scispace - formally typeset
Search or ask a question
Author

Zaied Shouran

Bio: Zaied Shouran is an academic researcher. The author has contributed to research in topics: Octave & Information system. The author has an hindex of 3, co-authored 5 publications receiving 38 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: As IoT home devices become increasingly ubiquitous, study’s findings and recommendations contribute to the broader understanding of users’ evolving attitudes towards privacy in smart homes.
Abstract: The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. organization and people are wide accepting and adopting the functionalities offered by the smart home applications. this can be because of the various advantages, in easing users’ everyday life and work, provided by the rising internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able either to accumulate information from the environment or to perform proper tasks. the main features of smart homes embrace realtime monitoring, remote control, safety from intruders, gas/fire alarm, and so on. Since among smart homes, sensitive and personal data are managed, security and privacy solutions should be put in place, to protect users/businesses’ data against violation try still on guarantee the supply of reliable services. As IoT home devices become increasingly ubiquitous, study’s findings and recommendations contribute to the broader understanding of users’ evolving attitudes towards privacy in smart homes.

64 citations

Journal Article
TL;DR: In this paper, the authors have discussed the effect challenges and obstacles to eGovernment transformation and the new idea is about the discussion of effect challenges, obstacles, and obstacles on government transformation.
Abstract: eGovernment ends up one of the key components for the advancement of the nation. Previous studies on eGovernment indicate that most governments are performing well in eGovernment implementation. However, eGovernment make the services from the government more effective and efficient through the better ICT capabilities rather the conventional method. The use of ICT make the public access faster and the public can get better information through the digital platform via internet. Currently, there is a necessity to focus on eGovernment Transformation, Organization Transformation, Public e-service, Public value, Challenges and Obstacles that face government to transform. The findings showed that each organizational element, that consists of process, people, culture and structure can identified well through the technology that induced organizational transformation in public sector. The changes of attribute can be identified by comprehensive review from general literature review of organizational point of view, the literature in the field of organization and information systems, and eGovernment literature. The new idea is about the discussion of effect challenges and obstacles to eGovernment transformation.

5 citations

Journal ArticleDOI
TL;DR: A framework to check eGovernment readiness is carried out by using the most important factors to measure eReadiness namely Technical, Organizational and Cultural, the result shows that the trust of the Internet and technology is very important to the wide-spread acceptance of eGovernment.
Abstract: Information and communication technology can make speedy changes in government processes, particularly in developing countries.in addition, there are many factors that effect on the implementation of eGovernment, because of these, this study carried out a framework to check eGovernment readiness by using the most important factors to measure eReadiness namely Technical, Organizational and Cultural. The result shows that the trust of the Internet and technology is very important to the wide-spread acceptance of eGovernment. because of that, Users need the Data and information protection must be safe from the unauthorized. Also, increasing the training and education factor will positively increase the decentralization factor. ICT infrastructure alone cannot achieve the implementation of eGovernment without a conscious policy designed to transform both the role of ICT in administration and the training and orientation of staff to imbibe innovations. it will be easier for people to be involved with new technology when all the essential things for life are covered. Computer and Internet experience impact eReadiness. public sector organizations should pay more attention to the recruitment and training of socalled big data talent or data scientists. In addition, there is a need to feel that there are benefits from requesting such a service online (perceived usefulness), on another hand, ease of use of the eGovernment website has no significant impact of eReadiness. ICT infrastructure and human capital get less weight, while indicators such as connectivity and regulations acquire more weight. This means that a country that is considered less ready in terms of ICT infrastructures and skills required to adopt eGovernment, its readiness with the new main characteristics of Cloud Computing.

3 citations

Journal Article
TL;DR: The relationship of the human factor in information security showing the human weaknesses which can cause unintentional harm to the organization is targeted and discussed, be that as it may, information security awareness may be a major tool in overcoming these weaknesses.
Abstract: Numerous organizations recognize that their workers, who are usually thought of the weakest link in information security, also can be great assets in the effort to reduce risk associated with data security. Information security has not been given enough consideration among the writing as far as the human issue impact; researchers have involved a lot of examination throughout this area. Human factors assume a noteworthy in computer security. all through this paper, we target the relationship of the human factor in information security showing the human weaknesses which can cause unintentional harm to the organization and discuss, be that as it may, information security awareness may be a major tool in overcoming these weaknesses.

3 citations

Journal ArticleDOI
TL;DR: The results of the study show that the Octave model can increase awareness about the importance of security in an information system and companies that implement it will be able to improve their performance in the future.
Abstract: Awareness of the security of information systems is an important thing to note. In this study, we will discuss planning models of awareness about information system security using Octave models or methods. The analytical method used is qualitative descriptive analysis. The results of the study show that the Octave model can increase awareness about the importance of security in an information system and companies that implement it will be able to improve their performance in the future.

Cited by
More filters
Journal ArticleDOI
TL;DR: The proposed IoT-based system for home automation can easily and efficiently control appliances over the Internet and support home safety with autonomous operation and can notably provide convenience, safety, and security for SH residents.
Abstract: Home automation systems have attracted considerable attention with the advancement of communications technology. A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. Lack of IoT technology usage, unfriendly user interface, limited wireless transmission range, and high costs are the limitations of existing home automation systems. Therefore, this study presents a cost-effective and hybrid (local and remote) IoT-based home automation system with a user-friendly interface for smartphones and laptops. A prototype called IoT@HoMe is developed with an algorithm to enable the monitoring of home conditions and automate the control of home appliances over the Internet anytime and anywhere. This system utilizes a node microcontroller unit (NodeMCU) as a Wi-Fi-based gateway to connect different sensors and updates their data to Adafruit IO cloud server. The collected data from several sensors (radio-frequency identification, ultrasonic, temperature, humidity, gas, and motion sensors) can be accessed via If This Then That (IFTTT) on users' devices (smartphones and/or laptops) over the Internet regardless of their location. A set of relays is used to connect the NodeMCU to homes under controlled appliances. The designed system is structured in a portable manner as a control box that can be attached for monitoring and controlling a real house. The proposed IoT-based system for home automation can easily and efficiently control appliances over the Internet and support home safety with autonomous operation. IoT@HoMe is a low cost and reliable automation system that reduces energy consumption and can notably provide convenience, safety, and security for SH residents.

