100% found this document useful (2 votes)
83 views75 pages

(Ebook PDF) Blockchain IOT and AI Technologies For Supply Chain Management 1st Edition by Priyanka Chawla, Adarsh Kumar, Anand Nayyar, Mohd Naved 1000855074 9781000855074 Full Chapters Download

The document discusses the book 'Blockchain, IoT, and AI Technologies for Supply Chain Management,' which explores the integration of modern technologies in supply chain management and addresses challenges faced by stakeholders, including the impact of COVID-19. It serves as a resource for researchers, educators, and students, providing insights into the evolution of supply chains and the importance of data management. The book consists of 12 chapters covering various aspects of supply chain management, including applications of IoT, AI, and blockchain technologies.

Uploaded by

hpustiubug599
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
83 views75 pages

(Ebook PDF) Blockchain IOT and AI Technologies For Supply Chain Management 1st Edition by Priyanka Chawla, Adarsh Kumar, Anand Nayyar, Mohd Naved 1000855074 9781000855074 Full Chapters Download

The document discusses the book 'Blockchain, IoT, and AI Technologies for Supply Chain Management,' which explores the integration of modern technologies in supply chain management and addresses challenges faced by stakeholders, including the impact of COVID-19. It serves as a resource for researchers, educators, and students, providing insights into the evolution of supply chains and the importance of data management. The book consists of 12 chapters covering various aspects of supply chain management, including applications of IoT, AI, and blockchain technologies.

Uploaded by

hpustiubug599
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

(Ebook PDF) Blockchain IOT and AI Technologies

for Supply Chain Management 1st edition by


Priyanka Chawla, Adarsh Kumar, Anand Nayyar,
Mohd Naved 1000855074 9781000855074 full
chapters download
https://ebookball.com/product/ebook-pdf-blockchain-iot-and-ai-
technologies-for-supply-chain-management-1st-edition-by-priyanka-
chawla-adarsh-kumar-anand-nayyar-mohd-
naved-1000855074-9781000855074-full-chapters-21942/

Download more ebook instantly today - Get yours now at ebookball.com


Get Your Digital Files Instantly: PDF, ePub, MOBI and More
Quick Digital Downloads: PDF, ePub, MOBI and Other Formats

(EBook PDF) Blockchain and Supply Chain Management 1st edition by Nir
Kshetri 0323899358 9780323899352 full chapters

https://ebookball.com/product/ebook-pdf-blockchain-and-supply-
chain-management-1st-edition-by-nir-
kshetri-0323899358-9780323899352-full-chapters-21876/

(Ebook PDF) Blockchain Technology in Supply Chain Management for


Society 5.0 1st edition by Atour Taghipour, Maathai Mathiyazhagan,
Vernika Agarwal 1000817172 9781000817171 full chapters

https://ebookball.com/product/ebook-pdf-blockchain-technology-in-
supply-chain-management-for-society-5-0-1st-edition-by-atour-
taghipour-maathai-mathiyazhagan-vernika-
agarwal-1000817172-9781000817171-full-chapters-21922/

(Ebook PDF) Blockchain Applications in Food Supply Chain Management


Case Studies and Implications 1st edition by Chen Zhang, Yu Gong,
Steve Brown 3031270541 9783031270543 full chapters

https://ebookball.com/product/ebook-pdf-blockchain-applications-
in-food-supply-chain-management-case-studies-and-
implications-1st-edition-by-chen-zhang-yu-gong-steve-
brown-3031270541-9783031270543-full-chapters-21946/

(EBook PDF) Goat Production and Supply Chain Management in the Tropics
1st edition by Pramod Kumar Rout, Ashok Kumar, Basanta Kumara Behera
1789240158 9781789240153 full chapters

https://ebookball.com/product/ebook-pdf-goat-production-and-
supply-chain-management-in-the-tropics-1st-edition-by-pramod-
kumar-rout-ashok-kumar-basanta-kumara-
behera-1789240158-9781789240153-full-chapters-21866/
(Ebook PDF) Supply Chain Management For Dummies 2nd edition by Daniel
Stanton 1119677017 9781119677017 full chapters

https://ebookball.com/product/ebook-pdf-supply-chain-management-
for-dummies-2nd-edition-by-daniel-
stanton-1119677017-9781119677017-full-chapters-21904/

(EBook PDF) Supply Chain Management Strategy and Organization 1st


edition Mikihisa Nakano 9811384797 9789811384790 full chapters

https://ebookball.com/product/ebook-pdf-supply-chain-management-
strategy-and-organization-1st-edition-mikihisa-
nakano-9811384797-9789811384790-full-chapters-21874/

(Ebook PDF) Logistics and Supply Chain Management 6th edition by


Martin Christopher 1292416203 9781292416205 full chapters

https://ebookball.com/product/ebook-pdf-logistics-and-supply-
chain-management-6th-edition-by-martin-
christopher-1292416203-9781292416205-full-chapters-21886/

(Ebook PDF) Sustainable Operations and Supply Chain Management 1st


edition by Melanie Kreye 1000819736 9781000819731 full chapters

https://ebookball.com/product/ebook-pdf-sustainable-operations-
and-supply-chain-management-1st-edition-by-melanie-
kreye-1000819736-9781000819731-full-chapters-21882/

(Ebook PDF) Practical Finance for Operations and Supply Chain


Management 1st edition by Alejandro Serrano, Spyros Lekkakos
0262043599 9780262043595 full chapters

https://ebookball.com/product/ebook-pdf-practical-finance-for-
operations-and-supply-chain-management-1st-edition-by-alejandro-
serrano-spyros-lekkakos-0262043599-9780262043595-full-
chapters-21908/
Blockchain, IoT, and AI Technologies
for Supply Chain Management

Supply chain management, often known as SCM, refers to the extensive variety of operations that
are required to plan, monitor, and coordinate the movement of a product from its raw materials to
its finished state in the most time- and money-efficient manner possible. How the supply chain is
managed has an impact not only on the quality of the product and the service but also on the
distribution, costs, and overall customer experience. Supply chain management is a massive
undertaking that needs firms to reevaluate the method in which they operate their supply chains.

Blockchain, IoT, and AI Technologies for Supply Chain Management discusses the problems and
difficulties that the facilitators of the supply chain confront, in addition to the possible solutions to
such problems and difficulties. This book will be the only one of its kind to address the impact of
COVID-19 on supply chain systems involving different stakeholders such as producers, dealers,
and manufacturers, and will provide a foundation for future research opportunities that will allow
for the unrestricted expansion and prosperity of business. It will serve as a foundation for
academics, scientists, and educationists interested in the use of modern technologies in the field of
supply chain management, such as the Internet of Things (IoT), Artificial Intelligence (AI), and
Blockchain. In addition to those engaged in research, undergraduate and postgraduate students in
higher education can also use this publication as a reference book. This book also presents a
multifaceted perspective for the general public, including topics such as computer science, the food
business, hotel management, fashion, medical, inventory management, and agricultural spheres.
Innovations in Intelligent Internet of Everything (IoE)
Series Editor: Fadi Al-Turjman

Computational Intelligence in Healthcare


Applications, Challenges, and Management
Meenu Gupta, Shakeel Ahmed, Rakesh Kumar, Chadi Altrjman

Blockchain, IoT, and AI Technologies for Supply Chain Management


Priyanka Chawla, Adarsh Kumar, Anand Nayyar, and Mohd Naved

For more information about the series, please visit: https://www.routledge.com/Innovations-in-


Intelligent-Internet-of-Everything-IoE/book-series/IOE
Blockchain, IoT, and AI
Technologies for Supply Chain
Management

Edited by
Priyanka Chawla
Adarsh Kumar
Anand Nayyar
Mohd Naved
First Edition published 2023
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742

and by CRC Press


4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

© 2023 selection and editorial matter, Priyanka Chawla, Adarsh Kumar, Anand Nayyar and Mohd Naved;
individual chapters, the contributors

CRC Press is an imprint of Taylor & Francis Group, LLC

Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication and
apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright
material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, access www.copyright.com or
contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-
8400. For works that are not available on CCC please contact [email protected]

Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only
for identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data


Names: Chawla, Priyanka, editor. | Kumar, Adarsh, editor. | Nayyar, Anand, editor.
Title: Blockchain, IoT and AI technologies for supply chain management / edited by Priyanka Chawla,
Adarsh Kumar, Anand Nayyar and Mohd Naved.
Description: 1 Edition. | Boca Raton, FL : CRC Press, 2023. |
Series: Innovations in Intelligent Internet of Everything IoE | Includes bibliographical references and index.
Identifiers: LCCN 2022045906 (print) | LCCN 2022045907 (ebook) | ISBN 9781032206400 (hardback) |
ISBN 9781032206417 (paperback) | ISBN 9781003264521 (ebook)
Subjects: LCSH: Business logistics. | Blockchains (Databases) | Internet of things. | Artificial intelligence.
Classification: LCC HD38.5 .B5356 2023 (print) | LCC HD38.5 (ebook) | DDC 658.8‐‐dc23/eng/20220922
LC record available at https://lccn.loc.gov/2022045906
LC ebook record available at https://lccn.loc.gov/2022045907

ISBN: 978-1-032-20640-0 (hbk)


ISBN: 978-1-032-20641-7 (pbk)
ISBN: 978-1-003-26452-1 (ebk)
DOI: 10.1201/9781003264521

Typeset in Times
by MPS Limited, Dehradun
Contents
Preface..............................................................................................................................................vii
About the Editors .............................................................................................................................xi
List of Contributors ........................................................................................................................xiii

Chapter 1 Fundamentals of IoT, Artificial Intelligence, and Blockchain


Approaches for Applications in Supply Chain Management ....................................1
V. Padmavathi and R. Saminathan

Chapter 2 Blockchain, IoT, and Artificial Intelligence Technologies for


Supply Chain Management: Bibliometric Analysis .................................................19
Esra Ozmen and Nurbahar Bora

Chapter 3 Complete Scenario for Supply Chain Management Using IoT and 5G .................43
Jay Kumar Pandey, Vandana B. Patil, Kukati Aruna Kumari, Santanu Das,
Arpit Namdev, Praful Nandankar, and Ankur Gupta

Chapter 4 Impact of Artificial Intelligence on Agriculture Value Chain Performance:


Agritech Perspective..................................................................................................71
C. Ganeshkumar, Jeganthan Gomathi Sankar, and Arokiaraj David

Chapter 5 Applications of Artificial Intelligence of Things in Green Supply Chain


Management: Challenges and Future Directions .....................................................99
Arshi Naim, Hamed Alqahtani, Sadaf Fatima, and Mohammad Faiz Khan

Chapter 6 Effects on Supply Chain Management due to COVID-19 ....................................127


Shipra Gupta and Vijay Kumar

Chapter 7 Artificial Intelligence from Vaccine Development to Pharmaceutical


Supply Chain Management in Post-COVID-19 Period........................................143
Abhishek Dadhich and Priyanka Dadhich

Chapter 8 Blockchain for SCM: A Prospective Study Based on a Panel


of Literature Reviews.............................................................................................. 163
Mostafa Qandoussi and Abdellah Houssaini

Chapter 9 A Blockchain-Based Framework for Circular Plastic Waste Supply


Chain Management in India: A Case Study of Kolkata, India .............................189
Biswajit Debnath, Ankita Das, Adrija Das, and Abhijit Das

v
vi Contents

Chapter 10 Supply Chain Management–Based Transportation System Using IoT


and Blockchain Technology.................................................................................... 205
Ahmed Mateen Buttar, Mahnoor Bano, and Amna Khalid

Chapter 11 Perspective Analysis of Three Types of Services on a Queueing-Inventory


System with a Sharing Buffer for Two Classes of Customers .............................229
K. Jeganathan, K. Prasanna Lakshmi, S. Selvakumar, T. Harikrishnan,
and D. Nagarajan

Chapter 12 Ensuring Provenance and Traceability in a Pharmaceutical Supply Chain


Using Blockchain and Internet of Things ..............................................................255
Anna N. Kurian, P.P. Joby, Tomina Anoop, and Allen Mathew

