scispace - formally typeset
Search or ask a question

Showing papers in "IT Professional in 2018"


Journal ArticleDOI
Dennis A. Miller1
TL;DR: This article describes how these two technologies will improve efficiencies, provide new business opportunities, address regulatory requirements, and improve transparency and visibility.
Abstract: Blockchain and the Internet of Things (IoT) are key technologies that will have a huge impact in the next 10 years for companies in the industrial market. This article describes how these two technologies will improve efficiencies, provide new business opportunities, address regulatory requirements, and improve transparency and visibility.

233 citations


Journal ArticleDOI
TL;DR: The authors discuss the advantages and disadvantages of blockchain technology using examples from the insurance sector, which can be generalized and applied to other sectors.
Abstract: Blockchain has been considered a breakthrough technology-but does your company need it? In this article, the authors discuss the advantages and disadvantages of blockchain technology using examples from the insurance sector, which can be generalized and applied to other sectors.

221 citations


Journal ArticleDOI
TL;DR: Key concerns that have been raised regarding institutions in the developing world are discussed and the potential role of blockchain to address them is evaluated.
Abstract: A large proportion of the population in the developing world can benefit from blockchain. In this article, the authors discuss key concerns that have been raised regarding institutions in the developing world and evaluate the potential role of blockchain to address them.

134 citations


Journal ArticleDOI
TL;DR: A characterization of the capabilities of connected and autonomous electric vehicles is used to devise a service management framework and pricing schemes for these services.
Abstract: The powerful capabilities of connected and autonomous electric vehicles will make them a popular provider of a wide range of services, including mobility, sensing, computing, traffic control, and energy management. This paper uses a characterization of these services to devise a service management framework and pricing schemes.

51 citations


Journal ArticleDOI
TL;DR: Some of the major privacy issues associated with consumer wearables are identified and possible solutions to address privacy concerns are explored.
Abstract: Consumer wearables have emerged as disrupting devices that benefit citizens in areas such as mobile health, fitness, security, and entertainment. The mass adoption of these devices not only generates high revenues but also exposes important privacy issues. The authors identify some of the major privacy issues associated with consumer wearables and explore possible solutions to address privacy concerns.

44 citations


Journal ArticleDOI
TL;DR: To take advantage of the volume and variety of data captured by and stored in ubiquitous IoT services, forensic investigators need to draw upon evidence-acquisition methods and techniques from all areas of digital forensics and possibly create new IoT-specific investigation processes.
Abstract: The Internet of Things (IoT) brings a set of unique and complex challenges to the field of digital forensics. To take advantage of the volume and variety of data captured by and stored in ubiquitous IoT services, forensic investigators need to draw upon evidence-acquisition methods and techniques from all areas of digital forensics and possibly create new IoT-specific investigation processes. Although a number of conceptual process models have been developed to address the unique characteristics of the IoT, many challenges remain unresolved.

39 citations


Journal ArticleDOI
TL;DR: A machine-learning-based smart controller for a commercial buildings HVAC system using LoRa (a long-range, low-power wireless platform) and results show that LoRas coverage range was 60.4 percent more than short-range communication inside the building.
Abstract: The critical requirements for devices connected to the Internet of Things are long battery life, long coverage range, and low deployment cost. The authors developed a machine-learning-based smart controller for a commercial buildings HVAC (heating, ventilation, and air conditioning) system using LoRa (a long-range, low-power wireless platform) and compared it with short-range RF communication in an indoor setting. Results show that LoRas coverage range was 60.4 percent more than short-range communication inside the building. The smart controller was capable of identifying when a room was unoccupied and turning off the HVAC, reducing its energy consumption up to 19.8 percent.

39 citations


Journal ArticleDOI
TL;DR: This research examines how 5G services, on their own or in combination with other technologies, are likely to have a transformative impact on e-commerce activities in the coming years.
Abstract: 5G services, on their own or in combination with other technologies, are likely to have a transformative impact on e-commerce activities.

