricultural products traceability system and truly realizes the credible and reliable traceability of the whole chain of agricultural products information. The research content and results of this paper have certain theoretical and practical values.
Styles APA, Harvard, Vancouver, ISO, etc.
42

A. Dhanalakshmi, Xu Hui, Roopini. R et R. Supriya. « Technological Advancements in E-Commerce and Customer Relationship Management ». International Journal of Engineering and Management Research 10, no 6 (11 décembre 2020) : 9–20. http://dx.doi.org/10.31033/ijemr.10.6.2.

Texte intégral
Résumé :
In the recent past, for any business to be successful it is essential to acquire, serve and retain customers. The number of users of commercial purposes has led to increased demand for E-Commerce in the global market. There has been a remarkable progress in E-Commerce due to globalization and technological advancements which led to sustainable quantum of business at affordable price. Technologies used in E-Commerce includes: Augmented Reality: The Future of E-Commerce Stores, Artificial Intelligence: Improving E-Commerce services and Optimizing Customer Experience, Voice Search, Chatbot, Blockchain Technology: A Faster, Safer and More Transparent used as E-Commerce Payment System, Security and Supply chain management. This paper focuses on the evolution of E-Commerce, development of CRM initiatives, leading E-Commerce companies, technological advancement in E-Commerce: E-Commerce platforms and service providers; software and tools used in E-Commerce and recent trends in E-Commerce and CRM in streamlining the CRM process thereby minimizing the cost of CRM.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Varatharaj, Nagaraj, et Sumithira Thulasimani Ramalingam. « Enabling continuous connectivity services for ambrosus blockchain application by incorporating 5G-multilevel machine learning orchestrations ». Journal of Intelligent & ; Fuzzy Systems 42, no 4 (4 mars 2022) : 3575–90. http://dx.doi.org/10.3233/jifs-211745.

Texte intégral
Résumé :
Most revolutionary applications extending far beyond smartphones and high configured mobile device use to the future generation wireless networks’ are high potential capabilities in recent days. One of the advanced wireless networks and mobile technology is 5G, where it provides high speed, better reliability, and amended capacity. 5 G offers complete coverage, which is accommodates any IoT device, connectivity, and intelligent edge algorithms. So that 5 G has a high demand in a wide range of commercial applications. Ambrosus is a commercial company that integrates block-chain security, IoT network, and supply chain management for medical and food enterprises. This paper proposed a novel framework that integrates 5 G technology, Machine Learning (ML) algorithms, and block-chain security. The main idea of this work is to incorporate the 5 G technology into Machine learning architectures for the Ambrosus application. 5 G technology provides continuous connection among the network user/nodes, where choosing the right user, base station, and the controller is obtained by using for ML architecture. The proposed framework comprises 5 G technology incorporate, a novel network orchestration, Radio Access Network, and a centralized distributor, and a radio unit layer. The radio unit layer is used for integrating all the components of the framework. The ML algorithm is evaluated the dynamic condition of the base station, like as IoT nodes, Ambrosus users, channels, and the route to enhance the efficiency of the communication. The performance of the proposed framework is evaluated in terms of prediction by simulating the model in MATLAB software. From the performance comparison, it is noticed that the proposed unified architecture obtained 98.6% of accuracy which is higher than the accuracy of the existing decision tree algorithm 97.1%.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Johnson, Chris, et Maria Evangelopoulou. « Defending Against Firmware Cyber Attacks on Safety-Critical Systems ». Journal of System Safety 54, no 1 (1 avril 2018) : 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.

Texte intégral
Résumé :
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to “rip and replace” obsolete components. However, the ability to make firmware updates has provided significant benefits to companies who use Programmable Logic Controllers (PLCs), switches, gateways and bridges, as well as an array of smart sensor/actuators. While these updates — which include security patches when vulnerabilities are identified in existing devices — can be distributed by physical media, they are increasingly downloaded over Internet connections. These mechanisms pose a growing threat to the cyber security of safety-critical applications, which is illustrated by recent attacks on safety-related infrastructures across the Ukraine. This paper explains how malware can be distributed within firmware updates. Even when attackers cannot reverse engineer the code necessary to disguise their attack, they can undermine a device by forcing it into a constant upload cycle in which the firmware installation never terminates. In this paper, we present means of mitigating the risks of firmware attacks on safety-critical systems as part of wider initiatives to secure national critical infrastructures. Technical solutions, including firmware hashing, must be augmented by organizational measures to secure the supply chain within individual plants, across companies and throughout safety-related industries.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Zhou, Xiong, Fang Zheng, Xujuan Zhou, Ka Ching Chan, Raj Gururajan, Zhangguang Wu et Enxing Zhou. « From traceability to provenance of agricultural products through blockchain ». Web Intelligence 18, no 3 (30 septembre 2020) : 181–89. http://dx.doi.org/10.3233/web-200440.

