【Author】 Zhang, Yang Liang, Yongquan Jia, Bin Wang, Pinxiang
CCF-C
【影响因子】11.648
【主题类别】
区块链应用-实体经济-制造领域
【Abstract】The blockchain-enabled cloud manufacturing is an emerging service-oriented paradigm, and the scheduling and process optimization for blockchain-enabled cloud manufacturing (SPO-BCMfg) are crucial to achieving the service-oriented goal. The blockchain-enabled cloud manufacturing paradigm improves the collaboration capabilities and information security over the ordinary cloud manufacturing while incorporating distributed storage, consensus mechanism, and cloud-edge collaboration. The above characteristics make SPO-BCMfg a multiobjective scheduling optimization problem. This article establishes the multiobjective SPO-BCMfg model based on a dynamic selection evolutionary algorithm to address the problem. First, we carry out the architecture and the modeling of the blockchain cloud manufacturing system. Then, a novel dynamic selection evolutionary algorithm is proposed, which is used to schedule and optimize the model for the process. In the stage of evolution, the algorithm uses a diversity-based population partitioning technique that utilizes the dynamic distance to realize the selection of elite solutions. The method was experimented on the SPO-BCMfg problem facing five and eight objectives. The experimental results show that the algorithm has a strong processing capacity in terms of convergence and diversity compared with the other advanced evolutionary algorithms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Informatics; Blockchain-enabled cloud manufacturing (BCMfg); dynamic selection evolutionary algorithm; multiobjective optimization; scheduling and process optimization
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 实证数据
【DOI】 10.1109/TII.2022.3188835
CCF-C
【影响因子】11.648
【主题类别】
区块链技术-协同技术-边缘计算
【Abstract】Trustworthy and real-time video surveillance aims to analyze the live camera streams in a privacy-preserving manner for the decision-making of various advanced services, such as pedestrian reidentification and traffic monitoring. In recent years, edge computing has been identified as a promising technology for trustworthy and real-time video surveillance because it keeps confidential video data locally and reduces the latency caused by massive data transmission. Generally, a single edge device can hardly afford the computation-intensive video analytics tasks. Most existing solutions incorporate cloud servers to handle the overloaded tasks. However, such an edge-cloud collaboration approach still suffers from unpredictable latency and privacy concerns because the remote cloud is centralized and distant from the cameras. In this work, we designed a blockchain-based collaborative edge intelligence (BCEI) approach for trustworthy and real-time video surveillance. In BCEI, geo-distributed edge devices form a peer-to-peer network to maintain a permissioned blockchain and share data and computation resources to perform computation-intensive video analytics tasks. The video analytics results are written on the blockchain in an immutable manner to guarantee trustworthiness. To reduce task execution time, we formulate and solve a joint stream mapping and task scheduling problem to schedule video streams and machine learning models among edge devices. A pedestrian reidentification prototype is implemented and deployed based on BCEI with the extensive performance evaluation, indicating the superiority of BCEI in latency reduction and system throughput improvement by leveraging collaboration among edge devices.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Collaborative edge computing; edge blockchain; edge intelligence; trustworthiness; video surveillance
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 实证数据
【DOI】 10.1109/TII.2022.3203397
CCF-C
【影响因子】11.648
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Industrial Internet-of-Things (IIoT) is a powerful IoT application, which remodels the growth of industries by ensuring transparent communication among various entities such as hubs, manufacturing places, and packaging units. Introducing data science techniques within the IIoT improves the ability to analyze the collected data in a more efficient manner, which current IIoT architectures lack due to their distributed nature. From a security perspective, network anomalies/attackers pose high security risk in IIoT. In this article, we have addressed this problem, where a coordinator IoT device is elected to compute the trust of IoT devices to prevent the MD to be part of network. Further, the transparency of the data is ensured by integrating a blockchain-based data model. The performance of the proposed framework is validated extensively and rigorously via MATLAB against various security metrics such as attack strength, message alteration, and probability of false authentication. The simulation results suggest that the proposed solution increases IIoT network security by efficiently detecting malicious attacks in the network.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Industrial Internet-of-Things (IIoT); secure IoT devices; security; trust management
