Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,128)

Search Parameters:
Keywords = business security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
45 pages, 2014 KiB  
Article
Innovative Business Models Towards Sustainable Energy Development: Assessing Benefits, Risks, and Optimal Approaches of Blockchain Exploitation in the Energy Transition
by Aikaterini Papapostolou, Ioanna Andreoulaki, Filippos Anagnostopoulos, Sokratis Divolis, Harris Niavis, Sokratis Vavilis and Vangelis Marinakis
Energies 2025, 18(15), 4191; https://doi.org/10.3390/en18154191 - 7 Aug 2025
Abstract
The goals of the European Union towards the energy transition imply profound changes in the energy field, so as to promote sustainable energy development while fostering economic growth. To achieve these changes, the incorporation of sustainable technologies supporting decentralisation, energy efficiency, renewable energy [...] Read more.
The goals of the European Union towards the energy transition imply profound changes in the energy field, so as to promote sustainable energy development while fostering economic growth. To achieve these changes, the incorporation of sustainable technologies supporting decentralisation, energy efficiency, renewable energy production, and demand flexibility is of vital importance. Blockchain has the potential to change energy services towards this direction. To optimally exploit blockchain, innovative business models need to be designed, identifying the opportunities emerging from unmet needs, while also considering potential risks so as to take action to overcome them. In this context, the scope of this paper is to examine the opportunities and the risks that emerge from the adoption of blockchain in four innovative business models, while also identifying mitigation strategies to support and accelerate the energy transition, thus proposing optimal approaches of exploitation of blockchain in energy services. The business models concern Energy Performance Contracting with P4P guarantees, improved self-consumption in energy cooperatives, energy efficiency and flexibility services for natural gas boilers, and smart energy management for EV chargers and HVAC appliances. Firstly, the value proposition of the business models is analysed and results in a comprehensive SWOT analysis. Based on the findings of the analysis and consultations with relevant market actors, in combination with the examination of the relevant literature, risks are identified and evaluated through a qualitative assessment approach. Subsequently, specific mitigation strategies are proposed to address the detected risks. This research demonstrates that blockchain integration into these business models can significantly improve energy efficiency, reduce operational costs, enhance security, and support a more decentralised energy system, providing actionable insights for stakeholders to implement blockchain solutions effectively. Furthermore, according to the results, technological and legal risks are the most significant, followed by political, economic, and social risks, while environmental risks of blockchain integration are not as important. Strategies to address risks relevant to blockchain exploitation include ensuring policy alignment, emphasising economic feasibility, facilitating social inclusion, prioritising security and interoperability, consulting with legal experts, and using consensus algorithms with low energy consumption. The findings offer clear guidance for energy service providers, policymakers, and technology developers, assisting in the design, deployment, and risk mitigation of blockchain-enabled business models to accelerate sustainable energy development. Full article
Show Figures

Figure 1

22 pages, 760 KiB  
Review
Strengthening Corporate Governance and Financial Reporting Through Regulatory Reform: A Comparative Analysis of Greek Laws 3016/2002 and 4706/2020
by Savvina Paganou, Ioannis Antoniadis, Panagiota Xanthopoulou and Vasilios Kanavas
J. Risk Financial Manag. 2025, 18(8), 426; https://doi.org/10.3390/jrfm18080426 - 1 Aug 2025
Viewed by 665
Abstract
This study explores how corporate governance reforms can enhance financial reporting quality and organizational transparency, focusing on Greece’s transition from Law 3016/2002 to Law 4706/2020. The legislative reform aimed to modernize governance structures, align national practices with international standards, and strengthen investor protection [...] Read more.
This study explores how corporate governance reforms can enhance financial reporting quality and organizational transparency, focusing on Greece’s transition from Law 3016/2002 to Law 4706/2020. The legislative reform aimed to modernize governance structures, align national practices with international standards, and strengthen investor protection in a post-crisis economic environment. Moving beyond a simple legal comparison, the study examines how Law 3016/2002’s formal compliance model contrasts with Law 4706/2020’s more substantive accountability framework. We hypothesize that Law 4706/2020 introduces substantively stronger governance mechanisms than its predecessor, thereby improving transparency and investor protection, while compliance with the new law imposes materially greater administrative and financial burdens, especially on small- and mid-cap firms. Methodologically, the research employs a narrative literature review and a structured comparative legal analysis to assess the administrative and financial implications of the new law for publicly listed companies, focusing on board composition and diversity, internal controls, suitability policies, and disclosure requirements. Drawing on prior comparative evidence, we posit that Law 4706/2020 will foster governance and disclosure improvements, enhanced oversight, and clearer board roles. However, these measures also impose compliance burdens. Due to the heterogeneity of listed companies and the lack of firm-level data following Law 4706/2020’s implementation, the findings are neither fully generalizable nor quantifiable; future quantitative research using event studies or panel data is required to validate the hypotheses. We conclude that Greece’s new framework is a critical step toward sustainable corporate governance and more transparent financial reporting, offering regulators, practitioners, and scholars examining legal reform’s impact on governance effectiveness and financial reporting integrity. Full article
(This article belongs to the Special Issue Research on Corporate Governance and Financial Reporting)
Show Figures

