Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
281
result(s) for
"electronic credentials"
Sort by:
Closing a Key Gap in DSCSA Compliance with Credentialing
2023
In this session, the Open Credentialing Initiative (OCI) introduces the concept and practical application of electronic credentials. The audience will learn about their use in the context of DSCSA and how they enable timely compliance with the DSCSA Authorized Trading Partner (ATP) requirements.
Journal Article
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme
by
Md. Mainul Islam
,
Youn Kyu Lee
,
Mpyana Mwamba Merlec
in
Authorship
,
Blockchain
,
Chemical technology
2022
In recent times, electronic portfolios (e-portfolios) are being increasingly used by students and lifelong learners as digital online multimedia résumés that showcase their skill sets and achievements. E-portfolios require secure, reliable, and privacy-preserving credential issuance and verification mechanisms to prove learning achievements. However, existing systems provide private institution-wide centralized solutions that primarily rely on trusted third parties to issue and verify credentials. Furthermore, they do not enable learners to own, control, and share their e-portfolio information across organizations, which increases the risk of forged and fraudulent credentials. Therefore, we propose a consortium blockchain-based e-portfolio management scheme that is decentralized, secure, and trustworthy. Smart contracts are leveraged to enable learners to completely own, publish, and manage their e-portfolios, and also enable potential employers to verify e-portfolio credentials and artifacts without relying on trusted third parties. Blockchain is used as an immutable distributed ledger that records all transactions and logs for tamper-proof trusted data provenance, accountability, and traceability. This system guarantees the authenticity and integrity of user credentials and e-portfolio data. Decentralized identifiers and verifiable credentials are used for user profile identification, authentication, and authorization, whereas verifiable claims are used for e-portfolio credential proof authentication and verification. We have designed and implemented a prototype of the proposed scheme using a Quorum consortium blockchain network. Based on the evaluations, our solution is feasible, secure, and privacy-preserving. It offers excellent performance.
Journal Article
A micro-credentialing methodology for improved recognition of HE employability skills
by
Guàrdia Ortiz Lourdes
,
Mancini Federica
,
Martinez Melo Montserrat
in
Acknowledgment
,
Adoption of innovations
,
Certification
2022
Increasingly, among international organizations concerned with unemployment rates and industry demands, there is an emphasis on the need to improve graduates’ employability skills and the transparency of mechanisms for their recognition. This research presents the Employability Skills Micro-credentialing (ESMC) methodology, designed under the EPICA Horizon 2020 (H2020) project and tested at three East African universities, and shows how it fosters pedagogical innovation and promotes employability skills integration and visibility. The methodology, supported by a competency-based ePortfolio and a digital micro-credentialing system, was evaluated using a mixed-method design, combining descriptive statistics and qualitative content analysis to capture complementary stakeholder perspectives. The study involved the participation of 13 lecturers, 169 students, and 24 employers. The results indicate that the ESMC methodology is a promising approach for supporting students in their transition from academia to the workplace. The implementation of the methodology and the involvement of employers entails rethinking educational practices and academic curricula to embed employability skills. It enables all actors to broaden their understanding of the relationship between higher education and the business sector and to sustain visibility, transparency, and reliability of the recognition process. These findings indicate that there are favourable conditions in the region for the adoption of the approach, which is a meaningful solution for the stakeholder community to address the skills gap.
Journal Article
Micro-credentials in leveraging emergency remote teaching: the relationship between novice users’ insights and identity in Malaysia
by
Osman Sharifah
,
Kumar Jeya Amantha
,
Lowrence Kevin
in
Creative Teaching
,
Credentials
,
Distance Education
2022
Micro-credentials have gained much popularity in recent years, and their popularity has skyrocketed due to emergency remote teaching instigated by the pandemic. It has been defined as a platform that provides credentials based on validated competencies. Nevertheless, in Malaysian HEI, such a concept is still novel and identifying insights on the benefits, challenges, and application are still scarce. Similarly, it was observed that there is a lack of observation on how students’ digital learning identity and their perception of professional relevance are influenced by such platform. Henceforth, based on the adapted enriched virtual model approach, a micro-credentials course was implemented to complement the new “normal” classes for a pre-service teacher’s instructional design course. A mixed-method triangulation design was used to explore the qualitative findings operationalized by open-ended questions (N = 74) with data obtained from the Digital Learning Identity Survey (DLIS) and Constructivist On-Line Learning Environment Survey (COLLES) (N = 72). The findings indicated that respondents had an overall positive perception of the use of micro-credentials to complement and overcome online learning challenges mainly due to substandard internet connectivity; nevertheless, they are unaware of the value of such credentials in their future profession. Conversely, their new identity as digital learners and experiences with a blended approach of online learning, especially with micro-credentials, was successful in shaping their identity as aspiring educators that embrace technology for teaching and learning.