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 实验仿真
【DOI】 10.1109/TII.2022.3182121
CCF-C
【影响因子】11.648
【主题类别】
区块链应用-实体经济-工业领域
【Abstract】Industrial Internet of Things (IIoT) has emerged as a new paradigm in the era of smart systems where interactions and transmission of messages among various entities in an industrial ecosystem are done autonomously. This includes manufacturing of products, shipment process, storage of records, and counting the data, to name a few. However, the involvement of multiple cyber threats that accompany the smart devices may lead the organizations on a heavy risk of profits. Even though the number of cybersecurity approaches have been proposed to ensure a secure and efficient communication mechanism in IIoT systems, the identification of cybersecurity issues in IIoT applications while exchanging the data is still at its early stage. The aim of this article is to propose an efficient cybersecurity communication mechanism using the trust evaluation system of each device to make a correct decision during communication. In addition, the evaluated trust of each device is further analyzed and monitored through a blockchain-based mechanism. The proposed approach is validated against an existing scheme in terms of various security metrics, such as sensitivity of devices while communicating, convergence time of transmitting information and percentage, and probability of malicious devices in terms of data delivery rate, false authentication, and trust value computation.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain Industrial Internet-of-Things (IIoT); blockchain mechanism; cyber secure systems; Industrial IoT; trusted system
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 实验仿真
【DOI】 10.1109/TII.2022.3182984
【Author】 Samuel, Omaji Omojo, Akogwu Blessing Onuja, Abdulkarim Musa Sunday, Yunisa Tiwari, Prayag Gupta, Deepak Hafeez, Ghulam Yahaya, Adamu Sani Fatoba, Oluwaseun Jumoke Shamshirband, Shahab
CCF-C
【影响因子】7.021
【主题类别】
区块链技术-协同技术-联邦学习
区块链应用-实体经济-医疗领域
【Abstract】Internet of medical things (IoMT) has made it possible to collect applications and medical devices to improve healthcare information technology. Since the advent of the pandemic of coronavirus (COVID-19) in 2019, public health information has become more sensitive than ever. Moreover, different news items incorporated have resulted in differing public perceptions of COVID-19, especially on the social media platform and infrastructure. In addition, the unprecedented virality and changing nature of COVID-19 makes call centres to be likely overstressed, which is due to a lack of authentic and unregulated public media information. Furthermore, the lack of data privacy has restricted the sharing of COVID-19 information among health institutions. To resolve the above-mentioned limitations, this paper is proposing a privacy infrastructure based on federated learning and blockchain. The proposed infrastructure has the potentials to enhance the trust and authenticity of public media to disseminate COVID-19 information. Also, the proposed infrastructure can effectively provide a shared model while preserving the privacy of data owners. Furthermore, information security and privacy analyses show that the proposed infrastructure is robust against information security-related attacks.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】COVID-19; Blockchains; Artificial intelligence; Privacy; Security; Medical diagnostic imaging; Data privacy; Blockchain; epidemiology; federated learning; information security; reinforcing addition
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 理论模型
【Author】 Salim, Mikail Mohammed Park, Jong Hyuk
CCF-C
【影响因子】7.021
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Medical Cyber-Physical Systems support the mobility of electronic health records data for clinical research to accelerate new scientific discoveries. Artificial Intelligence improves medical informatics, but current centralized data training and insecure data storage management techniques expose private medical data to unauthorized foreign entities. In this paper, a Federated Learning-based Electronic Health Record sharing scheme is proposed for Medical Informatics to preserve patient data privacy. A decentralized Federated Learning-based Convolutional Neural Network model trains data locally in the hospital and stores results in a private InterPlanetary File System. A secondary global model is trained at the research center using the local models. Private IPFS secures all medical data stored locally in the hospital. The novelty of this study resides in securing valuable hospital biomedical data useful for clinical research organizations. Blockchain and smart contracts enable patients to negotiate with external entities for rewards in exchange for their data. Evaluation results demonstrate that the decentralized CNN model performs better in accuracy, sensitivity, and specificity, similar to the traditional centralized model. The performance of the Private IPFS exceeds the Blockchain-based IPFS based on file upload and download time. The scheme is suitable for promoting a secure and privacy-friendly environment for sharing data with clinical research centers for biomedical research.