Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (198)

Search Parameters:
Keywords = trusted entities

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 1423 KB  
Article
Agentic AI in Smart Manufacturing: Enabling Human-Centric Predictive Maintenance Ecosystems
by Andrés Fernández-Miguel, Susana Ortíz-Marcos, Mariano Jiménez-Calzado, Alfonso P. Fernández del Hoyo, Fernando E. García-Muiña and Davide Settembre-Blundo
Appl. Sci. 2025, 15(21), 11414; https://doi.org/10.3390/app152111414 - 24 Oct 2025
Viewed by 311
Abstract
Smart manufacturing demands adaptive, scalable, and human-centric solutions for predictive maintenance. This paper introduces the concept of Agentic AI, a paradigm that extends beyond traditional multi-agent systems and collaborative AI by emphasizing agency: the ability of AI entities to act autonomously, coordinate proactively, [...] Read more.
Smart manufacturing demands adaptive, scalable, and human-centric solutions for predictive maintenance. This paper introduces the concept of Agentic AI, a paradigm that extends beyond traditional multi-agent systems and collaborative AI by emphasizing agency: the ability of AI entities to act autonomously, coordinate proactively, and remain accountable under human oversight. Through federated learning, edge computing, and distributed intelligence, the proposed framework enables intentional, goal-oriented monitoring agents to form self-organizing predictive maintenance ecosystems. Validated in a ceramic manufacturing facility, the system achieved 94% predictive accuracy, a 67% reduction in false positives, and a 43% decrease in unplanned downtime. Economic analysis confirmed financial viability with a 1.6-year payback period and a €447,300 NPV over five years. The framework also embeds explainable AI and trust calibration mechanisms, ensuring transparency and safe human–machine collaboration. These results demonstrate that Agentic AI provides both conceptual and practical pathways for transitioning from reactive monitoring to resilient, autonomous, and human-centered industrial intelligence. Full article
(This article belongs to the Special Issue AI-Based Machinery Health Monitoring)
Show Figures

Figure 1

21 pages, 527 KB  
Article
Block-CITE: A Blockchain-Based Crowdsourcing Interactive Trust Evaluation
by Jiaxing Li, Lin Jiang, Haoxian Liang, Tao Peng, Shaowei Wang and Huanchun Wei
AI 2025, 6(10), 245; https://doi.org/10.3390/ai6100245 - 1 Oct 2025
Viewed by 461
Abstract
Industrial trademark examination enables users to apply for and manage their trademarks efficiently, promoting industrial and commercial economic development. However, there still exist many challenges, e.g., how to customize a blockchain-based crowdsourcing method for interactive trust evaluation, how to decentralize the functionalities of [...] Read more.
Industrial trademark examination enables users to apply for and manage their trademarks efficiently, promoting industrial and commercial economic development. However, there still exist many challenges, e.g., how to customize a blockchain-based crowdsourcing method for interactive trust evaluation, how to decentralize the functionalities of a centralized entity to nodes in a blockchain network instead of removing the entity directly, how to design a protocol for the method and prove its security, etc. In order to overcome these challenges, in this paper, we propose the Blockchain-based Crowdsourcing Interactive Trust Evaluation (Block-CITE for short) method to improve the efficiency and security of the current industrial trademark management schemes. Specifically, Block-CITE adopts a dual-blockchain structure and a crowdsourcing technique to record operations and store relevant data in a decentralized way. Furthermore, Block-CITE customizes a protocol for blockchain-based crowdsourced industrial trademark examination and algorithms of smart contracts to run the protocol automatically. In addition, Block-CITE analyzes the threat model and proves the security of the protocol. Security analysis shows that Block-CITE is able to defend against the malicious entities and attacks in the blockchain network. Experimental analysis shows that Block-CITE has a higher transaction throughput and lower network latency and storage overhead than the baseline methods. Full article
Show Figures

