2021
DOI: 10.1504/ijil.2021.10034246
|View full text |Cite
|
Sign up to set email alerts
|

Towards intelligent organisations: an empirical investigation of learning orientation's role in technical innovation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(29 citation statements)
references
References 0 publications
1
28
0
Order By: Relevance
“…Clinical trial participants, health information and data processing providers and businesses, and as previously said, the medication supply chain are perhaps the most developed healthcare industries going forward with blockchain implementation [31]. However, there are applications for medical equipment and supply, IOMT, and public health that are aligned with the core concepts of better data management [32] and the reliability of the wellness supply chain, and these are briefly discussed below [33].…”
Section: Proposed Solutionmentioning
confidence: 99%
“…Clinical trial participants, health information and data processing providers and businesses, and as previously said, the medication supply chain are perhaps the most developed healthcare industries going forward with blockchain implementation [31]. However, there are applications for medical equipment and supply, IOMT, and public health that are aligned with the core concepts of better data management [32] and the reliability of the wellness supply chain, and these are briefly discussed below [33].…”
Section: Proposed Solutionmentioning
confidence: 99%
“…The IoMT healthcare system's cryptography designs, applications, and security evaluations are examined in detail. Random number generation, for example, will be examined in great detail because it is one of the most critical components of the cryptographic system (RNG) [20].…”
Section: Literature Reviewmentioning
confidence: 99%
“…There have also been various attempts to implement a Public Key Cryptography (PKC)-based system on restricted devices in order to overcome the scalability issue [40]. It has been demonstrated that it is possible to implement PKC with restricted hardware, particularly when utilizing ECC, which necessitates a smaller key size than RSA-based PKC [41].…”
Section: Safety Challenges and Solutionsmentioning
confidence: 99%