scholarly journals Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 76541-76567 ◽  
Author(s):  
Muktar Yahuza ◽  
Mohd Yamani Idna Bin Idris ◽  
Ainuddin Wahid Bin Abdul Wahab ◽  
Anthony T. S. Ho ◽  
Suleman Khan ◽  
...  
Author(s):  
Chinnasamy P. ◽  
Rojaramani D. ◽  
Praveena V. ◽  
Annlin Jeba S. V. ◽  
Bensujin B.

Several researchers analyzed the information security problems in edge computing, though not all studied the criteria for security and confidentiality in detail. This chapter intends to extensively evaluate the edge computing protection and confidentiality standards and the different technical approaches utilized by the technologies often used mitigate the risks. This study describes the latest research and emphasizes the following: (1) the definition of edge computing protection and confidentiality criteria, (2) state-of-the-art strategies used to mitigate protection and privacy risks, (3) developments in technical approaches, (4) measures used to measure the efficiency of interventions, (5) the categorization of threats on the edge device and the related technical pattern used to mitigate the attackers, and (6) research directions for potential professionals in the field of edge devices privacy and security.


2018 ◽  
Vol 8 (5) ◽  
pp. 529-546
Author(s):  
Christofer Laurell ◽  
Sten Soderman

PurposeThe purpose of this paper is to provide a systematic review of articles on sport published in leading business studies journals within marketing, organisational studies and strategy.Design/methodology/approachBased on a review of 38 identified articles within the subfields of marketing, strategy and organisation studies published between 2000 and 2015, the articles’ topical, theoretical and methodological orientation within the studied subfields were analysed followed by a cross-subfield analysis.FindingsThe authors identify considerable differences in topical, theoretical and methodological orientation among the studied subfields’ associated articles. Overall, the authors also find that articles across all subfields tend to be focussed on contributing to mature theory, even though the subfield of marketing in particular exhibits contributions to nascent theory in contrast to organisation studies and strategy.Originality/valueThis paper contributes by illustrating the current state of research that is devoted or related to the phenomenon of sport within three subfields in business studies. Furthermore, the authors discuss the role played by leading business studies journalsvis-à-vissport sector-specific journals and offer avenues for future research.


2021 ◽  
Vol 17 (1) ◽  
pp. 97-122
Author(s):  
Mohamed Hassan Mohamed Ali ◽  
Said Fathalla ◽  
Mohamed Kholief ◽  
Yasser Fouad Hassan

Ontologies, as semantic knowledge representation, have a crucial role in various information systems. The main pitfall of manually building ontologies is effort and time-consuming. Ontology learning is a key solution. Learning Non-Taxonomic Relationships of Ontologies (LNTRO) is the process of automatic/semi-automatic extraction of all possible relationships between concepts in a specific domain, except the hierarchal relations. Most of the research works focused on the extraction of concepts and taxonomic relations in the ontology learning process. This article presents the results of a systematic review of the state-of-the-art approaches for LNTRO. Sixteen approaches have been described and qualitatively analyzed. The solutions they provide are discussed along with their respective positive and negative aspects. The goal is to provide researchers in this area a comprehensive understanding of the drawbacks of the existing work, thereby encouraging further improvement of the research work in this area. Furthermore, this article proposes a set of recommendations for future research.


2020 ◽  
Vol 91 ◽  
pp. 102112
Author(s):  
Gianluca Mauri ◽  
Viviana Gori ◽  
Erica Bonazzina ◽  
Alessio Amatu ◽  
Federica Tosi ◽  
...  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
M. Najmul Islam Farooqui ◽  
Junaid Arshad ◽  
Muhammad Mubashir Khan

PurposeAlongside the remarkable evolution of cellular communication to 5G networks, significant security and privacy challenges have risen which can affect the widespread adoption of advanced communication technologies. In this context, the purpose of this paper is to examine research within security and privacy for 5G-based systems highlighting contributions made by the research community and identify research trends within different subdomains of 5G security where open issues still exist.Design/methodology/approachThis paper uses a bibliographic approach to review the state-of-the-art in the field of 5G security and is the pioneering effort to investigate 5G security research using this methodology. Specifically, the paper presents a quantitative description of the existing contributions in terms of authors, organizations, and countries. It then presents detailed keyword and co-citation analysis that shows the quantity and pattern of research work in different subfields. Finally, 5G security areas are identified having open challenges for future research work.FindingsThe study shows that China leads the world in terms of published research in the field of 5G security with USA and India ranked second and third respectively. Xidian University, China is ranked highest for number of publications and h-index followed by University Oulu and AALTO University Finland. IEEE Access, Sensors and IEEE Internet of Things Journal are the top publication venues in the field of 5G security. Using VOSViewer aided analysis with respect to productivity, research areas and keywords, the authors have identified research trends in 5G security among scientific community whilst highlighting specific challenges which require further efforts.Originality/valueExisting studies have focused on surveys covering state-of-the art research in secure 5G network (Zhang et al. 2019), physical layer security (Wu et al., 2018), security and privacy of 5G technologies (Khan et al., 2020) and security and privacy challenges when 5G is used in IoT (Sicari et al. 2020). However, our research has revealed no existing bibliometric studies in this area and therefore, to our best knowledge, this paper represents pioneering such effort for security within 5G.


2019 ◽  
Vol 75 (1) ◽  
pp. 65-68
Author(s):  
Anja Pabel ◽  
Philip L. Pearce

Purpose This paper aims to outline major theoretical concepts relating to the tourism-humour relationship and provide commentary on opportunities for further research in this area. Design/methodology/approach Papers for this perspective research were sourced by conducting a systematic review which critically appraised relevant research on this topic to provide evidence on humour and its current use in tourism settings. Findings Humour has received attention from many academic tribes and disciplines; however, investigations in the context of tourism are only in its early stages. Research limitations/implications The paper is based on a select number of peer-reviewed literature studies on the topic of tourism and humour. Practical implications The paper outlines some of the challenges that tourism operators face regarding authenticity, i.e. when the delivery of scripted humour is performed in such a way that it is considered spontaneous and meaningful. Originality/value The paper provides a brief overview of how humour is currently used in tourism settings and recommends future research opportunities to guide further studies into this topic.


2015 ◽  
Vol 54 (1) ◽  
pp. 161-182 ◽  
Author(s):  
Rafael Matielo ◽  
Raquel Carolina Souza Ferraz D'Ely ◽  
Luciane Baretta

The disciplinary field of Second Language Acquisition (SLA) has witnessed an increasing interest in the investigation of the effects of subtitled and captioned audiovisual materials on domains of language learning/acquisition. In this context, this paper seeks to provide a systematic review of recent studies related to language learning aspects aided by the instructional/experimental use of subtitled and captioned materials. The present paper draws on relevant literature in the field of SLA that interfaces with subtitling/captioning, while outlining their goals and main findings. This paper also aims to unveil which dimensions have merited scholar attention the most in the last two decades. Finally, some considerations are made regarding possible avenues for future research, taking into account the existing literature and underinvestigated issues.


Sign in / Sign up

Export Citation Format

Share Document