Figure 1

29 pages, 1977 KB  
Article
Evaluating the Decline Registered Auditors Will Have on the Future of the Assurance Industry in South Africa
by Thameenah Abrahams and Masibulele Phesa
Risks 2025, 13(9), 171; https://doi.org/10.3390/risks13090171 - 10 Sep 2025
Viewed by 1053
Abstract
Purpose: This article evaluated the decline of registered auditors (RAs) and its impact on the future of the assurance industry in South Africa. Auditors play a critical role in ensuring the transparency, trust, and credibility of financial statements. The decrease in the [...] Read more.
Purpose: This article evaluated the decline of registered auditors (RAs) and its impact on the future of the assurance industry in South Africa. Auditors play a critical role in ensuring the transparency, trust, and credibility of financial statements. The decrease in the number of registered auditors has become a pressing issue, raising concerns about the assurance industry’s ability to maintain a sufficient number of registered auditors and continue providing assurance services to public and private entities. Methodology: A qualitative Delphi methodology was employed, involving interviews with RAs who are registered with the Independent Regulatory Board for Auditors (IRBA). Eight RAs participated in structured interviews. This approach enabled the researcher to gather expert opinions, identify emerging trends, and explore challenges and opportunities within the audit profession related to the decline of RAs. Main findings: The decline of RAs is straining client demands, increasing workloads, and leading to a shortage of audit firms, which in turn affects audit quality and methodologies. Audit firms struggle to attract and retain talent due to regulatory burdens, economic pressures, and concerns about work–life balance. These pressures have resulted in higher audit fees, increased compliance costs, and more extensive training requirements. Smaller audit firms are especially impacted, with some downscaling their assurance services or exiting the market entirely. Practical implications: This study underscores the pressing need for regulatory bodies, such as the IRBA, to address the challenges faced by audit firms, particularly in terms of compliance and workforce retention. Proactive strategies are required to preserve the quality and accessibility of assurance services. Contribution: This study contributes to the ongoing discourse on the future of the audit profession by offering grounded insights into how the industry might sustain itself amid a declining number of RAs and changing professional dynamics. Full article
(This article belongs to the Special Issue Risks in Finance, Economy and Business on the Horizon in the 2030s)
Show Figures

Figure 1

13 pages, 1865 KB  
Article
Social Trusty Algorithm: A New Algorithm for Computing the Trust Score Between All Entities in Social Networks Based on Linear Algebra
by Esra Karadeniz Köse and Ali Karcı
Appl. Sci. 2025, 15(17), 9744; https://doi.org/10.3390/app15179744 - 4 Sep 2025
Viewed by 682
Abstract
The growing importance of social networks has led to increased research into trust estimation and interpretation among network entities. It is important to predict the trust score between users in order to minimize the risks in user interactions. This article enables the identification [...] Read more.
The growing importance of social networks has led to increased research into trust estimation and interpretation among network entities. It is important to predict the trust score between users in order to minimize the risks in user interactions. This article enables the identification of the most reliable and least reliable entities in a network by expressing trust scores numerically. In this paper, the social network is modeled as a graph, and trust scores are calculated by taking the powers of the ratio matrix between entities and summing them. Taking the power of the proportion matrix based on the number of entities in the network requires a lot of arithmetic load. After taking the powers of the eigenvalues of the ratio matrix, these are multiplied by the eigenvector matrix to obtain the power of the ratio matrix. In this way, the arithmetic cost required for calculating trust between entities is reduced. This paper calculates the trust score between entities using linear algebra techniques to reduce the arithmetic load. Trust detection algorithms use shortest paths and similar methods to eliminate paths that are deemed unimportant, which makes the result questionable because of the loss of data. The novelty of this method is that it calculates the trust score without the need for explicit path numbering and without any data loss. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

