﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jstpi-1405022920</doi_batch_id><timestamp>14050229203023</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title> Roshd -e- Fanavari</full_title><abbrev_title>jstpi</abbrev_title><issn media_type="electronic">1735-5486</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><journal_volume><volume>19</volume></journal_volume><issue>76</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A study of the nature of private data in the performance mechanism of IoT technology tools</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>hosein</given_name><surname>sadeghi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahdi </given_name><surname>Naser </surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>33</first_page><last_page>41</last_page></pages><doi_data><doi>10.61186/jstpi.20927.19.76.33</doi><resource>http://roshdefanavari.ir/fa/Article/20927</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/20927</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/20927</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/20927</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/20927</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/20927</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/20927</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/20927</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>1-	فرحزادی، علی اکبر، ناصر، مهدی، سازوکار جبران جمعی خسارات ناشی از نقض قواعد امنیتی آیین‌نامۀ عمومی حفاظت از اطلاعات اتحادیۀ اروپا و امکان ‌سنجی اجرای آن در حقوق ایران، دو فصلنامه حقوق خصوصی، دوره 16، شماره 2،صص 413-433، 1398</unstructured_citation></citation><citation key="ref2"><unstructured_citation>2-	Lachlan Urquhart, Tom Lodge, Andy Crabtree, Demonstrably doing accountability in the Internet of Things,International Journal of Law and Information Technology,Volume27, Issue1, pp 1-33, 2019</unstructured_citation></citation><citation key="ref3"><unstructured_citation>3-	Wagner Julian, The transfer of personal data to third countries under the GDPR: when does a recipient country provide an adequate level of protection?,International Data Privacy Law, online Edition:https://academic.oup.com › advance-article-pdf › doi › idpl › ipy008 › ipy008, 2019</unstructured_citation></citation><citation key="ref4"><unstructured_citation>4-	Finck Mich&amp;#232;le,Pallas Frank, &amp;#187;They who must not be identified—distinguishing personal from non-personal data under the GDPR&amp;#171;,International Data Privacy Law,Volume10,Issue1,February,pp11–36, 2020</unstructured_citation></citation><citation key="ref5"><unstructured_citation>5-	Ryngaert C &amp;amp;van Eijk N, &amp;#187;International cooperation by (European) security and intelligence services: reviewing the creation of a joint database in light of data protection guarantees&amp;#171;,International Data Privacy Law,Volume9,Issue1,February,pp61–73, 2019</unstructured_citation></citation><citation key="ref6"><unstructured_citation>6-	Altman, Micah &amp;amp;Etc,&amp;#187;Practical approaches to big data privacy over time&amp;#171;, International Data Privacy Law,Volume8,Issue1,February,pp29–51, 2018</unstructured_citation></citation><citation key="ref7"><unstructured_citation>7-	van der Sloot, Bart, ‘Do Privacy and Data Protection Rules Apply to Legal Persons and Should They? A Proposal for a Two-tiered System’, 31 Computer Law and Security Review, Volume 13, Issue 8, pp 18-34, 2017</unstructured_citation></citation><citation key="ref8"><unstructured_citation>8-	European Commission, The Article 29 Working Party Ceased to Exist as of 25 May 2018, https://ec.europa.eu/newsroom/article29/item detail. Cfm ? item  id=629492, (accessed 13 Nov2019)</unstructured_citation></citation><citation key="ref9"><unstructured_citation>9-	Data Protection Commission, ‘Guidance on Anonymisation and Pseudonymisation’  https://www.dataprotection.ie/sites/ default/ﬁles/uploads/2019-06/190614%20Anonymisation%20and% 20Pseudonymisation.pdf , (accessed 9 January 2020)</unstructured_citation></citation><citation key="ref10"><unstructured_citation>10-	European Commission, Communication from the Commission to the European Parliament and the Council, Exchanging and Protecting Personal Data in a GlobalisedWorld,online Edition: https://ec.europa.eu › newsroom › document, ,(accessed 12 May 2020)</unstructured_citation></citation><citation key="ref11"><unstructured_citation>11-	Deliberation of the Restricted Committee SAN-2019-001, pronouncing a financial sanction against GOOGLE LLC, ONLINE Edition available at: http//:www.cnil.fr, ,(accessed 12 May 2020)</unstructured_citation></citation><citation key="ref12"><unstructured_citation>12-	E. Blythe Stephen, &amp;#187;Hungary&amp;#39;s Electronic Signature Act: Enhancing Economic Development with Secure Electronic Commerce Transactions&amp;#171;, School of Management, New York Institute of Technology, USA, Volume8,Issue3,Automn, pp 47-58, 2007</unstructured_citation></citation><citation key="ref13"><unstructured_citation>13-	Levy, Karen E. C., Book-Smart, Not Street-Smart: Blockchain-Based Smart Contracts and The Social Workings of Law, online Edition available at: www.SSRN.com, pp 1-11, 2017</unstructured_citation></citation><citation key="ref14"><unstructured_citation>14-	O’Shields Reggie, Smart Contracts: Legal Agreements for the Blockchain, North Carolina Banking Institute,volume21, Issue 4, pp 1-13, 2017</unstructured_citation></citation><citation key="ref15"><unstructured_citation>15-	Kuan Hon, ‘The Problem of “Personal Data” in Cloud Computing: What Information Is Regulated? - The Cloud of Unknowing’ 1 International Data Privacy Law, Volume3, Issue2, March, pp11–36, 2017</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Supervision System on Organic Products Supply Chain Based on Blockchain Technology</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>FERESHTEHAZADI</given_name><surname>PARAND</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>َAli</given_name><surname>TAVAKOLIGOLPAYGANI</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Negin</given_name><surname>Ghaderi</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>52</first_page><last_page>59</last_page></pages><doi_data><doi>10.61186/jstpi.32595.19.76.52</doi><resource>http://roshdefanavari.ir/fa/Article/32595</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/32595</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/32595</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/32595</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/32595</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/32595</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/32595</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/32595</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>1.	Azzurra, A. Massimiliano, M. Angela, (2019). Measuring sustainable food consumption: A case study on organic food. Sustainable Production and Consumption, 17, 95–107.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>

