Emerging Trends in Intelligent Connectivity and Digital Transformation

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".

Deadline for manuscript submissions: closed (28 February 2026) | Viewed by 15005

Special Issue Editor

Special Issue Information

Dear Colleagues,

The digital landscape is rapidly evolving due to innovations in the Internet of Things (IoT), artificial intelligence (AI), advanced networking, and next-generation applications. These developments are reshaping industries, user experiences, and technological ecosystems. This Special Issue seeks to provide a platform for researchers and practitioners to present original contributions, reviews, and case studies on the cutting-edge technologies that are driving intelligent connectivity, automation, and digital transformation.

We welcome submissions from a wide range of disciplines, including computer science, engineering, data science, and human-centered technologies. Topics may address theoretical foundations, applied research, cross-domain integration, simulations, and real-world deployments.

Key areas of interest include, but are not limited to, the following:

  • Internet of Things (IoT) and Industrial IoT (IIoT);
  • AI and machine learning for intelligent networks;
  • Edge, fog, and cloud computing;
  • 5G/6G connectivity and advanced communication protocols;
  • Blockchain and distributed systems in connected environments;
  • Gamification and human-centered computing in networked applications;
  • Cybersecurity, privacy, and trust in digital ecosystems;
  • Emerging technologies in business management;
  • Interoperability, scalability, and energy-efficient architectures;
  • Digital transformation and AI-driven innovation across industries.

Dr. Hamed Taherdoost
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • intelligent connectivity
  • Internet of Things (IoT)
  • wireless communication (5G/6G)
  • digital transformation
  • Artificial Intelligence (AI)

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (6 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

21 pages, 903 KB  
Article
An Integrated Information Security Governance Model for Hyperconnected IoT Ecosystems; Unified Resilient Security Governance Model (URSGM)
by Hamed Taherdoost, Chin-Shiuh Shieh and Shashi Kant Gupta
Computers 2026, 15(4), 236; https://doi.org/10.3390/computers15040236 - 10 Apr 2026
Viewed by 552
Abstract
Hyperconnected IoT ecosystems have become crucial for organizational operations; yet, existing governance structures remain fragmented, are technology-centric, and not well-equipped to manage the risks, compliance pressures, and resilience needs of IoT. This paper presents an integrated, theory-based information security governance model that is [...] Read more.
Hyperconnected IoT ecosystems have become crucial for organizational operations; yet, existing governance structures remain fragmented, are technology-centric, and not well-equipped to manage the risks, compliance pressures, and resilience needs of IoT. This paper presents an integrated, theory-based information security governance model that is tailored for IoT-driven organizations. A conceptual synthesis is performed through integrating five theoretical anchors: governance theory, socio-technical systems theory, risk governance theory, institutional/compliance theory, and resilience/adaptive capacity theory. These theoretical lenses are used to derive essential governance constructs and to develop a modular architecture tailored to IoT security needs. The model’s validity is grounded in theoretical integration rather than empirical testing, consistent with the nature of conceptual research. The integrated model provides six interdependent governance dimensions: strategic governance, operational governance, technical oversight, compliance alignment, risk governance, and resilience/adaptation, anchored by an ecosystem coordination layer. It provides structured decision rights, continuous risk monitoring, regulatory legitimacy, and native adaptive capabilities toward dynamic cyber-physical threats. This research addresses a known gap in the literature on IoT governance by providing an integrated, theoretically validated governance model that systematically connects the rationale and operational mechanisms of governance for resilient, future-proof IoT adoption. The model is further operationalized through a five-level maturity structure, enabling organizations to assess and progressively enhance governance capabilities. Full article
Show Figures