25 pages, 4239 KB  
Article
Design and Implementation of a Blockchain-Based Secure Data Sharing Framework to Enhance the Healthcare System
by Shrawan Kumar Sharma and Firoj Parwej
Blockchains 2025, 3(3), 10; https://doi.org/10.3390/blockchains3030010 - 29 Aug 2025
Viewed by 1215
Abstract
The integration of blockchain technology into healthcare offers a robust solution to challenges in secure data sharing, privacy protection, and operational efficiency. Effective exchange of sensitive patient information among hospitals, clinics, insurers, and researchers is essential for better outcomes and medical advancements. Traditional [...] Read more.
The integration of blockchain technology into healthcare offers a robust solution to challenges in secure data sharing, privacy protection, and operational efficiency. Effective exchange of sensitive patient information among hospitals, clinics, insurers, and researchers is essential for better outcomes and medical advancements. Traditional centralized systems often suffer from data breaches, inefficiency, and poor interoperability. This paper presents a blockchain-based secure data-sharing framework tailored for healthcare, addressing these limitations. The framework employs a hybrid blockchain model, combining private and public blockchains: the private chain ensures fast transactions and controlled access, while the public chain fosters transparency and trust. Advanced cryptographic methods—such as asymmetric encryption, hashing, and digital signatures—safeguard patient data and maintain integrity throughout the datalifecycle. Smart contracts automate processes like consent management, access control, and auditing, ensuring dynamic permission enforcement without intermediaries. Role-based access control (RBAC) further limits access to authorized entities, enhancing privacy. To tackle interoperability, standardized data formats and protocols enable smooth communication across diverse healthcare systems. Large files, such as medical images, are stored off-chain, with only essential metadata and logs on the blockchain. This approach optimizes performance, scalability, and suitability for large-scale healthcare deployments. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains 2025)
Show Figures

Figure 1

7 pages, 182 KB  
Proceeding Paper
Evaluation of AI Models for Phishing Detection Using Open Datasets
by Nur Aniyansyah, Rina Rina, Sarah Puspitasari and Adhitia Erfina
Eng. Proc. 2025, 107(1), 37; https://doi.org/10.3390/engproc2025107037 - 28 Aug 2025
Viewed by 709
Abstract
Phishing is a form of cyber-attack that aims to steal sensitive information by impersonating a trusted entity. To overcome this threat, various artificial intelligence (AI) methods have been developed to improve the effectiveness of phishing detection. This study evaluates three machine learning models, [...] Read more.
Phishing is a form of cyber-attack that aims to steal sensitive information by impersonating a trusted entity. To overcome this threat, various artificial intelligence (AI) methods have been developed to improve the effectiveness of phishing detection. This study evaluates three machine learning models, namely Decision Tree (DT), Random Forest (RF), and Support Vector Machine (SVM), using an open dataset containing phishing and non-phishing URLs. The research process includes data preprocessing stages such as cleaning, normalization, categorical feature encoding, feature selection, and dividing the dataset into training and test data. The trained models are then evaluated using accuracy, precision, recall, F1-score, and comparison score metrics to determine the best model in phishing classification. The evaluation results show that the Random Forest model has the best performance with higher accuracy and generalization of 98.64% compared to Decision Tree which is only 98.37% and SVM 92.67%. Decision Tree has advantages in speed and interpretability but is susceptible to overfitting. SVM shows good performance on high-dimensional datasets but is less efficient in computing time. Based on the research results, Random Forest is recommended as the most optimal model for machine learning-based phishing detection. Full article
35 pages, 1263 KB  
Review
Blockchain for Security in Digital Twins
by Rahanatu Suleiman, Akshita Maradapu Vera Venkata Sai, Wei Yu and Chenyu Wang
Future Internet 2025, 17(9), 385; https://doi.org/10.3390/fi17090385 - 27 Aug 2025
Viewed by 1235
Abstract
Digital Twins (DTs) have become essential tools for improving efficiency, security, and decision-making across various industries. DTs enable deeper insight and more informed decision-making through the creation of virtual replicas of physical entities. However, they face privacy and security risks due to their [...] Read more.
Digital Twins (DTs) have become essential tools for improving efficiency, security, and decision-making across various industries. DTs enable deeper insight and more informed decision-making through the creation of virtual replicas of physical entities. However, they face privacy and security risks due to their real-time connectivity, making them vulnerable to cyber attacks. These attacks can lead to data breaches, disrupt operations, and cause communication delays, undermining system reliability. To address these risks, integrating advanced security frameworks such as blockchain technology offers a promising solution. Blockchains’ decentralized, tamper-resistant architecture enhances data integrity, transparency, and trust in DT environments. This paper examines security vulnerabilities associated with DTs and explores blockchain-based solutions to mitigate these challenges. A case study is presented involving how blockchain-based DTs can facilitate secure, decentralized data sharing between autonomous connected vehicles and traffic infrastructure. This integration supports real-time vehicle tracking, collision avoidance, and optimized traffic flow through secure data exchange between the DTs of vehicles and traffic lights. The study also reviews performance metrics for evaluating blockchain and DT systems and outlines future research directions. By highlighting the collaboration between blockchain and DTs, the paper proposes a pathway towards building more resilient, secure, and intelligent digital ecosystems for critical applications. Full article
Show Figures

