期刊
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT
卷 34, 期 5, 页码 1287-1317出版社
EMERALD GROUP PUBLISHING LTD
DOI: 10.1108/JEIM-10-2020-0395
关键词
Blockchain; Internet of things; Co-citation proximity analysis; Intellectual core; Systematic review
类别
资金
- Research Grants Council of the Hong Kong Special Administrative Region, China [UGC/FDS14/E06/20]
- University Grants Committee of the Hong Kong Special Administrative Region, China [700005]
- Big Data Intelligence Centre and Department of SCM, The Hang Seng University of Hong Kong
- Department of ISE, Hong Kong Polytechnic University
This study examines the intellectual core of BIoT using a co-citation proximity analysis-based systematic review, identifying nine categories within the core and providing a structural framework for further research in this underexplored area.
Purpose Due to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and industrial practitioners and is regarded as a future trend in technological development. Although several authors have conducted literature reviews on the topic, none have examined the development of the knowledge structure of BIoT, resulting in scattered research and development (R&D) efforts. Design/methodology/approach This study investigates the intellectual core of BIoT through a co-citation proximity analysis-based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies. Subsequently, we apply a series of statistical analyses, including exploratory factor analysis (EFA), hierarchical cluster analysis (HCA), k-means clustering (KMC) and multidimensional scaling (MDS) to establish the intellectual core. Findings Our findings indicate that there are nine categories in the intellectual core of BIoT: (1) data privacy and security for BIoT systems, (2) models and applications of BIoT, (3) system security theories for BIoT, (4) frameworks for BIoT deployment, (5) the fusion of BIoT with emerging methods and technologies, (6) applied security strategies for using blockchain with the IoT, (7) the design and development of industrial BIoT, (8) establishing trust through BIoT and (9) the BIoT ecosystem. Originality/value We use the CPASR method to examine the intellectual core of BIoT, which is an under-researched and topical area. The paper also provides a structural framework for investigating BIoT research that may be applicable to other knowledge domains.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据