Figure 1

19 pages, 384 KB  
Article
Adoption of AI in Higher Education: Engineering Faculty Perceptions of Preparation for Industry 4.0
by José Fernández Cerero, José María Fernández Batanero, Daniel Fernández Cerero and Marta Montenegro Rueda
Computers 2026, 15(3), 173; https://doi.org/10.3390/computers15030173 - 6 Mar 2026
Viewed by 551
Abstract
Artificial intelligence (AI) has established itself as a key technology in the context of Industry 4.0, with direct implications for university education, especially in engineering degrees. This study analyses the degree of adoption and the main educational uses of AI-based tools in higher [...] Read more.
Artificial intelligence (AI) has established itself as a key technology in the context of Industry 4.0, with direct implications for university education, especially in engineering degrees. This study analyses the degree of adoption and the main educational uses of AI-based tools in higher education, as well as teachers’ perceptions of their contribution to preparing students for the professional challenges associated with Industry 4.0. A qualitative descriptive-interpretative design was used, involving semi-structured interviews with 32 engineering teachers at the University of Seville. The results show an incipient and uneven adoption, focused mainly on instrumental uses to support planning and material development, with still limited integration in assessment and learning personalisation. Despite this, teachers perceive AI as a resource with the potential to promote the development of digital skills and improve employability, although they emphasise the need for specific teacher training and institutional support for deeper and more coherent pedagogical integration. Full article
Show Figures

Figure 1

45 pages, 7022 KB  
Article
Digitalization of Railway Traffic Dispatching Systems: From Legacy Infrastructure to a Software-Centric Platform
by Ivan Kokić, Jovana Vuleta-Radoičić, Iva Salom, Goran Dimić, Bratislav Planić, Sandra Velimirović and Slavica Boštjančič Rakas
Computers 2026, 15(3), 163; https://doi.org/10.3390/computers15030163 - 3 Mar 2026
Viewed by 646
Abstract
Digitalization of railway traffic dispatching systems is a key step in the modernization of railway telecommunication infrastructure. This paper presents a case study of the migration from legacy analog technology to a software-centric dispatching platform that integrates digital signal processing, optical fiber transmission, [...] Read more.
Digitalization of railway traffic dispatching systems is a key step in the modernization of railway telecommunication infrastructure. This paper presents a case study of the migration from legacy analog technology to a software-centric dispatching platform that integrates digital signal processing, optical fiber transmission, and Internet Protocol (IP)-based network architectures, as implemented in the Serbian railway system. The modernization is performed through an iterative, incremental process: existing analog dispatcher equipment and established operating procedures are preserved, while digital dispatching centers, trackside communication nodes, and radio-dispatching services are introduced gradually. This staged evolution enables high-capacity, noise-resilient communication and seamless interconnection between the old and the new subsystems without disrupting railway operations. The adoption of software-based control and integrated digital signal processing provides modular scalability, real-time system supervision, automated diagnostics, and improved maintainability. One of critical services within the new architecture, the Centralized Call Record- and Message-Archiving System (CCRMAS), provides a centralized platform that captures, secures, and retrieves operational railway communication in real time for monitoring, post-incident analysis, and regulatory compliance. The resulting architecture, deployed within Serbian Railways, establishes a scalable and resilient foundation for future automation, interoperability, and integration within intelligent railway traffic-management environments. Thus, the paper extracts a generalizable hybrid migration architecture model and transferable design principles, supported by deployment artifacts and illustrated through migration scenarios, that can be applied to the modernization of other legacy-intensive railway networks. Full article
Show Figures

Figure 1

30 pages, 2206 KB  
Article
Digital Tech Integration in Industrial Engineer Training via Affordable Academic Tools
by Lidia M. Belmonte, Eva Segura, José L. Gómez-Sirvent, Francisco López de la Rosa, Javier de las Morenas, Antonio Fernández-Caballero and Rafael Morales
Computers 2025, 14(12), 547; https://doi.org/10.3390/computers14120547 - 11 Dec 2025
Viewed by 1028
Abstract
The rapid advancement of Industry 4.0 and digital transformation is significantly impacting various sectors. Enabling digital technologies, such as big data, machine learning, and the Internet of Things, is becoming increasingly prevalent in industry. However, engineering curricula often fail to keep pace with [...] Read more.
The rapid advancement of Industry 4.0 and digital transformation is significantly impacting various sectors. Enabling digital technologies, such as big data, machine learning, and the Internet of Things, is becoming increasingly prevalent in industry. However, engineering curricula often fail to keep pace with these swift changes. This study, grounded in Kolb’s experiential learning theory, investigates the integration of enabling digital technologies into final academic projects for industrial engineering students to enhance their competencies through practical experience with affordable technologies. It presents a case study on the design of access control systems using Android, NFC, and Arduino. To demonstrate the potential of this approach, two projects are highlighted: one implementing an integrated parking access control system with NFC payment, and the other focusing on appointment management for access to services. A total of 50 industrial engineering students evaluated both projects, showing a high level of interest and a desire for similar future implementations. The findings indicate that integrating Industry 4.0 technologies into final academic projects effectively bridges the gap between industry requirements and engineering education, enhancing students’ technical skills through experiential learning. Full article
Show Figures

