📚References

  1. Meng, W.; Li, W.; Zhu, L. Enhancing medical smartphone networks via blockchain-based trust management against insider attacks. IEEE Trans. Eng. Manag. 2019, 67, 1377–1386. [Google Scholar] [CrossRef]

  2. Pandl, K.D.; Thiebes, S.; Schmidt-Kraepelin, M.; Sunyaev, A. On the convergence of artificial intelligence and distributed ledger technology: A scoping review and future research agenda. IEEE Access 2020, 8, 57075–57095. [Google Scholar] [CrossRef]

  3. Golbeck, J.; Robles, C.; Turner, K. Predicting personality with social media. In CHI’11 Extended Abstracts on Human Factors in Computing Systems; Association for Computing Machinery: New York, NY, USA, 2011; pp. 253–262. [Google Scholar]

  4. Meng, W.; Li, W.; Zhu, L. Enhancing medical smartphone networks via blockchain-based trust management against insider attacks. IEEE Trans. Eng. Manag. 2019, 67, 1377–1386. [Google Scholar] [CrossRef]

  5. Booher, H.R. (2003), Handbook of human systems integration, John Wiley & Sons. http://doi.org/10.1002/0471721174.

  6. Boy, G.A. (2021), “Human systems integration and design”, in: G. Salvendy and W. Karwowski (Editors), Handbook of Human Factors and Ergonomics, chapter 2, John Wiley & Sons, Ltd.

  7. Camara Dit Pinto, S., Masson, D., Villeneuve, E., Boy, G. and Urfels, L. (2021), “From requirements to prototyping, application of HSI methodology in DT design”, Proceedings of the International Conference on Engineering Design (ICED21), Vol. 1, pp. 1617–1626. http://doi.org/10.1017/pds.2021.423.

  8. Fürstenau, N. (2014), “Virtual and remote control tower - research, design, development and validation”, http://doi.org/10.1007/978-3-319-28719-5.

  9. Gopal Jani, Tushar Methta “Organisational Process reengineering”, https://event.conflr.com/HSI2019/sessiondetail_395520arrow-up-right

  10. Atlam, H.F.; Wills, G.B. Intersections between IoT and distributed ledger. In Advances in Organometallic Chemistry Volume 60; Elsevier BV: Amsterdam, The Netherlands, 2019; pp. 73–113. [Google Scholararrow-up-right]

  11. Karafiloski, E.; Mishev, A. Blockchain solutions for big data challenges: A literature review. In Proceedings of the IEEE EUROCON 2017—17th International Conference on Smart Technologies, Ohrid, Macedonia, 6–8 July 2017; pp. 763–768. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  12. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  13. ITU. Overview of the Internet of Things. Available online: https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=y.2060arrow-up-right (accessed on 13 October 2020).

  14. Statista. Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (in Billions). 2018. Available online: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/arrow-up-right (accessed on 8 October 2020).

  15. Atlam, H.F.; Wills, G.B. Technical aspects of blockchain and IoT. In Advances in Organometallic Chemistry Volume 60; Elsevier BV: Amsterdam, The Netherlands, 2019; pp. 1–39. [Google Scholararrow-up-right]

  16. Hugoson, M.Å. Centralized versus Decentralized Information Systems: A Historical Flashback. IFIP Adv. Inf. Commun. Technol. 2008, 303, 106–115. [Google Scholararrow-up-right]

  17. Yin, S.; Lu, Y.; Li, Y. Design and implementation of IoT centralized management model with linkage policy. In Proceedings of the Third International Conference on Cyberspace Technology (CCT 2015), Beijing, China, 17–18 October 2015; pp. 5–9. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  18. Atlam, H.F.; Wills, G.B. IoT Security, Privacy, Safety and Ethics. In Intelligent Sensing, Instrumentation and Measurements; Springer Science and Business Media LLC: Berlin, Germany, 2019; pp. 123–149. [Google Scholararrow-up-right]

  19. Atlam, H.F.; Walters, R.J.; Wills, G.B. Internet of Nano Things. In Proceedings of the 2nd International Conference on Cloud and Big Data Computing (ICCBDC 2018), Barcelona, Spain, 3–5 August 2018; pp. 71–77. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  20. Atlam, H.F.; Walters, R.J.; Wills, G.B. Intelligence of Things: Opportunities & Challenges. In Proceedings of the 2018 3rd Cloudification of the Internet of Things (CIoT), Paris, France, 2–4 July 2018; pp. 1–6. [Google Scholararrow-up-right]

  21. Conoscenti, M.; Vetro, A.; De Martin, J.C. Peer to Peer for Privacy and Decentralization in the Internet of Things. In Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), Buenos Aires, Argentina, 20–28 May 2017; pp. 288–290. [Google Scholararrow-up-right]