Figure 1

37 pages, 1545 KB  
Article
BFL-SDWANTrust: Blockchain Federated-Learning-Enabled Trust Framework for Secure East–West Communication in Multi-Controller SD-WANs
by Muddassar Mushtaq and Kashif Kifayat
Sensors 2025, 25(16), 5188; https://doi.org/10.3390/s25165188 - 21 Aug 2025
Viewed by 1053
Abstract
Software-Defined Wide-Area Networks (SD-WAN) efficiently manage and route traffic across multiple WAN connections, enhancing the reliability of modern enterprise networks. However, the performance of SD-WANs is largely affected due to malicious activities of unauthorized and faulty nodes. To solve these issues, many machine-learning-based [...] Read more.
Software-Defined Wide-Area Networks (SD-WAN) efficiently manage and route traffic across multiple WAN connections, enhancing the reliability of modern enterprise networks. However, the performance of SD-WANs is largely affected due to malicious activities of unauthorized and faulty nodes. To solve these issues, many machine-learning-based malicious-node-detection techniques have been proposed. However, these techniques are vulnerable to various issues such as low classification accuracy and privacy leakage of network entities. Furthermore, most operations of traditional SD-WANs are dependent on a third-party or a centralized party, which leads to issues such single point of failure, large computational overheads, and performance bottlenecks. To solve the aforementioned issues, we propose a Blockchain Federated-Learning-Enabled Trust Framework for Secure East–West Communication in Multi-Controller SD-WANs (BFL-SDWANTrust). The proposed model ensures local model learning at the edge nodes while utilizing the capabilities of federated learning. In the proposed model, we ensure distributed training without requiring central data aggregation, which preserves the privacy of network entities while simultaneously improving generalization across heterogeneous SD-WAN environments. We also propose a blockchain-based network that validates all network communication and malicious node-detection transactions without the involvement of any third party. We evaluate the performance of our proposed BFL-SDWANTrust on the InSDN dataset and compare its performance with various benchmark malicious-node-detection models. The simulation results show that BFL-SDWANTrust outperforms all benchmark models across various metrics and achieves the highest accuracy (98.8%), precision (98.0%), recall (97.0%), and F1-score (97.7%). Furthermore, our proposed model has the shortest training and testing times of 12 s and 3.1 s, respectively. Full article
(This article belongs to the Special Issue Sensors and IoT Technologies for the Smart Industry)
Show Figures

Figure 1

14 pages, 550 KB  
Article
Systemic Governance of Rural Revitalization: Social Capital Transfer Through State-Owned Enterprise Interventions in China
by Xinhui Wu, Minsheng Li and Yaofu Huang
Systems 2025, 13(8), 695; https://doi.org/10.3390/systems13080695 - 14 Aug 2025
Viewed by 953
Abstract
This study investigates how state-owned enterprises (SOEs) contribute to rural revitalization in China through systemic interventions that enable the transfer of social capital. Addressing the gap between external resource inputs and internal development needs, the study adopts a systems thinking framework to conceptualize [...] Read more.
This study investigates how state-owned enterprises (SOEs) contribute to rural revitalization in China through systemic interventions that enable the transfer of social capital. Addressing the gap between external resource inputs and internal development needs, the study adopts a systems thinking framework to conceptualize social capital as comprising structural, relational, and cognitive components. Drawing on multi-case evidence from assistance projects led by China Southern Power Grid, this study selects 11 assistance projects from a broader pool of 199 cases, to demonstrate how SOEs act as institutional nodes to reshape rural governance systems. They rebuild local organizational networks (structural capital), establish long-term trust through “strong commitment–weak contract” mechanisms (relational capital), and localize technical knowledge to align with rural contexts (cognitive capital). These interlinked processes form an integrated system that enhances rural governance capacity and promotes sustainable development. The findings highlight that SOEs are not merely resource providers but systemic catalysts that support cross-scalar collaboration and social infrastructure building. The study contributes a novel perspective by integrating social capital theory with a systemic governance lens and offer a actionable insights into the institutional design of assistance models for the future interventions by SOEs and similar entities in underdeveloped areas. Full article
Show Figures