Index..............................................................................................................................................273
Preface
Supply chain management (SCM) is the wide range of activities needed to schedule, track, and
conduct the flow of a product from materials to production to delivery in the most cost-effective
way. While the supply chains of yesterday were centered on the availability, movement, and
expense of physical objects, the supply chains of today are focused on the management of data,
resources, and goods integrated into solutions. The management of the supply chain influences the
quality of the product and service, distribution, prices and customer experience. In the present
situation, SCM is a huge challenge and requires businesses to revalidate the way their supply chain
is run. Technologies such as IoT, blockchain, augmented reality, robotics, and cloud computing
have emerged which can change the traditional working approach. Indeed, the blockchain in the
IoT industry has grown from USD$30 million to $113 million since 2018 and is expected to grow
to over $3 billion annually with a compound annual growth rate (CAGR) of nearly 93 percent by
2024. By 2025, the economic impact of industrial IoT applications may be somewhere between
USD$4 trillion and $11 trillion on global GDP. This economic impact of IoT is primarily due to
the visibility and remote control capabilities it offers to all industries, resulting in increased
operating efficiency and protection. The pandemic has exposed weaknesses and fragility through
most, if not all, sectors and industries in the global supply chains. A blockchain-based supply chain
management system is built on a decentralized distributed ledger that provides an irrefutable record
of all data relating to shipment status, track status, storage conditions, and more. To boost supply
and demand, AI makes it easier to access and evaluate a virtually unlimited source of data at once.
AI can also be used to further minimize human and labor costs, thus reducing the time taken in
early to later stages.
This book provides a holistic view of the supply chain concept from different dimensions. The
book covers the issues and challenges that are faced by the facilitators of the supply chain, along
with their potential solutions. The book has thrown a light on the impact of COVID-19 in the
progress of already-existing supply chain projects as well as the newly proposed ones. Since this
type of book will be the only of its kind to address the impact of COVID-19 on supply chain
systems involving different stakeholders such as producers, dealers, and manufacturers, it provides
a foundation for future research opportunities for unlimited growth and prosperity of business. This
book provides a foundation for researchers, scientists, and educationists towards the application of
advanced technologies such as IoT, AI, and blockchain in the area of supply chain management to
track assets accurately and for upgrading supply chain business operations. Since the delivery
chains are both dynamic and distributed these days, involving a great number of parties, this book
provides a multidimensional view for the masses ranging from computer science, food industry,
hotel management, apparel, medical, inventory management, and agriculture domain. It can be
used as a reference book for higher-education UG and PG students apart from the research
scholars. This book is comprised of 12 Chapters including comprehensive coverage to IoT, AI, and
Blockchain in supply chain management.
Chapter 1, titled “Fundamentals of IoT, Artificial Intelligence, and Blockchain Approaches
for Application in Supply Chain Management” elaborates that supply chains have a significant
impact not only on society but also on the performance of businesses and the environment. Supply
chains have a greater potential to develop and support a sustainable future if contemporary
technology is used appropriately and used in the appropriate ways. Businesses have the ability to
cut their emissions of greenhouse gases by combining technology such as the Internet of Things,
artificial intelligence, and blockchain. Chapter 2, titled “Blockchain, IoT, AI Technologies for
Supply Chain Management: Bibliometric Analysis,” explains that the world is always changing,
and businesses are doing their best to keep up. Technologies such as the Internet of Things are used
by artificial intelligence, particularly for the development of more complex supply chain

vii
viii Preface

management systems. There has been a rise in the number of research projects conducted in the
areas of blockchain, IoT, AI, and SCM, respectively. Chapter 3, titled “Complete Scenario for
Supply Chain Management Using IoT and 5G,” explains that 4G and 5G technologies are able
to offer smart services such as smart homes, smart energy, and smart health by analyzing data
collected from the Internet of Things. By using accessible interactive dashboards, inefficiencies
and errors in the supply chain may be corrected in a time frame that is very close to being
considered real time. Chapter 4, titled “Impact of Artificial Intelligence on Agriculture Value
Chain Performance: Agritech Perspective,” elaborates that agriculture is one of the necessary
activities that play a significant part in maintaining all of the activities that humans engage in. The
most significant issues that the sector is now facing are an expanding population and increased
competition for available resources. These issues may be overcome with the use of technological
advances, such as information and communication technology, artificial intelligence, machine
learning, and blockchain technology. Chapter 5, titled “Applications of Artificial Intelligence of
Things in Green Supply Chain Management: Challenges and Future Directions,” explains
that Internet of Things and artificial intelligence are two of the most exciting new technologies that
will emerge in the next several decades. The purpose of this chapter is to investigate the role that
artificial intelligence and the Internet of Things, often known as hybrid technology and described
as artificial intelligence of things (AIoT), play in green supply chain management (GSCM). This
chapter lays out a plan for the deployment of an IoT-based green supply chain for businesses, with
a particular focus on the healthcare industry. Chapter 6, titled “Effects on Supply Chain
Management due to COVID-19,” elaborates on the global pandemic scenario with COVID-19
that has had an impact on the management of the supply chain in every country across the globe.
There is a great need for innovation in the supply chain management of many different enterprises.
In the past, many businesses and manufacturers were unsuccessful because they did not have
sufficient knowledge at the appropriate moment. To have a better understanding of the current state
of the market, a survey was carried out. It has been discovered that some businesses are making a
loss as a result of the pandemic; yet, after implementing certain advancements, these businesses are
now making incredible profits. Chapter 7, titled “Artificial Intelligence from Vaccine
Development to Pharmaceutical Supply Chain Management in Post COVID-19 Period,”
discusses that on March 11, 2020, the World Health Organization classified the SARS-CoV-2
coronavirus outbreak as a pandemic across the world. The real-time decision-making process was
carried out with the assistance of AI algorithms to meet the obstacles associated with vaccine
production, storage, logistics, and safety concerns. Machine learning (ML) and artificial intelligence
(AI) based methodologies will be presented as applications for vaccine development. During the
process of supplying pharmaceuticals, we will discuss the use of AI to increase end-to-end visibility,
demand forecasting, and maintaining the integrity of the supply chain. Chapter 8, titled “Blockchain
for SCM: A Prospective Study Based on A Panel of Literature Reviews,” explains that the
industrial and service sectors are two areas that might be significantly altered by blockchain
technology. The management of supply chains is one of a number of different domains that may be
influenced by developing technology. The newly popular ideas of “smart manufacturing,” “cyber
physical systems,” and the “Internet of Things” would make it possible for intelligent communication
to take place between machines that are linked to one another. The integration of cutting-edge
technology into the management of supply chains will result in an increase in the openness and
accessibility of the information that is shared. Chapter 9, titled “A Blockchain-Based Framework
for Circular Plastic Waste Supply Chain Management in India: A Case Study of Kolkata,
India,” discusses the use of blockchain technology in the management of supply chains that has the
potential for exponential expansion. It may be worthwhile to put into action in an industry in which
supply chain networks are still experiencing difficulties. The industry of managing plastic garbage is
not held in particularly high regard across the board. The SCN of this sector may be improved by
turning it into a closed loop, which will increase cashflow. The development of a waste management
system that is both effective and efficient is another prerequisite for sustainable cities.
Preface ix

Chapter 10, titled “Supply Chain Management-Based Transportation System Using IoT and
Blockchain Technology,” discusses that the modern corporate environment is characterized by a
particularly high degree of rivalry due to the more demanding and dynamic nature of the market. This
is because supply networks need to be able to keep up with the ever-evolving external environment.
The incorporation of blockchain technology into the management of supply chains may result in
increased visibility and traceability, in addition to higher levels of both operational efficiency and
security. Chapter 11, titled “Perspective Analysis of Three Types of Services on a Queueing-
Inventory System with a Sharing Buffer for a Two Class of Customers,” explains the (s,Q)
ordering strategy for the replenishment products stored in the inventory system that only uses a single
server. In accordance with the probability p, the HNC(HNC) takes precedence over the LNC(LNC).
The hypothesis of the Markov chain is used to examine the steady state of the model that is being
investigated. The current quantity of goods in the inventory, as well as the number of low- and high-
priority items in the queue, are all included in the joint probability distribution. Chapter 12, titled
“Ensuring Provenance and Traceability in a Pharmaceutical Supply Chain Using Blockchain
and Internet of Things,” discusses the intergration of blockchain and IoT into the pharmaceutical
supply chain for better record management and also discusses ecosystem, visbility technologies, and
temperature sensors in a cold supply chain.
This book acts as a bridging information resource between basic concepts and advanced-level
contents from technical experts to blockchain, AI, and supply chain practitioners. This book
facilitates the research group to study and publish novel work towards the advancement of
emerging technologies in applications of supply chain management with AI and blockchain
integrated into it. The content is aimed at students at the graduate and post-graduate levels from
different engineering disciplines.

Priyanka Chawla
Adarsh Kumar
Anand Nayyar
Mohd Naved
About the Editors
Dr. Priyanka Chawla is working as an Associate Professor in the Department of Computer
Science and Engineering, NIT Warangal, India. She earned her PhD degree from Thapar
University, Patiala, Punjab, India. Dr. Chawla has had a rich experience of Industry and
Academia of around 20 years. Her research interests lie in the area of Internet of Things,
Blockchain, Artificial Intelligence, Big data, Data Science and Sustainable development. She has
several publications in reputed national and international journals and conferences. She is on the
editorial board of many reputed journals. She is also the reviewer for many reputed journals and
the member of the organizing committee for several conferences and workshops. She has
successfully completed various certifications in the field of education. She is a member of reputed
professional bodies like ISTE, ISC etc.

Dr. Adarsh Kumar is an associate professor in the School of Computer Science with University
of Petroleum & Energy Studies, Dehradun, India. He received his master’s degree (M. Tech) in
software engineering from Thapar University, Patiala, Punjab, India, and received his PhD degree
from Jaypee Institute of Information Technology University, Noida, India, followed by a post-doc
from Software Research Institute, Athlone Institute of Technology, Ireland. From 2005 to 2016, he
has been associated with the Department of Computer Science Engineering & Information
Technology, Jaypee Institute of Information Technology, Noida, Uttar-Pardesh, India, where he
has worked as an assistant professor. His main research interests are cybersecurity, cryptography,
network security, and ad-hoc networks. He has many research papers in reputed journals,
conferences, and workshops. He participated in one European Union H2020 sponsored research
project and he is currently executing two research projects sponsored from UPES SEED division
and one sponsored from Lancaster University.

Dr. Anand Nayyar received his PhD (Computer Science) from Desh Bhagat University in 2017 in
the area of Wireless Sensor Networks, Swarm Intelligence and Network Simulation. He is currently
working in School of Computer Science-Duy Tan University, Da Nang, Vietnam as Professor,
Scientist, Vice-Chairman (Research) and Director- IoT and Intelligent Systems Lab. A Certified
Professional with 125+ Professional certificates from CISCO, Microsoft, Amazon, EC-Council,
Oracle, Google, Beingcert, EXIN, GAQM, Cyberoam and many more. Published more than 150+
Research Papers in various High-Quality ISI-SCI/SCIE/SSCI Impact Factor Journals cum Scopus/
ESCI indexed Journals, 70+ Papers in International Conferences indexed with Springer, IEEE and
ACM Digital Library, 40+ Book Chapters in various SCOPUS, WEB OF SCIENCE Indexed Books
with Springer, CRC Press, Wiley, IET, Elsevier with Citations: 8000+, H-Index: 46 and I-Index:
165. Member of more than 60+ Associations as Senior and Life Member including IEEE, ACM. He
has authored/co-authored cum Edited 40+ Books of Computer Science. Associated with more than
500+ International Conferences as Programme Committee/Chair/Advisory Board/Review Board
member. He has 18 Australian Patents, 4 German Patents, 2 Japanese Patents, 11 Indian Design cum
Utility Patents, 1 USA Patent, 3 Indian Copyrights and 2 Canadian Copyrights to his credit in the area
of Wireless Communications, Artificial Intelligence, Cloud Computing, IoT and Image Processing.
Awarded 38 Awards for Teaching and Research—Young Scientist, Best Scientist, Best Senior
Scientist, Asia Top 50 Academicians and Researchers, Young Researcher Award, Outstanding
Researcher Award, Excellence in Teaching, Best Senior Scientist Award, DTU Best Professor and
Researcher Award- 2019, 2020-2021, 2022 and many more. He is listed in Top 2% Scientists as
per Stanford University (2020, 2021, 2022). He is acting as Associate Editor for Wireless Networks
(Springer), Computer Communications (Elsevier), International Journal of Sensor Networks
(IJSNET) (Inderscience), Frontiers in Computer Science, PeerJ Computer Science, Human

xi
xii About the Editors

Centric Computing and Information Sciences (HCIS), IET-Quantum Communications, IET Wireless
Sensor Systems, IET Networks, IJDST, IJISP, IJCINI, and IJGC. He is acting as Editor-in-Chief of
IGI-Global, USA Journal titled International Journal of Smart Vehicles and Smart Transportation
(IJSVST). He has reviewed more than 2500+ Articles for diverse Web of Science and Scopus
Indexed Journals. He is currently researching in the area of Wireless Sensor Networks, Internet of
Things, Swarm Intelligence, Cloud Computing, Artificial Intelligence, Drones, Blockchain, Cyber
Security, Network Simulation, Big Data and Wireless Communications.

