Sam Goundar

Sam Goundar
Multiple Universities · Information Technology

PhD
Research

About

173
Publications
2,113,789
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
987
Citations
Introduction
Professor Dr. Sam Goundar is an International Academic having taught at twelve different universities in ten different countries. He is the Editor-in-Chief of the International Journal of Blockchains and Cryptocurrencies (IJBC) - Inderscience Publishers, Editor-in-Chief of the International Journal of Fog Computing (IJFC) - IGI Publishers, Section Editor of the Journal of Education and Information Technologies and Editor-in-Chief (Emeritus) of the International Journal of Cloud Computing.
Additional affiliations
July 2014 - present
Victoria University of Wellington
Position
  • Lecturer
July 2012 - December 2013
United Nations University (UNU)
Position
  • Research Associate
July 2009 - June 2014
Bay of Plenty Polytechnic
Position
  • Lecturer

Publications

Publications (173)
Chapter
Zero Trust Architecture (ZTA) represents a paradigm shift in cloud security by challenging the outdated model of implicitly trusting internal networks. Instead of assuming trust based on network location, ZTA treats every access request—whether from inside or outside the network—as potentially malicious. This approach is crucial in cloud environmen...
Chapter
Metaverse and healthcare working together introduces a lot of attractive possibilities as well as challenges. On the positive side, the metaverse can make online doctor appointments more interesting and personal. It also enables the remote monitoring of patients thereby making healthcare more accessible. Training for doctors and nurses can improve...
Chapter
At present the world has moved to cyber space with latest technologies and different network systems. To protect the systems, files and data in a network cyber security play a key role in the digital world. The cyber security is most essential technology for protecting organization, financial and industry data securely from attackers to maintain se...
Chapter
The fusion of Federated Learning and Edge Computing has opened up new horizons for intelligent, secure, and efficient data processing. This chapter provides an in-depth exploration of “Federated Learning for Edge Intelligence.” It explores into the fusion of decentralized machine learning with edge devices, highlighting the important aspects of pri...
Chapter
Blockchain technology is expected to have on the one side of the coin a substantial impact on financial services design and delivery and a promising driver for the value creation logic on the other side. Over the last years, especially by means of startup business model taxonomies, researchers and practitioners tackled numerous topics and use cases...
Chapter
The last decade has seen a significant increase in the frequency and sophistication of cyber-attacks. As technology continues to advance and more and more sensitive information is stored and shared online, cyber criminals have found new and innovative ways to target individuals, businesses, and governments. In recent years, the number and severity...
Chapter
E-waste is an invisible, indirect waste that contaminates natural resources like the air, water, and soil, endangering the ecosystem, people, and animals. Long-term waste accumulation and contamination can harm the resources found in the environment. Since traditional waste management systems are very inefficient and the number of people living in...
Chapter
Brain tumor segmentation is a critical task in medical image analysis with applications in diagnosis, treatment planning, and patient monitoring. Deep learning models have shown remarkable success in automating this process. This research presents an investigation into the integration of dual attention mechanisms into prominent deep learning archit...
Chapter
Green computing can be described as efficient resource management in distributed computing environments such as cloud, fog, and edge computing environments. In green computing, green refers to the eco-friendly environment with environmental responsibility to efficiently manage the computing resources. Mainly, two significant reasons are associated...
Book
This is the model obtained in relation to the real system. And, based on this validation, a study and comparison of the various control techniques can be carried out via simulations, with the aim of identifying the best solution for the system. The proposal of the present work is to present a controller for the trail following vehicle based on a mo...
Chapter
This chapter has the major contribution towards the federated learning modules which are hosted to coordinate with client servers, to modify the design by shifting all with our future development, the modules from guest servers to hotel guest gadgets with more potent computational and storage capacities. Recently, IoT federated learning has used bl...
