Blockchain technology (BCT) has been gaining popularity due to its benefits for almost every industry. However, despite its benefits, the organizational adoption of BCT is rather limited. This lack ...of uptake motivated us to identify the factors that influence the adoption of BCT from an organizational perspective. In doing this, we reviewed the BCT literature, interviewed BCT experts, and proposed a research model based on the TOE framework. Specifically, we theorized the role of technological (perceived benefits, compatibility, information transparency, and disintermediation), organizational (organization innovativeness, organizational learning capability, and top management support), and environmental (competition intensity, government support, trading partners readiness, and standards uncertainty) factors in the organizational adoption of BCT in Australia. We confirmed the model with a sample of adopters and potential adopter organizations in Australia. The results show a significant role of the proposed factors in the organizational adoption of BCT in Australia. Additionally, we found that the relationship between the influential factors and BCT adoption is moderated by “perceived risks”. The study extends the TOE framework by adding factors that were ignored in previous studies on BCT adoption, such as perceived information transparency, perceived disintermediation, organizational innovativeness, organizational learning capability, and standards uncertainty.
Australia's Higher Education and Research Sector (HERS) must adopt digital resilience strategies to tackle cybersecurity challenges and manage major crises effectively. In this study, we have ...developed a digital resilience framework to mitigate these cybersecurity issues. Our findings suggest a range of keystone factors for crisis management, such as implementing cybersecurity awareness programmes, providing cyber support, redefining roles and responsibilities, implying risk management tools, partnerships with external security organizations, introducing policies, reconfiguring technologies, adopting new technologies, and evaluating current changes to combat these issues. These keystone factors will help achieve digital resilience and significantly minimize cybersecurity issues in HERS, not only during the current major crisis but also in the future. This research offers valuable theoretical and practical contributions that can be applied beyond the context of the recent crisis.
Purpose: The purpose of this research paper was to analyse the counterstrategies to mitigate cybersecurity challenges using organisational learning loops amidst major crises in the Higher Education ...and Research Sector (HERS). The authors proposed the learning loop framework revealing several counterstrategies to mitigate cybersecurity issues in HERS. The counterstrategies are explored, and their implications for research and practice are discussed. Methodology: The qualitative methodology was adopted, and semi-structured interviews with cybersecurity experts and top managers were conducted. Results: This exploratory paper proposed the learning loop framework revealing introducing new policies and procedures, changing existing systems, partnership with other companies, integrating new software, improving employee learning, enhancing security, and monitoring and evaluating security measures as significant counterstrategies to ensure the cyber-safe working environment in HERS. These counterstrategies will help to tackle cybersecurity in HERS, not only during the current major crisis but also in the future. Implications: The outcomes provide insightful implications for both theory and practice. This study proposes a learning framework that prioritises counterstrategies to mitigate cybersecurity challenges in HERS amidst a major crisis. The proposed model can help HERS be more efficient in mitigating cybersecurity issues in future crises. The counterstrategies can also be tested, adopted, and implemented by practitioners working in other sectors to mitigate cybersecurity issues during and after major crises. Future research can focus on addressing the shortcomings and limitations of the proposed learning framework adopted by HERS.
Over the last few years, business simulation games (BSGs) in higher education have attracted attention. BSGs tend to actively engage students with course material, promoting higher engagement and ...motivation and enabling learning outcomes. Increasingly, researchers are trying to explore the full potential of these games with an upsurge of research in the BSG field in recent years. There is a need to understand the current state of research and future research opportunities; however, there is a lack of recent systematic literature reviews in BSG literature. This study addresses this gap by systematically compiling online empirical research from January 2015 to April 2022. We followed PRISMA guidelines to identify fifty-seven (57) papers reporting empirical evidence of the effectiveness of BSGs in teaching and learning. Findings showed that BSGs improve learning outcomes such as knowledge acquisition, cognitive and interactive skills, and behaviour. The review also summarises different issues concerning the integration of BSGs into the curriculum, learning theories used in the selected studies, and assessment methods used to evaluate student achievement in learning outcomes. The findings of this review summarise the current research activities and indicate existing deficiencies and potential research directions that can be used as the basis for future research into the use of BSGs in higher education.
