2018
DOI: 10.21125/inted.2018.0453
|View full text |Cite
|
Sign up to set email alerts
|

Towards Safe-Bim Curricula Based on the Integration of Cybersecurity and Blockchains Features

Abstract: During the last decade, Qatar started an industry diversification strategy based on a knowledge-based economy for the next years. The ambition is to become a global "hub" in some key fields such as new technologies, finance, culture and sporting events. Such a diversification strategy requires massive investments, not only in physical and technical infrastructures, but also in the field of education. For instance, big projects based on the use of advanced new technologies such as BIM (Building Information Mode… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…In addition, data security is becoming more and more complex due to the differences between individuals interacting within a construction project and the development of the supply chain. The use of Blockchain technology can improve a project's Common Data Environment (CDE) with more secure management of activities resulting in full transparency of the project (Hammi and Bouras, 2018).…”
Section: Digital Twins Using Bim Datamentioning
confidence: 99%
“…In addition, data security is becoming more and more complex due to the differences between individuals interacting within a construction project and the development of the supply chain. The use of Blockchain technology can improve a project's Common Data Environment (CDE) with more secure management of activities resulting in full transparency of the project (Hammi and Bouras, 2018).…”
Section: Digital Twins Using Bim Datamentioning
confidence: 99%
“…In current usage, BIM uses a common data environment (CDE), which collects project information in a single repository to collect, manage, and distribute data for multidisciplinary teams [52]. All project members must therefore understand and comply with the cyber security rules [53].…”
Section: -2 Data Securitymentioning
confidence: 99%
“…Mutis and Paramashivam (2019) proposed the use of Cloud-BIM (building information model) to overcome the limitations and security vulnerabilities of the standalone BIM models, especially data breaches. Similarly, Hammi and Bouras (2018) identified the significance of cybersecurity implications of BIM and proposed the integration of BIM and blockchain in the university curriculum. Boyes (2015), on the other hand, examined the cyber-resilience issues of global supply chains considering the cybersecurity threat and vulnerability attributes.…”
Section: Cybersecurity Research In the Aec Industrymentioning
confidence: 99%