Chapter
In this chapter, we will review some of the Artificial Intelligence (A.I.) roadmaps to discuss the various implications of A.I. on the aviation sector and we will identify some high-level objectives to be met and the roadmap actions suggested to respond to the growth of Aviation in Vietnam after a comparison between Vietnam and other countries. In...
Chapter
The Internet of Things (IoT) enables Internet-connected devices to transmit data to private blockchain networks, allowing for the creation of tamper-resistant documents with shareable exchanges. IoT blockchain technology enables you to communicate and connect IoT data with key stakeholders, while avoiding the need for extensive management and contr...
Chapter
Crowdfunding refers to a way of raising funds from individuals and/or firms for business purposes. Conventionally, it is a manual process, in which, the collected fund is available with a single entity (firm or an individual). In such cases, it has been observed that the funds could be diverted elsewhere or misused. Online crowdfunding platform pow...
Chapter
In recent years, machine learning (ML) has become a hot topic of research and application. ML model and huge amount of data growth difficulties still follow ML development. With the lack of new data and constant training, published ML models may soon become obsolete; unscrupulous data contributors may upload incorrectly labelled data, leading to po...
Preprint
Full-text available
The rapid emergence of digital assets, underpinned by technological advancements such as blockchain, distributed ledger technology (DLT), and smart contracts, has triggered a paradigm shift in the global financial ecosystem. These digital assets, which encompass cryptocurrencies, tokenized securities, stablecoins, non-fungible tokens (NFTs), and ce...
Chapter
Smart healthcare lies in the technologies that enable physicians and care providers to cooperate in the best interest of the patients. The expansion of smart healthcare services raises relevant challenges to keep the patient at the heart of a cooperative, trusted, and datafied healthcare system. From the patient perspective, the purpose of this con...
Article
Full-text available
This research investigates how the uncertainty caused by the COVID-19 pandemic has affected digital banking usage in India. The study is made by utilizing a panel of data consisting of 108 firm-month observations during covid period from 2020 to 2022, with data mainly collected to analyze the impact of COVID-19 uncertainty. Most of the determinants...
Chapter
Detecting faces is a prevalent and substantial technology in current ages. It became interesting with the use of diverse masks and facial variations. The proposed method concentrates on detecting the facial regions in the digital images from real world which contains noisy, occluded faces and finally classification of images. Multi-task cascaded co...
Cover Page
Full-text available
Special Issue on IoT, Artificial Intelligence, and Data Analytics for Smart Environments https://lnkd.in/ezpAgMH2... The focus of this special issue is to publish new research outcomes that are furthering the level of current research or otherwise contributing to the overall comprehension of Internet of Things (IoT) related challenges like data an...
Article
Full-text available
Though consumers with vulnerabilities, such as visually impaired or blind and partially sighted people (BPSP), face several marketplace problems and challenges, existing literature provides limited guidance. The present study aims to examine the issues faced by BPSP in accessing financial services in Fiji. The study is grounded in the digital divid...
Chapter
With the continued advancement of blockchain technology and the growth of digital currency in recent years, various industries have engaged extensively in practices centered on the application of blockchain technology. The decentralization, safety, trustworthiness, and traceability features of the data collecting system offered by blockchain techno...
Article
Full-text available
The rapid emergence of digital assets, underpinned by technological advancements such as blockchain, distributed ledger technology (DLT), and smart contracts, has triggered a paradigm shift in the global financial ecosystem. These digital assets, which encompass cryptocurrencies, tokenized securities, stablecoins, non-fungible tokens (NFTs), and ce...
Article
Sentiment relevant information in the web pages concerning products, establishment, and commodities concentrates principally on the available textual contents. Research on crawling topic-relevant web pages is far behind compared to sentiment-relevant web pages despite the steep rise in sentiment-relevant information on the web. This paper resolves...
Article
COVID-19 data analysis and prediction from patient data repository collected from hospitals and health organizations. Users' credentials and personal information are at risk; it could be an unrecoverable issue worldwide. A Homomorphic identification of possible breaches could be more appropriate for minimizing the risk factors in preventing persona...