Journal Article
Phishing web site detection using diverse machine learning algorithms
2020
Purpose
This paper aims to present a framework to detect phishing websites using stacking model. Phishing is a type of fraud to access users’ credentials. The attackers access users’ personal and sensitive information for monetary purposes. Phishing affects diverse fields, such as e-commerce, online business, banking and digital marketing, and is ordinarily carried out by sending spam emails and developing identical websites resembling the original websites. As people surf the targeted website, the phishers hijack their personal information.
Design/methodology/approach
Features of phishing data set are analysed by using feature selection techniques including information gain, gain ratio, Relief-F and recursive feature elimination (RFE) for feature selection. Two features are proposed combining the strongest and weakest attributes. Principal component analysis with diverse machine learning algorithms including (random forest [RF], neural network [NN], bagging, support vector machine, Naïve Bayes and k-nearest neighbour) is applied on proposed and remaining features. Afterwards, two stacking models: Stacking1 (RF + NN + Bagging) and Stacking2 (kNN + RF + Bagging) are applied by combining highest scoring classifiers to improve the classification accuracy.
Findings
The proposed features played an important role in improving the accuracy of all the classifiers. The results show that RFE plays an important role to remove the least important feature from the data set. Furthermore, Stacking1 (RF + NN + Bagging) outperformed all other classifiers in terms of classification accuracy to detect phishing website with 97.4% accuracy.
Originality/value
This research is novel in this regard that no previous research focusses on using feed forward NN and ensemble learners for detecting phishing websites.
Journal Article
Blockchain-Based Supply Chain Systems, Interoperability Model in a Pharmaceutical Case Study
by
Gil-González, Ana Belén
,
Podgorelec, Blaž
,
Mezquita, Yeray
in
Analysis
,
Blockchain
,
Case studies
2023
The main purpose of supply chain systems based on blockchain technology is to take advantage of technology innovations to ensure that a tracked asset’s audit trail is immutable. However, the challenge lies in tracking the asset among different blockchain-based supply chain systems. The model proposed in this paper has been designed to overcome the identified challenges. Specifically, the proposed model enables: (1) the asset to be tracked among different blockchain-based supply-chain systems; (2) the tracked asset’s supply chain to be cryptographically verified; (3) a tracked asset to be defined in a standardized format; and (4) a tracked asset to be described with several different standardized formats. Thus, the model provides a great advantage in terms of interoperability between different blockchain-driven supply chains over other models in the literature, which will need to replicate the information in each blockchain platform they operate with, while giving flexibility to the platforms that make use of it and maintain the scalability of those logistic platforms. This work aims to examine the application of the proposed model from an operational point of view, in a scenario within the pharmaceutical sector.
Journal Article
A Blockchain Based Decentralized Identifiers for Entity Authentication in Electronic Health Records
by
Makkithaya, Krishnamoorthi
,
T, Manoj
,
V G, Narendra
in
Authentication
,
Blockchain
,
Cryptography
2022
Over the past two decades, the fast pace of digitization in the healthcare ecosystem led to a phenomenal rise in the creation, storage and sharing of Electronic Health Records (EHRs) across the globe. However, the mechanism of authentication used for proving the identity of entities in EHRs is based on the identifiers issued by centralized identity providers (IDPs). It may lead to a single point of failure, loss of privacy and lack of interoperability. A new wave of decentralized identifiers (DIDs) and verifiable credentials(VCs) data modelled by blockchain has made it possible to achieve entity authentication in a decentralized manner. In this study, a blockchain-based framework with decentralized identifiers for patient authentication and consent management for EHR access using verifiable credentials is proposed. It describes the process of DID generation and authentication credential setup along with workflows for issuing and verifying credentials in the EHR ecosystem. The framework is implemented using Hyperledger Indy blockchain and Aries library. The study evaluates the performance of proposed workflows in terms of scalability, efficiency, resource utilization and conducts security analysis. Specifically, the outcome of this study can be used to realize the decentralized identity management and authentication in EHR systems.