Dr. Mohd Naved is a passionate researcher and educator with 16 years of experience and proven
track record of quality research publications and leading teams for the research and overall
management of the educational institution. He is a senior member of IEEE and is associated with
multiple leading research organizations. He is a machine learning consultant and researcher,
currently teaching in Amity University (Noida) for various degree programs in analytics and
machine learning. He is actively engaged in academic research on various topics in management as
well as on 21st-century technologies. He has published 60+ research articles in reputed journals
(SCI/Scopus Indexed/peer reviewed). He has 16 patents in AI/ML and is actively engaged in
commercialization of innovative products.
Contributors
Hamed Alqahtani Adrija Das
Department of Information Systems A.K. Choudhury School of Information
King Khalid University Technology
Abha, Saudi Arabia University of Calcutta
Kolkata, India
Tomina Anoop
M.Sc Scholar, Tesside University Ankita Das
Middlesbrough, United Kingdom Consortium of Researchers for Sustainable
Development (C.R.S.D.)
Mahnoor Bano Agra, India
Department of Computer Science and
University of Agriculture Faisalabad Department of Data Science and Cyber
Faisalabad, Pakistan Security
Institute of Leadership
Nurbahar Bora Entrepreneurship and Development (iLead)
Atatürk University Social Sciences Institute Kolkata, India
Erzurum, Turkey
Santanu Das
Ahmed Mateen Buttar Seshadripuram First Grade College
Department of Computer Science Yelahanka New Town
University of Agriculture Faisalabad Bangalore, India
Faisalabad, Pakistan
Arokiaraj David
Abhishek Dadhich Department of Management Studies
School of Allied Health Sciences and St. Francis Institute of Management and
Management Research
New Delhi, India Mumbai, India

Priyanka Dadhich Biswajit Debnath


Department of Computer Science and Department of Chemical Engineering
Engineering Jadavpur University
Delhi Technical Campus Kolkata, India
Guru Gobind Singh Indraprastha University and
New Delhi, India Consortium of Researchers for Sustainable
Development (C.R.S.D.)
Abhijit Das Agra, India
Department of Information Technology
Institute of Leadership Sadaf Fatima
Entrepreneurship and Development (iLead) Department of Business Administration
Kolkata, India Aligarh Muslim University
and Aligarh, India
Department of Data Science and Cyber
Security C. Ganeshkumar
Institute of Leadership Indian Institute of Plantation Management
Entrepreneurship and Development (iLead) Bengaluru, India
Kolkata, India

xiii
xiv Contributors

Ankur Gupta Kukati Aruna Kumari


Department of Computer Science and Prasad V. Potluri Siddhartha Institute of
Engineering Technology
Vaish College of Engineering Vijaywada, Andhra Pradesh, India
Rohtak, Haryana, India
Anna N. Kurian
Shipra Gupta Computer Science and Engineering
School of Management St. Joseph’s College of Engineering and
Graphic Era Hill University Technology
Dehradun, Uttarakhand, India Palai, Kerala, India

T. Harikrishnan K. Prasanna Lakshmi


Department of Mathematics Department of Mathematics with Computer
Guru Nanak College Applications
Chennai, India Ethiraj College for Women
Chennai, India
Abdellah Houssaini
Faculty of Economics and Management Allen Mathew
University Ibn Tofail Financial Analyst, X L Dynamics
Kenitra, Morocco Kochi, Kerala, India

K. Jeganathan D. Nagarajan
Ramanujan Institute for Advanced Study Department of Mathematics
in Mathematics Rajalakshmi Institute of Technology
University of Madras Chennai, India
Chennai, India
Arshi Naim
P.P. Joby Department of Information Systems
Computer Science and Engineering King Khalid University
St. Joseph’s College of Engineering and Abha, Saudi Arabia
Technology
Palai, Kerala, India Arpit Namdev
University Institute of Technology RGPV
Amna Khalid Bhopal, Madhya Pradesh, India
Department of Computer Science
University of Agriculture Faisalabad Praful Nandankar
Faisalabad, Pakistan Government College of Engineering
Nagpur, India
Mohammad Faiz Khan
Security Forces Hospital Esra Ozmen
Ministry of Interiors Ankara Hacı Bayram Veli University
Abha, Saudi Arabia Ankara, Turkey

Vijay Kumar V. Padmavathi


Physics Department Department of Information Technology
Graphic Era Hill University A. V. C. College of Engineering
Dehradun, Uttarakhand, India Mayiladuthurai, Tamilnadu, India
Contributors xv

Jay Kumar Pandey R. Saminathan


Shri Ramswaroop Memorial University Department of Computer Science and
Barabanki, Uttar Pradesh, India Engineering
Annamalai University
Vandana B. Patil Chidambaram, Tamilnadu, India
Dr. D.Y. Patil Institute of Engineering
Management, and Research Jeganthan Gomathi Sankar
Pimpri-Chinchwad, Maharashtra, India BSSS Institute of Advanced Studies
Bhopal, India
Mostafa Qandoussi
Faculty of Economics and Management S. Selvakumar
Laboratory of Economics and Management of Ramanujan Institute for Advanced Study in
Organizations Mathematics
University Ibn Tofail University of Madras
Kenitra, Morocco Chennai, India
1 Fundamentals of IoT, Artificial
Intelligence, and Blockchain
Approaches for Applications
in Supply Chain Management
V. Padmavathi
Department of Information Technology, A. V. C. College of Engineering,
Mayiladuthurai, Tamilnadu, India

R. Saminathan
Department of Computer Science and Engineering, Annamalai
University, Chidambaram, Tamilnadu, India

CONTENTS
1.1 Introduction...............................................................................................................................2
1.2 Fundaments of IoT, Artificial Intelligence, and Blockchain Approaches..............................4
1.2.1 Essentials of IoT...........................................................................................................4
1.2.2 Highlights of Artificial Intelligence.............................................................................5
1.2.2.1 Data Access in Real Time ............................................................................5
1.2.2.2 Information from the Public (Multi-Party)...................................................5
1.2.2.3 Participating in a Game.................................................................................5
1.2.2.4 Speech Recognition .......................................................................................6
1.2.3 Fundamental of Blockchain Approaches.....................................................................6
1.3 The Intersection of Blockchain, Internet of Things (IoT), and
Artificial Intelligence in Supply Chain Management .............................................................6
1.3.1 Improving Data Standardization, Privacy, Security, and Scalability .........................6
1.3.1.1 Standardization of Data.................................................................................6
1.3.1.2 Privacy ...........................................................................................................6
1.3.1.3 Security ..........................................................................................................7
1.3.1.4 Scalability ......................................................................................................7
1.3.2 Using a Blockchain-Based Identity for Authentication ..............................................7
1.3.3 Five Stages of Supply Chain Management .................................................................8
1.3.4 Areas of Expertise in Supply Chain Management....................................................10
1.3.4.1 Make the Transition to Real-Time Supply Chain Planning ......................10
1.3.4.2 Supply Chain and Enterprise Planning Should Be Combined ..................10
1.3.4.3 Get Ready for the Demands of the End Consumers.................................. 10
1.3.4.4 Utilize Real-Time Data at Every Stage of the Supply Chain....................10
1.3.5 Applications in Supply Chain Management Using Blockchain Approaches...........10
1.4 IoT, Artificial Intelligence, and Blockchain-Based Supply
Chain Management: Architectural Description .....................................................................11
1.4.1 Proposed Supply Chain Structure and Data Preservation Approach .......................11
1.4.2 McEliece Cryptosystem .............................................................................................12

DOI: 10.1201/9781003264521-1 1
2 Blockchain, IOT and AI Technologies for Supply Chain Management

1.4.3 Optimized Secure Data Transmission .......................................................................14


1.4.4 Security Issues in Supply Chain Management for Information Exchange ..............15
1.5 Case Studies ...........................................................................................................................15
1.5.1 Case Study on Supply Chain Traceability ................................................................15
1.5.2 Case Study on Blockchain-Based Agri-Food Supply Chain
Management in China ................................................................................................ 15
1.5.3 Case Study on Blockchain-Based Supply Chain for Transaction Process
Automation .................................................................................................................15
1.6 Conclusion and Future Scope ................................................................................................ 16
References........................................................................................................................................ 16

1.1 INTRODUCTION
The Internet of Things (IoT) [1] is a network of physical objects or people that are equipped with
software, electronics, networks, and sensors to collect and exchange data. The Internet of Things
aims to extend Internet connectivity beyond traditional devices like computers, smartphones, and
tablets to more mundane products like toasters. As a result of the Internet of Things, virtually
everything becomes “smart,” utilizing the power of data collection, AI algorithms, and networks to
improve aspects of our life. Things in the Internet of Things include people with diabetes monitor
implants, animals with tracking devices, and so on.
IoT technology enables supply chain members to maximize their competitive advantage by
attaining visual management and intelligent management throughout the supply chain, enhancing
supply chain transparency, and facilitating information sharing.
Every day, trucks, ships, and humans must deliver, track, and account for millions of commodities.
The Internet of Things connects these products, assets, and people across the supply chain, enabling
efficiencies and optimizing operations that save companies time and money every year. IoT [2] devices
have the potential to have a substantial impact on all aspects of the supply chain, including warehouse
management, transportation and logistics, and last-mile delivery to the end consumer, as shown in
Figure 1.1. Manufacturers may increase operational efficiency, reduce theft and counterfeiting, and
deliver outstanding customer service by responding to data from IoT devices in their supply chain;
allows a manufacturer to see their whole supply chain in real time without having to rely on a third
party to scan packaging at any point along the way; writes data from IoT sensors straight to their
decentralized blockchain environment, ensuring that the data cannot be tampered with or hacked and is
completely correct; and allows the end-user to scan the product to check that they’re getting the actual
thing and that it’s in the best possible condition as specified by the manufacturer.
Artificial intelligence is already incredibly powerful, and it’s only getting better. From social
media to self-driving cars, the speed with which robots can be educated to replicate or even
outperform humans is becoming increasingly important. Although still in the early phases of
development, enterprise applications based on advanced technologies such as machine learning
and AI [3] are beginning to generate distinctive and novel business strategies. In the logistics and
supply chain industries, these technologies have proven to be game changers. According to
Gartner, the value of machine automation in supply chain operations is expected to triple in the
next five years. By 2022, it is expected that annual Industrial IoT (IIOT) investment by increasing
businesses will reach $600 billion.
AI-enhanced technologies are being utilized across supply chains to boost efficiency; reduce the
effects of a global labor shortage; and discover better, safer ways to move goods from one point to
another. AI applications can be found across the supply chain [4], from the production floor to the
front door. AI is being employed in the supply chain and logistics business because organizations
have realized that AI has the power to solve the difficulties of running a global logistics network.
When used effectively, AI may assist businesses in becoming smarter, making more agile deci-
sions, and anticipating challenges.
Fundamentals of IoT, AI, and Blockchain 3

FIGURE 1.1 Blockchain-Based IoT with Supply Chain Process.

Consumer expectations for on-time and intact delivery are being exceeded by AI-enabled
proactive solutions, which are also improving service quality. They’re also sharpening their talents
through automating compliance. As a result, there are fewer problems and lower costs across the
logistics network. The most intriguing feature of AI is its seemingly infinite potential. When algo-
rithms are combined with technologies like the Internet of Things (IoT) [5–9], machine learning
(ML), and predictive analytics, they become even more powerful. Because of increased access to
data, companies now have a better grasp of their worldwide logistics networks. Transparency is
important because it improves people’s perceptions of supply chain management and logistics.
Figure 1.2 depicts architecture of IoT systems. It is a three-layered structure and consists of an
application layer, network layer, and perception layer. All layers in a supply chain can access the
same data via blockchain, potentially reducing communication and data transmission issues. More
time can be spent on delivering goods and services, either enhancing quality or cutting costs, or
both. Blockchain technology can be used by businesses to track all types of transactions more
securely and transparently. The impact on supply chain operations might be massive. Companies

FIGURE 1.2 The IoT System’s Three-Layer Architecture.


4 Blockchain, IOT and AI Technologies for Supply Chain Management

can utilize blockchain to track a product’s history from conception to present-day location. The
transaction is securely documented every time a product changes hands, creating a permanent
record of the transaction from beginning to end. With the use of this advanced technology, parties
collaborating on a single shared platform might substantially reduce the time delays, additional
costs, and human error that are typically associated with transactions. By minimizing the number
of middle people in the supply chain, fraud risks are lowered. Finally, detailed records assist
businesses in identifying the source of fraud when it occurs.
The following are the objectives of this chapter:

• To study the background and review the extensive literature matching the concept of IoT
fundamentals, blockchain, AI highlights, and supply chain management.
• To propose a novel privacy protection technique based on blockchain technology. The
McEliece Cryptography system is used as base for secure data flow between suppliers and
customers.
• In addition, the security and privacy implications of blockchain-based IoT applications
are examined.

Organization of Chapter: The chapter is structured as follows: Section 1.2 addresses related
studies as well as a survey summary. Section 1.3 looks at data security and privacy in the context
of blockchain technology and the integration of blockchain, the Internet of Things, and artificial
intelligence in supply chain management. Section 1.4 describes the architectural design of IoT, AI,
and blockchain-based SCM with security mechanisms. Section 1.5 discusses the various case study
applications. Finally, Section 1.6 concludes the chapter with a future scope.

1.2 FUNDAMENTS OF IOT, ARTIFICIAL INTELLIGENCE, AND


BLOCKCHAIN APPROACHES
The digital transformation is being accelerated by three key technologies: Blockchain, IoT, and AI.
We believe these technologies will converge, enabling for the emergence of new business models:
In the future, autonomous agents (sensors, cars, machines, trucks, cameras, and other IoT devices)
will be able to (1) create a digital twin with IoT, (2) send and receive money using blockchain
technology on their own, and (3) make autonomous decisions as independent economic agents
using AI and data analytics. This convergence, we believe, will also stimulate the development of
self-contained business models and the digital transformation of industrial firms.

1.2.1 ESSENTIALS OF IOT

The Internet of Things is a network of networked devices that can collect and share data about their
own operations as well as their surroundings. Any device that has a two-way data link, such as
connected sensors, thermostats, cars, biometric devices, and luminaires, could be part of the IoT.
The three basic levels of an IoT system are the device layer, network layer, and platform layer.
The device layer contains the things that engage in the Internet of Things. The network layer
contains everything you need to connect devices to each other and to the platform layer [10–14].
An IoT system has four basic components, shown in Figure 1.3.

1. Sensors/Devices: Sensors and devices are necessary for collecting real-time data from
the environment. All of this data could be challenging in some way. It could be some-
thing as simple as a temperature sensor or something as complex as a video stream.
A gadget could have a range of sensors that do more than just sense. A smartphone,
for example, is a device having multiple sensors, including GPS and a camera, yet it is
unable to detect these features.
Fundamentals of IoT, AI, and Blockchain 5

FIGURE 1.3 Four Basic Components of IoT.

2. Data Transmission: All data is transmitted to a cloud infrastructure. A number of


communication methods should be used to connect the sensors to the cloud. Examples of
communication methods include mobile or satellite networks, Bluetooth, Wi-Fi, WAN,
and others.
3. Data Processing: The software processes the information after it has been captured and
transmitted to the cloud. This strategy may consist of merely checking the temperature or
readings from devices such as air conditioners or heaters. However, some tasks, such as
recognizing objects using computer vision on video, can be rather tough.
4. User Interface: The information must be accessible to the end-user in some way, which
can be done by sending them an email or text message, or by setting up alerts on their
phones. An interface that actively monitors the user’s IoT equipment may be required, on
occasion. For example, the user has a camera installed in their home. They want to be
able to access video recordings and all streams using a web server.