Chapter
The COVID-19 pandemic has had significant changes in all aspects of life having economic, social and physiological consequences that the healthcare sector is in the priority of agile changes for the surveillance of humanity and saving the life of people. The global collaboration is a very prominent necessity at this fight and the new technologies a...
Chapter
In the internet era, incalculable data is generated every day. In the process of data sharing, complex issues such as data privacy and ownership are emerging. Blockchain is a decentralized distributed data storage technology. The introduction of blockchain can eliminate the disadvantages of the centralized data market, but at the same time, distrib...
Chapter
Artificial Intelligence (AI) is going to influence the way we work and live in the future. Innovative applications created with the use of AI determine our quality of life, health, longevity, and the way we work, where we work, and how we work. Blockchain with its immutability, transparency, consensus, decentralized distributed ledgers, enhanced se...
Chapter
As the world adopts more and more of blockchain-based technologies, it will increasingly attract malicious users who will find and exploit their vulnerabilities. Therefore, the study of these vulnerabilities and how they are exploited becomes vital. In this chapter, we have reviewed a variety of vulnerabilities of blockchain. We have looked at thes...
Chapter
Edge computing is an exciting new approach to network architecture that helps organizations break beyond the limitations imposed by traditional cloud-based networks. It has emerged as a viable and important architecture that supports distributed computing to deploy compute and storage resources closer to the data source. Edge and fog computing addr...
Article
Full-text available
Solving the system of linear systems is of paramount importance in the field of science and technology. The applications of linear equations have been widely found in diverse fields. As an effect of the massive rise of big data, developing computational algorithms for solving systems of linear equations of large size has gained utmost importance in...
Article
Student performance is a critical factor in determining a university’s reputation because it has a negative effect on student retention. Students who do not perform well in a course are more likely to drop out from their programmes before graduating. Many students who enrol in Computing Science programmes struggle to find success because it is cons...
Chapter
The field of computer vision is encountering an extraordinary jump forward improvement today. This targets giving a thorough review of the ongoing advancement on computer vision calculations and their related equipment usage. Specifically, the noticeable accomplishments in computer vision errands, for example, picture characterization, object ident...
Chapter
Blockchain is an emerging technology with decentralized (Nakamoto, S., Bitcoin, A. (2008). Peer-to-peer electronic cash system. BN Publishing, La Vergne, TN, USA) and distributed technology utilized in third trusted party (TTP) for securing and solving cyberattacks. Healthcare system is a potential application having a strong impact on trustless an...
Chapter
A number of numerical practices exist that actuaries use to predict annual medical claim expense in an insurance company. This amount needs to be included in the yearly financial budgets. Inappropriate estimating generally has negative effects on the overall performance of the business. This study presents the development of artificial neural netwo...
Article
Full-text available
A number of numerical practices exist that actuaries use to predict annual medical claims expense in an insurance company. This amount needs to be included in the yearly financial budgets. Inappropriate estimating generally has negative effects on the overall performance of the business. This paper presents the development of Artificial Neural Netw...
Article
Full-text available
Smart homes and cities is one of the crucial topics for an individual of any age that requires almost zero computer literacy in order to benefit the leisure and luxury offered by smart homes and cities. Benefits offered by smart homes and cities are not only limited to leisure and luxury but other various areas of an individual's life and to aid th...
Article
Full-text available
Prior studies have found that mobile cloud computing could bring substantial cost savings to firms, ultimately resulting in reduced transaction cost to customers. Despite this, financial firms in Fiji are slow adopters of mobile cloud computing. The study identifies the challenges faced by financial firms in the adoption of mobile cloud computing t...