Figure 1

28 pages, 1063 KB  
Article
A Digital Identity Blockchain Ecosystem: Linking Government-Certified and Uncertified Tokenized Objects
by Juan-Carlos López-Pimentel, Javier Gonzalez-Sanchez and Luis Alberto Morales-Rosales
Appl. Sci. 2025, 15(15), 8577; https://doi.org/10.3390/app15158577 - 1 Aug 2025
Viewed by 2163
Abstract
This paper presents a novel digital identity ecosystem built upon a hierarchical structure of Blockchain tokens, where both government-certified and uncertified tokens can coexist to represent various attributes of an individual’s identity. At the core of this system is the government, which functions [...] Read more.
This paper presents a novel digital identity ecosystem built upon a hierarchical structure of Blockchain tokens, where both government-certified and uncertified tokens can coexist to represent various attributes of an individual’s identity. At the core of this system is the government, which functions as a trusted authority capable of creating entities and issuing a unique, non-replicable digital identity token for each one. Entities are the exclusive owners of their identity tokens and can attach additional tokens—such as those issued by the government, educational institutions, or financial entities—to form a verifiable, token-based digital identity tree. This model accommodates a flexible identity framework that enables decentralized yet accountable identity construction. Our contributions include the design of a digital identity system (supported by smart contracts) that enforces uniqueness through state-issued identity tokens while supporting user-driven identity formation. The model differentiates between user types and certifies tokens according to their source, enabling a scalable and extensible structure. We also analyze the economic, technical, and social feasibility of deploying this system, including a breakdown of transaction costs for key stakeholders such as governments, end-users, and institutions like universities. Considering the benefits of blockchain, implementing a digital identity ecosystem in this technology is economically viable for all involved stakeholders. Full article
(This article belongs to the Special Issue Advanced Blockchain Technology and Its Applications)
Show Figures

Figure 1

33 pages, 1129 KB  
Article
Toward a ‘Green Intelligence’? The Intelligence Practices of Non-Governmental Organisations Which Combat Environmental Crime
by Charlotte M. Davies
Laws 2025, 14(4), 52; https://doi.org/10.3390/laws14040052 - 28 Jul 2025
Viewed by 1842
Abstract
Environmental crime has been increasingly recognised as transnational organised crime, but efforts to build a coherent and effective international response are still in development and under threat from shifts in the funding landscape. This mixed methods study addresses the role of one significant [...] Read more.
Environmental crime has been increasingly recognised as transnational organised crime, but efforts to build a coherent and effective international response are still in development and under threat from shifts in the funding landscape. This mixed methods study addresses the role of one significant group of actors in environmental crime enforcement, which are non-governmental organisations (NGOs) who gather intelligence that can be shared with law enforcement and regulatory agencies. The study compares their intelligence practices to findings from traditional intelligence sectors, with a focus upon criminal justice and policing. The research generated quantitative and qualitative data from NGO practitioners, which is integrated to discern three overarching themes inherent in these NGOs’ intelligence practices: the implementation of formal intelligence practices is still underway in the sector; there remains a need to improve cooperation to break down silos between agencies and NGOs, which requires an improvement in trust between these entities; the operating environment provides both opportunities and challenges to the abilities of the NGOs to deliver impact. The study concludes by positing that the characteristics of NGOs mean that this situation constitutes ‘green intelligence’, contextualising intelligence theory and highlighting areas in which agencies can further combat environmental crime. Full article
(This article belongs to the Special Issue Global Threats in the Illegal Wildlife Trade and Advances in Response)
Show Figures