38 citations


Journal ArticleDOI
TL;DR: An overview of privacy in the context of big data is provided, categorizing four types of existing privacy violations in big data systems and assessing the strengths and weaknesses of their protection techniques.
Abstract: Big data systems have been instrumental in solving computational problems for business intelligence and predictive analysis. Despite this, they exhibit serious concerns for user privacy. The authors provide an overview of privacy in the context of big data, categorizing four types of existing privacy violations in big data systems and assessing the strengths and weaknesses of their protection techniques. They also provide measures that can be taken to strengthen users privacy.

36 citations


Journal ArticleDOI
TL;DR: It is important to remember that no new technology succeeds with the rip-and-replace method, so organizations using this technology will have a greater impact if they augment existing, well-established technologies such as EDI systems.
Abstract: Blockchain has enormous potential to advance modern services, but it is important to remember that no new technology succeeds with the rip-and-replace method. Organizations using this technology will have a greater impact if they augment existing, well-established technologies such as electronic data interchange (EDI) systems.

31 citations


Journal ArticleDOI
TL;DR: The author analyzes the factors behind the rural-urban disparity in e-commerce in developing countries and proposes a strategy to address this gap.
Abstract: In recent years, there has been increased participation in e-commerce activities among rural communities in developing countries. Despite this progress, e-commerce in developing countries has been a highly urban-oriented phenomenon. The author analyzes the factors behind the rural-urban disparity in e-commerce in developing countries.

Journal ArticleDOI
TL;DR: Can AI be used to empower IoT for accurate data acquisition and analysis real-time model development and prediction, while utilizing a blockchain foundation to reduce risks, support risk mitigation strategies, and enhance integrity and security?
Abstract: Digital transformation is affecting industries across global markets. Market segments, including industrial manufacturing, healthcare, financial services, food services, and automotive, are increasingly adopting Artificial Intelligence (AI), Internet of things (IoT), robotic process automation (RPA), and blockchain technologies. The convergence of these technologies holds the promise of creating smarter, safer, efficient, and more secure systems. IoT devices integrated with RPA allow secure robust communication among sensors, actuators, and power sources. AI is being deployed on wide ranging systems from quantum computers to edge devices. These systems are becoming more responsive in thinking, perceiving, and acting within time performance constraints. Designers are becoming increasingly confident in applying multiple technology advancements to solve volatile, uncertain, complex, and ambiguous challenges. However, as these technology architectures become more integrated, we are concerned with security and privacy risks. If all the data are on a centralized system, a single platform, or a nondistributed application, targeting the single point of failure, compromises the entire system. Can we use AI to empower IoT for accurate data acquisition and analysis real-time model development and prediction, while utilizing a blockchain foundation to reduce risks, support risk mitigation strategies, and enhance integrity and security? Kitchen appliances serve as an example where integration of AI and IoT architectures with blockchain technologies can enable user satisfaction. A refrigerator equipped with IoTsensors enables inventory monitoring, while blockchain assures data integrity from devices to trusted decentralized systems. The IoT allows capturing real-time stream of sensor data, while blockchain ensures providence with a chain of custody of a smart contract in a distributed ledger with AI providing descriptive, predicted, and prescriptive Jeff Daniels University of Maryland University College

Journal ArticleDOI
TL;DR: Digital transformation requires a special set of skills and competencies, such as BPM, robotic process automation, cloud computing, emerging technology, agile program management, cybersecurity, and effective internal and external communications skills.
Abstract: Digital transformation requires a special set of skills and competencies, such as BPM, robotic process automation, cloud computing, emerging technology, agile program management, cybersecurity, and effective internal and external communications skills.

Journal ArticleDOI
TL;DR: The ways in which the use of social media results in digital transformation of informal ties that provide the social capital needed for KS, both within and across organizations are explored.
Abstract: This article provides insight into the transformative role that social media can play in informal knowledge sharing (KS) in an enterprise through the lens of social capital. This work explores the ways in which the use of social media results in digital transformation of informal ties that provide the social capital needed for KS, both within and across organizations. The empirical basis of this article is a field study focused on the use of social media by knowledge workers from 17 consulting firms.