Article
Purpose Based on the concepts confined in Ajzen's theory of planned behavior (TPB), this study investigates users' attitudes towards adoption of a blockchain-based framework in the esports industry that proposes a scheme of rewarding stakeholders for their invested attention along with blockchain technology's inherent protocols. Design/methodology...
Chapter
This introduction chapter presents the different concepts and context of the book. It explains how the pandemic has led to digital transformation and therefore a dramatic increase in security incidents and cyberattacks. How training to mitigate security incidents and cyberattacks has resulted in more hackers and cybercriminals being trained. To mak...
Article
Full-text available
Edge computing is an exciting new approach to network architecture that helps organizations break beyond the limitations imposed by traditional cloud-based networks. It has emerged as a viable and important architecture that supports distributed computing to deploy compute and storage resources closer to the data source. Edge and fog computing addr...
Chapter
Enterprise resource planning (ERP) systems have become a crucial part of every business organization. The need for ERP systems have drastically increased over the past decade and it is a key factor in bringing success to any organization. Keeping in mind the impact of ERPS, another notable factor to consider in this time and age is the impact of ar...
Chapter
Full-text available
The worldwide infrastructure facilitator for corporations and home customers today is cloud computing. Cloud infrastructure provides infinite consistency in the computing power, storage, and network bandwidth in order for them to satisfy the demands of operation in an optimal manner. Cloud computing allows technology firms, internet suppliers, and...
Chapter
Full-text available
The rapid growth in internet technology and the innovations in smart devices has had its impact on how businesses used to operate a decade ago to how consumers followed traditional shopping behavior when goods or services was required. The rise in internet users presents the opportunity of Electronic Commerce, the idea of providing and accessing go...
Chapter
Full-text available
Data, being in the form of text and numbers is no longer the norm. Now, apart from text and numbers, data constitutes video, audio, graphics, tactile data, and sensory data. Gone are the days, when data was only curated by authorised, qualified and conveyors of data/information holding positions in esteemed institutions, organisations and governmen...
Chapter
Big data is emerging, and the latest developments in technology have spawned enormous amounts of data. The traditional databases lack the capabilities to handle this diverse data and thus has led to the employment of new technologies, methods, and tools. This research discusses big data, the available big data analytical tools, the need to use big...
Chapter
This chapter provides better understanding and use-cases of big data in healthcare. The healthcare industry generates lot of data every day, and without proper analytical tools, it is quite difficult to extract meaningful data. It is essential to understand big data tools since the traditional devices don’t maintain this vast data, and big data sol...
Chapter
In the internet era, incalculable data is generated every day. In the process of data sharing, complex issues such as data privacy and ownership are emerging. Blockchain is a decentralized distributed data storage technology. The introduction of blockchain can eliminate the disadvantages of the centralized data market, but at the same time, distrib...
Article
The seamless execution of application is important in mobile cloud applications. The limited processing power of mobile devices with insufficient resources to handle computational processing of complex applications is compared to the cloud infrastructure, which can handle multiple tasks simultaneously due to its multiple virtual machines and hosts....
Chapter
Information system (IS) is an important aspect of the communication industry. It is a storehouse of vital information for the company as well as for the employees. Many companies in Tonga use the IS to retrieve information about the employees' leave history and other personal data for reference and promotion purposes. It is therefore important that...
Chapter
The main purpose of this case study is to analyze Fiji National University's (FNU) legacy information management systems and its related issues. The chapter will summarize FNU's journey towards identifying its issues, documenting the requirements, selecting the right vendor, and current project progress. Fiji National University is Fiji's newest un...
Chapter
The current study aims to find out the effectiveness of customer relationship management (CRM) in banking. It intends to determine the efficiency of how CRM works from a staff and customer perspective. This research is important since CRM has become a leading goal of marketing of every organization. Its outcomes will allow comprehensive understandi...
Chapter
The focus today has passed from administrative management tasks to becoming a strategic partner of the overall organization strategy, largely with the strong support of information technologies evolution in this field of knowledge. Two systematic analyses have been carried out to identify the problems. This included an interview and chat with curre...
