Alexander Krumpholz, Marthie Grobler, Raj Gaire, Claire Mason, Shanae Burns (CSIRO Data61)

With more devices connected to the internet, collecting and sharing data using the Internet of Things (IoT) is an exciting prospect for many food supply chain stakeholders and consumers. However, new technologies introduce significant real and perceived security and privacy concerns that are hindering broader adoption of these technologies. While many of these risks can be mitigated through advanced privacy preservation technologies and security practices, we hypothesized that participants in primary industry supply chains have limited knowledge of these tools. By investigating perceptions and attitudes towards data sharing and privacy preserving tools, we hoped to reveal how communication strategies could be targeted to address this barrier to usable security in data sharing and digital food supply chains. To this end, we carried out pilot interviews and conducted a survey of Australian food supply chain stakeholders to explore: (1) current data sharing practices and the attitudes of food supply chains participants towards such practices, and (2) the perception towards privacy preserving techniques. We found that the extent of data sharing differs among different food supply chains. In general, participants in these supply chains were cautiously positive about the potential for data sharing. They also report that they were developing more trust in privacy preserving technologies as a tool for managing data sharing risk. An issue that emerged was the perception that the effort required to engage with data sharing platforms outweighs the benefits derived from them. Furthermore, the benefits of data sharing were not seen to be evenly distributed across the supply chain. These findings provide useful direction for progressing the adoption of digital supply chains.

View More Papers

A Formal Analysis of the FIDO UAF Protocol

Haonan Feng (Beijing University of Posts and Telecommunications), Hui Li (Beijing University of Posts and Telecommunications), Xuesong Pan (Beijing University of Posts and Telecommunications), Ziming Zhao (University at Buffalo)

Read More

An Exploratory study of Malicious Link Posting on Social...

Muhammad Hassan, Mahnoor Jameel, Masooda Bashir (University of Illinois at Urbana Champaign)

Read More

As Strong As Its Weakest Link: How to Break...

Kai Li (Syracuse University), Jiaqi Chen (Syracuse University), Xianghong Liu (Syracuse University), Yuzhe Tang (Syracuse University), XiaoFeng Wang (Indiana University Bloomington), Xiapu Luo (Hong Kong Polytechnic University)

Read More

Model-Agnostic Defense for Lane Detection against Adversarial Attack

Henry Xu, An Ju, and David Wagner (UC Berkeley) Baidu Security Auto-Driving Security Award Winner ($1000 cash prize)!

Read More