Figure 1

33 pages, 1146 KiB  
Article
Impact of Security Management Activities on Corporate Performance
by Hyunwoo Cho and Keuntae Cho
Systems 2025, 13(8), 633; https://doi.org/10.3390/systems13080633 - 28 Jul 2025
Viewed by 184
Abstract
The digital business environment is rapidly evolving with advancements in information technology (IT), increasing the risk of information security incidents. Grounded in the resource-based view and in contingency theory, this study adopts a different approach from prior research by conceptualizing security management activities [...] Read more.
The digital business environment is rapidly evolving with advancements in information technology (IT), increasing the risk of information security incidents. Grounded in the resource-based view and in contingency theory, this study adopts a different approach from prior research by conceptualizing security management activities not as mere risk control mechanisms, but as strategic innovation drivers that can enhance corporate performance (sales revenue and operating profit). The authors develop a research model with six independent variables, including internal and external security management activities, CISO role configuration (independent or dual-role with CIO), and investment levels in IT and information security. The dependent variables include sales revenue and operating profit, with ISMS or ISO certification as a moderating variable. Using information security (IS) disclosures and financial data from 545 Korean firms that have reported their security management activities to the Ministry of Science and ICT, multiple regression and moderation analyses reveal that high IT investment negatively impacts performance, but this effect is mitigated when formal security systems, like ISMS or ISO, are in place. The results suggest that integrating recognized security frameworks into management strategies can enhance both innovation and financial outcomes, encouraging a proactive approach to security management. Full article
Show Figures

Figure 1

33 pages, 767 KiB  
Article
Deliberate and Emergent Strategic Outcomes for High-Growth IT SME Business Models
by Juan Martín Ireta-Sánchez
Systems 2025, 13(8), 621; https://doi.org/10.3390/systems13080621 - 23 Jul 2025
Viewed by 518
Abstract
For high-growth firms, designing and implementing strategies to ensure the long-term sustainability of business models is a key priority. Although these strategies are carefully planned to achieve specific outcomes, these firms also encounter contextual factors inherent to entrepreneurship, as well as the potential [...] Read more.
For high-growth firms, designing and implementing strategies to ensure the long-term sustainability of business models is a key priority. Although these strategies are carefully planned to achieve specific outcomes, these firms also encounter contextual factors inherent to entrepreneurship, as well as the potential negative consequences of operating as small- and medium-sized enterprises (SMEs). Consequently, they adapt emergent outcomes to secure positive scaling-up processes. A comprehensive analysis of 69 studies from 1978 to 2023 revealed that 34.8% used sales as the main indicator of high-growth outcomes, 18.8% considered employment to be the most important outcome, and 37.7% incorporated both. The assessment period for these studies spanned three to seven consecutive years. A subsequent review of the existing literature yielded 56 potential new outcomes, emphasising the existence of a diverse array of concepts and metrics with which to assess high-growth performance. The study confirmed sales and positive profits arising during the planning process as strategic outcomes. However, it was also demonstrated that geographical expansion and innovation become emergent outcomes in critical situations. The research also identified that external factors, including an adverse public environment, business context difficulties, and a favourable business environment, may influence the effect of the firm’s high growth. Full article
(This article belongs to the Special Issue Business Model Innovation in the Digital Era)
Show Figures