2.	Codex GL 32: 2013, Guidelines for the production, processing, labeling and marketing of organically produced foods.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
۳. استاندارد ملی ایران به شماره ۱۱۰۰۰:۱۳۹۹ تحت عنوان استاندارد ( الزامات توليد، فرآوري، بازرسي و صدورگواهي، برچسب گذاري و بازار رساني مواد غذايي ارگانيك (زيستي)).</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
4.	R. Bierbaum, S. Leonard, D. Rejeski, C. Whaley, R. Barra, C. Libre, Novel entities and technologies: environmental benefits and risks, Environ. Sci. Pol. 105 (2020) 134–143.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>

5.	Ganne, E. 2018. Can blockchain revolutionize international trade? In: WTO [online]. Available: www.wto.org/english/res_e/publications_e/blockchainrev18_e.htm</unstructured_citation></citation><citation key="ref6"><unstructured_citation>

6.	 PricewaterhouseCoopers (PwC). 2019. Blockchain is here. What’s your next move. In: PwC [online]. Available: www.pwc.com/blockchainsurvey</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
	
7.	Ethereum. 2020. What is Ethereum. In: Ethereum [online]. Available at: https://ethereum.org/what-is-ethereum/</unstructured_citation></citation><citation key="ref8"><unstructured_citation>

8.	Wang, Y., Singgih, M., Wang, J., &amp; Rit, M. (2019). Making sense of blockchain technology: How will it transform supply chains? International Journal of Production Economics, 211, 221–236.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>

9.	Azzi, R., Chamoun, R. K., &amp; Sokhn, M. (2019). The power of a blockchain-based supply chain. Computers &amp; Industrial Engineering, 135, 582–592.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>

10.	Hawlitschek, F., Notheisen, B., &amp; Teubner, T. (2018). The limits of trust-free systems: A literature review on blockchain technology and trust in the@@ sharing economy. Electronic Commerce Research and Applications, 29, 50–63. https://doi.org/10.1016/j. elerap.2018.03.005.
</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
11.	Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., &amp; Zhang, Y. (2017). Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3690–3700.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>

12.	Sikorski, J. J., Haughton, J., &amp; Kraft, M. (2017). Blockchain technology in the chemical industry: Machine-to-machine electricity market. Applied Energy, 195, 234–246.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>

13.	Tian, F. (2016). An agri-food supply chain traceability system for China based on RFID and blockchain technology. International Conference on Service Systems and Service Management, 1–6.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
14.	Ahmed, S., &amp; Broek, N. T. (2017). Food supply: Blockchain could boost food security. Nature, 550(7674), 43.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>

15.	Lu, Q., &amp; Xu, X. (2017). Adaptable blockchain-based systems: A case study for product traceability. IEEE Software, 34(6), 21–27.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>

16.	Tönnissen, S., &amp; Teuteberg, F. (2019). Analysing the impact of blockchain-technology for operations and supply chain management: An explanatory model drawn from multiple case studies. International Journal of Information Management. https://doi.org/ 10.1016/j.ijinfomgt.2019.05.009.
</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
17.	Behnke, K., &amp; Janssen, M. F. W. H. A. (2019). Boundary conditions for traceability in food supply chains using blockchain technology. International Journal of Information Management. https://doi.org/10.1016/j.ijinfomgt.2019.05.025.
</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
18.	Saberi, S., Kouhizadeh, M., Sarkis, J., &amp; Shen, L. (2019). Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research, 57(7), 2117–2135.

19.	Pan, X., Pan, X., Song, M., Ai, B., &amp; Ming, Y. (2019). Blockchain technology and enterprise operational capabilities: An empirical test. International Journal of Information Management. https://doi.org/10.1016/j.ijinfomgt.2019.05.002.
</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
20.	FAO &amp; International Telecommunication Union (ITU). 2019. E-agriculture in action: Blockchain for agriculture. Opportunity and challenges. Bangkok. 67 pp. Available at www.fao.org/3/CA2906EN/ca2906en.pdf.
</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
21.	FAO &amp; World Health Organization (WHO). 2017. It’s time for fixed definitions for food fraud and food integrity. In: Codex Alimentarius [online].Rome. Available at www.fao.org/faowho-codexalimentarius/news-and-events/news-details/en/c/897028/
</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
22.	Wolfert, S., Ge, L., Verdouw, C., &amp; Bogaardt, M.-J. (2017). Big data in smart farming – A review. Agricultural Systems, 153, 69–80.</unstructured_citation></citation><citation key="ref22"><unstructured_citation> https://doi.org/10.1016/j. agsy.2017.01.023.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>

23.	Aung, M. M., &amp; Chang, Y. S. (2014). Traceability in a food supply chain: Safety and quality perspectives. Food Control, 39, 172–184.


24.	Olsen, P. &amp; Borit, M. 2013. How to define traceability. Trends in Food Science &amp; Technology, 29(2): 142–150. 
</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
25.	Tzounis, A., Katsoulas, N., Bartzanas, T., &amp; Kittas, C. (2017). Internet of things in agriculture, recent advances and future challenges. Biosystems Engineering, 164, 31–48.