125 citations

Journal ArticleDOI
TL;DR: A blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes and is implemented on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy.
Abstract: With the advancement of Information and Communication Technology (ICT) and the proliferation of sensor technologies, the Internet of Things (IoT) is now being widely used in smart home for the purposes of efficient resource management and pervasive sensing. In smart homes, various IoT devices are connected to each other, and these connections are centered on gateways. The role of gateways in the smart homes is significant, however, its centralized structure presents multiple security vulnerabilities such as integrity, certification, and availability. To address these security vulnerabilities, in this paper, we propose a blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes. The network consists of three layers including device, gateway, and cloud layers. The blockchain technology is employed at the gateway layer wherein data is stored and exchanged in the form blocks of blockchain to support decentralization and overcome the problem from traditional centralized architecture. The blockchain ensures the integrity of the data inside and outside of the smart home and provides availability through authentication and efficient communication between network members. We implemented the proposed network on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy. The evaluation results demonstrate that the proposed security solutions outperforms over the existing solutions.

91 citations

Journal ArticleDOI
TL;DR: A comprehensive review of the HEMS literature with reference to main concepts, configurations, and enabling technologies is presented and an overall overview of current and future trends in HEMS solutions and technologies is offered.
Abstract: Home energy management systems (HEMSs) help manage electricity demand to optimize energy consumption and distributed renewable energy generation without compromising consumers’ comfort HEMSs operate according to multiple criteria, including energy cost, weather conditions, load profiles, and consumer comfort They play an increasingly ubiquitous role in energy efficiency through the reduction of electricity consumption within residential and commercial smart grids This paper presents a comprehensive review of the HEMS literature with reference to main concepts, configurations, and enabling technologies In doing so, it also provides a summary of HEMS computing trends and popular communication technologies for demand response applications The ensuing survey offers the reader with an overall overview of current and future trends in HEMS solutions and technologies

80 citations

Journal ArticleDOI
TL;DR: A simple secure smart home framework based on a refined version of blockchain called Consortium blockchain is described and highlighted, which highlights the limitations and opportunities of adopting such an architecture.
Abstract: Smart Home automation is increasingly gaining popularity among current applications of Internet of Things (IoT) due to the convenience and facilities it provides to the home owners. Sensors are employed within the home appliances via wireless connectivity to be accessible remotely by home owners to operate these devices. With the exponential increase of smart home IoT devices in the marketplace such as door locks, light bulbs, power switches etc, numerous security concerns are arising due to limited storage and processing power of such devices, making these devices vulnerable to several attacks. Due to this reason, security implementations in the deployment of these devices has gained popularity among researchers as a critical research area. Moreover, the adoption of traditional security schemes has failed to address the unique security concerns associated with these devices. Blockchain, a decentralised database based on cryptographic techniques, is gaining enormous attention to assure security of IoT systems. The blockchain framework within an IoT system is a fascinating substitute to the traditional centralised models, which has some significant concerns in fulfilling the demand of smart homes security. In this article, we aim to examine the security of smart homes by instigating the adoption of blockchain and exploring some of the currently proposed smart home architectures using blockchain technology. To present our findings, we describe a simple secure smart home framework based on a refined version of blockchain called Consortium blockchain. We highlight the limitations and opportunities of adopting such an architecture. We further evaluate our model and conclude with the results by designing an experimental testbed using a few household IoT devices commonly available in the marketplace.

47 citations

Journal ArticleDOI
19 Feb 2021
TL;DR: A comprehensive review of research work on the existing technologies and applications of IoT in residential and commercial buildings and results show that the commercial building sector has received more attention compared to the residential building sector.
Abstract: Residential and commercial buildings are undergoing a dramatic change, and the Internet of Things (IoT) technologies are shaping the future of these buildings. Researchers have recently utilized IoT in a variety of applications and settings to transfer conventional buildings into smart, efficient, and secure buildings. While functional IoT approaches have been developed, there is still a need for improvement in IoT applications and operations to understand the full potential of this technology. This improvement can properly be done by bridging the gaps of the current literature to provide a building block for future studies. The objective of this paper is to present a comprehensive review of research work on the existing technologies and applications of IoT in residential and commercial buildings. For residential buildings, studies are divided to three major categories of home automation, intelligent energy management systems, and healthcare facilities. For commercial buildings, the current literature is divided to four categories of office buildings, healthcare facilities, educational buildings, and restaurants and retail facilities. Based on the review of each category, the trends, current benefits and risks, and future challenges of the IoT implementation in the built environments are identified and discussed. In particular, integration of various IoT technologies with different capabilities, data storage and processing, and privacy and security risks are identified as the main challenges for IoT implementation. In addition, our results show that the commercial building sector has received more attention compared to the residential building sector. By providing the directions for future research opportunities, this paper benefits IoT developers and researchers to properly identify their work boundaries and define their contributions.

41 citations