Journal Article
Patient Portals Fail to Collect Structured Information About Who Else is Involved in a Person’s Care
by
Peereboom, Danielle
,
Dorr, David A
,
Graham, Leilani R
in
Access
,
Associations, institutions, etc
,
Autonomy
2024
The US health care delivery system does not systematically engage or support family or friend care partners. Meanwhile, the uptake and familiarity of portals to personal health information are increasing among patients. Technology innovations, such as shared access to the portal, use separate identity credentials to differentiate between patients and care partners. Although not well-known, or commonly used, shared access allows patients to identify who they do and do not want to be involved in their care. However, the processes for patients to grant shared access to portals are often limited or so onerous that interested patients and care partners often circumvent the process entirely. As a result, the vast majority of care partners resort to accessing portals using a patient’s identity credentials—a “do-it-yourself” solution in conflict with a health systems’ legal responsibility to protect patient privacy and autonomy. The personal narratives in this viewpoint (shared by permission) elaborate on quantitative studies and provide first-person snapshots of challenges faced by patients and families as they attempt to gain or grant shared access during crucial moments in their lives. As digital modalities increase patient roles in health care interactions, so does the importance of making shared access work for all stakeholders involved—patients, clinicians, and care partners. Electronic health record vendors must recognize that both patients and care partners are important users of their products, and health care organizations must acknowledge and support the critical contributions of care partners as distinct from patients.
Journal Article
A Lightweight ECC-Based Authentication and Key Agreement Protocol for IoT with Dynamic Authentication Credentials
2024
Due to the openness of communication channels and the sensitivity of the data being collected and transmitted, securing data access and communication in IoT systems requires robust ECC-based authentication and key agreement (AKA) protocols. However, designing an AKA protocol for IoT presents significant challenges, as most IoT sensors are deployed in resource-constrained, unattended environments with limited computational power, connectivity, and storage. To achieve anonymous authentication, existing solutions typically rely on shared temporary public keys to mask device IDs or validate sender certificates, which increases the computational overhead. Furthermore, these protocols often fail to address crucial security concerns, such as nonresistance to ephemeral secret leakage (ESL) attacks and a lack of perfect forward security. To mitigate the computational burden, we propose a dynamic authenticated credentials (DACs) synchronization framework for anonymous authentication. Then, we introduce an ECC-based AKA scheme that employs DACs in place of temporary public keys or sender credentials, enabling efficient and secure anonymous authentication. The security of the proposed protocol was rigorously verified under the Real-or-Oracle model and validated using ProVerif. Performance comparisons demonstrate that our scheme offered significant improvements in security, with an over 37% reduction in communication cost and computational overhead.
Journal Article
Reshaping vocational training: a study on the recognition of micro-credentials in job markets
2024
PurposeThis study examines the perceptions of human resource (HR) professionals regarding the use of micro-credentials in the job market. The research explores the role of micro-credentials as emerging credentials in job requirements, continuing education, soft skills acquisition, job application evaluation (JAE) processes, qualification preferences in recruitment, salary/pay scale determination and promotional opportunities.Design/methodology/approachA quantitative research methodology was used to collect data through questionnaires distributed to 124 HR professionals.FindingsThe study finds that HR professionals recognize the value of micro-credentials in enhancing a candidate’s resume and aligning with their career objectives, as they offer personalized skill-building opportunities. However, some recruiters question the legitimacy of micro-credentials, perceiving them as informal and questioning their practical transferability.Originality/valueThis study highlights the importance for HR professionals to remain updated on emerging trends, adapt to the changing dynamics of the professional workforce and incorporate this into their recruitment and promotion policies. It also emphasizes the need for further investigation into the legitimacy of micro-credentials and their impact on the job market and presents the potential benefits of their integration into HR practices.
Journal Article