Journal ArticleDOI
TL;DR: The authors present an implemented framework for an interactive cognitive system enabling human-centered, adaptive industrial assistance in cooperative, complex human-in-the-loop assembly tasks.
Abstract: Cognitive systems are capable of human-like actions such as perception, learning, planning, reasoning, self- and context-awareness, interaction, and performing actions in unstructured environments. The authors present an implemented framework for an interactive cognitive system enabling human-centered, adaptive industrial assistance in cooperative, complex human-in-the-loop assembly tasks. The functionality of the cognitive system includes enabling perception and awareness, understanding and interpreting situations, reasoning, decision making, and autonomous acting.

Journal ArticleDOI
TL;DR: A recent NIST publication provides insights that might lead to standardization and promote formalization, logical reasoning, simulations, reliability measurements, and security risk analysis for the IoT by first examining the things that make up the IoT as mentioned in this paper.
Abstract: There are various interpretations and definitions for the Internet of Things (IoT) and its components. People often talk about objects, devices, and sensors connecting the virtual world to the physical world. A recent NIST publication provides insights that might lead to standardization and promote formalization, logical reasoning, simulations, reliability measurements, and security risk analysis for the IoT by first examining the things that make up the IoT.

Journal ArticleDOI
TL;DR: The Internet of Things has gone from hype to abject reality, and its ubiquity is growing, so ensuring TIPPSS for IoT is critical to protect people, devices, infrastructure, and cities in this hyper-connected world.
Abstract: The Internet of Things (IoT) has gone from hype to abject reality, and its ubiquity is growing. Ensuring TIPPSS for IoT (Trust, Identity, Privacy, Protection, Safety, and Security) is critical to protect people, devices, infrastructure, and cities in our hyper-connected world.

Journal Article
TL;DR: The Internet of Things (IoT), with its distinguished features such as sensing and intelligence (artificial and regular), can support and significantly benefit the pedagogical processes for all interrelated actors as well as all assets involved.
Abstract: The Internet of Things (IoT), with its distinguished features such as sensing and intelligence (artificial and regular), can support and significantly benefit the pedagogical processes for all interrelated actors (faculty, students, and staff) as well as all assets involved (libraries, classrooms, and labs).

Journal ArticleDOI
TL;DR: This special issue of IT Professional presents emergent financial technology trends and examines promising future developments, critical challenges and issues, innovative approaches and novel solutions, and new financial applications.
Abstract: This special issue of IT Professional presents emergent financial technology trends and examines promising future developments, critical challenges and issues, innovative approaches and novel solutions, and new financial applications.

Journal ArticleDOI
TL;DR: In insights gathered from the design and implementation of an SMS chatbot-based virtual assistant to hotel guests in London, the author discusses challenges and first outcomes and makes recommendations based on this experience toward best practices for approaching the design of chatbots in the customer service domain.
Abstract: This article shares insights gathered from the design and implementation of an SMS chatbot-based virtual assistant to hotel guests in London. The author discusses challenges and first outcomes, and makes recommendations based on this experience toward best practices for approaching the design of chatbots in the customer service domain.

Journal ArticleDOI
TL;DR: The authors critically review and analyze both the economic and social implications of the autonomous car, finding that these implications will play an important role in the future of autonomous cars among consumers.
Abstract: One of the major issues with autonomous cars is their future impact on society as well as on the research community, academia, and industry. As interest in autonomous car technology grows, the social and economic implications of this technology will affect various stakeholders, including its commercialization. The authors critically review and analyze both the economic and social implications of the autonomous car. The significance of these implications will play an important role in the future of autonomous cars among consumers.

Journal ArticleDOI
TL;DR: A novel context-aware fog computing framework for intelligent transportation systems (ITS) called CFC-ITS, which consists of multiple intelligent tiers: Internet of Things tier, fog service tier, and global cloud service tier supporting edge analytics for ITS services in a connected car environment.
Abstract: This paper proposes a novel context-aware fog computing framework for intelligent transportation systems (ITS) called CFC-ITS. This scheme consists of multiple intelligent tiers: Internet of Things tier, fog service tier, and global cloud service tier supporting edge analytics for ITS services in a connected car environment. Each tier on the fog senses different contexts like location, time, available resources, and estimated response time for efficiently processing tasks to provide delay-sensitive services while optimizing virtualized resources. A preliminary prototype and a testbed for this study were built to validate the robustness of the proposed approach.