26.	Reyna, A., Martín, C., Chen, J., Soler, E., &amp; Díaz, M. (2018). On blockchain and its integration with iot. challenges and opportunities. Future Generation Computer Systems, 88, 173–190. 
</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Designing a model based on blockchain technology to strengthen cyber security in the banking industry</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>hossein</given_name><surname>amoozadkhalili</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>neda</given_name><surname>haghi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Reza</given_name><surname>Tavakkoli-Moghaddam</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>60</first_page><last_page>70</last_page></pages><doi_data><doi>10.61186/jstpi.33168.19.76.60</doi><resource>http://roshdefanavari.ir/fa/Article/33168</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/33168</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/33168</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/33168</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/33168</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/33168</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/33168</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/33168</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1].	آهني جان، سارا،  صدوقي وش، مسعود. مطالعه و بررسي راهکارهاي تامين امنيت در فن آوري بلاکچين، چهارمين کنفرانس ملي دانش و فناوري مهندسي برق کامپيوتر و مکانيک ايران، 1399.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2].	بازيار، مصطفي. بررسي رابطه بين اکوسيستم کسب وکاري ديجيتال و فناوري بلاکچين (بررسي موردي بلاکچين مجوزدار هايپرلجر)، دومين کنفرانس بين المللي و ملي مطالعات مديريت، حسابداري و حقوق، 1399.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3].	فقيه نيا، محمدعلي، رهسپارفرد، خيراله،  فرجامي، يعقوب. امن سازي شبکه نامتمرکز اشياء با بلاکچين (مطالعه موردي: خانه هوشمند)، سومين کنفرانس بين المللي فناوري هاي نوآورانه در زمينه علوم، مهندسي و تکنولوژي، 1399.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4].	قمري، فاطمه، شيدائيان، حامد. بکارگيري فناوري بلاکچين و اينترنت اشياء در شهر هوشمند، چهارمين کنفرانس ملي دانش و فناوري مهندسي برق کامپيوتر و مکانيک ايران،1399.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5].	زاهدي، فاطمه، ظروفي، محسن، ورمزيار، علي. بررسي معماري هاي مبتني بر بلاکچين و اينترنت اشيا / مشکلات و موانع و روش هاي رفع آن،  نخستين کنفرانس بين المللي شهر هوشمند چالش ها و راهبردها، 1398.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6].	بختياري، سعيد، کشميري، اميرحسين. بررسي فناوري بلاکچين در بهبود امنيت اينترنت اشياء،  ششمين کنگره بين المللي توسعه و ترويج علوم و فنون بنيادين در جامعه، 1397.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7].	نيک زاد خسمخي، بابک، پورنصيررودبنه، مريم، خدادادحسيني، سيدحميد. ارائه يک مدل براي تامين امنيت مبتني بر بلاکچين در بانکداري ديجيتالي (مطالعه موردي: بانک ملي ايران)، پنجمين کنفرانس ملي مهندسي کامپيوتر و بلاک چين ايران، 1399.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8].	Xu, Z., Wang, Q., Wang, Z., Liu, D., Xiang, Y., &amp; Wen, S. PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain. In Proceedings of the Australasian Computer Science Week Multiconference , 2020, (pp. 1-8).</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9].	Osmani, M., El-Haddadeh, R., Hindi, N., Janssen, M., &amp; Weerakkody, V. Blockchain for next generation services in banking and finance: cost, benefit, risk and opportunity analysis. Journal of Enterprise Information Management.2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10].	Rajnak, V., &amp; Puschmann, T. The impact of blockchain on business models in banking. Information Systems and e-Business Management, 2020. 1-53.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11].	Garg, P., Gupta, B., Chauhan, A. K., Sivarajah, U., Gupta, S., &amp; Modgil, S. Measuring the perceived benefits of implementing blockchain technology in the banking sector. Technological Forecasting and Social Change, 120407. 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12].	Wang, H., Ma, S., Dai, H. N., &amp; Imran, M. Blockchain-based data privacy management with nudge theory in open banking. Future Generation Computer Systems,110, 2020, 812-823.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13].	Naik, V., Pejawar, R., Singh, R., Aher, A., &amp; Kanchan, S. Expeditious banking using Blockchain Technology. International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE), 2020, (pp. 1-6). IEEE.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14].	Avasthi, A. A. Online Economy on the Move: The Future of Blockchain in the Modern Banking System. In International Conference on Innovative Computing and Communications , 2020, (pp. 129-145). Springer, Singapore</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15].	Anwar, S., &amp; Yadav, A. Framework for Banking &amp; Financial Sector Through Artificial Intelligence and Blockchain Technology. (In respect to Middle East). Solid State Technology, 63(6), 2020,6321-6328.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Introducing robotic process automation as the connection point of Internet of everything with artificial intelligence projects </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Seyed Omid</given_name><surname>Azarkasb</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Hossein</given_name><surname>Khasteh</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>42</first_page><last_page>51</last_page></pages><doi_data><doi>10.61186/jstpi.34055.19.76.42</doi><resource>http://roshdefanavari.ir/fa/Article/34055</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/34055</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/34055</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/34055</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/34055</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/34055</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/34055</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/34055</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	ستاد اقتصاد دیجیتال و هوشمندسازی معاونت علمی و فناوری ریاست جمهوری، "قطب نمای اقتصاد دیجیتال 2020"، شرکت فناوری و نوآوری هوشمند سایان، سایاتک، مترجمین:  مهدی محمدی و امیر شریفیان، 1400.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	مجله برخط ایران دی ان ان، "عنوان موضوع: اتوماسیون فرایند رباتیک چیست؟ RPA چه تفاوتی با BPMS دارد؟"، آدرس سایت: https://www.irandnn.ir/mag، 1399.