On the privacy and security for e-health services in the metaverse: An overview
Metaverse-enabled healthcare systems are expected to efficiently utilize an unprecedented
amount of health-related data without disclosing sensitive or private information of …
amount of health-related data without disclosing sensitive or private information of …
Implementing data sovereignty: Requirements & challenges from practice
Data sovereignty, the possibility to keep control over data, is gaining increasing attention in
both research and industry. Due to complex supply chains and a strong trend toward …
both research and industry. Due to complex supply chains and a strong trend toward …
Unlocking metaverse-as-a-service the three pillars to watch: Privacy and security, edge computing, and blockchain
In this article, the authors provide a comprehensive overview on three core pillars of
metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and …
metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and …
Beyond control over data: Conceptualizing data sovereignty from a social contract perspective
In the data economy, data sovereignty is often conceptualized as data providers' ability to
control their shared data. While control is essential, the current literature overlooks how this …
control their shared data. While control is essential, the current literature overlooks how this …
[HTML][HTML] Unleashing innovation in first-line healthcare: The barriers to realizing platform openness
Purpose Digital platforms are essential for fostering innovation in first-line healthcare. These
platforms require openness, allowing external parties to utilize, enhance, or profit from them …
platforms require openness, allowing external parties to utilize, enhance, or profit from them …
Identification of Key Requirements for the Application of Data Sovereignty in the Context of Data Exchange
S Biehs, J Stilling - 2024 - aisel.aisnet.org
With the growing digitization in our modern world, data is becoming an increasingly valuable
business asset. Therefore, it is crucial that individuals and organizations are aware of their …
business asset. Therefore, it is crucial that individuals and organizations are aware of their …
Unleashing the potential of data ecosystems: establishing digital trust through trust-enhancing technologies
Companies increasingly innovate data-driven business models, enabling them to create
new products and services. Emerging data ecosystems provide these companies access to …
new products and services. Emerging data ecosystems provide these companies access to …
[KSIĄŻKA][B] Secure Collaborations for the Industrial Internet of Things
J Pennekamp - 2024 - jpennekamp.de
Abstract The Industrial Internet of Things (IIoT) is leading to increasingly-interconnected and
networked industrial processes and environments, which, in turn, results in stakeholders …
networked industrial processes and environments, which, in turn, results in stakeholders …
Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet
M Dahlmanns, F Heidenreich… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
Internet-wide studies provide extremely valuable insight into how operators manage their
Internet of Things (IoT) deployments in reality and often reveal grievances, eg, significant …
Internet of Things (IoT) deployments in reality and often reveal grievances, eg, significant …
A Novel Metaverse-as-a-Service Architecture from an Operator View
In this research paper, the authors present a comprehensive overview of three key elements
of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and …
of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and …