Journal ArticleDOI
TL;DR: The authors analyze relevant public information provided by new media to predict the movement of the USD/TWD exchange rate and explore whether big data analytics with machine-learning modeling can exceed the random walk mechanism and the notion of market efficiency.
Abstract: The authors analyze relevant public information provided by new media to predict the movement of the USD/TWD exchange rate and explore whether big data analytics with machine-learning modeling can exceed the random walk mechanism and the notion of market efficiency.

Journal ArticleDOI
TL;DR: This research is motivated by two questions: What are the current trends of data breaches in the public sector and how do contextual governmental factors impact these data breaches?
Abstract: A data breach exposes confidential, protected data to unauthorized access and manipulation. This study examines the extent and occurrences of data breaches in the US public sector through an analysis of data breaches over a five-year period. This research is motivated by two questions: What are the current trends of data breaches in the public sector and how do contextual governmental factors impact these data breaches?

Journal ArticleDOI
TL;DR: The authors designed a new software engineering lifecycle process for big data projects, primarily based on ISO/IEC standard 15288:2008, which aims to simplify the development process for such projects.
Abstract: There is currently no development process standard for big data projects. With the increasing number of such projects, the authors designed a new software engineering lifecycle process for big data projects, primarily based on ISO/IEC standard 15288:2008.

Journal ArticleDOI
George Strawn1
TL;DR: This article explores the revolutionary possibility that the new IT is changing the capitalist system itself.
Abstract: This article explores the revolutionary possibility that the new IT is changing the capitalist system itself.

Journal ArticleDOI
TL;DR: The 2018 Winter Olympics in Pyeongchang was a showcase of South Koreas technological advancement and sophistication.
Abstract: The 2018 Winter Olympics in Pyeongchang was a showcase of South Koreas technological advancement and sophistication.

Journal ArticleDOI
TL;DR: The authors analyze cyber breaches of PII and found that they are significantly larger compared to other breaches, showing that past breaches are useful for predicting future breaches.
Abstract: Cyberthreats create unique risks for organizations and individuals, especially regarding breaches of personally identifiable information (PII). However, relatively little research has examined hackings distinct impact on privacy. The authors analyze cyber breaches of PII and found that they are significantly larger compared to other breaches, showing that past breaches are useful for predicting future breaches.

Journal ArticleDOI
TL;DR: By providing access to data from numerous systems in one database and supporting the systems that can produce an appropriate customer experience, a customer data platform overcomes the limitations imposed by fragmented point solutions and presents a holistic approach to customer interactions.
Abstract: By providing access to data from numerous systems in one database and supporting the systems that can produce an appropriate customer experience, a customer data platform overcomes the limitations imposed by fragmented point solutions and presents a holistic approach to customer interactions.

Journal ArticleDOI
TL;DR: In this column, the focus was on people taking a collaborative role to design and build the most extraordinary things using tools and techniques that are available at FabLabs, but now the focus is on the use of robots for extreme automation.
Abstract: In our last column, we have illustrated how FabLabs network can play an important role in shaping the future of manufacturing and automation. The focus was on people taking a collaborative role to design and build the most extraordinary things using tools and techniques that are available at FabLabs. In this direction, FabLabs is a platform of a community of makers who collaborate and learn from each other to build highly specialized products, rather than settle for the legacy mass production products. In this column, however, we are shifting our focus on the use of robots for extreme automation. Actually, “none of humanity’s creations inspires such a confusing mix of awe, admiration, and fear as those associated with robots. We want robots to make our lives easier and safer, yet we can’t quite bring ourselves to trust them. We’re crafting them in our own image, yet we are terrified they’ll supplant us”. The fears from the outcome of using robots reached some kind of far end as apocalyptic, resembling the biblical Apocalypse or the end of world. These reactions describe the wind of change related to automation and manufacturing as many prominent people are asking important “what if” questions like what happens if a new technology based on robotics causes millions to lose their jobs in a short period of time, or what if most companies simply no longer need many human workers? Bill Gates, as well as many politicians, believes that governments should tax companies for using robots instead of people as a way to compensate the loss in employment and for retraining. Others like legislators and lawmakers are trying to mature a robot law. Actually, the notion that workers’ skills can suddenly become obsolete Jinan Fiaidhi Sabah Mohammed Lakehead University