Figure 1

23 pages, 924 KiB  
Article
Identifying Critical Success Factors in the Regeneration of English Seaside Resorts
by Liam Richardson, Anya Chapman and Duncan Light
Tour. Hosp. 2025, 6(3), 142; https://doi.org/10.3390/tourhosp6030142 - 16 Jul 2025
Viewed by 358
Abstract
This paper focuses on regeneration projects in ‘first-generation’ seaside resorts in England from the perspective of those leading and managing such projects. There have been numerous recent initiatives intended to revive seaside resorts and enable them to regain competitiveness, but limited analysis of [...] Read more.
This paper focuses on regeneration projects in ‘first-generation’ seaside resorts in England from the perspective of those leading and managing such projects. There have been numerous recent initiatives intended to revive seaside resorts and enable them to regain competitiveness, but limited analysis of what is necessary for such regeneration projects to be successful. This paper contributes to debates about the role of critical success factors (CSFs) in regeneration by identifying issues that apply to the specific context of seaside resorts. In-depth interviews were undertaken with ten managers responsible for individual projects focusing on the CSFs necessary for regeneration projects to succeed. Four such factors were identified: (1) the need to secure appropriate funding (and associated difficulties); (2) the importance of involving stakeholders (particularly the local authority and local community); (3) the need for a strong business plan (which must evolve as the project progresses); and (4) the importance of considering best practices elsewhere. The importance of each success factor varied by the sector (public/commercial/third) leading the regeneration initiative and varied at different stages of a regeneration project. These findings have practical implications for local authorities, commercial enterprises, and third-sector bodies in seaside destinations. Full article
Show Figures

Figure 1

23 pages, 4081 KiB  
Article
Continuous Behavioral Biometric Authentication for Secure Metaverse Workspaces in Digital Environments
by Giluk Kang, Jihoon Park and Young-Gab Kim
Systems 2025, 13(7), 588; https://doi.org/10.3390/systems13070588 - 15 Jul 2025
Viewed by 316
Abstract
As many companies adopted hybrid work arrangements during and after the COVID-19 outbreak, interest in Metaverse applications for virtual offices grew considerably. Along with this growing interest, the risk of data breaches has also increased, as virtual offices often handle confidential documents for [...] Read more.
As many companies adopted hybrid work arrangements during and after the COVID-19 outbreak, interest in Metaverse applications for virtual offices grew considerably. Along with this growing interest, the risk of data breaches has also increased, as virtual offices often handle confidential documents for businesses. For this reason, existing studies have explored Metaverse user authentication methods; however, their methods suffer from several limitations, such as the need for additional sensors and one-time authentication. Therefore, this paper proposes a novel behavioral authentication framework for secure Metaverse workspaces. The proposed framework adopts keyboard typing behavior that is common in the office and does not cause fatigue to users as an authentication factor to afford active and continuous user authentication. Based on our evaluation, the user identification accuracy achieved an average of approximately 95% among 11 of 15 participants, with the highest-performing user reaching an accuracy of 99.77%. In addition, the proposed framework achieved an average false acceptance rate of 0.41% and a false rejection rate of 4.02%. It was also evaluated with existing studies using requirements for user authentication in the Metaverse to demonstrate its strengths. Therefore, this framework can fully ensure a secure Metaverse office by preventing unauthenticated users. Full article
Show Figures

Figure 1

27 pages, 1889 KiB  
Article
Advancing Smart City Sustainability Through Artificial Intelligence, Digital Twin and Blockchain Solutions
by Ivica Lukić, Mirko Köhler, Zdravko Krpić and Miljenko Švarcmajer
Technologies 2025, 13(7), 300; https://doi.org/10.3390/technologies13070300 - 11 Jul 2025
Cited by 1 | Viewed by 660
Abstract
This paper presents an integrated Smart City platform that combines digital twin technology, advanced machine learning, and a private blockchain network to enhance data-driven decision making and operational efficiency in both public enterprises and small and medium-sized enterprises (SMEs). The proposed cloud-based business [...] Read more.
This paper presents an integrated Smart City platform that combines digital twin technology, advanced machine learning, and a private blockchain network to enhance data-driven decision making and operational efficiency in both public enterprises and small and medium-sized enterprises (SMEs). The proposed cloud-based business intelligence model automates Extract, Transform, Load (ETL) processes, enables real-time analytics, and secures data integrity and transparency through blockchain-enabled audit trails. By implementing the proposed solution, Smart City and public service providers can significantly improve operational efficiency, including a 15% reduction in costs and a 12% decrease in fuel consumption for waste management, as well as increased citizen engagement and transparency in Smart City governance. The digital twin component facilitated scenario simulations and proactive resource management, while the participatory governance module empowered citizens through transparent, immutable records of proposals and voting. This study also discusses technical, organizational, and regulatory challenges, such as data integration, scalability, and privacy compliance. The results indicate that the proposed approach offers a scalable and sustainable model for Smart City transformation, fostering citizen trust, regulatory compliance, and measurable environmental and social benefits. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

