{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T08:52:50Z","timestamp":1766739170635,"version":"3.37.3"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Vietnam National University Ho Chi Minh City","award":["DS2022-20-07"],"award-info":[{"award-number":["DS2022-20-07"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3405409","type":"journal-article","created":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T17:26:06Z","timestamp":1716571566000},"page":"74961-74978","source":"Crossref","is-referenced-by-count":9,"title":["Leveraging Blockchain to Enhance Digital Transformation in Small and Medium Enterprises: Challenges and a Proposed Framework"],"prefix":"10.1109","volume":"12","author":[{"given":"Hoai-Nam","family":"Nguyen","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Enginering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5806-5910","authenticated-orcid":false,"given":"Hoang-Anh","family":"Pham","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Enginering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh City, Vietnam"}]},{"given":"Nguyen","family":"Huynh-Tuong","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam"}]},{"given":"Duc-Hiep","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Vietnam Blockchain Corporation (VBC), Ho Chi Minh City, Vietnam"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.12821\/ijispm050104"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.26458\/v5.i1.1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/21582440211047576"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.445"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11114\/bms.v4i3.3523"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/JOCM-08-2020-0249"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.rtbm.2021.100620"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103117"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2020.103290"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.resglo.2020.100034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2023.3268567"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00940-3_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21098\/bemp.v23i4.1240"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3295889"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FoNeS-AIoT54873.2021.00036"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/21582440221079877"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206791"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3194319"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2023.3291635"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3277923"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179690"},{"key":"ref22","article-title":"Blockchain as privacy and security solution for smart environments: A survey","author":"Ebrahim","year":"2022","journal-title":"arXiv:2203.08901"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC57335.2023.10044170"},{"volume-title":"Time for Trust: The Trillion-Dollar Reason to Rethink Blockchain","year":"2020","key":"ref24"},{"issue":"11","key":"ref25","doi-asserted-by":"crossref","first-page":"341","DOI":"10.3390\/fi14110341","article-title":"Blockchain technology: Benefits, challenges, applications, and integration of blockchain technology with cloud computing","volume":"14","author":"Habib","year":"2022","journal-title":"Future Internet"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819816-2.00004-6"},{"volume-title":"A Managers Guide to Blockchains for Business: From Knowing What to Knowing How","year":"2018","author":"Lacity","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/014920639101700108"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/9781119557722.ch2"},{"volume-title":"Permissioned Blockchains: A Comparative Study","year":"2021","author":"Soelman","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174943"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3291618"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3065880"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SCC55611.2022.00054"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijinfomgt.2020.102136","article-title":"Permissionless and permissioned blockchain diffusion","volume":"54","author":"Helliar","year":"2020","journal-title":"Int. J. Inf. Manage."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2021.101625"},{"key":"ref37","first-page":"1","article-title":"Blockchain for enterprise: Overview, opportunities and challenges","volume-title":"Proc. 13th Int. Conf. Wireless Mobile Commun. (ICWMC)","author":"Ben Hamida"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.2000442"},{"issue":"3","key":"ref39","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.bushor.2019.01.009","article-title":"How blockchain technologies impact your business model","volume":"62","author":"Morkunas","year":"2019","journal-title":"Bus. Horizons"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3471140"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0506-0"},{"article-title":"Permissioned blockchains: A comparative study","year":"2021","author":"Soelman","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038517"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2021.120739"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2992783"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECOME.2018.8658586"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4036226"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117588"},{"key":"ref50","article-title":"Identity management on blockchain\u2014Privacy and security aspects","author":"Panait","year":"2020","journal-title":"arXiv:2004.13107"},{"key":"ref51","first-page":"16","article-title":"Identity system essentials","volume":"29","author":"Smith","year":"2016","journal-title":"Evernym, Mar"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/s22134714"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2018.00032"},{"key":"ref54","first-page":"144","article-title":"Blockchain beyond cryptocurrency: Non-fungible tokens","volume-title":"Proc. Int. Conf. Eurasian Economies","author":"Sak\u0131z"},{"key":"ref55","article-title":"`Its a blessing and a curse: Unpacking creators practices with non-fungible tokens (NFTs) and their communities","author":"Sharma","year":"2022","journal-title":"arXiv:2201.13233"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2022.07.003"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.07.003"},{"volume-title":"The Zen Therapy Zen Therapy","year":"2023","author":"Epstein","key":"ref58"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1108\/JPBM-03-2018-1780"},{"issue":"2","key":"ref60","first-page":"388","article-title":"Modeling the intergrated customer loyalty program on blockchain technology by using credit card","volume":"4","author":"Choi","year":"2018","journal-title":"Int. J. Future Revolution Comput. Sci. Commun. Eng."},{"key":"ref61","first-page":"1","article-title":"Too good to be true? Understanding how blockchain revolutionizes loyalty programs","volume-title":"Proc. Amer. Conf. Inf. Syst.","author":"Wang"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100023"},{"article-title":"A taxonomy of non-fungible tokens: Overview, evaluation and explanation","year":"2022","author":"Olsson","key":"ref63"},{"key":"ref64","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-951089\/v1","volume-title":"A decentralized framework for patents and intellectual property as NFT in blockchain networks","author":"Bamakan","year":"2021"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8645058"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10538268.pdf?arnumber=10538268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T17:45:03Z","timestamp":1717177503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10538268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3405409","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}