For dispute resolution in daily life, tamper-proof data storage and retrieval of log data are important with the incorporation of trustworthy access control for the related users and devices, while ...giving access to confidential data to the relevant users and maintaining data persistency are two major challenges in information security. This research uses blockchain data structure to maintain data persistency. On the other hand, we propose protocols for the authentication of users (persons and devices) to edge server and edge server to main server. Our proposed framework also provides access to forensic users according to their relevant roles and privilege attributes. For the access control of forensic users, a hybrid attribute and role-based access control (ARBAC) module added with the framework. The proposed framework is composed of an immutable blockchain-based data storage with endpoint authentication and attribute role-based user access control system. We simulate authentication protocols of the framework in AVISPA. Our result analysis shows that several security issues can efficiently be dealt with by the proposed framework.
Blockchain technology (BCT) is an emerging technology. Cybersecurity challenges in BCT are being explored to add greater value to business processes and reshape business operations. This scoping ...review paper was aimed at exploring the current literature’s scope and categorizing various types of cybersecurity challenges in BCT. Databases such as Elsevier, ResearchGate, IEEE, ScienceDirect, and ABI/INFORM Collection (ProQuest) were searched using a combination of terms, and after rigorous screening, 51 research studies were found relevant. Data coding was performed following a framework proposed for scoping review. After careful analysis, thirty different types of cybersecurity challenges in BCT were categorized into six standardized classes. Our results show that most of the studies disclose cybersecurity challenges in BCT generally without pointing to any specific industry sector, and to a very little extent, few papers reveal cybersecurity challenges in BCT related to specific industry sectors. Also, prior studies barely investigated the strategies to minimize cybersecurity challenges in BCT. Based on gap identification, future research avenues were proposed for scholars.
Blockchain technology has garnered substantial interest due to its capacity to transform numerous industries by amplifying transparency and bolstering security measures. Despite the increasing ...interest, there is a void in existing literature regarding the alignment of actors with the diffusion of innovation principles in the context of blockchain adoption. This gap restricts comprehension of the factors influencing adoption. This research addressed this void by investigating how actors align with the diffusion of innovation principles in making decisions about blockchain adoption. Diffusion of innovation model was combined with the innovation translation concept derived from Actor-Network Theory to explore these complex dynamics in more detail. The results indicate that the decision-making process for blockchain adoption corresponds to knowledge, persuasion, and decision stages, mirroring the phases found in the innovation translation approach. This research offers theoretical insights and practical knowledge that can be beneficial to individuals and organisations looking to promote a successful implementation of blockchain technology.
In this paper, we interpret the sequence of events and issues that led to the ERP failure during the post-implementation phase in a large IT service management company in Australia. For this purpose, ...we used theoretical frameworks from the domain of organizational and situated learning. We found that several factors created severe complexities and failure at the post-implementation phase of the ERP: 1) staff's lack of understanding of the SAPERP, 2 the interconnection of ERP with business processes, 3) a disconnection between the training that the vendor provided and actual work practices, and 4) management's and staffs misunderstanding about the adequacy of the training and staff engagement. Our findings suggest that the theoretical space that situated learning theories provide can enhance our understanding about post-implementation issues.
COVID-19 datasets: A brief overview Sun, Ke; Li, Wuyang; Saikrishna, Vidya ...
Computer Science and Information Systems,
09/2022, Letnik:
19, Številka:
3
Journal Article
Odprti dostop
The outbreak of the COVID-19 pandemic affects lives and social-economic development around the world. The affecting of the pandemic has motivated researchers from different domains to find effective ...solutions to diagnose, prevent, and estimate the pandemic and relieve its adverse effects. Numerous COVID-19 datasets are built from these studies and are available to the public. These datasets can be used for disease diagnosis and case prediction, speeding up solving problems caused by the pandemic. To meet the needs of researchers to understand various COVID-19 datasets, we examine and provide an overview of them. We organise the majority of these datasets into three categories based on the category of applications, i.e., time-series, knowledge base, and media-based datasets. Organising COVID-19 datasets into appropriate categories can help researchers hold their focus on methodology rather than the datasets. In addition, applications and COVID-19 datasets suffer from a series of problems, such as privacy and quality. We discuss these issues as well as potentials of COVID-19 datasets.