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Artificial intelligence; bioinformatics; data privacy; file systems
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 理论模型
【Author】 Yu, Jing Liu, Jicheng Sun, Jiakang Shi, Mengyu
【影响因子】3.889
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】In the context of "carbon neutral", distributed energy, including photovoltaic power generation and energy storage systems, is developing rapidly. Meanwhile, the new generation of information technology, such as "Cloud computing, Big data, the Internet of things, Mobile Internet, AI, Blockchain", is driving the digital transformation of the energy industry. Under digital drive, how the agents in the photovoltaic-storage-use value chain collaborate and create value intelligently is a question worthy of deep consideration. Firstly, the value creation mechanism and collaborative process of the digital-driven photovoltaic-storage-use value chain are analyzed from a value intelligence creation perspective. Secondly, the tripartite evolutionary game model of photovoltaic power generator, energy storage provider and user is established. Finally, the influencing factors of digital- driven photovoltaic-storage-use value chain collaboration are explored through a numerical simulation, and management suggestions are put forward. The study finds the following: (1) The behavior choice of each agent in the value chain will affect the decision of other agents. In particular, the photovoltaic power generator has a great influence on the cooperative willingness of other agents. To promote value chain collaboration, the guiding role of the photovoltaic power generator should be fully realized. (2) Agents on the value chain can use a variety of digital technologies to improve enabling benefits, which is conducive to promoting value chain collaboration. (3) The driving costs and potential risks are obstacles for value chain collaboration. Cost reduction and risk prevention are effective ways to improve the willingness of collaboration. (4) Reasonable incentive compensation mechanisms and information asymmetry punishment measures are the keys to enhancing collective willingness. This research provides theoretical support for photovoltaic-storage-use value chain collaboration from a value intelligence creation perspective.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】value chain collaboration; photovoltaic power generation-energy storage-energy use; digital-driven; value intelligence creation; evolutionary game
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 理论模型
【DOI】 10.3390/su15043287
【影响因子】3.889
【主题类别】
区块链治理-市场治理-市场分析
【Abstract】Blockchain is considered one of the key technologies that can accelerate the Industrial Revolution 4.0. The intention to use Blockchain can still be improved in several ways, and how users perceive Blockchain is likely to be influenced by how well they understand the underlying theory. This study examines several important factors, namely government regulation, social influence, perceived security, and Blockchain functional benefits, to measure trust and satisfaction with relationship quality, which may influence the intention to use Blockchain. A sample of 460 people participated in the online questionnaire survey, which was then evaluated with SmartPLS 3. The findings reveal that the social influence and Blockchain functional benefits have a substantial impact on relationship quality, which further results in a positive impact on Blockchain usage intention as well. This study can serve as a reference for companies that need to consider the factors discussed in this study when implementing Blockchain technology to achieve marketing goals and generate sustainable Blockchain usage intentions.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain usage intention; Blockchain functional benefits; relationship quality; perceived security
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 实证数据
【DOI】 10.3390/su15043500
【Author】 Roman-Martinez, Isabel Calvillo-Arbizu, Jorge Mayor-Gallego, Vicente J. J. Madinabeitia-Luque, German Estepa-Alonso, Antonio J. J. Estepa-Alonso, Rafael M. M.