Figure 1

24 pages, 921 KB  
Article
Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing
by Abdul Ghafoor, Iraklis Symeonidis, Anna Rydberg, Cecilia Lindahl and Abdul Qadus Abbasi
Cryptography 2025, 9(3), 52; https://doi.org/10.3390/cryptography9030052 - 23 Jul 2025
Viewed by 774
Abstract
Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches, robust security protocols, and advanced data management strategies to address key challenges such as data [...] Read more.
Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches, robust security protocols, and advanced data management strategies to address key challenges such as data consistency, transparency, ownership, controlled access or exposure, and privacy-preserving analytics for value-added services. In this paper, we introduced the Framework for Livestock Empowerment and Decentralized Secure Data eXchange (FLEX), as a comprehensive solution grounded on five core design principles: (i) enhanced security and privacy, (ii) human-centric approach, (iii) decentralized and trusted infrastructure, (iv) system resilience, and (v) seamless collaboration across the supply chain. FLEX integrates interdisciplinary innovations, leveraging decentralized infrastructure-based protocols to ensure trust, traceability, and integrity. It employs secure data-sharing protocols and cryptographic techniques to enable controlled information exchange with authorized entities. Additionally, the use of data anonymization techniques ensures privacy. FLEX is designed and implemented using a microservices architecture and edge computing to support modularity and scalable deployment. These components collectively serve as a foundational pillar of the development of a digital product passport. The FLEX architecture adopts a layered design and incorporates robust security controls to mitigate threats identified using the STRIDE threat modeling framework. The evaluation results demonstrate the framework’s effectiveness in countering well-known cyberattacks while fulfilling its intended objectives. The performance evaluation of the implementation further validates its feasibility and stability, particularly as the volume of evidence associated with animal identities increases. All the infrastructure components, along with detailed deployment instructions, are publicly available as open-source libraries on GitHub, promoting transparency and community-driven development for wider public benefit. Full article
(This article belongs to the Special Issue Emerging Trends in Blockchain and Its Applications)
Show Figures

Figure 1

19 pages, 626 KB  
Article
A Strong Anonymous Privacy Protection Authentication Scheme Based on Certificateless IOVs
by Xiaohu He, Shan Gao, Hua Wang and Chuyan Wang
Symmetry 2025, 17(7), 1163; https://doi.org/10.3390/sym17071163 - 21 Jul 2025
Viewed by 405
Abstract
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing [...] Read more.
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing anonymous authentication schemes have limitations, including large vehicle storage demands, information redundancy, time-dependent pseudonym updates, and public–private key updates coupled with pseudonym changes. To address these issues, we propose a certificateless strong anonymous privacy protection authentication scheme that allows vehicles to autonomously generate and dynamically update pseudonyms. Additionally, the trusted authority transmits each entity’s partial private key via a session key, eliminating reliance on secure channels during transmission. Based on the elliptic curve discrete logarithm problem, the scheme’s existential unforgeability is proven in the random oracle model. Performance analysis shows that it outperforms existing schemes in computational cost and communication overhead, with the total computational cost reduced by 70.29–91.18% and communication overhead reduced by 27.75–82.55%, making it more suitable for privacy-sensitive and delay-critical IoV environments. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Applied Cryptography)
Show Figures