Chapter
The purpose of this chapter is to investigate how an oil company's information system, STRIPES, has assisted in ensuring a competitive advantage for its customers through its operational capabilities. This system systematically examines the processes, from the point where the customer places their order to the time he receives their ordered fuel in...
Chapter
ERP systems play a vital role in an organization. However, the success of ERP systems is heavily dependent on the structure of the organization and the usage of the ERP system. The benefits of the ERP system implementation is very well reflected on the utilization of the ERP system by the organization. Our team's research is based on the implementa...
Chapter
The continuous advancements in technologies and higher accessibility to new and improved technologies are becoming the enabler and leading to digital transformations in the entire business industry and for the national economy of any country. It opens up opportunities to improve business practices and processes and offers ways to do business in a m...
Chapter
ERP systems are crucial for organizations in order to manage and automate its business effortlessly to possess a competitive advantage. This research was conducted with the purpose to understand the relationship between ERP systems, ERP capabilities will contribute towards achieving a competitive advantage. The chapter also examines the impact of E...
Chapter
Enterprise resource planning (ERP) systems provide large organizations with the ability to share information between their cross-functional business units. ERP systems in turn may span over various geographical locations as with the case of multinational organizations. Sharing of information becomes a critical focus for these organizations which ma...
Chapter
Customer relationship management (CRM) is used to manage and analyze customer interactions within an organization. The aim of the research is to identify and analyze CRM problems in a public entity in order to increase value from the CRM functions. The research will run through the information system Success model consisting of three influential fa...
Chapter
There's a fast growing use for Enterprise Resource Planning (ERP) systems being done all over by a majority of businesses globally and the measuring of the success of these types of information systems should be done for firms where it is implemented. The firms nowadays invest in a large portion of financial resources towards implementation of thes...
Chapter
Over the decades, the growth in the telecommunication and Internet service providers has extended tremendously. The rapid growth has led the telecommunication and Internet service providers to find innovative ways to provide better customer-oriented service to guarantee fast, reliable, efficient, and best customer experience. The South Pacific is n...
Chapter
The purpose of this chapter is to investigate how an oil company’s information system, STRIPES, has assisted in ensuring a competitive advantage for its customers through its operational capabilities. This system systematically examines the processes, from the point where the customer places their order to the time he receives their ordered fuel in...
Chapter
Full-text available
This research was conducted to assess how the use of human resource information system (HRIS) affects HR functions of the organization. HRIS research is very limited in Fiji and the Pacific as a whole therefore there was a need for this study. This chapter uses the DeLone and McLean HRIS success model integrated with some incumbent HRIS factors pro...
Chapter
Local companies in Fiji have implemented and have been trying to implement ERP systems for decades. While a few have been successful with their implementation, many have seen frequent failures. This chapter will compare the implementation practices used by Fijian companies with the standard methodologies. Regardless of companies achieving a success...
Chapter
Full-text available
Enterprise systems, namely enterprise resource planning (ERP), have existed for decades and enabled organizations to gain a competitive advantage while integrating their functions and streamlining their operations. Over the years, enterprise systems have evolved with developments in technology and new ways of doing business. Technologies like cloud...
Chapter
This chapter investigates the best practices for implementing an ERP system by reviewing several related literatures and identifies the critical success factors. Not only that but literature review for existing ERP system implementation framework is also carried out. In addition to these literature reviews, this chapter considers several influencin...
Chapter
One of the most important tools in any organization today is the management information system which aims to provide reliable, complete, accessible, and understandable information in a timely manner to the users of the system. The management information system (MIS) plays a similar role compared to the role of heart in the body; information is the...
Chapter
Big data, big data analytics, and business intelligence is the buzzword in today’s business arena. With the advent of the Internet and in particular the Internet of things, the opportunity that it presents may be too good to pass up. The chance to be able to get to know not just your customers but more so their behavior can help you, in a way, to s...