22 pages, 291 KiB  
Article
Circular Economy for Strategic Management in the Copper Mining Industry
by Angélica Patricia Muñoz-Lagos, Luis Seguí-Amórtegui and Juan Pablo Vargas-Norambuena
Sustainability 2025, 17(14), 6364; https://doi.org/10.3390/su17146364 - 11 Jul 2025
Viewed by 302
Abstract
This study examines the awareness and implementation of Circular Economy (CE) principles within Chile’s mining sector, which represents the world’s leading copper producer. We employed a mixed-methods approach, combining quantitative surveys with qualitative semi-structured interviews, to evaluate perceptions and implementation levels of CE [...] Read more.
This study examines the awareness and implementation of Circular Economy (CE) principles within Chile’s mining sector, which represents the world’s leading copper producer. We employed a mixed-methods approach, combining quantitative surveys with qualitative semi-structured interviews, to evaluate perceptions and implementation levels of CE practices across diverse organizational contexts. Our findings reveal a pronounced knowledge gap: while 73.3% of mining professionals reported familiarity with CE concepts, only 57.3% could provide accurate definitions. State-owned mining companies demonstrated substantially higher CE implementation rates, with 36.5% participating in eco-industrial collaborations and 51% conducting environmental audits, compared to their private counterparts. Small enterprises (1–100 employees) exhibited particularly limited engagement, as demonstrated by 71.8% lacking established sustainability reporting mechanisms. A considerable implementation gap was also identified; although 94.8% of respondents considered CE principles integral to business ethics and 89.6% recognized CE as essential for securing a social license to operate, only 20.8% reported that their organizations maintained dedicated CE units. The research presents actionable recommendations for policymakers, including targeted financial incentives and training programs for small- and medium-sized enterprises (SMEs) in mining services, the establishment of standardized CE performance metrics for the sector, and the integration of CE principles into strategic management education to accelerate sustainable transformation within Chile’s critical mining industry. Full article
22 pages, 1332 KiB  
Article
Business Logic Vulnerabilities in the Digital Era: A Detection Framework Using Artificial Intelligence
by Bilgin Metin, Martin Wynn, Aylin Tunalı and Yağmur Kepir
Information 2025, 16(7), 585; https://doi.org/10.3390/info16070585 - 7 Jul 2025
Viewed by 781
Abstract
Digitalisation can positively impact the efficiency of real-world business processes, but may also introduce new cybersecurity challenges. One area that is particularly vulnerable to cyber-attacks is the business logic embedded in processes in which flaws may exist. This is especially the case when [...] Read more.
Digitalisation can positively impact the efficiency of real-world business processes, but may also introduce new cybersecurity challenges. One area that is particularly vulnerable to cyber-attacks is the business logic embedded in processes in which flaws may exist. This is especially the case when these processes are within web-based applications and services, which is increasingly becoming the norm for many organisations. Business logic vulnerabilities (BLVs) can emerge following the software development process, which may be difficult to detect by vulnerability detection tools. Through a systematic literature review and interviews with industry practitioners, this study identifies key BLV types and the challenges in detecting them. The paper proposes an eight-stage operational framework that leverages Artificial Intelligence (AI) for enhanced BLV detection and mitigation. The research findings contribute to the rapidly evolving theory and practice in this field of study, highlighting the current reliance on manual detection, the contextual nature of BLVs, and the need for a hybrid, multi-layered approach integrating human expertise with AI tools. The study concludes by emphasizing AI’s potential to transform cybersecurity from a reactive to a proactive defense against evolving vulnerabilities and threats. Full article
(This article belongs to the Special Issue New Information Communication Technologies in the Digital Era)
Show Figures