1.2.2 HIGHLIGHTS OF ARTIFICIAL INTELLIGENCE


1.2.2.1 Data Access in Real Time
To improve on traditional corporate systems that use outmoded batch planning methodologies,
new AI systems must address the stale data problem. Most supply chains today attempt to carry out
plans based on data that is several days old, but this results in poor decision making, which either
under-optimizes the supply chain or needs human user involvement. Without real-time data,
AI technology merely makes wrong decisions faster.

1.2.2.2 Information from the Public (Multi-Party)


Any AI, deep learning, or machine learning algorithm must be able to access data from outside
the organization or, more importantly, be granted access to data relevant to your trading
community. Unless the AI tool can see forward-most demand and downstream supply, as well as
any relevant limits and capacity in the supply chain, the results will be no better than a tradi-
tional planning system. Unfortunately, this lack of awareness and access to real-time community
data is the standard in nearly all supply chains. This, of course, must change if an AI tool is to be
successful.

1.2.2.3 Participating in a Game


You can acquire a machine that can play master level chess for a few hundred dollars. They have
some AI, but they largely compete with people via brute force calculations, which entail scanning
hundreds of thousands of locations. You must be able to scan 200 million spots per second to
overcome a world champion utilizing brute force and well-established techniques [15].
6 Blockchain, IOT and AI Technologies for Supply Chain Management

1.2.2.4 Speech Recognition


By the 1990s, computer-based speech recognition had advanced enough to be used for limited
purposes. As a result, United Airlines has replaced the flight information keyboard tree with a
system that uses voice recognition to recognize flight numbers and city names. It’s very com-
fortable. On the other hand, certain computers can be programmed by voice, but most users prefer
the keyboard and mouse for more convenience.

1.2.3 FUNDAMENTAL OF BLOCKCHAIN APPROACHES


Blockchain is a system of interconnected blocks that contains transaction history and other user
data. It is based on the concept of a decentralised distributed digital ledger. This technology en-
ables the network’s user nodes to conduct cryptographically secure and anonymous money
transactions, with the transactions being authenticated and approved by all users in a public
manner. It’s a cutting-edge technology that’s becoming increasingly popular as a result of the use
of digital currency. Although blockchain has a promising future in online transactions, it is prone
to a variety of security and vulnerability flaws.
A peer-to-peer architecture underpins blockchain technology. Because it’s decentralized and
made up of a series of blocks, it’s called blockchain. Since Satoshi Nakamoto’s original concept
was derived and implemented in Bitcoin, blockchain has been a hot topic among scholars. Its
attributes have also increased the scope of its applicability [16–20]. Because it saves all of the
nodes’ calculations in each of them, it’s also known as distributed ledger technology. The net-
work’s reliability is not an issue because the ledger is shared. Hash code, which is a one-of-a-kind
and unchangeable value generated by a sophisticated mathematical hash function, is also included
in the blocks. Transactions are not done in the traditional way, especially with real user IDs and
addresses, so there are numerous options for anonymizing both senders and recipients. The system
is somewhat autonomous because there is no central authority. As a result of these factors, the
blockchain concept has evolved into a new technology that can be used in a variety of industries.

1.3 THE INTERSECTION OF BLOCKCHAIN, INTERNET OF THINGS (IOT), AND


ARTIFICIAL INTELLIGENCE IN SUPPLY CHAIN MANAGEMENT
1.3.1 IMPROVING DATA STANDARDIZATION, PRIVACY, SECURITY, AND SCALABILITY
Blockchain enables decentralized aggregation of large amounts of data generated by IoT devices,
allowing benefits to be shared more evenly among participants in supply chain exchanges [21]. As
shown in Figure 1.4, the confluence of IoT, AI, and blockchain technology approaches in supply chain
management includes data standardization, privacy, security, scalability, traceability, and quality.

1.3.1.1 Standardization of Data


Smart objects generate a large amount of data. This data must be managed, processed, transported,
and stored correctly. Standardization is necessary for true device and application interoperability
[22]. The right standards, issued at the right time in a technology’s development, can help ensure
interoperability, generate trust in the system, and make it easier to use. Standardization’s ultimate
goal is to reduce all features to a single scale without distorting the variances in value ranges. Data
normalization is the process of rescaling the attributes to have a mean of 0 and a variation of 1.

1.3.1.2 Privacy
Special considerations are needed to protect personal information from disclosure of things in the
Internet of Things environment [23–25]. You can give almost every physical or logical entity
or object a unique identifier and the ability to autonomously navigate communications over the
Internet or similar networks.
Fundamentals of IoT, AI, and Blockchain 7

FIGURE 1.4 The Confluence of IoT, AI, and Blockchain Technology Approaches in Supply Chain
Management.

1.3.1.3 Security
IoT, AI, and Blockchain are three new technologies that can boost productivity and help supply
chain exchange partners provide the integrity they need. The combination of Blockchain, IoT,
and AI technology is thought to have a huge revolutionary influence across a variety of in-
dustries, as it shows a possible avenue for controlling IoT devices. The use of blockchains and
IoT allows users to create a more resilient, responsive, and distributed peer-to-peer system with
the ability to engage with supply chain exchange partners in a “trustless,” safe, and real-time
manner. More importantly, blockchain-based solutions [26] have the potential to change the
IoT’s potential benefits by bridging the device-data interoperability gap while maintaining se-
curity, privacy, and dependability.

1.3.1.4 Scalability
The blockchain can be managed using either a centralized database (such as MySQL) or distributed
hash table (DHT) technology. As a result, (off-chain) transactions complete faster and are more
scalable. Off-chain solutions also have the potential to interoperate with enterprise infrastructures
that store non-essential data. In addition, supply chain blockchain-enabled IoT applications adapt
to IoT network features such as heterogeneity, dynamic topology, complexity, scalability,
throughput, and memory size [27]. These solutions seek to improve scalability by modifying the
basic parts of blockchain transactions by using new or especially lightweight network protocols for
IoT devices, editable blockchain enhancement techniques, and directed acyclic graphs (DAGs) to
increase block size. Increasing the block size of a public blockchain improves scalability and
provides additional storage and processing capabilities, but it can also slow down the block pro-
pagation speed of your network.

1.3.2 USING A BLOCKCHAIN-BASED IDENTITY FOR AUTHENTICATION


When the blockchain is implemented, users will be able to create their own identities and publicly
verifiable information for them. Users can save public data on the blockchain, removing the re-
quirement for third parties to handle identity data [15]. A local blockchain is used to register
ordinary nodes for authentication. Smart contracts are utilized on cluster head nodes to validate
8 Blockchain, IOT and AI Technologies for Supply Chain Management

FIGURE 1.5 Blockchain-Based Identity for


Authentication.

registration and authentication requests made by normal nodes. The public chain stores information
about the registered nodes.
According to the W3C, “Verifiable Credentials reflect assertions made by an issuer in a tamper-
evident and privacy-respecting manner.” Verifiable credentials, in essence, allow for the digital
watermarking of claims data using a combination of public key cryptography and privacy-
preserving methods to avoid correlation [28,29]. As a result, physical credentials can be safely
transformed to digital, and holders of such credentials can choose publish particular information
from their credentials without disclosing the actual data, and other parties can instantaneously
validate this data without having to contact the issuer.
Distributed identifiers are globally unique and persistent identifiers. The ID owner has full
control over them. Distributed IDentifier (DID) does not depend on a centralized registry, au-
thority, or identity provider. When an organization provides verifiable credentials, it also pro-
vides a public DID. The blockchain, which is an immutable record of data, stores the same
public DID. Distributed identifiers are globally unique and persistent identifiers. The ID owner
has full control over them. DID does not depend on a centralized registry, authority, or identity
provider. When an organization provides verifiable credentials, it also provides a public DID.
The blockchain, which is an immutable record of data, stores the same public DID. If you want
to verify the authenticity/validity of your credentials, you can search they DID on the blockchain
to see who issued it without contacting the publisher. The blockchain acts as a distributed
registry of verifiable data. A “phone book” that anyone can use to find out which organization a
particular public DID belongs to.
The owner, publisher, and verifier are three participants in blockchain-based identity man-
agement. When using blockchain technology for identity management, it is important to remember
that there are three different parties involved: identity owner, issuer, and verifier [30–34]. The ID
holder’s personal credentials can be issued by the ID issuer. The identity issuer may be a trusted
third party B. Local government (user). When issuing a card, the card issuer confirms the legality
of the personal data (name, date of birth, etc.) on the card. Figure 1.5 shows the identity based on
blockchain for authentication.

1.3.3 FIVE STAGES OF SUPPLY CHAIN MANAGEMENT


The control of the flow of products and services from the point of origin to the point of con-
sumption by the end-user is referred to as supply chain management. The regulation of the flow of
goods and services from the point of manufacture to the point of consumption is referred to as
supply chain management. Transportation and storage of raw materials utilized in work-in-
progress, inventory, and fully furnished objects are also included.
Fundamentals of IoT, AI, and Blockchain 9

FIGURE 1.6 The Stages of Supply Chain Management.

The following actors are briefly introduced in Figure 1.6, which depicts a simplified version of
such a process:

i. Suppliers/Provider: Raw materials like as seeds and nutrients, as well as pesticides,


chemicals, and other substances.
ii. Manufacturer/Producer: Typically, the farmer is responsible for everything from
seeding to harvesting. Raw resources are transformed into finished goods.
iii. Distributor/Wholesaler: The distributor is responsible for conveying the producer’s
output (e.g., the product) from the processor to retailers.
iv. Retailer/Dealer: A retailer is responsible for selling items, whether they are sold in
small neighbourhood stores or enormous supermarkets.
v. Consumer/Customer: The consumer is the final link in the chain.

The graphic above depicts the flow of goods, services, and information from the producer to the
consumer [35]. The passage of a product from the producer to the manufacturer, who then transfers
it to the distributor for distribution, is depicted in the diagram. The distributor then delivers it to a
wholesaler or retailer, who distributes the items to a variety of locations where customers can
easily purchase them.
Supply chain management is basically a combination of supply and demand management.
Examine the entire chain using a variety of tactics and methods and work efficiently at each stage.
Each entity involved in the process must strive to reduce costs and help organizations improve
long-term performance while creating value for stakeholders and consumers [36]. This method
helps reduce charges by eliminating unnecessary costs, transfers, and processing.
The following are the main advantages of supply chain management:

• Improves client service and relationships.


• Develops more efficient distribution systems for in-demand items and services.
• Enhances efficiency and business processes.
• Lowers the cost of storage and transportation.
• Reduces both direct and indirect expenditures.
• Assists in the timely delivery of the correct items to the correct location.
• Supports the successful execution of just-in-time stock models by improving inventory
management.
• Assists businesses in adjusting to globalisation, economic turmoil, rising customer de-
mands, and other changes.
• Assists businesses in reducing waste, lowering costs, and increasing efficiency throughout
the supply chain.
10 Blockchain, IOT and AI Technologies for Supply Chain Management

1.3.4 AREAS OF EXPERTISE IN SUPPLY CHAIN MANAGEMENT


• The five aspects that make up supply chain management are supply planning, production
planning, inventory planning, capacity planning, and sales planning.
• Supply planning identifies the most efficient way to cover the demand generated by de-
mand planning. The goal is to create a supply-demand balance that meets the company’s
financial and service goals.
• Production planning deals with the company’s production and manufacturing modules. It
takes into account resource allocation for employees, materials, and manufacturing capacity.
• The production/supply plan includes the following steps:
• Collaboration and Supplier Management
• Production Planning
• Inventory planning analyzes the optimal quantity and timing of inventory to meet sales
and production requirements.
• Capacity planning estimates the number of production workers and equipment needed to
meet product demand.
• The movement of items from the supplier or manufacturer to the POS is monitored by
sales and network plans. Packaging, inventory, warehousing, supply chain, and logistics
are all procedures under the control of sales.

A supply chain is required that is connected from beginning to end, across the organization and
beyond, to flourish in a rapidly developing global market [37–39]. These five steps should be
followed to accomplish connected supply chain planning.

1.3.4.1 Make the Transition to Real-Time Supply Chain Planning


Companies that plan using ERP systems and spreadsheets rely almost entirely on historical data,
leaving little room for change in the case of demand or supply disruptions. For example, a
company can anticipate the number of products it will sell in the current quarter using data from
the previous year.

1.3.4.2 Supply Chain and Enterprise Planning Should Be Combined


The second phase is to connect formerly compartmentalised supply chain planning to sales and
operations planning, as well as finance planning. By synchronizing their short-term operational
planning with their bigger business planning operations, companies can make real-time changes to
inventory estimations and supplies.

1.3.4.3 Get Ready for the Demands of the End Consumers


Consumer packaged goods manufacturers face a perpetual challenge in anticipating what con-
sumers want and when they want it. For example, detects client demand signals by providing end-
to-end intelligence across the supply chain, as well as beyond an established network of whole-
salers and retailers.

1.3.4.4 Utilize Real-Time Data at Every Stage of the Supply Chain


Supply chain planning often includes different suppliers, channels, customers, and pricing
schemes, so leverage real-time data at all stages of the supply chain, especially if spreadsheets are
the primary planning tool. The model is huge and can become unmanageable in some cases.

