4.5 Article

Exploring the intellectual cores of the blockchain-Internet of Things (BIoT)

期刊

JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT
卷 34, 期 5, 页码 1287-1317

出版社

EMERALD GROUP PUBLISHING LTD
DOI: 10.1108/JEIM-10-2020-0395

关键词

Blockchain; Internet of things; Co-citation proximity analysis; Intellectual core; Systematic review

资金

  1. Research Grants Council of the Hong Kong Special Administrative Region, China [UGC/FDS14/E06/20]
  2. University Grants Committee of the Hong Kong Special Administrative Region, China [700005]
  3. Big Data Intelligence Centre and Department of SCM, The Hang Seng University of Hong Kong
  4. Department of ISE, Hong Kong Polytechnic University

向作者/读者索取更多资源

This study examines the intellectual core of BIoT using a co-citation proximity analysis-based systematic review, identifying nine categories within the core and providing a structural framework for further research in this underexplored area.
Purpose Due to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and industrial practitioners and is regarded as a future trend in technological development. Although several authors have conducted literature reviews on the topic, none have examined the development of the knowledge structure of BIoT, resulting in scattered research and development (R&D) efforts. Design/methodology/approach This study investigates the intellectual core of BIoT through a co-citation proximity analysis-based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies. Subsequently, we apply a series of statistical analyses, including exploratory factor analysis (EFA), hierarchical cluster analysis (HCA), k-means clustering (KMC) and multidimensional scaling (MDS) to establish the intellectual core. Findings Our findings indicate that there are nine categories in the intellectual core of BIoT: (1) data privacy and security for BIoT systems, (2) models and applications of BIoT, (3) system security theories for BIoT, (4) frameworks for BIoT deployment, (5) the fusion of BIoT with emerging methods and technologies, (6) applied security strategies for using blockchain with the IoT, (7) the design and development of industrial BIoT, (8) establishing trust through BIoT and (9) the BIoT ecosystem. Originality/value We use the CPASR method to examine the intellectual core of BIoT, which is an under-researched and topical area. The paper also provides a structural framework for investigating BIoT research that may be applicable to other knowledge domains.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据