On the privacy and security for e-health services in the metaverse: An overview

M Letafati, S Otoum - Ad Hoc Networks, 2023 - Elsevier
Metaverse-enabled healthcare systems are expected to efficiently utilize an unprecedented
amount of health-related data without disclosing sensitive or private information of …

Implementing data sovereignty: Requirements & challenges from practice

M Hellmeier, J Pampus, H Qarawlus… - Proceedings of the 18th …, 2023 - dl.acm.org
Data sovereignty, the possibility to keep control over data, is gaining increasing attention in
both research and industry. Due to complex supply chains and a strong trend toward …

Unlocking metaverse-as-a-service the three pillars to watch: Privacy and security, edge computing, and blockchain

V Ahsani, A Rahimi, M Letafati, BH Khalaj - arxiv preprint arxiv …, 2023 - arxiv.org
In this article, the authors provide a comprehensive overview on three core pillars of
metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and …

Beyond control over data: Conceptualizing data sovereignty from a social contract perspective

AE Abbas, T van Velzen, H Ofe, G van de Kaa… - Electronic Markets, 2024 - Springer
In the data economy, data sovereignty is often conceptualized as data providers' ability to
control their shared data. While control is essential, the current literature overlooks how this …

[HTML][HTML] Unleashing innovation in first-line healthcare: The barriers to realizing platform openness

G van der Wielen, AE Abbas, M de Reuver - International Journal of …, 2024 - Elsevier
Purpose Digital platforms are essential for fostering innovation in first-line healthcare. These
platforms require openness, allowing external parties to utilize, enhance, or profit from them …

Identification of Key Requirements for the Application of Data Sovereignty in the Context of Data Exchange

S Biehs, J Stilling - 2024 - aisel.aisnet.org
With the growing digitization in our modern world, data is becoming an increasingly valuable
business asset. Therefore, it is crucial that individuals and organizations are aware of their …

Unleashing the potential of data ecosystems: establishing digital trust through trust-enhancing technologies

F Schäfer, J Rosen, C Zimmermann, F Wortmann - 2023 - aisel.aisnet.org
Companies increasingly innovate data-driven business models, enabling them to create
new products and services. Emerging data ecosystems provide these companies access to …

[KSIĄŻKA][B] Secure Collaborations for the Industrial Internet of Things

J Pennekamp - 2024 - jpennekamp.de
Abstract The Industrial Internet of Things (IIoT) is leading to increasingly-interconnected and
networked industrial processes and environments, which, in turn, results in stakeholders …

Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet

M Dahlmanns, F Heidenreich… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
Internet-wide studies provide extremely valuable insight into how operators manage their
Internet of Things (IoT) deployments in reality and often reveal grievances, eg, significant …

A Novel Metaverse-as-a-Service Architecture from an Operator View

V Ahsani, A Rahimi, M Letafati… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In this research paper, the authors present a comprehensive overview of three key elements
of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and …