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	چارگون، "عنوان موضوع: اتوماسیون فرایند رباتیک چیست؟"، آدرس سایت: https://www.chargoon.com ، 1399.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	پل‌وینو، " هوش مصنوعی - نقش RPA و IPA در بهبود فرایندها و تحول در بانکداری"، آدرس سایت: http://polwinno.ir، 1400.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Sergey, M., S. Nikolay, E.sergery, “Cyber Security Concept for Internet of Everything (IoE)”, IEEE Systems of Signal Synchronization, Generating and Processing in Telecommunications, Kazan, Russia, 2017. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	HFS Research, “Bridging Digital Transformations through RPA”, https://www.hfsresearch.com, 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	FREEDOM and SAFETY, “This is The Internet of Everything”,https://freedomandsafety.com/en/file/ioepng, Site Visited: 2021.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	V.C. Farias da Costa, L. Oliveria, J. de Souza, " Internet of Everything (IoE) Taxonomies: A Survey and a Novel Knowledge-Based Taxonomy", Sensors, Vol. 21, No. 2, pp. 1-35, 2021.  </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Langleya, D.J, J. V. Doorn, I.C.L. Ng, S. Stieglitz, A. Lazovik,  A. Boonstra, “The Internet of Everything: Smart Things and Their Impact on Business Models”, ElSEVIER, Journal of Business Research, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Madakam, R.M. Holmuke, D.K. Jaiswal, "The Future Digital Work Force: Robotic Process Automation (RPA)", Journal of Information Systems and Technology Management, Vol. 16, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	ABBYY, “Automation Anywhere”, https://www.abbyy.com.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	GSAS, “Tractica: the Global Revenue of AI Software Will Reach 126 Billion US Dollars in 2025, Focusing on Consumer, Financial Services and Other Applications”, https://www.gsas.edu.hk, 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	LearnBonds, “Global AI Software Market to Grow Five Times and Reach $126bn Value by 2025”, https://learnbonds.com, 2020.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Atlanticcouncil, https://www.atlanticcouncil.org.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Effects of Blockchain Technology on the Accounting and Auditing profession</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Payam</given_name><surname>Noori Doabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>ghodratollah</given_name><surname>taleb nia</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>25</first_page><last_page>32</last_page></pages><doi_data><doi>10.61186/jstpi.34218.19.76.25</doi><resource>http://roshdefanavari.ir/fa/Article/34218</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/34218</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/34218</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/34218</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/34218</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/34218</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/34218</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/34218</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>1.	Abad-Segura, Emilio; Infante-Moro, Alfonso; González-Zamar, Mariana-Daniela; López-Meneses, Eloy. (2021). Blockchain Technology for Secure Accounting Management: Research Trends Analysis, Mathematics, 9 (14), 1631.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
2.	Alina Olaru, Elena. (2021). the Impact of Blockchain on the Accounting Profession, CECCAR BUSINESS REVIEW, No 4.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
3.	ALSaqa, Zeyad Hashim; Hussein, Ali Ibrahim; and Mahmood, Saddam Mohammed. (2019). the Impact of Blockchain on Accounting Information Systems, Journal of Information Technology Management, Vol. 11, No. 3.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
4.	Coyne, J.G. and McMickle, P.L. (2017), Can blockchains serve an accounting purpose, Journal of Emerging Technologies in Accounting, Vol. 14 No. 2, PP. 101-111.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
5.	Dutta, Saurav K. (2020). The Definitive Guide to Blockchain for Accounting and Business, Emerald Publishing Limited, UK.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
6.	Fullana, Olga and Ruiz, Javier. (2019). accounting information systems in the blockchain era.Available at SSRN: https://ssrn.com/abstract=3517142.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
7.	Garanina, Tatiana and Et al. (2021). Blockchain in accounting research: current trends and emerging topics. Accounting, Auditing &amp; Accountability Journal, Emerald Publishing Limited.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
8.	Ibañez, Juan Ignacio and Bayer, Chris N. and Tasca, Paolo and Xu, Jiahua, (2020). REA, Triple-Entry Accounting and Blockchain: Converging Paths to Shared Ledger Systems. At SSRN: https://ssrn.com/abstract=3602207 </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
9.	Pascual Pedreño, Eladio; Gelashvili, Vera; Pascual Nebreda, Laura. (2021). Blockchain and its application to accounting, Intangible Capital, Vol 17, No 1.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
10.	Quade, Ryan A. (2021). Blockchain: The Transformation of Accounting, Vol 4, Issue 2.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Role of IoT Technology Features in Perceived Value Creation, Intention to Advertise and Continue to Receive Customer Services at Sepah Bank</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Yaser</given_name><surname>Ghasemi Nezhad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>hamidreza</given_name><surname>fallah lajimi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Sheikhol-Islami Tonekaboni</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>71</first_page><last_page>78</last_page></pages><doi_data><doi>10.61186/jstpi.34236.19.76.71</doi><resource>http://roshdefanavari.ir/fa/Article/34236</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/34236</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/34236</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/34236</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/34236</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/34236</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/34236</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/34236</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>