【影响因子】3.476
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】Continuity of care requires the exchange of health information among organizations and care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of care should give explicit consent to the treatment of her personal data, and organizations must obey the individual's will. Nevertheless, few solutions focus on guaranteeing the proper execution of consents. We propose a service-oriented architecture, backed by blockchain technology, that enables: (1) tamper-proof and immutable storage of subject of care consents; (2) a fine-grained access control for protecting health data according to consents; and (3) auditing tasks for supervisory authorities (or subjects of care themselves) to assess that healthcare organizations comply with GDPR and granted consents. Standards for health information exchange and access control are adopted to guarantee interoperability. Access control events and the subject of care consents are maintained on a blockchain, providing a trusted collaboration between organizations, supervisory authorities, and individuals. A prototype of the architecture has been implemented as a proof of concept to evaluate the performance of critical components. The application of subject of care consent to control the treatment of personal health data in federated and distributed environments is a pressing concern. The experimental results show that blockchain can effectively support sharing consent and audit events among healthcare organizations, supervisory authorities, and individuals.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Service-oriented architecture; Access control; Medical services; Health information management; General Data Protection Regulation; Blockchain; consent management; fast healthcare information resources (FHIR); general data protection regulation (GDPR); service-oriented architecture (SOA); business process management (BPM)
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 理论模型
【影响因子】3.401
【主题类别】
区块链应用-实体经济-云服务
【Abstract】Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly con-venient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentica-tion process. Blockchain technology is utilized in this study to enable efficient and secure operation which not only empowers cloud security but also avoids threats and attacks. Additionally, the data integrity authentication technique is also uti-lized to limit the unwanted access of data in cloud storage unit. The major objec-tive of the projected technique is to empower data security and user authentication in cloud computing environment. To improve the proposed authentication pro-cess, cuckoo filter and Merkle Hash Tree (MHT) are utilized. The proposed meth-odology was validated using few performance metrics such as processing time, uploading time, downloading time, authentication time, consensus time, waiting time, initialization time, in addition to storage overhead. The proposed method was compared with conventional cloud security techniques and the outcomes establish the supremacy of the proposed method.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; security; data integrity; authentication; cloud computing; signature; hash tree