  22. Atlam, H.F.; Walters, R.J.; Wills, G.B. Fog Computing and the Internet of Things: A Review. Big Data Cogn. Comput. 2018, 2, 10. [Google Scholararrow-up-right] [CrossRefarrow-up-right] [Green Versionarrow-up-right]

  23. Atlam, H.F.; Wills, G.B. An efficient security risk estimation technique for Risk-based access control model for IoT. Internet Things 2019, 6, 1–20. [Google Scholararrow-up-right] [CrossRefarrow-up-right] [Green Versionarrow-up-right]

  24. Atlam, H.F.; Alenezi, A.; Walters, R.J.; Wills, G.B.; Daniel, J. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017; pp. 655–661. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  25. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2009. Available online: https://git.dhimmel.com/bitcoin-whitepaper/arrow-up-right (accessed on 13 October 2020).

  26. Back, A.; Corallo, M.; Dashjr, L.; Friedenbach, M.; Maxwell, G.; Miller, A.; Poelstra, A.; Timón, J.; Wuille, P. Enabling Blockchain Innovations with Pegged Sidechains. 2014. Available online: http://kevinriggen.com/files/sidechains.pdfarrow-up-right (accessed on 13 October 2020).

  27. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  28. Coinbase. What Is the Bitcoin Blockchain? 2017. Available online: https://support.coinbase.com/customer/portal/articles/1819222-what-is-the-blockchainarrow-up-right (accessed on 8 October 2020).

  29. Oxford. Blockchain|Definition of Blockchain in English by Oxford Dictionaries. 2018. Available online: https://en.oxforddictionaries.com/definition/blockchainarrow-up-right (accessed on 8 October 2020).

  30. Sultan, K.; Ruhi, U.; Lakhani, R. Conceptualizing Blockchains: Characteristics & Applications. arXiv 2018, arXiv:1806.03693. [Google Scholararrow-up-right]

  31. Samaniego, M.; Deters, R. Hosting Virtual IoT Resources on Edge-Hosts with Blockchain. In Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8–10 December 2016; pp. 116–119. [Google Scholararrow-up-right]

  32. Satyanarayanan, M. The Emergence of Edge Computing. Computer 2017, 50, 30–39. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  33. Kowalski, M.; Lee, Z.W.Y.; Chan, T.K.H. Blockchain technology and trust relationships in trade finance. Technol. Forecast. Soc. Chang. 2021, 166, 120641. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  34. Werbach, K. The Blockchain and the New Architecture of Trust (Information Policy); The MIT Press: London, UK, 2018. [Google Scholararrow-up-right]

  35. Gaggioli, A.; Eskandari, S.; Cipresso, P.; Lozza, E. The Middleman Is Dead, Long Live the Middleman: The “Trust Factor” and the Psycho-Social Implications of Blockchain. Front. Blockchain 2019, 2. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  36. Shala, B.; Trick, U.; Lehmann, A.; Ghita, B.; Shiaeles, S. Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision. IEEE Access 2020, 8, 119961–119979. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  37. Bashir, I. Mastering Blockchain: Distributed Ledger Technology, Decentralization, and Smart Contracts Explained, 2nd ed.; Packt Publishing: Mumbai, India, 2018. [Google Scholararrow-up-right]

  38. Konstantinidis, I.; Siaminos, G.; Timplalexis, C.; Zervas, P.; Peristeras, V.; Decker, S. Blockchain for Business Applications: A Systematic Literature Review. In Business Information Systems; Springer: Cham, Switzerland, 2018; pp. 384–399. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

  39. NVIDIA Jetson Nano for Edge AI Applications and Education. 2022. Available online: https://www.nvidia.com/en-us/autonomous-machines/embedded-systems/jetson-nanoarrow-up-right (accessed on 5 January 2022).

  40. NVIDIA Jetson TX2: High Performance AI at the Edge. 2022. Available online: https://www.nvidia.com/en-us/autonomous-machines/embedded-systems/jetson-tx2arrow-up-right (accessed on 5 January 2022).

  41. Intel® Movidius™ Vision Processing Units (VPUs). 2022. Available online: https://www.intel.com/content/www/us/en/products/details/processors/movidius-vpu.htmlarrow-up-right (accessed on 5 January 2022).

  42. Voigt, P.; von dem Bussche, A. The EU General Data Protection Regulation (GDPR); Springer: Cham, Switzerland, 2017. [Google Scholararrow-up-right] [CrossRefarrow-up-right]

Annas, G.J. HIPAA Regulations: A New Era of Medical-Record Privacy? Sch. Commons Boston Univ. Sch. Law 2003, 348, 1486. [Google Scholararrow-up-right] [CrossRefarrow-up-right] [PubMedarrow-up-right] [Green Versionarrow-up-right]

Last updated