1.3.5 APPLICATIONS IN SUPPLY CHAIN MANAGEMENT USING BLOCKCHAIN APPROACHES


Blockchain allows all participants in a supply chain to have access to the same data, potentially
minimizing communication and data transfer problems. Less time can be spent confirming data
Fundamentals of IoT, AI, and Blockchain 11

and more time can be spent delivering goods and services – improving quality, lowering costs,
or doing both.
Blockchain allows all participants in the supply chain to access the same data, which may
minimize communication and data transfer issues. You can spend less time reviewing your data
and more time delivering goods and services to improve quality, reduce costs, or both. Blockchain
has the potential to improve supply chain transparency while reducing costs and risks. Below are
some of the key benefits that blockchain supply chain innovation can offer.

Key Potential Benefits


• Improved traceability of the material supply chain to ensure compliance with business
requirements.
• Reduce losses from gray market/counterfeit transactions.
• Reduce paperwork and management costs by improving visibility and compliance of
outsourced contract manufacturing.

Possible Secondary Benefits


• Enhance your company’s reputation by maintaining transparency about the materials used
in your products.
• Increase the reliability of the data provided and the trust of the public.
• Reduce the risk of PR disasters due to supply chain failures.
• Participate in discussions with stakeholders.

The company digitizes physical assets; provides decentralized, invariant records of all transactions;
and allows them to trace assets across the supply chain, from manufacturing to distribution to end
user. End-to-end tracking is visible and accurate. This greater supply chain transparency benefits
both firms and customers.

1.4 IOT, ARTIFICIAL INTELLIGENCE, AND BLOCKCHAIN-BASED SUPPLY


CHAIN MANAGEMENT: ARCHITECTURAL DESCRIPTION
1.4.1 PROPOSED SUPPLY CHAIN STRUCTURE AND DATA PRESERVATION APPROACH
Figure 1.7 depicts the whole architecture of the proposed privacy protection technique based on
blockchain technology. The block diagram for the proposed work includes three processes: supply
chain, AI, and IoT [40]. In the supply chain process, several segments are linked to one another in
various areas of the chain, such as service, inventory, and cost, showing the whole product
structure and data will be transmitted via blockchain technology.
A supplier of raw materials such as seeds, fertilizers, pesticides, chemicals, and other sub-
stances. A farmer who usually oversees the entire process from seed to harvest. Raw materials
are converted to finished products. The distributor is responsible for transferring the producer’s
products (such as products) from the processor to the retailer. Retailers are responsible for
selling their products, whether they are sold in small stores in the neighborhood or in large
supermarkets.
The consumer is the last link in the chain. Blockchain helps prevent fraud on high-value
products, such as diamonds and medicines, by increasing the transparency of the supply chain
[41–43]. By mitigating or eliminating the effects of counterfeit goods, blockchain helps com-
panies understand how raw materials and finished goods pass through each subcontractor,
reducing lost profits from counterfeit and gray market transactions and helps building confidence
in end-market consumers.
12 Blockchain, IOT and AI Technologies for Supply Chain Management

FIGURE 1.7 Proposed Architecture.

1.4.2 MCELIECE CRYPTOSYSTEM


McEliece’s cryptosystem, which dates from the 1970s and is based on the syndrome decoding
issue, is an example of a code-based cryptosystem. McEliece’s technique has a fast encryption and
decryption time, which is beneficial for executing quick blockchain transactions. McEliece’s
cryptosystem, on the other hand, necessitates the storage and execution of enormous matrices that
serve as public and private keys. Such matrices often take up between 100 kilobytes and several
megabytes, which can be a limitation when dealing with resource-constrained systems.
For encryption and decryption, the McEliece algorithm is used in Figure 1.8.

a. Consider plain text a, which is embedded with the weight vector e.


b. The Cipher text b is calculated using the formula b = a ∗ G + e
c. The equation that generates the encrypted text is as follows: y1 = b ∗ P−1

The encrypted text is given by y1.


The decryption procedure is as follows

a. By extracting the first four components of y1, which is represented by X0


b. The decryption procedure is carried out. x = S−1 ∗ y1
c. Finally, x outputs plain text.
Fundamentals of IoT, AI, and Blockchain 13

FIGURE 1.8 Key Management Process.

As a result, utilizing appropriate keys, the McEliece algorithm is used to encrypt and decode the
data.
Figure 1.9 shows a comparison of execution times for the asymmetric techniques. According to
the graph, the recommended McEliece technique completes the encryption procedure in 1.2 sec-
onds. The RSA technique, on the other hand, completes the encryption operation in 2.8 seconds
[44]. As a result, the proposed McEliece algorithm requires less time to encrypt data than the
existing RSA technique. The encryption time of the proposed McEliece is compared to symmetric
and asymmetric encryption algorithms. Overall, the results show that the McEliece algorithm
encrypts in a very short amount of time.

The suggested algorithm has the following advantages:


• Both the RSA and McEliece algorithms use a key length of 1024-bits.
• Despite having the same number of rounds for the encryption process, the suggested
McEliece algorithm takes less time to encrypt than the existing RSA technique.
• This is because the number of encryption rounds required is smaller than the number of
rounds required by the RSA method.

A comparison of the execution times consumed by the asymmetric approach during the decryption
process is shown in Figure 1.10. According to statistics, the decryption process for the proposed
McEliece algorithm takes 1.3 seconds. On the other hand, with the RSA method, it takes
3.6 seconds to decrypt the message [45]. As a result, the proposed McEliece algorithm takes less
time to decode the data than the RSA algorithm. Compared to existing algorithms like RSA, the
proposed McEliece method takes less time to decrypt [46]. This is because the McEliece method
requires less blocks to decrypt than other algorithms.

FIGURE 1.9 Asymmetric Methods Execution Time (Encryption) Comparison.


14 Blockchain, IOT and AI Technologies for Supply Chain Management

FIGURE 1.10 Asymmetric Methods Execution Time (Decryption) Comparison.

TABLE 1.1
Algorithms in Summary
Algorithms Key Length (Bits) Execution Time (Seconds)

Encryption Decryption
RSA 1024 2.8 3.6
McEliece 1024 1.2 1.3

The execution times for the symmetric and asymmetric techniques are compared in Table 1.1. The
table includes a list of algorithms, as well as their corresponding key lengths (in bits) and en-
cryption and decryption process times. Both symmetric and asymmetric encryption approaches are
compared to the proposed McEliece decryption time. The McEliece symmetric algorithm is
compared to the RSA asymmetric approach and the results demonstrate that the McEliece method
requires relatively little time to decrypt.

1.4.3 OPTIMIZED SECURE DATA TRANSMISSION


In supply chain management, blockchain technology is a viable alternative for secure information
exchange. However, maintaining security at all layers of the blockchain [47] is so important that
the McEliece cryptography system is becoming more and more popular. A secure flow of data
between manufacturers, suppliers and customers is critical to being able to respond to market
fluctuations.
Secure data flow between manufacturers, suppliers, and customers is essential. The value of
information or assets that a supplier owns, owns, accesses, or processes under a contract cannot be
quantified. This is a major obstacle to the entire supply chain. The main advantage of this pro-
cedure is that only identified people can access the shared data using the same key issued by the
sender. This makes the exchange of information very secure and allows stakeholders to function in
any corporate environment.
Fundamentals of IoT, AI, and Blockchain 15

1.4.4 SECURITY ISSUES IN SUPPLY CHAIN MANAGEMENT FOR INFORMATION EXCHANGE


Reducing supply chain links is responsible for reducing the risks associated with recipients and
shipping. Supply chain transportation and other weather, border security, economic collapse, and
natural disaster capabilities make it easy to connect supply chain technology with as much data as
possible with automated supplier analysis and improves supply chain reliability and efficiency, and
thanks to sellers, delivery partners, and more, the business is less exposed to unforeseen disasters.
Supply chain management is used in a variety of professions such as health care and logistics, and
information in data formats is highly sensitive as moved from intermediate-to-intermediate levels
[48]. Researchers use a variety of optimization tools and technologies in logistics to address many
areas where security is a major concern. Network optimization tools model the entire supply chain
[49], including forecast data, manufacturing, product and asset data, inventory and distribution
rates, features, and costs. Site-level supply chain modeling with other planning tools does not fall
into the category of network optimization techniques.

1.5 CASE STUDIES


1.5.1 CASE STUDY ON SUPPLY CHAIN TRACEABILITY
Every stage of the procedure might be considerably speeding up with blockchain technology. From
raw materials to completed items, every transaction signaling a movement of commodities would
be documented. Documentation would be generated, updated, read, or confirmed by parties on the
blockchain, giving visibility of the whole supply chain. A complete audit trail would be generated,
which could be utilized to protect consumers from counterfeit goods while also increasing com-
pany trust in the authenticity and quality of items, influencing sourcing decisions. Payments might
be made effortlessly between stakeholders throughout the process in finance, based on agreements.
As an addition, linked sensors and smart devices might measure the state of containers and other
information can be stored to inform final.

1.5.2 CASE STUDY ON BLOCKCHAIN-BASED AGRI-FOOD SUPPLY CHAIN


MANAGEMENT IN CHINA
The primary goal of agri-food supply chain management is to limit opportunism brought on by
knowledge asymmetry. To control the unpredictability of the agri-food quasi-organization, a tra-
ditional Chinese agri-food supply chain management uses a contract system and a trust me-
chanism. In the situation of asymmetric information, however, improving transaction efficiency
and maintaining agri-food supply chain stability is nearly difficult. Today, Blockchain, IoT and Big
Data are transforming the agri-food supply chain into a massive smart network that will break
down information barriers.

1.5.3 CASE STUDY ON BLOCKCHAIN-BASED SUPPLY CHAIN FOR TRANSACTION PROCESS


AUTOMATION
The transaction problem in supply chain management is extremely important to stakeholders. The
exchange of transactions is critical for the supply chain’s efficient transportation and logistical
activities. The present supply chain management system has various flaws in terms of security and
confidence in the transaction process. As a result, information is transferred in a semi-digital and
paper-based manner. In this article, we examine a supply chain trust issue and offer a new method
based on blockchain technology for addressing the issue and automating the entire payment
process using a smart contract. Validation using a case study is carried out.
16 Blockchain, IOT and AI Technologies for Supply Chain Management

1.6 CONCLUSION AND FUTURE SCOPE


The blockchain technology will ensure data security at every level of the system. An attacker can’t
update or give bogus data without breaking the chain. The blockchain is a new technology that is
increasingly being used in security systems and other fields. Furthermore, this chapter looked at the
many security issues, obstacles, flaws, and attacks that are preventing more people from using
blockchain technology from a variety of angles. To make the suggested architecture more depend-
able, safe, and scalable, blockchain components are added. Finally, the security and privacy im-
plications of blockchain IoT applications are examined, as well as methods for improving the
scalability and throughput of such systems. Blockchain, the Internet of Things, and Artificial
Intelligence are cutting-edge technologies that will usher in a new era of digital transformation and
disrupt a variety of industries. The convergence of these three technologies will result in the birth of
new business models: Autonomous agents will operate as profit centres on their own. 1) that utilise
IoT in supply chain to build a digital twin, 2) use blockchain technology in supply chain to send and
receive money autonomously, and 3) and use AI in supply chain to make autonomous decisions as
independent economic agents. The influence of supply chains on society, the environment, and fi-
nancial success is immense, as is the establishment of autonomous business models and corporate
digital revolutions. With the right application of modern technologies, supply chains have more
potential to construct and support a sustainable future. By merging technologies such as IoT, AI, and
Blockchain, businesses can reduce greenhouse gas emissions, optimize routes, remove waste, ensure
efficient transactions with suppliers, improve worker safety, and limit hazards. A supply chain is
made up of many firms from one end to the other. These contracts are vulnerable to forgery. The
traceability of changing data is one of the major issues in supply chain systems. When compared to
traditional database management systems, the current cost of blockchain solutions is simply too high,
impeding commercial adoption. Current systems rely on the faith of persons involved in the supply
chain’s operation; this reliance on trust must be eliminated. Better blockchain technology, a me-
chanism to prevent any node from joining the supply chain network without permission, and the
McEliece cryptosystem for a more added security layer to IoT communication systems without the
use of any sophisticated or complicated systems are all included in the system.
The semantic-based technique of access control was taken to the next level of security in the
future, with the history of the user’s request and the development of fine-grained policies. With the
proposed system, which will be implemented with heterogeneous devices in a real social network,
other elements such as trust will be investigated.