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 实验仿真
【影响因子】1.170
【主题类别】
区块链应用-实体经济-工业领域
【Abstract】The increasing threat landscape in Industrial Control Systems (ICS) brings different risk profiles with comprehensive impacts on society and safety. The complexity of cybersecurity risk assessment increases with a variety of third-party software components that comprise a modern ICS supply chain. A central issue in software supply chain security is the evaluation whether the secure development lifecycle process (SDL) is being methodologically and continuously practiced by all vendors. In this paper, we investigate the possibility of using a decentralized, tamper-proof system that will provide trustworthy visibility of the SDL metrics over a certain period, to any authorized auditing party. Results of the research provide a model for creating a blockchain-based approach that allows inclusion of auditors through a consortium decision while responding to SDL use cases defined by this paper. The resulting blockchain architecture successfully responded to requirements mandated by the security management practice as defined by IEC 62443-4-1 standard.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】industrial control systems; secure development lifecycle; blockchain
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 理论模型
【DOI】 10.2298/CSIS210923060M
【Author】 Lin, Hua-Yi
【影响因子】1.170
【主题类别】
区块链应用-实体经济-车联网
【Abstract】Over the past few years, because of the popularity of the Internet of vehicles and cloud computing, the exchange of group information between vehicles is no longer out of reach. Through WiFi/5G wireless communication protocol, vehicles can instantly deliver traffic conditions and accidents to the back end or group vehicles traveling together, which can reduce traffic congestion and accidents. In addition, vehicles transmit real-time road conditions to the cloud vehicle management center, which can also share real-time road conditions and improve the road efficiency for pedestrians and drivers. However, the transmission of information in an open environment raises the issue of personal information security. Most of the security mechanisms provided by the existing Internet of vehicles require centralized authentication servers, which increase the burden of certificate management and computing. Moreover, the road side unit as a decentralized authentication center may be open to hacking or modification, but due to personal privacy and security concerns, vehicle-to-vehicle is not willing to share information with each other. Therefore, this study is conducted through blockchain to ensure the security of vehicle-based information transmission. Moreover, the elliptic curve Diffie-Hellman (ECDH) key exchange protocol and a secure conference key mechanism with direct user confirmation combined with the back-end cloud platform Map/Reduce is proposed to ensure the identities of Mappers and Reducers that participate in the cloud operation, avoid malicious participants to modify the transmission information, so as to achieve secure Map/Reduce operations, and improves vehicle and passenger traffic safety.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of vehicles; blockchain; ECDH; Map; Reduce