[1] محمد شفیعی، مجید؛‌‌ هادی. تیموری و شیوا. دلیلی. فناوري اطلاعات در نظام بانکی: کیفیت خدمات بانکداري الکترونیک و وفاداري مشتري (مطالعه مشتریان بانک ملی اصفهان). مجله نوآوری در مدیریت سیستم و فناوری با رویکرد هوشمندسازی کسب و کار. دانشگاه الزهرا. 1394. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] آشنا، علی و کسری. زمانی. (۱۳۹۸). چهارچوبی برای بررسی برنامه‌‌های اینترنت اشیاء در مدل‌‌های کسب و کار، پنجمین کنفرانس دستاوردهای نوین و به روز در علوم مهندسی و فناوری‌‌های جدید، رشت، سازمان بسیج مهندسی صنعتی استان گیلان.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] صباغ زاده، فرزانه؛ نرگس. بازیان و محبوبه مهرانفر. اینترنت اشیاء و کاربرد آن در بانکداری، هفتمین کنفرانس ملی کاربردهای حسابداری و مدیریت، تهران، گروه ارتباط طلایی آسیا. 1397.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] ملکی، علیرضا. بررسی مدیریت زنجیره تأمین الکترونیکی به کمک استانداردهای GS1 در صنعت خرده‌ فروشی. نشریه مرکز ملی شماره گذاری کالا و خدمات ایران. 1397.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] نوری شمس آباد، محمود. کاربرد‌‌های اینترنت اشیاء در خدمات بانکی. مجله مشاوره مدیریت کسب و کار، توسعه تجاره دلیران دنا. 1398.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] حسینی، میرزا حسین و سمیه. قادری. مدل عوامل مؤثر بر کیفیت خدمات بانکی، چشم انداز مدیریت بازرگانی، شماره3 (36). صص 89-115، 1389.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] اولریش، دیو و بروک بانک، وین. طرح ارزش‌آفرینی منابع انسانی. ترجمۀ مسعود بینش، افشین دبیری، رضا قرائی‌پور. ناشر: تهران : آهار: مؤسسه عالی پژوهش تامین اجتماعی، 1385.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] رهنمای رودپشتی، فریدون و اکبر. افتخاری علی آبادی. تدوین استراتژی با رویکرد ارزش آفرینی در موسسات مالی. مجله مهندسی مالی و مدیریتی پرتقوی. شماره چهارم. 1389.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] زاهدیان نژاد، محمود؛ علیرضا. حسن زاده و علی. شایان. چارچوب مرجع پیاده سازی اینترنت اشیاء در بانکداری، شانزدهمین کنفرانس بین المللی مدیریت (علمی-پژوهشی)، تهران، دانشگاه الزهرا(س). ۱۳۹۸.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] کارگرشریف آباد، محمد؛ محسن گرامی‌و احمدعلی یزدان پناه. شناسایی فاکتورهای موثر در پذیرش اینترنت اشیاء از دیدگاه کاربران با استفاده از مدل تکمیلی TAM ارایه شده در مدل گایو و بای. مورد مطالعه: مشتریان شرکت ارتباطات سیار ایران همراهاول، فصلنامه رشد فناوری 15 (58). ۱۳۹۸.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] رضائی نور، جلال و مجتبی. مشایخی. بررسی تاثیر اینترنت اشیاء بر عملکرد سازمانی با در نظر گرفتن نقش واسطه اي خلق دانش مورد مطالعه (بانک مهر اقتصاد استان تهران). مجله مدیریت  و اطلاعات. سال چهارم، شماره دوم (11). 1397.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] موسوی، سید علیرضا. ارائه مدل ارزش آفرینی در صنعت خدمات بانکداری (مطالعه موردی: بانک ملی استان فارس). مجله مدیریت بازاریابی. شماره 37. 1397.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] زمانی، محمود؛ رضا. قورچی بیگی و روح اله قاسمی‌. شناسایی الزامات و کاربردهای اینترنت اشیاء در صنعت بانکداری بر اساس تجارب بین المللی، هفتمین همایش ملی بانکداری الکترونیک و نظام‌‌های پرداخت، تهران، پژوهشکده پولی و بانکی. ۱۳۹۶.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] پاشوی، قاسم؛ جواد. امانی؛ میر محمدحسین. عباسزاده و هیمن. خضری آذر. مقدمه ای بر معادلات ساختاری به روش  PLSو کاربرد آن در علوم رفتاری. ناشر دانشگاه ارومیه، 266 ، 1393.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Gautier, P. " Customer relationship management"(CRM) in the Internet of Things. By Philippe GAUTIER on Friday 23 September 2011, 12-31- Web 3.0 / Internet of Things / Internet des Objets – Permalink, 2011. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Singh, C., Pattanayak, D., Dixit, D., Antony, K., Agarwala, M., Kant, R., ... &amp; Mathur, V. Frauds in the Indian banking industry. IIM Bangalore Research Paper, (505)., 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Daunt, K. L., and Harris, L. C. Consumer showrooming: Value co-destruction. Journal of Retailing and Consumer Services, 38(May), 166–176, 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] Madakam, S., Ramaswamy, R., &amp; Tripathi, S. Internet of Things (IoT): A literature review. Journal of Computer and Communications, 3(05), 164, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., &amp; Ayyash, M. Internet of things: A survey on enabling </unstructured_citation></citation><citation key="ref20"><unstructured_citation>technologies, protocols, and applications. IEEE communications surveys &amp; tutorials, 17(4), 2347-2376, 2015.
[20] Costa, K. A. P., Munoz, R., Albuquerque, V. H. C. De, Papa, P., Lisboa, C. O., Munoz, R., &amp; Albuquerque, V. H. C. De. Internet of Things : A Survey on Machine AC PT. Computer Networks, 151, 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Madhani, P. M. Enhancing customer lifetime value in fast fashion retailing with RFID initiatives. International Journal of Business and Globalisation, 15(2), 205–237, 2015.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Ranjan, K. R., &amp; Read, S. Value co-creation: concept and measurement. Journal of the Academy of Marketing Science, 44(3), 290-315, 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Diène, Bassirou, et al. "Data management techniques for Internet of Things." Mechanical Systems and Signal Processing 138: 106564, 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Li, W., Antipolis, S., Tropea, G., Abid, A., Antipolis, S., &amp; Detti, A. Review of Standard Ontologies for the Web of Things. 2019 Global IoT Summit (GIoTS), 1–6, 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Bataev, A. V., Rodionov, D. G., &amp; Kosonogova, E. S. Evaluation of efficiency of using bank smart-card in Russian financial institutions. International Conference on Information Networking, 2018- Janua, 589–593, 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Saxena, S., &amp; Ali Said Mansour Al-Tamimi, T. Big data and Internet of Things (IoT) technologies in Omani banks: a case study. Foresight, 19(4), 409–420, 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Rimer, S. An IoT architecture for financial services in developing countries. 2017 IST-Africa Week Conference, IST-Africa 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Jacintha, V., Tamilarasu, S., &amp; Students, S. Y. An IOT Based ATM Surveillance System. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 1–6, 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] Balaji, M. S., &amp; Roy, S. K. Value co-creation with Internet of things technology in the retail industry.Journal of Marketing Management,33(1-2),7-31, 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] Nataliia, L., &amp; Elena, F. Internet of things as a symbolic resource of power. Procedia-Social and Behavioral Sciences, 166, 521-525, 2016.