Figure 1

25 pages, 468 KB  
Review
Analysing the Factors Contributing to the Decline of Auditors Globally and Avenue for Future Research: A Scoping Review
by Thameenah Abrahams and Masibulele Phesa
J. Risk Financial Manag. 2025, 18(7), 363; https://doi.org/10.3390/jrfm18070363 - 1 Jul 2025
Cited by 2 | Viewed by 3338
Abstract
Aim: This article explores the contributing factors to the decline in the number of auditors globally and aims to provide the consequences and possible recommendations. Auditors play a critical role in ensuring transparency, trust, and credibility of financial statements. However, the profession is [...] Read more.
Aim: This article explores the contributing factors to the decline in the number of auditors globally and aims to provide the consequences and possible recommendations. Auditors play a critical role in ensuring transparency, trust, and credibility of financial statements. However, the profession is experiencing a decline across the globe. The decrease in the number of registered auditors has become a pressing issue, raising concerns about the future of the assurance industry’s ability to maintain the number of registered auditors and continue providing assurance services to public and private entities or companies. Methodology: A scoping-review methodology was adopted to analyse the existing literature on the global decline in the number of auditors. This approach utilises research evidence to identify trends, challenges, and opportunities within the audit profession. Relevant studies were sourced from databases such as ScienceDirect, Google Scholar, and ResearchGate, as well as the grey literature. Main findings: This study identifies a combination of factors driving the decline of auditors globally. Economic pressures, such as cost reduction initiatives and outsourcing, have impacted the demand for traditional auditing services. Complex regulatory requirements have increased barriers to entry, while technological advancements, such as artificial intelligence, are disrupting traditional auditing roles. Additionally, the profession suffers from negative perceptions regarding workload, remuneration, and work–life balance, discouraging new entrants. Practical implications: The findings emphasise the urgent need for the auditing profession to adapt to evolving challenges. Stakeholders, including regulatory bodies and professional organisations, must address issues such as technological integration, career development pathways, and regulatory simplification. Enhanced public awareness campaigns and training initiatives are critical to attracting and retaining professional talent. Contribution: This study contributes to the limited body of knowledge on the global decline of auditors by creating a broad spectrum of evidence. It highlights actionable strategies to address the profession’s challenges and provides a foundation for future research on sustaining the relevance of auditors in a dynamic global economy. Full article
(This article belongs to the Special Issue Financial Management)
Show Figures

Figure 1

20 pages, 1300 KB  
Article
QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things
by Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Chenyun Pan and Elias Kougianos
Cryptography 2025, 9(2), 34; https://doi.org/10.3390/cryptography9020034 - 27 May 2025
Cited by 2 | Viewed by 2396
Abstract
This research investigates the integration of quantum hardware-assisted security into critical applications, including the Industrial Internet-of-Things (IIoT), Smart Grid, and Smart Transportation. The Quantum Physical Unclonable Functions (QPUF) architecture has emerged as a robust security paradigm, harnessing the inherent randomness of quantum hardware [...] Read more.
This research investigates the integration of quantum hardware-assisted security into critical applications, including the Industrial Internet-of-Things (IIoT), Smart Grid, and Smart Transportation. The Quantum Physical Unclonable Functions (QPUF) architecture has emerged as a robust security paradigm, harnessing the inherent randomness of quantum hardware to generate unique and tamper-resistant cryptographic fingerprints. This work explores the potential of Quantum Computing for Security-by-Design (SbD) in the Industrial Internet-of-Things (IIoT), aiming to establish security as a fundamental and inherent feature. SbD in Quantum Computing focuses on ensuring the security and privacy of Quantum computing applications by leveraging the fundamental principles of quantum mechanics, which underpin the quantum computing infrastructure. This research presents a scalable and sustainable security framework for the trusted attestation of smart industrial entities in Quantum Industrial Internet-of-Things (QIoT) applications within Industry 4.0. Central to this approach is the QPUF, which leverages quantum mechanical principles to generate unique, tamper-resistant fingerprints. The proposed QPUF circuit logic has been deployed on IBM quantum systems and simulators for validation. The experimental results demonstrate the enhanced randomness and an intra-hamming distance of approximately 50% on the IBM quantum hardware, along with improved reliability despite varying error rates, coherence, and decoherence times. Furthermore, the circuit achieved 100% reliability on Google’s Cirq simulator and 95% reliability on IBM’s quantum simulator, highlighting the QPUF’s potential in advancing quantum-centric security solutions. Full article
(This article belongs to the Special Issue Emerging Topics in Hardware Security)
Show Figures

Figure 1

Back to TopTop