Texte intégral
Résumé :
As China’s agricultural output has improved, the national and local monitoring system of agricultural product safety has become much better, and monitoring standards have become increasingly strict. Despite this, there are agricultural product safety incidents which have caused consumer panic. One way to address this is by properly establishing tracking systems so that agricultural product logistics in China can be tracked and monitored. We explored this research objective with agricultural traceability and security in mind. One option that could be considered is the blockchain technology. Blockchain could also be used to ascertain the provenance of agricultural products to increase the quality and safety of the Chinese agricultural supply chain. In this context, this research converged on big data and technology, platforms and other means for product quality and safety of agricultural products traceability. In order to verify the accuracy of these three convergence, regression analysis were used to construct five models for verification of three hypothesis. The results show that based on “Internet+”, using big data, big technology and big platform can significantly increase the accuracy of agricultural products traceability system hence improve consumer acceptance of the safety of agricultural products.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Alhamzah F. Abbas, Naveed Akhtar Qureshi, Nohman Khan, Rabia Chandio et Javed Ali. « The Blockchain Technologies in Healthcare : Prospects, Obstacles, and Future Recommendations ; Lessons Learned from Digitalization ». International Journal of Online and Biomedical Engineering (iJOE) 18, no 09 (11 juillet 2022) : 144–59. http://dx.doi.org/10.3991/ijoe.v18i09.32253.

Texte intégral
Résumé :
For today's healthcare data management systems, fundamental problems are data transparency, traceability, immutability, audit, data provenance, flexible access, trust, privacy, and security. Blockchain is a promising technology that can help to optimise healthcare data management operations by increasing data efficiency and ensuring trust. The current study examined the usefulness of blockchain technology in healthcare and the barriers to adoption. Finally, we looked at the future of blockchain technology in healthcare. The current study reviewed 53 papers and utilised the PRISMA framework 2020 to include and exclude records from the Scopus database. The VOS Viewer software is used to categorize the published literature, and the prevalence of essential terms is often used to authenticate the main themes in classifications. The current study findings indicate that Blockchain offers a wide range of applications and functions in healthcare. By allowing the transfer of patient medical information, controlling the medication supply chain, and facilitating the safe transfer of patient medical records, blockchain technology assists healthcare researchers in discovering genetic codes. Because blockchain can support novel analytics, healthcare firms may notice changes in their data in real-time, allowing them to make swift choices without human involvement
Styles APA, Harvard, Vancouver, ISO, etc.
47

Gupta, Sangeeta. « Private Blockchain-Cloud System (PBCS) for Healthcare Services ». International Journal of Software Innovation 10, no 2 (avril 2022) : 1–8. http://dx.doi.org/10.4018/ijsi.289602.

Texte intégral
Résumé :
Blockchain in the recent times stands as a buzz word to deal with huge set of real time applications that function in a manual way rather than in an automated manner. There may be several intermediate phases involved to access legitimate records of significance in various sectors like financial industry, supply chain market, educational organizations, healthcare systems etc. But, when the amount of data is enormous, then manual steps to infer a conclusion after undergoing verification and validation phases, is a time-consuming approach. Hence, there is a necessity to automate the process flow using emerging tools and technologies such as blockchain. Towards this end, a novel Private Blockchain-Cloud System (PBCS) for Healthcare Services is proposed in this work. An model is presented to secure the patient records via e-block access platform where only the person holding the legitimate key can access the data. Security is further strengthened by deploying the blocks of a blockchain in cloud environment.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Amade, Benedict, Achimba Chibueze Ogbonna et Emmanuel Ifeanyichukwu Nkeleme. « An Investigation of the Factors Affecting Successful Enterprise Resource Planning (ERP) Implementation in Nigeria ». Journal of Construction in Developing Countries 27, no 1 (juin 2022) : 41–63. http://dx.doi.org/10.21315/jcdc2022.27.1.3.