REFERENCES
[1] Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In
High Performance Computing and Communications, IEEE 14th International Conference on Smart
City, pp. 1392–1393.
[2] Fernandez-Carames, T. M., & Fraga-Lamas, P. (2018). A review on the use of ´blockchain for the
internet of things. IEEE Access, 6(6), 32979–33001.
[3] Song, J. C., Demir, M. A., Prevost, J. J., & Rad, P. (2018). Blockchain design for trusted decen-
tralized IoT networks. In 2018 13th Annual Conference on System of Systems Engineering (SoSE).
IEEE, pp. 169–174.
[4] Singh, S., Sanwar Hosen, A. S. M., & Yoon, B. (2021). Blockchain security attacks, challenges and
solutions for the future distributed IoT network. IEEE Access, 9, 13938–13959, DOI: 10.1109/
ACCESS.2021.3051602
[5] Agrawal, R., Verma, P., Sonanis, R., Goel, U., & De, A. (2018). Continuous security in IoT using
blockchain. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Samsung Research Institute Bangalore, IEEE. 6423–6427.
[6] Roy, S., Ashaduzzaman, Md, Hassan, M., & Chowdhury, A. (2018). Blockchain for IoT security and
management: Current prospects, challenges and future directions. 5th International Conference on
Networking, Systems and Security (NSysS), IEEE, DOI: 978-1-7281-1325-8/18/$31.00
Fundamentals of IoT, AI, and Blockchain 17

[7] Krishnan, N., & Roopesh Jenu, K. (2018). Blockchain based security framework for IoT im-
plementations. In International CET Conference on Control, Communication and Computing, July 5.
[8] Saxena, S., Bhushan, B., & Abdul Ahad, M. (2021). Blockchain based solutions to secure IoT:
Background, integration trends and a way forward. Journal of Network and Computer Applications,
181, 103050, ISSN, 1084–8045, DOI: 10.1016/j.jnca.2021.103050
[9] Nartey, C. (2021). On blockchain and IoT integration platforms: Current implementation challenges
and future perspectives. Hindawi Wireless Communications and Mobile Computing, Article ID
6672482, DOI: 10.1155/2021/6672482
[10] Abu-elkheir, M., Hayajneh, M., & Ali, N. A. (2013). Data management for the Internet of Things:
Design primitives and solution. Sensors, 13(11), pp. 15582–15612, DOI: 10.3390/s131115582
[11] Kosta, B. P., & Naidu, P. S. (2021). Design and implementation of a strong and secure lightweight
cryptographic hash algorithm using elliptic curve concept: SSLHA-160. (IJACSA) International
Journal of Advanced Computer Science and Applications, 12(2), 15582–15612.
[12] Krishnan, K. N., Jenu, R., Joseph, T., & Silpa, M. L. (2010). Blockchain based security framework
for IoT implementations. In International CET Conference on Control, Communication, and
Computing (IC4). IEEE, Thiruvananthapuram, pp. 425–429. DOI: 10.1109/CETIC4.2018.8531042.
[13] Roy, S., Ashaduzzaman, M. D., Hassan, M., & Chowdhury, A. R. (2018). Blockchain for IoT se-
curity and management: Current prospects, challenges and future directions. In 5th International
Conference on Networking, Systems and Security (NSysS)., IEEE, Dhaka, Bangladesh, pp. 1–9, DOI:
10.1109/NSysS.2018.8631365.
[14] Saxena, S., Bhushan, B., & Ahad, M. A. (2021). Blockchain based solutions to secure IoT:
Background, integration trends and a way forward. Journal of Network and Computer Applications,
181, 103050. DOI: 10.1016/j.jnca.2021.103050
[15] Singh, S., Sanwar Hosen, A. S. M., & Yoon, B. (2021). Blockchain security attacks, challenges, and
solutions for the future distributed IoT network. IEEE Access, 9, 13938 –13959, DOI: 10.1109/
ACCESS.2021.3051602
[16] Bermeo-Almeida, O., Cardenas-Rodriguez, M., Samaniego-Cobo, T., Ferruzola-Gomez, E., &
Cabezas-Cabezas, R. (2018). Blockchain in agriculture: A systematic literature review. In
Proceedings of the 4th International Conference, vol. 883, pp. 44–56.
[17] Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwia, K., & Njilla, L. (2017). ProvChain: A
blockchain-based data provenance architecture in cloud environment with enhanced privacy and
availability. In Proceedings of the CCGRID, pp. 468–477.
[18] Kim, T. H., Solanki, V. S., Baraiya, H. J., Mitra, A., & Shah, H. (2020). A smart, sensible agriculture
system using the exponential moving average model. Symmetry, 12(3), 457.
[19] Anupama, H. S., DurgaBhavani, A., & Fayaz, A. B. A. Z. (2020). Smart farming: IoT based water
managing system. International Journal of Innovative Technology and Exploring Engineering, 9(4),
2383–2385.
[20] Caro, M. P., Ali, M. S., Vecchio, M., & Giaffreda, R. (2018). Blockchain-based traceability in Agri-
Food supply chain management: A practical implementation. In IoT Vertical and Topical Summit on
Agriculture, pp. 1–4.
[21] Tian, F. An agri-food supply chain traceability system for China based on RFID & blockchain
technology. In Proceedings of the 13th International Conference on Service Systems and Service
Management, ICSSSM, China. pp. 1–6.
[22] Tian, F. A Supply chain traceability system for food safety based on HACCP, blockchain & internet
of things. In Proceedingsof the 14th International Conference on Services Systems and Services
Management, ICSSSM, pp. 1–6.
[23] Fu, Y., & Zhu, J. (2019). Big production enterprise supply chain endogenous risk management based
on blockchain. IEEE Access, 7(8626088), 15310–15319.
[24] Fernández-Caramés, T. M., & Fraga-Lamas, P. A. (2018). Review on the use of blockchain for the
Internet of Things. IEEE Access, 6, 32979–33001.
[25] Liang, G., Weller, S. R., Luo, F., Zhao, J., & Dong, Z. Y. Distributed blockchain-based data pro-
tection framework for modern power systems against cyber-attacks. IEEE Transactions on Smart
Grid, 10(3), 3162–3173. DOI: 10.1109/TSG.2018.2819663
[26] Perboli, G., Musso, S., & Rosano, M. (2018). Blockchain in logistics and supply chain: A lean
approach for designing real-world use cases. IEEE Access, 6, 62018–62028.
[27] Khan, P. S., & Byun, Y. C. (2020). IoT-Blockchain enabled optimized provenance system for food
industry 4.0 using advanced deep learning. Sensors, 20(10), 2990. DOI: 10.3390/s20102990
18 Blockchain, IOT and AI Technologies for Supply Chain Management

[28] Pham, T. D., & Yan, H. (2017). Tensor Decomposition of Gait Dynamics in Parkinson’s Disease. IEEE
Transactions on Biomedical Engineering, 65(8), 1820–1827, DOI: 10.1109/TBME.2017.2779884
[29] Lindholm, B., Nilsson, M. H., Hansson, O., & Hagell, P. (2016). External validation of a 3-step falls
prediction model in mild Parkinson’s disease. Journal of Neurology, 263, 2462–2469, DOI: 10.1007/
s00415-016-8287-9
[30] Delval, A. (2014). Why we should study gait initiation in Parkinson’s disease. Neurophysiologie
Clinique/Clinical Neurophysiology, 44, 69–76, DOI: 10.1016/j.neucli.2013.10.127
[31] Liang, J., Qin, Z., Xiao, S., Zhang, J., Yin, H., & Li, K. (2020). Privacy-preserving range query over
multi-source electronic health records in public clouds. Journal of Parallel and Distributed
Computing, 135, 127–139, DOI: 10.1016/j.jpdc.2019.08.011
[32] Liu, Y., Zhang, Y., Ling, J., & Liu, Z., (2018). Secure and fine-grained access control on e-healthcare
records in mobile cloud computing. Future Generation Computer Systems, 78(3), 1020–1026, DOI:
10.1155/2017/6426495
[33] Akbarnejad, A., & Baghshah, M. S. (2017). A probabilistic multi-label classifier with missing and noisy
labels handling capability. Pattern Recognition Letters, 89, 18–24, DOI: 10.1016/j.patrec.2017.01.02.
[34] Pei-Hao, C., Rong-Long, W., De-Jyun, L., & Jin-Siang, S. (2013). Gait Disorders in Parkinson’s
disease: Assessment and Management. International Journal of Gerontology, 7(4), 189–193, DOI:
10.1016/j.ijge.2013.03.005
[35] Hathaliya, J. J., & Tanwar, S. (2020). An exhaustive survey on security and privacy issues in
Healthcare 4.0. Computer Communication, 153, 311–335. DOI: 10.1016/j.comcom.2020.02.018
[36] Omar, A. A., Bhuiyan, M. Z. A., Basu, A., Kiyomoto, S., & Rahman, M. S. (2019). Privacy-friendly
platform for healthcare data in cloud based on blockchain environment. Future Generation
Computer Systems, 95, 511–521. DOI: 10.1016/j.future.2018.12.044
[37] Prashanth, R., Dutta, R. S., Mandal, P. K., & Ghosh, S. (2016). High accuracy detection of early
Parkinson’s disease through multimodal features and machine learning. International Journal of
Medical Informatics, 90, 13–21. DOI: 10.1016/j.ijmedinf.2016.03.001
[38] Hui-Ling, C., Chang-Cheng, H., Xin-Gang, Y., & Su-Jing, W. (2013). An efficient diagnosis system
for detection of Parkinson’s disease using fuzzy k-nearest neighbor approach. Expert Systems with
Applications, 40(1), 263–271. DOI: 10.1016/j.eswa.2012.07.014
[39] Al, M. K. A., Musaed, A., Kashfia, S., & Saiful, I. M. (2017). Cloud based framework for
Parkinson’s disease diagnosis and monitoring system for remote healthcare applications. Future
Generation Computer Systems. 66, 36–47. DOI: 10.1016/j.future.2015.11.010
[40] Hausdorff, J. M. (2009). Gait dynamics in Parkinson’s disease: Common and distinct behavior
among stride length, gait variability, and fractal-like scaling. Chaos, 19, 026113.
[41] Zeng, W., & Wang, C. (2016). Parkinson’s disease classification using gait analysis via deterministic
learning. Neuroscience Letters, 633, 268–278.
[42] Cong, F. (2015). Tensor decomposition of EEG signals: A brief review. Journal of Neuroscience
Methods, 248, 59–69.
[43] Lin, K., Pankaj, S., & Wang, D. (2018). Task offloading and resource allocation for edge-of things
computing on smart healthcare systems. Computers & Electrical Engineering, 95(72), 511–521.
DOI: 10.1016/j.compeleceng.2018.10.003
[44] Bro, R., & Kiers, H. A. L. (2003). A new efficient method for determining the number of compo-
nents in PARAFAC models. Journal ofChemometrics, 17, 274–286.
[45] Despotovic, V., Skovranek, T., & Schommer, C. (2020). Speech based estimation of Parkinson’s disease
using Gaussian processes and automatic relevance determination. Neuro Computing, 401, 173–181.
[46] Goyal, J., Khandnor, P., & Aseri, T. C. (2020). Classification, prediction, and monitoring of
Parkinson’sdisease using computer assisted technologies: A comparative analysis. Engineering
Applications of Artificial Intelligence, 96, 103955.
[47] Armañanzas, R., Bielza, C., Chaudhuri, R. K., Martinez-Martin, P., & Larrañaga, P. (2013).
Unveiling relevant non-motor Parkinson’s disease severity symptoms using a machine learning
approach. Artificial Intelligence in Medicine, 58(3), 195–202, ISSN 0933-3657, DOI: 10.1016/
j.artmed.2013.04.002
[48] Sgantzos, K., & Grigg, I. (2019). Artificial intelligence implementations on the blockchain. Use
cases and future applications. Future Internet, 11, 170. DOI: 10.3390/fi11080170.
[49] Lin, K., Pankaj, S., & Wang, D. (2016). Task offloading and resource allocation for edge-of things
computing on smart healthcare systems. Computers & Electrical Engineering, 72, 348–360. DOI:
10.1016/j.compeleceng.2018.10.003
2 Blockchain, IoT, and Artificial
Intelligence Technologies for
Supply Chain Management:
Bibliometric Analysis
Esra Ozmen
Ankara Hacı Bayram Veli University, Ankara, Turkey

Nurbahar Bora
Atatürk University Social Sciences Institute, Erzurum, Turkey

CONTENTS
2.1 Introduction.............................................................................................................................19
2.2 Background of the Study .......................................................................................................20
2.2.1 Blockchain ..................................................................................................................20
2.2.2 Internet of Things (IoT) .............................................................................................21
2.2.3 Artificial Intelligence..................................................................................................21
2.2.4 Supply Chain Management (SCM) ........................................................................... 22
2.3 Related Works ........................................................................................................................22
2.4 Methodology...........................................................................................................................26
2.4.1 Research Design ......................................................................................................... 26
2.4.2 Data Collection...........................................................................................................26
2.4.3 Data Analysis .............................................................................................................27
2.5 Findings ..................................................................................................................................27
2.5.1 Co-Occurrence/Author Keywords..............................................................................27
2.5.2 Attribution/Sources ...................................................................................................30
2.5.3 Bibliographic Link/Country......................................................................................34
2.6 Discussion...............................................................................................................................37
2.7 Conclusion and Future Scope ................................................................................................39
References........................................................................................................................................ 39

2.1 INTRODUCTION
Business firms follow different strategies to have competitive advantage in the market. With the
development of technology, various systems and applications are utilized by enterprises for having
competitive advantage, survival, decision planning, management, and so on. Moreover, with the
emergence of Industry 4.0, it is seen that various concepts and systems have also emerged in the
use of technology by enterprises; for example, improved supply chain management systems
providing material, information, and money flow; artificial intelligence imitating human intelli-
gence; the Internet of Things, which enable physical objects to be connected with each other and
with larger systems are new concepts that have entered our life with the development of tech-
nology. In this chapter, a bibliometric analysis study has been conducted with 1558 metadatasets.

