Image de Google Jackets
Vue normale Vue MARC vue ISBD

Logistics and security of connected objects

Par : Type de matériel : TexteTexteLangue : français Détails de publication : 2022. Sujet(s) : Ressources en ligne : Abrégé : Connected objects, starting with the first Apple iPhone in 2007, represent a major technological evolution (Benghozi et al., 2008). Offering huge potential for improvements, they redesign the supply chain processes and thus develop long-lasting competitive advantages. This paper focuses on the use of connected objects in the field of logistics. Based on research, it aims to draw users’ (but also designers') attention to the development and security of the data produced and exchanged. A scoping study has been carried out to understand the impact of the Internet of Things (IoT) on use and potential benefits, in four main areas (identification, tracing, delivery and maintenance assistance). Further, the study emphasizes five security areas to help firms overcome potential security vulnerabilities linked to connected objects: organization, use, interconnection, platform governance, and data protection.
Tags de cette bibliothèque : Pas de tags pour ce titre. Connectez-vous pour ajouter des tags.
Evaluations
    Classement moyen : 0.0 (0 votes)
Nous n'avons pas d'exemplaire de ce document

89

Connected objects, starting with the first Apple iPhone in 2007, represent a major technological evolution (Benghozi et al., 2008). Offering huge potential for improvements, they redesign the supply chain processes and thus develop long-lasting competitive advantages. This paper focuses on the use of connected objects in the field of logistics. Based on research, it aims to draw users’ (but also designers') attention to the development and security of the data produced and exchanged. A scoping study has been carried out to understand the impact of the Internet of Things (IoT) on use and potential benefits, in four main areas (identification, tracing, delivery and maintenance assistance). Further, the study emphasizes five security areas to help firms overcome potential security vulnerabilities linked to connected objects: organization, use, interconnection, platform governance, and data protection.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025