【发表时间】2023
【收录时间】2023-03-23
【文献类型】 实验仿真
【DOI】 10.2298/CSIS220921056L
【作者】 王琳;
【作者单位】河南工业大学管理学院;
【文献来源】情报杂志
【复合影响因子】3.030
【综合影响因子】2.087
【主题类别】
区块链应用-实体经济-情报领域
【摘要】[研究目的]情报体系是突发事件下粮食应急联供决策与运作的重要支撑,强化粮食应急供应过程中的情报采集、存储、共享、分析和溯源等职能是提高粮食应急决策科学性和运作高效性的重要途径。[研究方法]在梳理粮食应急情报需求的基础上,建立基于区块链的粮食应急情报体系理论框架,并从体系要素分析、平台架构和组织结构设计、运作流程重塑等方面阐释基于区块链的粮食应急情报体系构建。[研究结论]区块链为突发事件下粮食应急供应行动提供全周期的情报支持,在保证粮食应急情报及时、准确、全面共享的同时能够实现情报预警和情报溯源,为保障国家粮食安全、推进应急管理体系和能力现代化提供支撑。
【关键词】突发事件;;应急情报;;情报体系;;粮食应急供应;;区块链
【文献类型】 理论模型
【发表时间】2023-03-23
【作者】 郭瑞;魏鑫;陈丽;
【作者单位】西安邮电大学网络空间安全学院;西安邮电大学无线网络安全技术国家工程实验室;
【文献来源】信息网络安全
【复合影响因子】1.887
【综合影响因子】0.804
【主题类别】
区块链应用-实体经济-工业领域
【摘要】针对工业物联网环境下数据访问控制方案存在解密设备计算负担过重,无法保护解密设备隐私信息,以及不能追踪恶意设备等问题,文章提出一种工业物联网环境下可外包的策略隐藏属性基加密方案。该方案借助边缘计算技术将海量工业数据的大部分解密操作外包给边缘计算节点,极大减轻了解密设备的计算负担。该方案将属性基加密中的访问结构进行拆分,引入策略隐藏技术,在实现工业数据机密性的同时保护解密设备的隐私信息。此外,文章利用区块链技术对系统内设备进行监管和审计。安全性分析表明,该方案在选择明文攻击下是安全的。文章在PBC密码库和Hyperledger Fabric区块链平台上将该方案与同类方案进行模拟仿真,结果表明,该方案具有较高的计算效率,适用于工业物联网环境。
【关键词】工业物联网;;区块链;;边缘计算;;隐私保护;;属性基加密
【文献类型】 实验仿真
【发表时间】2023-03-23
【作者】
【作者单位】信息网络安全
【文献来源】信息网络安全
【复合影响因子】1.887
【综合影响因子】0.804
【主题类别】
区块链技术-协同技术-隐私计算
【摘要】1000台高性能专用算力服务器组建的庞大集群,每秒可处理超过2.4亿笔智能合约交易、百亿条数据隐私计算,性能全球领先。记者近日从北京微芯区块链与边缘计算研究院获悉,区块链与隐私计算算力集群Hive“蜂巢”日前正式启用。据介绍,作为北京市重大科技创新及高精尖产业项目,该算力集群依托我国首个自主可控的区块链软硬件技术体系“长安链”,建设具备先进算力、服务国家重大应用场景的区块链与隐私计算算力基础设施。
【关键词】区块链;隐私计算;
【文献类型】 新闻
【发表时间】2023-03-23
【作者】 袁俊宇;
【作者单位】中南财经政法大学法学院;
【文献来源】当代法学
【复合影响因子】
【综合影响因子】
【主题类别】
区块链治理-法律治理-数字货币监管
【摘要】数字人民币运营机构泄露用户个人信息,以及个人信息处理过程中所面临的信息窃取风险引发了学界对用户个人信息权益保护的争论。数字人民币运营机构负有保护用户个人信息权益的义务,具体包括信息风险的消除、控制、预防三种类型,其法定化则可借由“危险源监控”型安全保障义务而实现。信息风险应采用动态模式加以消解,以衡平用户个人信息安全保障与共享利用。安全保障义务的归入标准与择出机制可借助场景分析与风险评估实现。在责任承担上,应以过错程度区分侵权人的连带责任与补充责任,并限定向第三人追偿的前提与比例,达致数字人民币运营机构与用户之间利益的最大化。
【关键词】数字人民币运营机构;;安全保障义务;;个人信息;;利益衡平
【文献类型】 观点阐述
【发表时间】2023-03-23
【作者】 陆亮亮;刘志阳;刘建一;殷伟;
【作者单位】上海财经大学商学院;上海财经大学中国社会创业研究中心;华东理工大学科学技术发展研究院;
【文献来源】外国经济与管理
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-虚拟经济-元宇宙
【摘要】元宇宙创业是以新一代信息技术集成应用为基础,由计算力、想象力、场景力并行驱动的虚实相生价值创造和占有的新型创业活动。与传统创业和数字创业相比,元宇宙创业具有主体无定形、机会自致性、资源多池化、组织DAO形态以及产出相生性等核心特征。已有的创业理论无法完整解释元宇宙创业的复杂多变和虚实互动现象。本文综合运用身份建构理论、技术具身理论、模拟移情理论和涌现理论,对元宇宙创业进行了初步阐述,在此基础上尝试构建了以虚实相生为核心的元宇宙创业理论框架。该框架认为,元宇宙创业是由个体、技术、场景等前因变量驱动,在对虚拟世界与现实世界的机会和资源的配置中实现价值创造的过程。未来的元宇宙创业研究需要在虚实相生新范式下加强对元宇宙创业的主体身份、技术具身、过程沉浸、系统涌现等方面的研究。作为创业领域的前沿探索,本文填补了已有创业研究的理论缺口,对于推动更广泛的元宇宙创业实践也具有重要的借鉴价值。
【关键词】元宇宙创业;;数字创业;;研究框架;;虚实相生
【文献类型】 观点阐述
【发表时间】2023-03-23
【作者】 王倞;白长虹;妥艳媜;于超;
【作者单位】南开大学旅游与服务学院;南开大学商学院;
【文献来源】外国经济与管理
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-虚拟经济-元宇宙
【摘要】元宇宙创新企业场景的战略窗口期已经形成,但其过程机制仍有待探索。本研究立足企业数字创新情境,基于服务主导逻辑理论,从人—货—场交互的角度出发,归纳迪士尼和米哈游案例企业在旅游与游戏领域的实践智慧,探讨元宇宙创新企业场景的过程机制。研究发现:第一,元宇宙创新企业场景的过程中存在虚实融合的“场”构成要素,现实场景的构成要素具体表现为聚合型环境、塑造型人物、联动型事件,虚拟场景的构成要素具体表现为开放型环境、整合型人物、触发型事件。第二,现实场景与虚拟场景要素的融合过程呈现出要素聚焦特征,虚拟场景与现实场景要素的融合过程呈现出要素发散特征,元宇宙构建“场”要素过程的不同特征决定了人—货—场交互逻辑的不同。第三,元宇宙创新企业场景的两种人—货—场交互逻辑分别是引导式交互、探索式交互,企业在场景创新过程中承担着重要角色。本文丰富了场景理论、服务主导逻辑理论和数字创新研究,为元宇宙背景下企业创新创业的过程理论与实践提供了参考。
【关键词】元宇宙;;企业场景创新;;服务主导逻辑;;案例研究
【文献类型】 实证数据
【发表时间】2023-03-23