Texte intégral
Résumé :
The ERP system has been identified as a tool for delivering information technology (IT) services through software and other critical infrastructures using internet technologies. Given its nature as an industry-driven concept and system, this is universally accepted in industry as a tool to solve practical problems with a view to achieving an integrated enterprise information system. However, a developing country like Nigeria still faces a lot of hurdles in managing its construction supply chain. The aim of this study is to investigate the factors affecting the successful implementation of enterprise resource planning (ERP) systems in the Nigerian construction industry. After a literature search, expert input via the Delphi technique, the study identified four main factors and 21 sub-factors. The Decision-Making Trial and Evaluation Laboratory (DEMATEL) method was used to prioritise the factors and to identify the relationship that exists between the factors. The findings revealed that the key factors affecting the implementation of ERP systems are "A lot of security concerns" (T7), "The management of ERP projects is too complex" (P5) and "The inability to align the ERP solution with the business plans of the organisation" (P2). This study recommends that the findings of this work will help both local and international practitioners alike.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Nilufer, Nilufer, et Zeynep Yeni Erol. « A critical approach to technology-based risks in blockchain system ». International Journal of Business Ecosystem & ; Strategy (2687-2293) 2, no 1 (24 février 2020) : 41–48. http://dx.doi.org/10.36096/ijbes.v2i1.164.

Texte intégral
Résumé :
The blockchain technology has given a new shape to the world and disrupted a wide variety of technology-based industries. The disruptive characteristics of blockchain technology have molded the way of doing things. Since the importance of blockchain technology in business and social environment is increasing day by day, this study aimed to underline risks of blockchain technology within the network. Two strategies were made to infer the technology-based risk in the blockchain ecosystem. First, the study examined to find the technology-based risk at the point where a user executes the transaction from his/her computer ‘Node’. Second, this study attempts to figure out the security concerns within the web of the blockchain. After assessment of benefits and risks of this technology, this study concluded with the findings that blockchain is very much secure and trustable system which provides peer-to-peer transactions without needing any trusted third party, besides, once the information of the transaction is recorded, the system stores multiple copies of it, so there is no chance to change or delete it from the system. In the case of negligence, there is a possibility of forgery at the node, but numerous software has been developed for protecting the computer. The approach of the study is grounded in the literature review of journal articles, reports, and conference proceedings from authenticated sources via content analysis of the keywords such as blockchain, security, trust, technology-based risks. Blockchain technology is not associated with finance but it has high usage in other areas like health, education, supply chain, the music industry and many more to explore.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Paul, Shubhra Deb, et Swarup Bhunia. « SILVerIn : Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure ». ACM Journal on Emerging Technologies in Computing Systems 17, no 3 (25 juin 2021) : 1–28. http://dx.doi.org/10.1145/3460232.

Texte intégral
Résumé :
A printed circuit board (PCB) provides necessary mechanical support to an electronic system and acts as a platform for connecting electronic components. Counterfeiting and in-field tampering of PCBs have become significant security concerns in the semiconductor industry as a result of increasing untrusted entities in the supply chain. These counterfeit components may result in performance degradation, profit reduction, and reputation risk for the manufacturers. While Integrated Circuit (IC) level authentication using physical unclonable functions (PUFs) has been widely investigated, countermeasures at the PCB level are scarce. These approaches either suffer from significant overhead issues, or opportunistic counterfeiters can breach them like clockwork. Besides, they cannot be extended to system-level (both chip and PCB together), and their applications are also limited to a specific purpose (i.e., either counterfeiting or tampering). In this article, we introduce SILVerIn , a novel systematic approach to verify the authenticity of all chips used in a PCB as well as the board for combating attacks such as counterfeiting, cloning, and in-field malicious modifications. We develop this approach by utilizing the existing boundary scan architecture (BSA) of modern ICs and PCBs. As a result, its implementation comes at a negligible (∼0.5%) hardware overhead. SILVerIn is integrated into a PCB design during the manufacturing phase. We implement our technique on a custom hardware platform consisting of an FPGA and a microcontroller. We incorporate the industry-standard JTAG (Joint Test Action Group) interface to transmit test data into the BSA and perform hands-on measurement of supply current at both chip and PCB levels on 20 boards. We reconstruct these current values to digital signatures that exhibit high uniqueness, robustness, and randomness features. Our approach manifests strong reproducibility of signatures at different supply voltage levels, even with a low-resolution measurement setup. SILVerIn also demonstrates a high resilience against machine learning-based modeling attacks, with an average prediction accuracy of ∼51%. Finally, we conduct intentional alteration experiments by replacing the on-board FPGA to replicate the scenario of PCB tampering, and the results indicate successful detection of in-field modifications in a PCB.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie