ICT, Smart Systems, and Standardization

Author(s):  
Kai Jakobs

This chapter first provides a brief introduction to the links between standards and standardization, innovation, and economics. This will be followed a description of the complex web of Standards Setting Organizations (SSOs) in the ICT/smart systems sector. Subsequently, a flexible tool to describe the characteristics of an SSO will be discussed. This will be followed by the description of a typical standards setting process. These three aspects are only parts of the fairly complex task of standardization management, which will be described next. The subsequent section will briefly cover national standardization strategies. Finally, some likely future research directions are sketched.

Author(s):  
lamia Chaari Fourati ◽  
Mohamed Fourati ◽  
Bilel Najeh ◽  
Aicha Idriss

During this last decade, the blockchain (BC) paradigm has been required in several use cases and scenarios in particular for security, privacy, and trust provisioning. Accordingly, several studies proposed the use of BC technology to secure and to assure the trustworthiness of unmanned aerial vehicles (UAVs). In this context, this chapter highlights several applications and scenarios for the deployment of UAVs within diverse smart systems. In addition, it illustrates the advantages of the integration of the BC within UAVs-based smart systems. This integration reveals new challenges and future research directions that are discussed in this chapter.


2020 ◽  
Vol 01 (04) ◽  
pp. 170-182
Author(s):  
A K M Bahalul Haque ◽  
Sonia Tasmin

Internet of things (IoT) is the epitome of sustainable development. It has facilitated the development of smart systems, industrialization, and the state-of-the-art quality of life. IoT architecture is one of the essential baselines of understanding the widespread adoption. Security issues are very crucial for any technical infrastructure. Since IoT comprises heterogeneous devices, its security issues are diverse too. Various security attacks can be responsible for compromising confidentiality, integrity, and availability. In this paper, at first, the IoT architecture is described briefly. After that, the components of IoT are explained with perspective to various IoT based applications and services. Finally, various security issues, including recommended solutions, are elaborately described and the potential research challenges and future research directions.


2018 ◽  
Vol 30 (3) ◽  
pp. 29-54 ◽  
Author(s):  
Christoph Feichter ◽  
Isabella Grabner ◽  
Frank Moers

ABSTRACT This study provides descriptive evidence on target-setting policies in multi-divisional firms. Despite the importance of performance targets in practice, research mainly focuses on a few key areas in target setting, neglecting many other important aspects of target setting in organizations. Hence, relatively little is known about how performance targets are actually set, especially within multi-divisional firms. We perform in-depth interviews with managers responsible for target setting in multi-divisional firms. Using this interview information, we develop specific research questions that we examine in a survey among large U.S. and European multi-divisional firms. Broadly speaking, the survey results provide evidence that firms commit substantial time and resources to the target-setting process, indicating that they place a high strategic importance on this process. However, we also find that they are not very effective in reaching the goals of the target-setting process. Most importantly, we find a large variation in target-setting policies across firms. We exploit this variation to identify future research directions to guide examination of the diverse decisions managers encounter in the field of target setting.


Sign in / Sign up

Export Citation Format

Share Document