Graphical abstract

33 pages, 5362 KiB  
Article
A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things
by Bo Wang, Jiesheng Wang and Mingchu Li
Sensors 2025, 25(13), 4082; https://doi.org/10.3390/s25134082 - 30 Jun 2025
Viewed by 248
Abstract
With the rapid development of the Financial Internet of Things (FIoT), many intelligent devices have been deployed in various business scenarios. Due to the unique characteristics of these devices, they are highly vulnerable to malicious attacks, posing significant threats to the system’s stability [...] Read more.
With the rapid development of the Financial Internet of Things (FIoT), many intelligent devices have been deployed in various business scenarios. Due to the unique characteristics of these devices, they are highly vulnerable to malicious attacks, posing significant threats to the system’s stability and security. Moreover, the limited resources available in the FIoT, combined with the extensive deployment of AI algorithms, can significantly reduce overall system availability. To address the challenge of resisting malicious behaviors and attacks in the FIoT, this paper proposes a trust-based collaborative smart device selection algorithm that integrates both subjective and objective trust mechanisms with dynamic blacklists and whitelists, leveraging domain knowledge and game theory. It is essential to evaluate real-time dynamic trust levels during system execution to accurately assess device trustworthiness. A dynamic blacklist and whitelist transformation mechanism is also proposed to capture the evolving behavior of collaborative service devices and update the lists accordingly. The proposed algorithm enhances the anti-attack capabilities of smart devices in the FIoT by combining adaptive trust evaluation with blacklist and whitelist strategies. It maintains a high task success rate in both single and complex attack scenarios. Furthermore, to address the challenge of resource allocation for trusted smart devices under constrained edge resources, a coalition game-based algorithm is proposed that considers both device activity and trust levels. Experimental results demonstrate that the proposed method significantly improves task success rates and resource allocation performance compared to existing approaches. Full article
(This article belongs to the Special Issue Network Security and IoT Security: 2nd Edition)
Show Figures

Figure 1

27 pages, 16258 KiB  
Article
A Blockchain-Based Lightweight Reputation-Aware Electricity Trading Service Recommendation System
by Pingyan Mo, Kai Li, Yongjiao Yang, You Wen and Jinwen Xi
Electronics 2025, 14(13), 2640; https://doi.org/10.3390/electronics14132640 - 30 Jun 2025
Viewed by 263
Abstract
With the continuous expansion of users, businesses, and services in electricity retail trading systems, the demand for personalized recommendations has grown significantly. To address the issue of reduced recommendation accuracy caused by insufficient data in standalone recommendation systems, the academic community has conducted [...] Read more.
With the continuous expansion of users, businesses, and services in electricity retail trading systems, the demand for personalized recommendations has grown significantly. To address the issue of reduced recommendation accuracy caused by insufficient data in standalone recommendation systems, the academic community has conducted in-depth research on distributed recommendation systems. However, this collaborative recommendation environment faces two critical challenges: first, how to effectively protect the privacy of data providers and power users during the recommendation process; second, how to handle the potential presence of malicious data providers who may supply false recommendation data, thereby compromising the system’s reliability. To tackle these challenges, a blockchain-based lightweight reputation-aware electricity retail trading service recommendation (BLR-ERTS) system is proposed, tailored for electricity retail trading scenarios. The system innovatively introduces a recommendation method based on Locality-Sensitive Hashing (LSH) to enhance user privacy protection. Additionally, a reputation management mechanism is designed to identify and mitigate malicious data providers, ensuring the quality and trustworthiness of the recommendations. Through theoretical analysis, the security characteristics and privacy-preserving capabilities of the proposed system are explored. Experimental results show that BLR-ERTS achieves an MAE of 0.52, MSE of 0.275, and RMSE of 0.52 in recommendation accuracy. Compared with existing baseline methods, BLR-ERTS improves MAE, MSE, and RMSE by approximately 13%, 14%, and 13%, respectively. Moreover, the system exhibits 94% efficiency, outperforming comparable approaches by 4–24%, and maintains robustness with only a 30% attack success rate under adversarial conditions. The findings demonstrate that BLR-ERTS not only meets privacy protection requirements but also significantly improves recommendation accuracy and system robustness, making it a highly effective solution in a multi-party collaborative environment. Full article
Show Figures

