scholarly journals Application of Blockchain for Internet of Things: A Bibliometric Analysis

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.

Author(s):  
Vimitha R. Vidhya Lakshmi ◽  
Gireesh Kumar T.

Mobile Social Networks and its related applications have made a very great impact in the society. Many new technologies related to mobile social networking are booming rapidly now-a-days and yet to boom. One such upcoming technology is Opportunistic Mobile Social Networking. This technology allows mobile users to communicate and exchange data with each other without the use of Internet. This paper is about Opportunistic Mobile Social Networks, its architecture, issues and some future research directions. The architecture and issues of Opportunistic Mobile Social Networks are compared with that of traditional Mobile Social Networks. The main contribution of this paper is regarding privacy and security issues in Opportunistic Mobile Social Networks. Finally, some future research directions in Opportunistic Mobile Social Networks have been elaborated regarding the data's privacy and security.


2020 ◽  
pp. 0032258X2096858
Author(s):  
Alexander E Carter ◽  
Mariea Hoy ◽  
Betsy Byrne DeSimone

Despite law enforcement’s best efforts to use social media as a means of community policing, some engagement tactics may lead citizens to disclose personally identifiable information (PII). We coded 200 tweets with the popular #9PMRoutine that tagged @PascoSheriff (Florida) for participant PII. We found numerous postings of adults’ and children’s PII that are problematic including pictures, health information and security-related comments about their routines or vacations. Implications for law enforcement to protect their communities are discussed as well as opportunities to continue to cultivate their online relationships in a more secure forum. We also provide future research directions.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2011 ◽  
pp. 192-205
Author(s):  
Helena Halas ◽  
Tomaž Klobucar

This chapter explores the influence of pervasive computing on companies and their businesses, with the main stress on business models. The role of business models for companies is presented. Introduction to pervasive computing and a survey of existing e-business models classifications are used as a base for our research. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.


Author(s):  
Luiz Eduardo Marques Bastos

This chapter addresses the so-called Industry 4.0 and some of its applications in industrial pumps, seeking to emphasize its characteristics and benefits. The introduction of 4.0 industry technologies in this traditional industry can cause profound changes in existing business models, providing greater customer satisfaction, either improving the effectiveness of equipment operation, contributing to better adjustment to working conditions, and also prolonging their life cycle. We are still in the early stages of these technologies and a lot is yet to evolve; however, there are already interesting examples developed by some pump manufacturers around the world, some of which will be mentioned in this chapter. It is subdivided into three main parts, namely brief historical panorama from the first industrial revolution to Industry 4.0, current applications in the industrial pump industry, and finally, future research directions and conclusion.


Author(s):  
Helena Halas ◽  
Tomaž Klobucar

This chapter explores the influence of pervasive computing on companies and their businesses, with the main stress on business models. The role of business models for companies is presented. Introduction to pervasive computing and a survey of existing e-business models classifications are used as a base for our research. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.


2014 ◽  
Vol 10 (2) ◽  
pp. 78-95 ◽  
Author(s):  
Karen Smith ◽  
Francis Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


2017 ◽  
Vol 37 (6) ◽  
pp. 686-702 ◽  
Author(s):  
Saara A. Brax ◽  
Anu Bask ◽  
Juliana Hsuan ◽  
Chris Voss

Purpose Services are highly important in a world economy which has increasingly become service driven. There is a growing need to better understand the possibilities for, and requirements of, designing modular service architectures. The purpose of this paper is to elaborate on the roots of the emerging research stream on service modularity, provide a concise overview of existing work on the subject, and outline an agenda for future research on service modularity and architecture. The articles in the special issue offer four diverse sets of research on service modularity and architecture. Design/methodology/approach The paper is built on a literature review mapping the current body of literature on the topic and developing future research directions in service modularity and architecture. Findings The growing focus on services has triggered needs to investigate the suitability and implementation of physical-product-focused modularity principles and theories in service contexts, and to search for principles/theories that enhance services. The expanding research stream has explored various aspects of service modularity in empirical contexts. Future research should focus on service-specific modularity theories and principles, platform-based and mass-customized service business models, comparative research designs, customer perspectives and service experience, performance in context of modular services, empirical evidence of benefits and challenges, architectural innovation in services, modularization in multi-provider contexts, and modularity in hybrid offerings combining service and tangible product modules. Originality/value Nine areas are recommended for further research on service modularity and architecture. The introductory piece also discusses the roots of service modularity and provides an overview of current contributions.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 62962-63003 ◽  
Author(s):  
Yasir Saleem ◽  
Noel Crespi ◽  
Mubashir Husain Rehmani ◽  
Rebecca Copeland

Sign in / Sign up

Export Citation Format

Share Document