scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Technology convergence assessment: Case of blockchain within the IR 4.0 platform

01 Nov 2021-Technology in Society (Pergamon)-Vol. 67, pp 101709
TL;DR: Bibliometric trends across the concept of technological convergence of Blockchain and IR 4.0 technologies are identified, indicating four major thematic clusters for the convergence trends with basic, established, niche, and emerging technologies.
About: This article is published in Technology in Society.The article was published on 2021-11-01. It has received 15 citations till now. The article focuses on the topics: Emerging technologies & Blockchain.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article , the authors proposed a conceptual framework to reduce the impact of adoption barriers against BLC-IoT in food supply chain (FSC) in Indian organizations.

12 citations

Journal ArticleDOI
01 Jan 2023-Sensors
TL;DR: In this paper , a real-time view of blockchain-based applications for Industry 4.0 and Society 5.0 is presented, where open issues, challenges, and research opportunities are discussed.
Abstract: Today, blockchain is becoming more popular in academia and industry because it is a distributed, decentralised technology which is changing many industries in terms of security, building trust, etc. A few blockchain applications are banking, insurance, logistics, transportation, etc. Many insurance companies have been thinking about how blockchain could help them be more efficient. There is still a lot of hype about this immutable technology, even though it has not been utilised to its full potential. Insurers have to decide whether or not to use blockchain, just like many other businesses do. This technology keeps a distributed ledger on each blockchain node, making it more secure and transparent. The blockchain network can operate smart contracts and convince others to agree, so criminals cannot make mistakes. On another side, the Internet of Things (IoT) might make a real-time application work faster through its automation. With the integration of blockchain and IoT, there will always be a problem with technology regarding IoT devices and mining the blockchain. This paper gives a real-time view of blockchain—IoT-based applications for Industry 4.0 and Society 5.0. The last few sections discuss essential topics such as open issues, challenges, and research opportunities for future researchers to expand research in blockchain—IoT-based applications.

12 citations

Journal ArticleDOI
TL;DR: In this paper , a decision framework called the q-rung orthopair fuzzy set (q-ROFS)-entropy-rank sum-weighting method (RSWM)-multi-objective optimization with ratio analysis with the full multiplicative form (MULTIMOORA) is developed.

12 citations

Journal ArticleDOI
TL;DR: ESRES, a system that adopts blockchain technology to prevent fraudulent behavior in the process of returns and exchanges with the smart contract and multi-attribute decision-support method to help consumers choose a suitable payment program is proposed.
Abstract: With the rapid development of e-commerce services, online retail has evolved from multi-channel to omni-channel in order to provide customers with more services. However, reverse logistics services (returns and exchanges) have become the target of many fraudulent activities, causing a lot of economic losses for many online retail companies. The current challenge of the traditional countermeasure is it requires a lot of manpower and training resources. In this study, we propose ESPRES, a system that adopts blockchain technology to prevent fraudulent behavior in the process of returns and exchanges with the smart contract and multi-attribute decision-support method to help consumers choose a suitable payment program. A practical implication of this study is that by adopting blockchain technology, a great amount of manpower used on determining whether each return or exchange is fraudulent can be reduced since merchants can check the product ownership. In addition, due to the fact that the footprint of goods cannot be forged, it can also prevent counterfeit or parallel imports of goods.

11 citations

Journal ArticleDOI
TL;DR: Based on a dataset formed by 420 scientific documents published from 2006 to 2020 a bibliometric and network analysis is carried out to find the scientific trends, the main relationships according to collaborations and intermediaries, and the research hubs that help to establish the research agenda.

7 citations

References
More filters
Journal ArticleDOI
TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Abstract: I have long felt that, because it was posed as a cute problem about philosophers seated around a table, Dijkstra’s dining philosopher’s problem received much more attention than it deserves. (For example, it has probably received more attention in the theory community than the readers/writers problem, which illustrates the same principles and has much more practical importance.) I believed that the problem introduced in [41] was very important and deserved the attention of computer scientists. The popularity of the dining philosophers problem taught me that the best way to attract attention to a problem is to present it in terms of a story. There is a problem in distributed computing that is sometimes called the Chinese Generals Problem, in which two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive. I stole the idea of the generals and posed the problem in terms of a group of generals, some of whom may be traitors, who have to reach a common decision. I wanted to assign the generals a nationality that would not offend any readers. At the time, Albania was a completely closed society, and I felt it unlikely that there would be any Albanians around to object, so the original title of this paper was The Albanian Generals Problem. Jack Goldberg was smart enough to realize that there were Albanians in the world outside Albania, and Albania might not always be a black hole, so he suggested that I find another name. The obviously more appropriate Byzantine generals then occurred to me. The main reason for writing this paper was to assign the new name to the problem. But a new paper needed new results as well. I came up with a simpler way to describe the general 3n+1-processor algorithm. (Shostak’s 4-processor algorithm was subtle but easy to understand; Pease’s generalization was a remarkable tour de force.) We also added a generalization to networks that were not completely connected. (I don’t remember whose work that was.) I also added some discussion of practical implementation details.

5,208 citations

Book ChapterDOI
TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Abstract: Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement. It is shown that, using only oral messages, this problem is solvable if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals. With unforgeable written messages, the problem is solvable for any number of generals and possible traitors. Applications of the solutions to reliable computer systems are then discussed.

4,901 citations

Proceedings ArticleDOI
22 Feb 1999
TL;DR: A new replication algorithm that is able to tolerate Byzantine faults that works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time of previous algorithms by more than an order of magnitude.
Abstract: This paper describes a new replication algorithm that is able to tolerate Byzantine faults. We believe that Byzantinefault-tolerant algorithms will be increasingly important in the future because malicious attacks and software errors are increasingly common and can cause faulty nodes to exhibit arbitrary behavior. Whereas previous algorithms assumed a synchronous system or were too slow to be used in practice, the algorithm described in this paper is practical: it works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time of previous algorithms by more than an order of magnitude. We implemented a Byzantine-fault-tolerant NFS service using our algorithm and measured its performance. The results show that our service is only 3% slower than a standard unreplicated NFS.

3,562 citations

Journal ArticleDOI
TL;DR: This article conducted an extensive literature review, employing bibliometric analysis and snowballing techniques to investigate the state of the art in the field and synthesise the similarities, differences and relationships between both terms.

3,508 citations

Journal ArticleDOI
TL;DR: The conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Abstract: Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner. We review how this mechanism works and also look into smart contracts—scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows. We also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network. Wherever applicable, we identify solutions and workarounds. Our conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.

3,129 citations