Data flows across organizational boundaries are vital for creating and capturing value from data-intensive digital technologies, such as Artificial Intelligence. To achieve this, organizations ...increasingly engage in digital innovation networks, i.e., constellations of relations among dispersed, loosely coupled actors, who seek to collaborate for combining heterogeneously distributed domain expertise to train and leverage emerging digital technologies that learn from data. Yet, data flows remain stalled within digital innovation networks, and organizations fail to achieve sought-after benefits from data-intensive digital technologies. To date, research has paid limited attention to what contributes to stalled data flows and what strategies are required to facilitate seamless data flows. Our in-depth qualitative study of a digital innovation network within the Swedish forestry identified four key mechanisms underlying stalled data flows and hampering firms in leveraging value from data-intensive digital technologies and revealed the key role of brokerage functions in digital innovation networks for establishing what we call related variety.
•The paper investigates the critical role of data flows across organizational boundaries in digital innovation networks.•Mechanisms underlying stalled data flows within a digital innovation network in the forestry industry are identified.•The paper discusses how brokerage functions can establish related variety to facilitate seamless data flows.•We highlight the importance of overcoming stalled data flows emphasizing the need for strategic collaboration networks.
In this second progress report on infrastructure, I concentrate on the evolving infrastructures of our digital worlds, or ‘cloudfrastructures’. While there is an extensive literature in geography on ...the digital, less attention has been paid to its infrastructures. In this report I explore their relationships to other infrastructures, to nature, and to flow. I argue that paying attention to cloudfrastructures calls for new thinking on the axiom of (in)visibility in infrastructure studies, alerting us to (in)visibility as layered, multiple and orchestrated. Thinking of (in)visibility in this way also calls for an engagement with infrastructure beyond materiality.
Abstract The regulation of personal data varies widely between countries, with potential effects on digital services. We develop a taxonomy for the regulation of cross‐border personal data transfers ...and systematically categorize 143 countries in one of the three data models identified, which are an open data model, a conditional model, and a control model. Using a gravity model, we then study if sharing a similar regulatory model between trading partners is associated with trade in digital services. Moreover, we assess if enacting a comprehensive data protection law impacts the relationship between data models and digital services. The open model of data transfers appears to support data flows, regardless of the the presence of a domestic regime for personal data. We find a negative effect on digital services for the conditional model that prescribes conditions that need to be fulfilled to transfer personal data across borders. Interestingly, we find that this negative effect is more than offset by the presence of a comprehensive data protection law. Finally, the control model, which has strict conditions to transfer personal data outside the country, only has a negative and significant effect when a domestic regime for data protection is implemented. The latter is likely to reflect the cost burden of firms to comply with these regulations as the trust channel might not be effective in countries characterized by government surveillance.
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows ...in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
In the digital economy, the volume, variety and availability of data produced in myriad forms from a diversity of sources has become an important resource for competitive advantage, innovation ...opportunity as well as source of new management challenges. Building on the theoretical and empirical foundations of the traditional manufacturing Supply Chain (SC), which describes the flow of physical artefacts as raw materials through to consumption, we propose the Data Supply Chain (DSC) along which data are the primary artefact flowing. The purpose of this paper is to outline the characteristics and bring conceptual distinctiveness to the context around DSC as well as to explore the associated and emergent management challenges and innovation opportunities. To achieve this, we adopt the systematic review methodology drawing on the operations management and supply chain literature and, in particular, taking a framework synthetic approach which allows us to build the DSC concept from the pre-existing SC template. We conclude the paper by developing a set of propositions and outlining an agenda for future research that the DSC concept implies.
A web shell is a server-side script uploaded by an attacker to enable persistent access on a compromised machine. Detecting web shells is therefore of significant importance. In this paper, we ...present a novel system named ShellBreaker to detect web shells written in PHP, one of the leading languages used for server-side script development. ShellBreaker performs detection by correlating syntactical and semantic features that systematically characterize web shells through three aspects including (i) their communication with external users/attackers, (ii) their adaption to the run-time environment, and (iii) their usage of sensitive operations. We have evaluated ShellBreaker using real-world, PHP-based web shells and benign PHP scripts. Experimental results have demonstrated that ShellBreaker can achieve a high detection rate of 91.7% at a low false positive rate of 1%.
This paper explains the legal framework for cross-border transfers of personal data outside the EUand assesses its impact on a selection of Asia-Pacific data protection laws. It studies the ...positiondefended by the EU in the debates for a new general framework on e-commerce in the World TradeOrganization (WTO) and the sections regarding data flows of some free trade agreements recentlyconcluded by Asia-Pacific countries such as the Regional Comprehensive Economic Partnership andthe Comprehensive and Progressive Agreement for Trans-Pacific Partnership. This paper shows howthe regulation of data flows has surpassed national data protection laws to be increasingly present infree trade agreements with the tensions this may entail, paying special attention to the EU and Asia-Pacific. A holistic view is necessary because the consequences for human rights in trade negotiationsshould not be overlooked.
Apart from the positive effects οf smart homes, such as economic, energy, and security enhancements, and the focus on their efficiency and reliability, it should also be paid attention to the legal, ...ethical and social impacts of these ICT systems. The field of children’s data protection is challenging, as they are likely more vulnerable to online risks, and as a result, their protection requires a specialized privacy-preserving scheme. This research work addresses the crucial issues of minors’ data protection, from a European law perspective, through IoT-based devices inside a smart home environment.