Figure 1

39 pages, 6955 KB  
Article
Architecture for Managing Autonomous Virtual Organizations in the Industry 4.0 Context
by Cindy Pamela López, Marco Santórum and Jose Aguilar
Computers 2025, 14(12), 519; https://doi.org/10.3390/computers14120519 - 28 Nov 2025
Viewed by 902
Abstract
A Virtual Organization (VO) unites companies or independent individuals to achieve a shared, short-term objective by leveraging information technologies for communication and coordination in personalized product creation. Despite extensive research, existing VO management architectures lack alignment with Industry 4.0 standards, do not incorporate [...] Read more.
A Virtual Organization (VO) unites companies or independent individuals to achieve a shared, short-term objective by leveraging information technologies for communication and coordination in personalized product creation. Despite extensive research, existing VO management architectures lack alignment with Industry 4.0 standards, do not incorporate intelligent requirement-gathering mechanisms, and are not based on the RAMI 4.0 framework. These limitations hinder support for Autonomous Virtual Organizations (AVOs) in evaluation, risk management, and continuity, often excluding small and medium-sized enterprises (SMEs) during the partner selection process. This study proposes a comprehensive architecture for AVO management, grounded in ACODAT (Autonomous Cycle of Data Analysis Tasks) and RAMI 4.0 principles. The methodology includes a literature review, an architectural design, and a detailed specification of the ACODAT for the digital supply chain design. A prototype was developed and applied in a case study involving a virtual organization within an editorial consortium. Evaluation addressed core service performance, scalability of the batch selection algorithm, resource-use efficiency, and accessibility/SEO compliance. Benchmarking demonstrated that the prototype met or exceeded thresholds for scalability, efficiency, and accessibility, with minor performance deviations attributed to the testing environment. The results highlight significant time savings and improved automation in requirement identification, partner selection, and supply chain configuration, underscoring the architecture’s effectiveness and inclusivity. Full article
Show Figures

Figure 1

Review

Jump to: Research

76 pages, 904 KB  
Review
Theoretical Bases of Methods of Counteraction to Modern Forms of Information Warfare
by Akhat Bakirov and Ibragim Suleimenov
Computers 2025, 14(10), 410; https://doi.org/10.3390/computers14100410 - 26 Sep 2025
Cited by 2 | Viewed by 10621
Abstract
This review is devoted to a comprehensive analysis of modern forms of information warfare in the context of digitalization and global interconnectedness. The work considers fundamental theoretical foundations—cognitive distortions, mass communication models, network theories and concepts of cultural code. The key tools of [...] Read more.
This review is devoted to a comprehensive analysis of modern forms of information warfare in the context of digitalization and global interconnectedness. The work considers fundamental theoretical foundations—cognitive distortions, mass communication models, network theories and concepts of cultural code. The key tools of information influence are described in detail, including disinformation, the use of botnets, deepfakes, memetic strategies and manipulations in the media space. Particular attention is paid to methods of identifying and neutralizing information threats using artificial intelligence and digital signal processing, including partial digital convolutions, Fourier–Galois transforms, residue number systems and calculations in finite algebraic structures. The ethical and legal aspects of countering information attacks are analyzed, and geopolitical examples are given, demonstrating the peculiarities of applying various strategies. The review is based on a systematic analysis of 592 publications selected from the international databases Scopus, Web of Science and Google Scholar, covering research from fundamental works to modern publications of recent years (2015–2025). It is also based on regulatory legal acts, which ensures a high degree of relevance and representativeness. The results of the review can be used in the development of technologies for monitoring, detecting and filtering information attacks, as well as in the formation of national cybersecurity strategies. Full article
Show Figures

Figure 1

Back to TopTop