DOI: 10.1201/9781003264521-2 19
20 Blockchain, IOT and AI Technologies for Supply Chain Management

The data were collected in January 2022, via Scopus database. All research studies published
between 1995 and 2021 and including Blockchain, IoT, Al, or SCM keywords are listed. With the
bibliometric analysis it is possible to produce scientific maps that reveals relationships in inter-
disciplinary fields. This original study also aimed to contribute related literature, which requires
holistic bibliometric analysis covering these four areas. For data visualization, analysis was per-
formed using the VOSviewer tool. It is plausible to say that this study will be useful in terms of
providing an overview of the blockchain, IoT, AI, and SCM literature and may guide researchers
who want to work in these fields. In addition, this research presents the analysis of Blockchain,
IoT, AI, and SCM research from a holistic perspective using bibliometric visualization techniques.
It contributes to researchers, institutions, and scientists who want to work in these fields, to reveal
and evaluate the effect of developing technological processes. This study is limited to the Scopus
database. Those who want to work in this field can examine the databases and find WoS, IEEE
Xplore, Google Scholar, etc.
In this chapter, it is aimed to contribute to the literature by subjecting the studies in the fields of
Blockchain, IoT, AI, and SCM to a holistic bibliometric analysis. The execution of the study was
carried out in four main steps. Firstly, it was aimed to examine the current status of the studies in the
field of blockchain, IoT, AI, or SCM. Then, the databases with the studies on these fields were
searched. The data collection process was determined by deciding on the publication range of the
studies in the Scopus database. The bibliometric analysis step of the collected data was started by using
the VOSviewer tool. Details such as country, source, and keywords were discussed in the analysis
phase. The results were presented in light of the findings and various suggestions were included.
Within the scope of this chapter, the following objectives are expected to be achieved:

• To provide a systematic perspective on past, present, and future developments in


Blockchain, IoT, AI, and SCM technologies.
• To fill the gap in the literature by providing bibliometric analysis of interdisciplinary fields.
• To guide future research on the course of technology and to contribute to the academic
literature.

Organization of Chapter: The chapter is organized as: Section 2.2 elaborates the background of
the study. Section 2.3 highlights the related works. Section 2.4 elaborates on the methodology.
Section 2.5 outlines the findings. Section 2.6 stresses the discussion. Section 2.7 concludes the
chapter with future scope.

2.2 BACKGROUND OF THE STUDY


2.2.1 BLOCKCHAIN
There are many definitions in the literature about blockchain. For example, Beck [1] (2018) defined
it as a database that allows secure and consistent transactions by many nodes in the network. Zheng
et al. [2] (2017) defined blockchain as a data ledger. While the transactions approved in this data
ledger are stored in block lists, the data ledger grows as each block is added. In another definition
of blockchain, it is expressed as a part of a distributed software system to ensure data integrity [3].
According to Swan [4] (2015), blockchain is essentially a distributed database system that records
transaction data and information, secured by cryptography and managed by a consensus mecha-
nism. Looking at the definitions in the literature, blockchain can be technically expressed as a
combination of a distributed database and cryptographic algorithms. Blockchain technology has
evolved over time: Blockchain 1.0 in money transfer and payment systems in 2009, Blockchain
2.0, known as smart contracts in 2013, and Blockchain 3.0 in non-financial applications as of
2020 [5]. With the aforementioned development of blockchain, various classifications have been
made. In current classifications, there are public, private, and consortium blockchain categories [6].
IT For SCM: Bibliometric Analysis 21

FIGURE 2.1 Blockchain Working Logic.

Blockchain offers various advantages such as preventing data loss and destruction, high level of
trust, and transparency. In addition to these advantages, there are also disadvantages such as
performance and user privacy [7]. The blockchain working logic conveyed by Crosby et al. [8]
(2016) is presented in Figure 2.1.

2.2.2 INTERNET OF THINGS (IOT)


The introduction of the IoT concept into our lives was proposed in the Massachusetts Institute of
Technology (MIT) Auto-ID laboratories in the early 1990s. However, the first IoT application
“Trojan Room coffee pot” was developed in 1999 [9]. In the same year, the world’s first Internet-
controlled device, a remote toaster, was developed [10]. However, the concept we call IoT is
located in the middle of the concepts of object, human, and Internet today. The Internet of Things
is defined as a network formed by connecting objects in the simplest sense [11]. In other words, it
can also mean that objects have communication with each other. The Internet of Things also refers
to the integration of the virtual world with objects, which has emerged with the development of
technology [12]. RFID, NFC, and wireless technologies have been extremely effective in the
development of the Internet of Things [13]. On the other hand, embedded intelligence, connection,
and interaction steps in the development of this technology should not be forgotten [14]. An
example of a high-level IoT architecture is presented in Figure 2.2 [15].

2.2.3 ARTIFICIAL INTELLIGENCE


Along with the industrial revolution, many developments have occurred in the field of technology.
Technology has helped to do countless jobs that humanity has been challenged or unable to do.
Artificial intelligence is among the technological innovations that started to do the work done
manually by humans. Artificial intelligence is the field of science and technology created with
computer programs and intelligent systems to perform various tasks and tasks that require human
22 Blockchain, IOT and AI Technologies for Supply Chain Management

FIGURE 2.2 An Example of a High-Level IoT Architecture.

intelligence [16]. Artificial intelligence, which is used more and more every day, is the most
important source of innovation today. Many places such as hotels, health care, restaurants, etc. can
be given as examples of fields where artificial intelligence services are employed [17,18].

2.2.4 SUPPLY CHAIN MANAGEMENT (SCM)


Supply Chain is defined as a set of elements including suppliers, logistics services, manufacturers,
distributors, and retailers, and there is a flow of materials, products, and information among those
components [19]. Supply chain management, on the other hand, is the management of materials
and products from the supply of basic raw materials to the final product stage; it is a management
philosophy that focuses on how to exploit the process, competitive advantages, technology, and
capabilities. Supply chain management has some objectives such as increasing customer satis-
faction, shortening the cycle time, reducing costs, and product defects [20]. Supply chain man-
agement also includes processes such as customer relationship management, order processing,
demand management, purchasing, and product development [21,22]. The interrelationship of
blockchain, IoT, AI, and SCM technologies is explained in Figure 2.3 [23].

2.3 RELATED WORKS


There are bibliometric studies in many fields in the literature. Related studies were reached by
querying the keywords “blockchain,” “IoT,” “AI,” “SCM,” and “bibliometric analysis” in WoS,
Scopus, Science Direct, and Google Scholar research databases. In this section, related studies in
the literature are summarized.
Firdaus et al. [24] (2019) analyzed blockchain research activities with 1119 publications in the
Scopus database between 2013 and 2018 using bibliometric methods. The countries with the
highest number of publications in the field of blockchain were the United States, China, and
Germany respectively, while Singapore and Switzerland are the countries with the least number of
publications. On the other hand, in terms of the number of citations, it is seen that the publications
IT For SCM: Bibliometric Analysis 23

FIGURE 2.3 The Interrelationship of Blockchain, IoT, AI, and SCM Technologies.

originated from Singapore and Switzerland receive higher citations. In terms of keywords used in
the publication by authors, it is observed that blockchain, Bitcoin, privacy, smart contract, and
cryptocurrency were determined as the most used keywords. “Data privacy,” “digital storage,”
“data security,” “big data,” and “distributed databases” were determined as the most used cate-
gories in solving problems in blockchain. Miau and Yang [25] (2018) analyzed 801 publications
and blockchain technologies in the Scopus database related to blockchain technology with bib-
liometric methods. The countries with the most publications in the blockchain space are the United
States, United Kingdom, Germany, Switzerland, and China, respectively. “Bitcoin,” “blockchain,”
and “electronic money” are the most used keywords by the authors who publish these posts. It is
stated that the number of literatures on blockchain has increased. Blockchain research in the WoS
database was conducted by Alam et al. [26] (2022). In the bibliometric analysis, China and the
USA were determined as the countries that contributed the most to blockchain research. It is seen
that the blockchain is not only about informatics, but also operates in the fields of tele-
communications, commerce, trust, reputation, and law.
Guo et al. [27] (2021) analyzed the data collected from WoS database and CiteSpace with
VOSviewer analysis tools. It has been determined that the countries with the most publications in
24 Blockchain, IOT and AI Technologies for Supply Chain Management

the field of blockchain are China, the USA, and the United Kingdom, respectively. The USA is the
most cited country compared to other countries. The most popular journals are IEEE Access, IEEE
Journal of the Internet of Things, Next Generation Computer Systems, and Sensor and Applied
Science Basel. In addition, it was concluded that “smart contract,” “Bitcoin,” “security,”
“Ethereum,” and “cryptography” are the most used keywords, respectively. Luo et al. [28] (2021)
performed bibliometric analysis using the blockchain technology SciMat tool with 2993 publi-
cations in the WoS database. They concluded that China, USA, South Korea, England, and
Australia are the countries that broadcast the most, respectively. On the other hand, it is stated that
there are five groups of data sets: “Data Security and Privacy Protection,” “New Algorithms,”
“Features and Applications of Blockchain,” “New Technology Research,” and “Cloud Technology
Research.” Leong et al. [29] (2021) performed a bibliometric analysis of IoT technology studies on
the WoS database using VOSviewer. The most publications in the field of IoT have been seen as
The Technological Forecasting and Social Change. While the most cited journals were
Technological Forecasting and Social Change, the country with the highest number of publica-
tions in IoT studies was the USA. It is also found that “Internet of Things,” “model,” “technology,”
“adoption,” and “user acceptance” are the mostly used keywords by the authors. Katoch [30]
(2021) discussed studies in the fields of IoT, SCM, and logistics in the Scopus database. When the
journals were analyzed according to the number of publications, The International Journal of RF
Technologies Research took the first place. The country with the highest number of publications in
these fields was the USA. It has been seen that “RFID,” “SCM,” “IoT,” “logistics,” and “Industry
4.0” are the most used keywords.
In the study of Raza [31] (2022), research focused on RFID applications in the supply chain
were investigated on Scopus database. According to the findings, while China is the most pro-
ductive country, USA is the most cited country in this field. The International Journal of
Production Economics became the most widely published journal. When the keywords are ex-
amined, it is seen that the most used keywords are “supply chain management,” “radio frequency
identification,” and “supply chains.” It is stated that machine learning, IoT, and blockchain
technologies benefit from supply chain and RFID technologies. Examining the IoT technology in
the WoS database, Wang et al. [32] (2021) reported that the journal with the highest number of
publications in the study was IEEE Access; it has been a sensor magazine. On the other hand, he
stated that China is the most cited country. Internet of Things, wireless sensor networks, man-
agement, and security appear to be the most used keywords. In the bibliometric analysis study
conducted by Niu et al. [33] (2016) about artificial intelligence on the WoS database. Expert
Systems with Applications was the journal with the most publications in the study. When the
journals were examined in terms of the number of citations, artificial intelligence took the first
place. The country that produces the most in this field is the USA. When the keywords are ex-
amined, there are “artificial intelligence (AI),” “artificial neural network (ANN),” “genetic algo-
rithm (GA),” “expert system (IT IS),” and “optimization.” Gao and Ding [34] (2022) performed
bibliometric analysis about artificial intelligence in WoS, Scopus, and Derwent Innovation Index
(DII) databases. They reported that USA, China, England, Germany, and Spain have higher of
publications. In the bibliometric analysis, areas of expertise were determined by focusing on three
clusters named random forest, deep learning, and machine learning.
Zeba et al. [35] (2021) discussed the applications of artificial intelligence in the manufacturing
sector in the WoS database. Bibliometric analysis was performed using VOSviewer and WordStat
analysis tools. The most used keywords in 1979–2010 were “artificial intelligence,” “production
system,” “neural networks,” “flexible manufacturing system,” “expert systems,” “petri nets,”
“control system,” and “decision support.” In 2011–2019, it is stated as artificial intelligence, neural
networks, production system, machine learning, smart manufacturing, cyber-physics, genetic al-
gorithms, and deep learning. The journal that ranked first in terms of citations in 2019 was
International Journal of Production Research. Riahi et al. [36] (2021) conducted bibliometric
analysis using RStudio mapping software in their artificial intelligence-based supply chain research
IT For SCM: Bibliometric Analysis 25

in the Scopus database. International Journal of Production Research ranks first in terms of
number of journals. The countries with the most publications are the United States and the United
Kingdom. Sharma et al. [37] (2022) demonstrated artificial intelligence research in SCM. The
keyword supply chain management ranked first. In SCM and AI research, it was concluded that
there is a relationship with smart agent and inventory control issues. It was concluded that
“supplier selection” in SCM and “genetic algorithms” in artificial intelligence are widely used.
Zekhnin et al. [23] (2020) covered SCM searches in the Scopus, Elsevier, Emerald, Taylor &
Francis, Springer, IEEE, and Google Scholar databases. It has been seen that the USA is the first
country in terms of publishing research in the field of SCM. Supply Chain Management: An
International Journal is the most popular one having the highest number of studies about the topic.
In addition, “SMC,” “supply chain,” and “blockchain” are the most used keywords. Marty [38]
(2022) used BibExcel and Gephi software for supply chain management research in Scopus and
WoS databases. It has been seen that the USA ranks first in terms of the number of publications.
International Journal of Production Economics took the first place in terms of publication
quantity. It is seen that the keywords “supply chain management,” “integration,” “sector,” and
“logistics” are the most common ones.
Kamran et al. [39] (2020) revealed the concept of BIot by analyzing blockchain and iodine
research with bibliometric methods, with 151 publications in the WoS database between 2008 and
2019 (April). In BIot research, the journals with the most publications are listed as IEEE Access,
Sensors, International Journal of Distributed Sensor Networks, Future Generation Computer
Systems, and The International Journal of eScience. The countries with the most publications in
this field were China and the USA, respectively. When the author keywords are examined, it is
seen that the results of “security,” “smart contracts,” “computing,” “privacy,” and “smart city” are
reached, respectively. In the study conducted by Szum [40] (2021), VOSviewer analysis tool was
used with 1019 publications in WoS, Scopus and IEEE Xplore databases between 2012 and 2021
and the author analyzed IoT-based smart city research with bibliometric methods. The countries
with the most broadcasts in the field of IoT-based smart city were determined as India, United
States, and China, respectively. IEEE Internet of Things Journal ranks first among the most widely
published journals, with Sensor second andIEEE Access third. Author keywords were analyzed in
five cluster titles. The words specified are “IoT application domains in smart cities,” “IoT archi-
tecture for smart cities,” “energy,” “security-privacy,” and “data.”
Çiğdem [41] (2021) used the R analysis tool in her study with 8036 publications in the WoS
database between 1991 and 2021. Author analyzed research on digital transformation of the supply
chain using bibliometric methods. China ranked first with the most publications in this field, and
USA took the second place. USA ranks first in terms of number of citations, while China ranks
second. International Journal of Production Economics ranks first in terms of citations and
publications, while International Journal of Production Research ranks second. When the author
keywords are examined, it is seen that the keywords “RFID,” “IoT,” “blockchain,” “sustain-
ability,” and “big data” are used intensively, respectively. Zhang et al. [42] (2020) used R and
VOSviewer analysis tools with 777 publications in the Scopus database in (2012-2019) and
analyzed big data and sustainable supply chain management research with bibliometric methods.
The first country with the most publications in these fields was the USA, while the second was
China. Sustainability ranks first among the most popular magazines, while Lecture Notes in
Computer Science is second. Advances in Intelligent System and Computing ranks third. “Big
data,” “sustainability,” “supply chain management,” “big data analysis,” and “supply chains” were
used for author keywords, respectively.
In summary, it is understood that the number of publications in the field of blockchain is quite
high in the USA and China. IEEE Access is the most popular journal; blockchain and Bitcoin seem
to be the most used keywords. In the field of IoT, it is also seen that the number of publications
made in the USA and China is quite high. It can be inferenced that The Technological Forecasting
and Social Change and IEEE Access are among the most popular journals, and IoT and RFID are
26 Blockchain, IOT and AI Technologies for Supply Chain Management

the most used keywords. Applied Expert Systems: International Journal of Production Research
has become the most popular journal in the field of artificial intelligence with its numerous
publications in the USA. It is seen that “artificial intelligence” is the most commonly used key-
word. It is seen that the number of publications in the USA in the field of SCM is high, Supply
Chain Management: An International Journal is the most popular journal, and “SCM” and “supply
chain” are the most used keywords.