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] Dineshreddy, V., &amp; Gangadharan, G. R. Towards an Internet of Things framework for financial services sector. 3rd International Conference on Recent Advances in Information Technology, RAIT, 177–181, 2016.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] Hoffman, D. L., &amp; Novak, T. P. Emergent experience and the connected consumer in the smart home assemblage and the Internet of things. The Center for the Connected Consumer; The George Washington University School of Business, 2015.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] Moon, H., Park, J., &amp; Kim, S. The importance of an innovative product design on customer behaviour: Development and validation of a scale. Journal of Product Innovation Management, 32(2), 224–232, 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] Molina-Castillo, F.-J., Lopez-Nicolas, C., &amp; Soto-Acosta, P. Interaction effects of media and message on perceived complexity, risk and trust of innovative products. European Management Journal, 30(6), 577–587, 2012.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improve security in cloud computing infrastructure using block chain protocol</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohsen</given_name><surname>Gerami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Vahid</given_name><surname>Yazdanian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Siavash</given_name><surname>Naebasl</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>1</first_page><last_page>13</last_page></pages><doi_data><doi>10.61186/jstpi.34504.19.76.1</doi><resource>http://roshdefanavari.ir/fa/Article/34504</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/34504</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/34504</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/34504</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/34504</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/34504</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/34504</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/34504</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>
1-	قمری، مسعود و فروغی، سعید و خواجه، هادی،1398،مدل پیشنهادی جهت امنیت اینترنت اشیاء و رایانش ابری با استفاده از الگوریتم AES و RSA،پنجمین همایش بین المللی علوم و تکنولوژی با رویکرد توسعه پایدار،شیراز،https://civilica.com/doc/967361</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
2-	فیروزبخت، محسن و کاظمی، زیبا،1395،ارائه یک الگوریتم کارا جهت احراز هویت کاربران در رایانش ابری،اولین کنفرانس بین المللی چشم انداز های نو در مهندسی برق و کامپیوتر،تهران،https://civilica.com/doc/555536</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
3-	حاج صمدی ورنوسفادرانی، حمیدرضا و تاجفر، امیرهوشنگ،1400،استفاده از فناوری بلاک چین برای بالابردن امنیت درداده های ابری،دوازدهمین کنفرانس ملی علوم و مهندسی کامپیوتر و فناوری اطلاعات،بابل،https://civilica.com/doc/1224702</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
4-	جوزدانی، مریم و مظفری، سعید،1398،پذیرش بلاک چین به عنوان یک ضرورت در تجارت الکترونیک،https://civilica.com/doc/990998</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
5-	نیک فطرت، صدف و شیری، محمدابراهیم،1397،امنیت داده های ذخیره شده در ابر با استفاده از بهبود الگوریتم رمزنگاری متقارن،نهمین سمپوزیوم بین المللی پیشرفتهای علوم و تکنولوژی،مشهد،https://civilica.com/doc/841546</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
6-	Sunyaev, A. (2020). Cloud computing. In Internet computing (pp. 195-236). Springer, Cham.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
7-	De Donno, M., Tange, K., &amp; Dragoni, N. (2019). Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog. Ieee Access, 7, 150936-150948.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
8-	Pavithra, S., Ramya, S., &amp; Prathibha, S. (2019, February). A survey on cloud security issues and blockchain. In 2019 3rd International Conference on Computing and Communications Technologies (ICCCT) (pp. 136-140). IEEE. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
9-	Singh, H. P., Singh, R., &amp; Singh, V. (2020). Cloud Computing Security Issues, Challenges and Solutions (No. 2533). EasyChair. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
10-	Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., &amp; Sarkar, P. (2018, January). Cloud computing security challenges &amp; solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
11-	Lin, I. C., &amp; Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ Network Security, 19(5), 653-659. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
12-	Guo, S., Hu, X., Guo, S., Qiu, X., &amp; Qi, F. (2019). Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Transactions on Industrial Informatics. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
13-	Wang, J., Wu, L., Choo, K. K. R., &amp; He, D. (2019). Blockchain based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
14-	Casado-Vara, R., de la Prieta, F., Prieto, J., &amp; Corchado, J. M. (2018, November). Blockchain framework for IoT data quality via edge computing. In Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems (pp. 19-24). ACM. </unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
15-	Xu, X., Zhang, X., GAO, H., Xue, Y., Qi, L., &amp; Dou, W. (2019). Become: blockchain-enabled computation offloading for IOT in mobile edge computing. IEEE Transactions on Industrial Informatics. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
16-	Kang, J., Yu, R., Huang, X., Wu, M., Maharjan, S., Xie, S., &amp; Zhang, Y. (2018). Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things Journal. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
17-	Damianou, A., Angelopoulos, C. M., &amp; Katos, V. (2019, May). An Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities. In 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS) (pp. 465-472). IEEE.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
18-	Aldmour, R., Yousef, S., Baker, T., &amp; Benkhelifa, E. (2021). An approach for offloading in mobile cloud computing to optimize power consumption and processing time. Sustainable Computing: Informatics and Systems, 31, 100562. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