Figure 1

24 pages, 875 KiB  
Review
Implementing Digital Sovereignty to Accelerate Smarter Mobility Solutions in Local Communities
by Anthony Jnr. Bokolo
Smart Cities 2025, 8(4), 106; https://doi.org/10.3390/smartcities8040106 - 29 Jun 2025
Viewed by 453
Abstract
Achieving a climate neutral economy by 2050 in Europe in line with the European Green Deal places specific responsibility on the transportation sector, which contributes to greenhouse gas (GHG) emissions. For the transportation domain to reduce its GHG emissions, there is need to [...] Read more.
Achieving a climate neutral economy by 2050 in Europe in line with the European Green Deal places specific responsibility on the transportation sector, which contributes to greenhouse gas (GHG) emissions. For the transportation domain to reduce its GHG emissions, there is need to advance urban mobility solutions in local communities via the use of data in all modes of transportation. Accordingly, to intelligently improve mobility solutions, huge amounts of data are needed from citizens in local communities to improve mobility services. However, the access, usage, and ownership of data in the transportation sector continue to be hindered due to issues including privacy, security, and trust concerns, among others. However, to improve smarter mobility solutions, there is a need for clarification of digital sovereignty, which today hinders data flow among different actors in the transportation sector. Therefore, research is needed to provide an approach that enables digital sovereignty while providing innovative mobility services and applications to citizens. Accordingly, this article carried out a systematic review to explore how to maintain digital sovereignty to improve urban mobility services in local communities. Based on grounded theory and a literature review, this study explores the factors that influence digital sovereignty from local communities’ point of view. More importantly, a policy framework is proposed to improve sovereign data usage control for citizens. Additionally, recommendations for achieving digital sovereignty are presented to foster data ecosystem business opportunities for mobility service providers and to increase data autonomy, trust, and transparency for citizens. Full article
Show Figures

Figure 1

36 pages, 744 KiB  
Review
Digital Transition as a Driver for Sustainable Tailor-Made Farm Management: An Up-to-Date Overview on Precision Livestock Farming
by Caterina Losacco, Gianluca Pugliese, Lucrezia Forte, Vincenzo Tufarelli, Aristide Maggiolino and Pasquale De Palo
Agriculture 2025, 15(13), 1383; https://doi.org/10.3390/agriculture15131383 - 27 Jun 2025
Viewed by 602
Abstract
The increasing integration of sensing devices with smart technologies, deep learning algorithms, and robotics is profoundly transforming the agricultural sector in the context of Farming 4.0. These technological advancements constitute critical enablers for the development of customized, data-driven farming systems, offering potential solutions [...] Read more.
The increasing integration of sensing devices with smart technologies, deep learning algorithms, and robotics is profoundly transforming the agricultural sector in the context of Farming 4.0. These technological advancements constitute critical enablers for the development of customized, data-driven farming systems, offering potential solutions to the challenges of agricultural intensification while addressing societal concerns associated with the emerging paradigm of “farming by numbers”. The Precision Livestock Farming (PLF) systems enable the continuous, real-time, and individual sensing of livestock in order to detect subtle change in animals’ status and permit timely corrective actions. In addition, smart technology implementation within the housing environment leads the whole farming sector towards enhanced business rentability and food security as well as increased animal health and welfare conditions. Looking to the future, the collection, processing, and analysis of data with advanced statistic methods provide valuable information useful to design predictive models and foster the insight on animal welfare, environmental sustainability, farming productivity, and profitability. This review highlights the significant potential of implementing advanced sensing systems in livestock farming, examining the scientific foundations of PLF and analyzing the main technological applications driving the transition from traditional practices to more modern and efficient farming models. Full article
Show Figures

