Acceptance of Blockchain Based Supply Chain Management System: Research Model Proposal Blokzincir Tabanli Tedarik Zinciri Yönetimi Sistemi Kabulü: Arastirma Modeli Önerisi

2019-11-01
Gokalp, Ebru
Coban, Selin
Gökalp, Mert Onuralp
© 2019 IEEE.Blockchain technology provides emerging solutions including decentralized management, security, privacy and robustness. In Supply Chain Management (SCM) applications, blockchain technology enable us to increase customer satisfaction, operational excellence, and to decrease operational costs and risks. Despite of these significant benefits, there are limited number of studies that combines SCM and blockchain in the literature. The main aim of this study is to investigate the factors influencing the adoption and acceptance of the blockchain based SCM in organizations. To this end, a comprehensive systematic literature review is conducted and a research model based on Technology-Organization-Environment (TOE) framework is proposed. The proposed research model consists of factors of the relative advantage, complexity, interoperability/compatibility, standardization, trust and scalability in the context of technology; organization's IT resource, top management support, organization size and financial resources in the context of organization; competitive pressure, trading partner pressure, government policy and regulations and inter-organizational trust in the context of environment.

Suggestions

Uses of PKI for process authorization
Taşkazan, Feyza; Özgit, Attila; Erten, Murat; Department of Computer Engineering (2003)
Enterprises require an information security solution that provides privacy, integrity, authentication and access controls for processes. License management systems are developed to be a solution for process authorization in different platforms. However, security threats on processes cannot be controlled with existing license management mechanisms. The need is a complete system that is independent from implementation, platform, and application. In this thesis, we design a complete system for process authoriz...
Decentralized secure multiparty computation
Taşcı, Buse; Cenk, Murat; Department of Cryptography (2019)
Advances in blockchain technology have led to new applications that aim to eliminate central systems, to improve transparency and user control in transactions whiledealing with the privacy and security challenges. In this thesis, a system which enables users to control their private data and to share chosen data to other parties usingsecure computation techniques is reviewed. Then, we present a blockchain-based digital identity system depending on this architecture. This system ensures that identity informa...
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
Sonmez, Ferda Ozdemir; Günel Kılıç, Banu (2021-09-01)
Types and complexity of information security related vulnerabilities are growing rapidly and present numerous challenges to the enterprises. One of the key challenges is to identify the optimal set of precautions with limited budget. Despite the fact that majority of enterprises have a budget constraint for installing and maintaining the protection systems, the majority of the previous work only focus on prioritization of security targets and do not consider the preventative actions and budget constraints. ...
A framework for distributed intrusion detection systems
Öztosun, Ümit; Koçyiğit, Altan; Mumcuoğlu, Erkan; Department of Information Systems (2002)
Emergence of intrusion detection systems (IDSs) has leveraged the security of infor mation systems. However, they also introduced new problems. Plethora of intrusion detection systems are in common use today, using various different ways and tech niques for intrusion detection. It is not uncommon to see an information system uti lizes different IDSs, in order to combine advantages and to reduce disadvantages of individual systems. This often results in a confusion of systems that output informa tion in diff...
Analysis of Password Attacks From The Perspective Of The Attacker By Multiple Honeypots
Aydın, Kıvanç; Acartürk, Cengiz; Department of Cybersecurity (2021-8-19)
Authentication is vital for secure operation of ICT systems. Since the past several decades, alternative solutions have been developed for authentication, such as biometric authentication methods, aiming at replacing passwords. Nevertheless, their success has been limited as evidenced by intensive use of passwords. Today, an average user uses dozens of different passwords in daily practice. The frequent use of passwords in authentication also leads to a close interest of attackers due to rapid the expansion...
Citation Formats
E. Gokalp, S. Coban, and M. O. Gökalp, “Acceptance of Blockchain Based Supply Chain Management System: Research Model Proposal Blokzincir Tabanli Tedarik Zinciri Yönetimi Sistemi Kabulü: Arastirma Modeli Önerisi,” 2019, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/69942.