19-	GAO, Y., Guan, H., Qi, Z., Hou, Y., &amp; Liu, L. (2018). A multi-objective ant colony system algorithm for virtual machine placement in cloud computing. Journal of computer and system sciences, 79(8), 1230-1242. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
20-	Tiwari, H., &amp; Madhumala, R. B. (2021). A Review of Particle Swarm Optimization in Cloud Computing. Smart IoT for Research and Industry, 93-108. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
21-	Xu, X., Chen, Y., Yuan, Y., Huang, T., Zhang, X., &amp; Qi, L. (2019). Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimedia Tools and Applications, 1-26</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
22-	Roman, R., Lopez, J., &amp; Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Investigating the effect of perceived value on resistance to the adoption of blockchain technology in the tourism industry</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>yazdan</given_name><surname>shirmohamadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohadese</given_name><surname>kokabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyyed Mohammad Hadi</given_name><surname>Qazi Tabatabaei</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>1</day><year>2023</year></publication_date><pages><first_page>14</first_page><last_page>24</last_page></pages><doi_data><doi>10.61186/jstpi.41425.19.76.14</doi><resource>http://roshdefanavari.ir/fa/Article/41425</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://roshdefanavari.ir/fa/Article/Download/41425</resource></item><item crawler="google"><resource>http://roshdefanavari.ir/fa/Article/Download/41425</resource></item><item crawler="msn"><resource>http://roshdefanavari.ir/fa/Article/Download/41425</resource></item><item crawler="altavista"><resource>http://roshdefanavari.ir/fa/Article/Download/41425</resource></item><item crawler="yahoo"><resource>http://roshdefanavari.ir/fa/Article/Download/41425</resource></item><item crawler="scirus"><resource>http://roshdefanavari.ir/fa/Article/Download/41425</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://roshdefanavari.ir/fa/Article/Download/41425</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>1-	Walsh, Clara, Philip O’Reilly, Rob Gleasure, John McAvoy, and Kevin O’Leary. “Understanding Manager Resistance to Blockchain Systems.” European Management Journal 39, no. 3, 353–65, 2021.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>2-	Colombo, Edoardo, and Rodolfo Baggio. “Tourism Distribution Channels: Knowledge Requirements.” In Bridging Tourism Theory and Practice, edited by Noel Scott, Marcella De Martino, and Mathilda Van Niekerk, 8:289–301, 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>3-	Valeri, Marco, and Rodolfo Baggio. “A Critical Reflection on the Adoption of Blockchain in Tourism.” Information Technology &amp; Tourism 23, no. 2, 121–32, 2021. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>4-	Mougayar, William. The Business Blockchain: Promise, Practice, and Application of the next Internet Technology. Hoboken, New Jersey: John Wiley &amp; Sons, Inc, 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>5-	Gibson, Cyrus F. “IT-Enabled Business Change: An Approach to Understanding and Managing Risk.” SSRN Electronic Journal, 47-50, 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>6-	Khan, Kamran, and Kim Hyunwoo. “Factors Affecting Consumer Resistance to Innovation.” Master, JÖNKÖPING UNIVERSITY, 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>7-	Chen, Chien-fei, Xiaojing Xu, and Laura Arpan. “Between the Technology Acceptance Model and Sustainable Energy Technology Acceptance Model: Investigating Smart Meter Acceptance in the United States.” Energy Research &amp; Social Science 25, 93–104, 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>8-	Treiblmaier, Horst. “Blockchain and Tourism.” In Handbook of E-Tourism, edited by Zheng Xiang, Matthias Fuchs, Ulrike Gretzel, and Wolfram Höpken, 1–21, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>9-	Calvaresi, Davide, Maxine Leis, Alevtina Dubovitskaya, Roland Schegg, and Michael Schumacher. “Trust in Tourism via Blockchain Technology: Results from a Systematic Review.” In Information and Communication Technologies in Tourism 2019, edited by Juho Pesonen and Julia Neidhardt, 304–17, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>10-	Revfine. “How Blockchain Technology Is Transforming the Travel Industry,” 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>11-	Mendling, Jan, Ingo Weber, Wil Van Der Aalst, Jan Vom Brocke, Cristina Cabanillas, Florian Daniel, Søren Debois, et al. “Blockchains for Business Process Management - Challenges and Opportunities.” ACM Transactions on Management Information Systems 9, no. 1, 1–16, 2018.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>12-	Zeithaml, Valarie A. “Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence.” Journal of Marketing 52, no. 3, 2–22, 1988.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>13-	Adams, J. Stacy. “Towards an Understanding of Inequity.” The Journal of Abnormal and Social Psychology 67, no. 5, 422–36, 1963.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>14-	Liljander, Veronica, and Tore Strandvik. “Estimating Zones of Tolerance in Perceived Service Quality and Perceived Service Value.” International Journal of Service Industry Management 4, no. 2, 6–28, 1993.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>15-	Ulaga, Wolfgang, and Samir Chacour. “Measuring Customer-Perceived Value in Business Markets.” Industrial Marketing Management 30, no. 6, 525–40, 2001.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>16-	Rivière, Arnaud. “Towards a Model of the Perceived Value of Innovation: The Key Role of Perceived Benefits Ahead of the Adoption Process.” Recherche et Applications En Marketing (English Edition) 30, no. 1, 5–27, March 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>17-	Kim, Moon-Koo, Jeesun Oh, Jong-Hyun Park, and Changlim Joo. “Perceived Value and Adoption Intention for Electric Vehicles in Korea: Moderating Effects of Environmental Traits and Government Supports.” Energy 159, 799–809, 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>18-	Rosenberg, Nathan. “Factors Affecting the Diffusion of Technology.” Explorations in Economic History 10, no. 1, 3–33, 1972.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>19-	Rogers, Everett M. Diffusion of Innovations. 1st ed. NY: Free press, 1962.