Figure 1

17 pages, 2135 KiB  
Article
Cloud Computing’s Impact on the Digital Transformation of the Enterprise: A Mixed-Methods Approach
by Tereza Raquel Merlo, Fariba Fard and Suliman Hawamdeh
Sustainability 2025, 17(13), 5755; https://doi.org/10.3390/su17135755 - 23 Jun 2025
Viewed by 1098
Abstract
Cloud computing (CC) represents a key digital transformation advancement, reshaping the ways in which businesses operate across diverse industries. The exponential growth in data production has created an unprecedented challenge in the ways in which data is created, processed, and managed. This study [...] Read more.
Cloud computing (CC) represents a key digital transformation advancement, reshaping the ways in which businesses operate across diverse industries. The exponential growth in data production has created an unprecedented challenge in the ways in which data is created, processed, and managed. This study investigates the impact of cloud computing on the digital transformation of the enterprise, including issues concerning sustainability and long-term preservation and curation. While there has been a proliferation of studies concerning the adoption and implementation of cloud computing in the enterprise, there is still a gap in the literature concerning the use of cloud computing technology for long-term preservation, digital curation, and sustainability. The study employed a mixed-methods approach that utilized a systematic review of the literature and an Internet-based survey. The combination of the systematic review and survey was intended to provide insights into the key strategic factors impacting the use of cloud computing for long-term preservation and sustainability. The results of the study show that, despite the growing recognition of the benefits of cloud computing, most organizations are still concerned about issues such as security, privacy, accessibility, and cost. Concerns regarding the long-term preservation and sustainability of enterprise information are closely tied to the extent to which cloud computing services are deemed reliable and trustworthy. This study underscores the varying levels of satisfaction among users, with businesses acknowledging both the advantages and disadvantages of the current cloud solutions. Full article
(This article belongs to the Section Economic and Business Aspects of Sustainability)
Show Figures

Figure 1

31 pages, 802 KiB  
Review
Impact of EU Laws on the Adoption of AI and IoT in Advanced Building Energy Management Systems: A Review of Regulatory Barriers, Technological Challenges, and Economic Opportunities
by Bo Nørregaard Jørgensen and Zheng Grace Ma
Buildings 2025, 15(13), 2160; https://doi.org/10.3390/buildings15132160 - 21 Jun 2025
Cited by 1 | Viewed by 854
Abstract
The integration of Artificial Intelligence (AI) and the Internet of Things (IoT) in Building Energy Management Systems (BEMSs) offers transformative potential for improving energy efficiency, enhancing occupant comfort, and supporting grid stability. However, the adoption of these technologies in the European Union (EU) [...] Read more.
The integration of Artificial Intelligence (AI) and the Internet of Things (IoT) in Building Energy Management Systems (BEMSs) offers transformative potential for improving energy efficiency, enhancing occupant comfort, and supporting grid stability. However, the adoption of these technologies in the European Union (EU) is significantly influenced by a complex regulatory landscape, including the EU AI Act, the General Data Protection Regulation (GDPR), the EU Cybersecurity Act, and the Energy Performance of Buildings Directive (EPBD). This review systematically examines the legal, technological, and economic implications of these regulations on AI- and IoT-driven BEMS. Following the PRISMA-ScR guidelines, 64 relevant sources were reviewed, comprising 34 peer-reviewed articles and 30 regulatory or policy documents. First, legal and regulatory barriers that may hinder innovation are identified, including data protection constraints, cybersecurity compliance, liability concerns, and interoperability requirements. Second, technological challenges in designing regulatory-compliant AI and IoT solutions are examined, with a focus on data privacy-preserving architectures (e.g., edge computing versus cloud processing), explainability requirements for AI decision-making, and cybersecurity resilience. Finally, the economic opportunities arising from regulatory alignment are highlighted, demonstrating how compliant AI and IoT-based BEMS can enable energy savings, operational efficiencies, and new business models in smart buildings. By synthesizing current research and policy developments, this review offers a comprehensive framework for understanding the intersection of regulatory requirements and technological innovation in AI-driven building management. Strategies are discussed for navigating regulatory constraints while leveraging AI and IoT for energy-efficient, intelligent building operations. The insights presented aim to support researchers, policymakers, and industry stakeholders in advancing regulatory-compliant BEMS that balance innovation, security, and sustainability. Full article
(This article belongs to the Section Building Energy, Physics, Environment, and Systems)
Show Figures

Figure 1

Back to TopTop