Chapter
In the era of mechanical digitalization, organizations are progressively putting resources into apparatuses and arrangements that permit their procedures, machines, workers, and even the products themselves to be incorporated into a solitary coordinated system for information assortment, information examination, the assessment of organization advan...
Chapter
Full-text available
Industrial Internet of Things (IIoT) is the enabler of the Fourth Industrial Revolution (4IR) or Industry 4.0. The Fourth Industrial Revolution will have a profound impact on the way we live, work, and socialize. Industry 4.0 is essentially about the digital transformation of our lives, cities, and industries. Industrial Internet of Things will int...
Chapter
Full-text available
With the rise in cyber-attacks on cloud environments like Brute Force, Malware or Distributed Denial of Service attacks, information security officers and data center administrators have a monumental task on hand. Organizations design data center and service delivery with the aim of catering to maximize device provisioning & availability, improve a...
Chapter
Full-text available
This chapter focused on the importance and influence of industrial internet of things (IIoT) and the way industries operate around the world and the value added for society by the internet-connected technologies. Industry 4.0 and internet of things (IoT)-enabled systems where communication between products, systems, and machinery are used to improv...
Chapter
Full-text available
Big data is emerging, and the latest developments in technology have spawned enormous amounts of data. The traditional databases lack the capabilities to handle this diverse data and thus has led to the employment of new technologies, methods, and tools. This research discusses big data, the available big data analytical tools, the need to use big...
Chapter
Cloud computing has slowly but surely become the foremost service provider for information technology applications and platform delivery. However, Cloud issues continue to exist, like cyberattacks, slow last mile latency, and clouds lack client-centric and location-aware applications to process real time data for efficient and customized applicatio...
Chapter
With mission critical web applications and resources being hosted on cloud environments, and cloud services growing fast, the need for having greater level of service assurance regarding fault tolerance for availability and reliability has increased. The high priority now is ensuring a fault tolerant environment that can keep the systems up and run...
Chapter
Fog computing has the potential to resolve cloud computing issues by extending the cloud service provider's reach to the edge of the cloud network model, right up to the cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience, and keeps the data close to the use...
Article
The seamless execution of application is important in mobile cloud applications. The limited processing power of mobile devices with insufficient resources to handle computational processing of complex applications is compared to the cloud infrastructure, which can handle multiple tasks simultaneously due to its multiple virtual machines and hosts....
Book
This book presents the 2nd International Conference on Artificial Intelligence and Computer Visions (AICV 2021) proceeding, which took place in Settat, Morocco, from June 28- to 30, 2021. AICV 2021 is organized by the Scientific Research Group in Egypt (SRGE) and the Computer, Networks, Mobility and Modeling Laboratory (IR2M), Hassan 1st University...
Article
Full-text available
Crowdfunding is a way for people, businesses, and charities to raise money. It works through individuals or organisations who invest in (or donate to) crowdfunding projects in return for a potential profit or reward. Investing this way can be risky. Security is the main challenging issue in crowdfunding contracts. Using existing literature on crowd...
Article
Full-text available
The economic boom over the recent past and the quest to further develop has made several nation states the business hubs in their regions. Along with the investments, there has been growth in the number of property sales. Social media has become convenient platform of choice for advertising property sales after the introduction of Web 2.0. This art...
Article
Crowdfunding is a way for people, businesses, and charities to raise money. It works through individuals or organisations who invest in (or donate to) crowdfunding projects in return for a potential profit or reward. Investing this way can be risky. Security is the main challenging issue in crowdfunding contracts. Using existing literature on crowd...
Chapter
Full-text available
Due to globalization, demand per capita has increased over the decade; in turn, standard of living has been increased. The emission of carbon dioxide is increasing exponentially in construction industries, which affects the global ecological system. To reduce the global warming potential, net zero energy buildings are very essential. With respect t...