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>20-	Talwar, Shalini, Manish Talwar, Puneet Kaur, and Amandeep Dhir. “Consumers’ Resistance to Digital Innovations: A Systematic Review and Framework Development.” Australasian Marketing Journal 28, no. 4, 286–99, 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>21-	Kendall, Kenneth E. “The Significance of Information Systems Research on Emerging Technologies: Seven Information Technologies That Promise to Improve Managerial Effectiveness.” Decision Sciences 28, no. 4, 775–92, 1997.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>22-	Laumer, Sven. “Resistance to IT-Induced Change - Theoretical Foundation and Empirical Evidence.” Phd, University of Bamberg, 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>23-	Samhan, Bahae, and K.D. Joshi. “Understanding Electronic Health Records Resistance: A Revealed Causal Mapping Approach” 9, no. 2–3, 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>24-	Samhan, Bahae. “Revisiting Technology Resistance: Current Insights and Future Directions.” Australasian Journal of Information Systems 22, 24-32, 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>25-	Rogers, Everett M. Diffusion of Innovations. 1st ed. NY: Free press, 1962.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>26-	Fishbein, Martin, and Icek Ajzen. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley Series in Social Psychology. Reading, Mass: Addison-Wesley Pub. Co, 124-125, 1975.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>27-	Ajzen, Icek. “From Intentions to Actions: A Theory of Planned Behavior.” In Action Control, edited by Julius Kuhl and Jürgen Beckmann, 11–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>28-	Davis, Fred D. “A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results.” Massachusetts Institute of Technology, 25-26, 1986.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>29-	Venkatesh, Viswanath, and Fred D. Davis. “A Model of the Antecedents of Perceived Ease of Use: Development and Test.” Decision Sciences 27, no. 3, 451–81, 1996.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>30-	Venkatesh, Viswanath, and Fred D. Davis. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies.” Management Science 46, no. 2, 186–204, 2000.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>31-	Venkatesh, Morris, Davis, and Davis. “User Acceptance of Information Technology: Toward a Unified View.” MIS Quarterly 27, no. 3, 425, 2003.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>32-	Kim, Hee-Woong, Hock Chuan Chan, and Sumeet Gupta. “Value-Based Adoption of Mobile Internet: An Empirical Investigation.” Decision Support Systems 43, no. 1, 111–26, 2007.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>33-	Venkatesh, Viswanath, and Hillol Bala. “Technology Acceptance Model 3 and a Research Agenda on Interventions.” Decision Sciences 39, no. 2, 273–315, 2008.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>34-	Markus, M. Lynne. “Power, Politics, and MIS Implementation.” Communications of the ACM 26, no. 6, 430–44, 1983.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>35-	Klaus, Timothy Paul. “An Examination of User Resistance in Mandatory Adoption of Enterprise Systems.” Phd, University of South Florida, 2005.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>36-	Samuelson, William, and Richard Zeckhauser. “Status Quo Bias in Decision Making.” Journal of Risk and Uncertainty 1, no. 1, 7–59, 1988.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>37-	Joshi, Kailash. “A Model of Users’ Perspective on Change: The Case of Information Systems Technology Implementation.” MIS Quarterly 15, no. 2, 229, 1991.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>38-	Kim, Hee-Woong, and Atreyi Kankanhalli. “Investigating User Resistance to Information Systems Implementation: A Status Quo Bias Perspective.” MIS Quarterly 33, no. 3, 567, 2009.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>39-	Ajzen, Icek. “The Theory of Planned Behavior.” Organizational Behavior and Human Decision Processes 50, no. 2, 179–211, 1991.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>40-	Samuelson, William, and Richard Zeckhauser. “Status Quo Bias in Decision Making.” Journal of Risk and Uncertainty 1, no. 1, 7–59, 1988.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>41-	Joshi, Kailash. “A Model of Users’ Perspective on Change: The Case of Information Systems Technology Implementation.” MIS Quarterly 15, no. 2, 229, 1991.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>42-	Joshi, Kailash. “Understanding User Resistance and Acceptance during the Implementation of an Order Management System: A Case Study Using the Equity Implementation Model” Journal of Information Technology Case and Application Research 7, no. 1, 15, 2005.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>43-	Kim, Hee-Woong, and Atreyi Kankanhalli. “Investigating User Resistance to Information Systems Implementation: A Status Quo Bias Perspective.” MIS Quarterly 33, no. 3, 567, 2009.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>44-	Walsh, Clara, Philip O’Reilly, Rob Gleasure, John McAvoy, and Kevin O’Leary. “Understanding Manager Resistance to Blockchain Systems.” European Management Journal 39, no. 3, 353–65, 2021.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>45-	VanderStoep, Scott W., and Deirdre D. Johnston. Research Methods for Everyday Life: Blending Qualitative and Quantitative Approaches. 1st ed. Research Methods for the Social Sciences. San Francisco, CA: Jossey-Bass, 2009.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>46-	Astrachan, Claudia Binz, Vijay K. Patel, and Gabrielle Wanzenried. “A Comparative Study of CB-SEM and PLS-SEM for Theory Development in Family Firm Research.” Journal of Family Business Strategy 5, no. 1, 116–28 2014.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>47-	Hair, Joseph F, William C Black, Barry J Babin, and Rolph E Anderson. Multivariate Data Analysis. 8th ed. United Kingdom: Cengage Learning, EMEA, 234-240, 2019.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>48-	Hair, Joseph F, William C Black, Barry J Babin, and Rolph E Anderson. Multivariate Data Analysis. 8th ed. United Kingdom: Cengage Learning, EMEA, 234-240, 2019</unstructured_citation></citation><citation key="ref49"><unstructured_citation>49-	Hair, Joseph F., 2nd ed. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Second edition. Los Angeles: Sage, 2017. </unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>