2.4 METHODOLOGY
In order to fill the gap in the literature about Blockchain, IoT, AI, and SCM with a holistic
bibliometric analysis and provide the interaction between developing technologies from a holistic
perspective, a bibliometric analysis was conducted in this study. This chapter focus on the fol-
lowing research questions:

• Which countries, journals, and author keywords are included in Blockchain, IoT, AI, and
SCM research?
• Which countries and journals are mostly cited in Blockchain, IoT, AI, and SCM
researches?
• How are these areas related to each other over time?

2.4.1 RESEARCH DESIGN


Bibliometric analysis is one of the quantitative research methods that helps to analyze publications.
With this analysis, it is possible to clearly display and visualize the interactions and performances
of different disciplines [27]. Lists of countries, authors, institutions, journals, keywords, etc. help
to visualize the relationships between them using scientific maps [43].

2.4.2 DATA COLLECTION


Within the scope of this research, data collection was carried out on 23 January 2022 via the Scopus
database. In this context, research published in English languages between the years 1995 and 2021,
having the keywords “Blockchain,” “IoT,” “AI,” and “SCM” in part of the “title,” “abstract,” and
“keywords” were queried. The listed 1558 researches were incorporated in this study. The metadata
set was obtained in “.csv” format and the data collection process was completed. Scopus, which has
been in existence since 2004, is a database that holds close to 69 million records, serving many
researchers in the social, health, life, and physical sciences [43]. The query used in the data collection
process is given below. The steps followed in the study are shown in Figure 2.4.

FIGURE 2.4 Data Collection Process.


IT For SCM: Bibliometric Analysis 27

FIGURE 2.5 Data Analysis Process.

Query: TITLE-ABS-KEY (((“Blockchain” OR “IoT” OR “Internet of Things” OR “Artificial


Intelligence” OR “AI”) AND (“SCM” OR “Supply Chain Management”)))

2.4.3 DATA ANALYSIS


There are many analysis tools with different features for the realization of bibliometric analysis.
Within the scope of this research, bibliometric analysis was performed using the open source
VOSviewer software developed by Leiden University (Netherlands) for the analysis of the
data [44]. With VOSviewer, it is possible to create nodes according to the size of the data, repetition
of nodes, and data visualization according to the level of interaction between nodes [45]. The
bibliometric analysis of the data was completed with Co-Occurrence-Author Keywords,
Citation-Sources, and Bibliographic Coupling-Countries. The data analysis process is presented
in Figure 2.5.

2.5 FINDINGS
The findings obtained within the scope of the study were discussed in three categories: the author,
the journals cited, and the countries where the study was conducted.

2.5.1 CO-OCCURRENCE/AUTHOR KEYWORDS


When the publications on the use of Blockchain, IoT, and artificial intelligence technologies in
supply chain management are examined, “co-occurrence-author keywords” were chosen to
determine the most used author keywords in the VOSviewer analysis tool. The minimum number
of repetitions for each keyword is set at five. In total, 147 out of 3252 keywords were found to be
related to each other. The analysis process was provided by including only one of the same ex-
pressions with the same meaning and spelling. The analysis process was completed by visualizing
108 data as seven clusters. Table 2.1 shows the 20 most repeated keywords.
When Table 2.1 is examined, it is seen that “block chain” is the most used keyword with the
highest connection strength (853). “Supply chain management” is second place, and “Internet of
28 Blockchain, IOT and AI Technologies for Supply Chain Management

TABLE 2.1
Related Keywords Used in Studies
Keywords Occurrences Total Link Strength
Blockchain 489 853
Supply Chain Management 414 722
Internet of Things 215 335
Industry 4.0 92 160
Rfid 77 97
Traceability 63 162
Smart Contract 58 144
Sustainability 53 124
Logistics 49 110
Smart Contracts 41 97
Big Data 38 75
Artificial Intelligence 37 60
Cloud Computing 33 63
Security 30 79
Machine Learning 29 61
Distributed Ledger 28 69
Transparency 27 74
Trust 23 64
Ethereum 23 60
Distributed Ledger Technology 18 45

Things” in third place. Although “Industry 4.0” is the fourth most used keyword, it is seen that it
ranks fifth in terms of connection strength (160). Figure 2.6 includes the most commonly used
keywords related to each other in studies.
The author keywords that emerged as a result of the bibliometric analysis are presented in
Figure 2.6. It seems that “blockchain” ranks first as the keyword with the most used formations (489)

FIGURE 2.6 Related Author Keywords in the Top 10.


Other documents randomly have
different content
The text on this page is estimated to be only 29.03%
accurate

w Chapter 15 BELOW THE RIO GRANDE 'ARTIME


propaganda of the United States in the other countries of the
Western Hemisphere is of exceptional interest today because of the
importance which "hemisphere solidarity" has assumed in the power
politics of the whole world. The contemporary Division of Cultural
Relations of the Department of State is attempting, on a modest
scale and in unostentatious fashion, to continue a campaign for Pan-
American friendship which was started as a governmental activity
twenty-two years ago by the CPI, and which had been carried on
even before that by the Pan-American Union. And Latin America
commands special attention in the CPI story for an additional
reason: in no other part of the world was the relation between
Wilson idealism and commercial interest more intricate or more
pronounced. American businessmen helped the CPI in all countries,
but in Latin America they carried the chief burden of our national
propaganda. The two most important figures in the CPI invasion of
Latin America were Lieutenant F. E. Ackerman and Edward L.
Bernays. Ackerman, who was attached to Ernest Poolers Foreign
Press Bureau in New York, was dispatched on an organizing trip to
South America in the winter of 1918, reaching Pernambuco on March
i and continuing from there to Rio de Janeiro and then other leading
cities of the continent. At each place he set up a CPI office. In Brazil
the work was left in the hands of Ambassador E. V. Morgan, with the
feature service supervised by Lieutenant William Y. Boyd, assistant
naval attache. H. H. Sevier, former publisher of the Austin (Texas)
The text on this page is estimated to be only 29.35%
accurate

American and future ambassador to Chile, was appointed


director of the Buenos Aires office and also covered Paraguay and
Uruguay, receiving help from private citizens in Asuncion and from
the American minister, F. C. Crocker, in Montevideo. A. A. Preciado
was in charge for Chile, and C. N. Griffis, a Lima publisher, for Peru,
Ecuador, and Bolivia. An organization trip similar to Ackerman's but
not nearly so productive of results was undertaken in Central
America by S. P. Verner, who made Panama his base. The other key
man in the Latin American work was Bernays, who today is widely
believed to have succeeded the late Ivy Lee as No. i public-relations
adviser of American businessmen. He came to the CPI in 1917 as a
young Vienna-born New Yorker who had served as press agent for
the Russian Ballet, Enrico Caruso, and other top-rank artists. His
most important work with the Committee was the conception and
execution of plans for enlisting the help of American business firms.
Toward the end of the war he was also in charge of the whole Latin
American news service, and following the Armistice he went to Paris
with the CPI delegation. Creel was not uniformly pleased with the
post-Armistice work of Bernays, but everyone granted the
importance of his contributions while we were still at war. Ford,
Studebaker, Remington Typewriter, Swift, National City Bank,
International Harvester, and many other corporations were
persuaded by Bernays to turn their Latin American branches into
veritable outposts of the CPI. Pamphlets and other publications were
distributed to customers, and posters and photographic displays
filled windows. Advertising was sometimes given or denied to Latin
American papers in accordance with the editorial attitude toward the
war. Study of the Committee's work in every country below the Rio
Grande brings important results, but the most comprehensive picture
of objectives in all Latin America is given by the record of experience
in Mexico, where the program was the most elaborate and where the
general nature of the whole problem was perfectly illustrated.
The text on this page is estimated to be only 29.09%
accurate

Mexico was not an easy place to convince people of


America's nobility of purpose. It was not forgotten that the
commander of the A.E.F., supposedly fighting for the rights of small
nations, had gone to France almost directly from his military
expedition on Mexican soil. And American seizure of Vera Cruz at
President Wilson's order, as well as the countless actual and alleged
sins of American capitalists and the widespread suspicion of "dollar
diplomacy/' did not make the task easier. Further, it was recalled, at
least in educated circles, that Mexico had certain "lost provinces"
within the borders of the United States— territory which had been
taken during a special manifestation of American big-brotherliness
seventy years before, and which was offered back to Mexico in the
Germans' notorious Zimmermann Note. German propagandists had
been active in Mexico City at least since 1914, and, although the
Allies had made some effort to oppose them, nothing serious was
done until 1917, when the British established a central committee
under H. A. C. Cummins, charge d'affaires, with orders to counteract
and if possible destroy the German propaganda machine. When the
United States entered the picture, it was proposed that our agents
cooperate with the British, but, for a variety of reasons, the
relationship was never close and sometimes not even cordial. One
reason was the CPI belief, at the outset, that we were furnishing
"information," not "propaganda," as Creel explained to John Barrett,
director of the Pan-American Union, in a letter on May 24. A general
analysis of the Mexican problem was given to Creel on February 27,
1918, by Robert H. Murray, who had been about a month at work as
director of the Mexico City office: "We have to deal with a fanciful
revolutionary government which conservatively may be assumed to
be at least passively anti-American and pro-German. We make our
appeal to a densely ignorant population. The proportionately small
educated, reading and theoretically thoughtful part of this population
is inclined by instinct, racial traits, and the example
The text on this page is estimated to be only 29.19%
accurate

and influence of the past generation to distrust us and our


government and to dislike Americans in the mass. There always is in
Mexico more or less latent anti-American sentiment. This may be
dormant, or become active as it serves the purposes of politicians
and chauvinistic agitators, either in or out of the government, to fan
and excite it. Thus considering the people and the government, we
are compelled to realize at the outset that we are working in
territory which normally is antagonistic." Murray was staff
correspondent of the New York World, and apparently continued in
this private employment throughout the CPI work, though at one
point the World objected to his double assignment. There was
certainly no suggestion on the part of the CPI that he was not giving
proper attention to the government job. He was not only an
experienced newspaperman but familiar with Mexico, where he had
lived for seven years. Editor and Publisher said on March 29, 1919:
"Mr. Murray is the only foreign correspondent who has witnessed
and covered every stage of the Mexican revolution from its
beginning in 1910 to the present. He has known personally and
interviewed all of the ten presidents from Diaz's time. . . . He has
also known and interviewed Villa and Zapata." On the basis of his
knowledge of Mexico, Murray advised Creel that the CPI should steer
clear of the British and operate independently. But George Mooser,
who had been sent with a consignment of films via Vera Cruz, and
was apparently slated to be CPI commissioner in Mexico, disagreed.
He favored working through George T. Summerlin, counsellor of the
American Embassy, and Mr. Cummins, the British charge. After study
of both Murray's and Mooser's reports, Creel decided in favor of
Murray and named him head of all CPI work in Mexico. Murray was
not hopeful of results at first, and his principal desire was merely to
show United States colors in the field: "This service will obtain merit
not so much through what it [324)
The text on this page is estimated to be only 28.33%
accurate

may be expected really to accomplish or that it is vitally


necessary to influence public sentiment, but because it will indicate
that we are at least as enterprising as the Germans. . . . I think
news, movies ample for start, reserving other proper measures as
experience and opportunity dictate." To be as enterprising as the
enemy was a strenuous assignment in Mexico City, for German
agents found ready allies in native haters of the Gringo. It seemed
reasonable to many Mexicans when they were told that the
American army in France was merely sharpening a knife that
ultimately would be turned against Mexico. Stories of American
atrocities against Cubans, Filipinos, and Porto Ricans were widely
distributed, and an attempt was made to persuade Mexico that all
was not happy achievement north of the Rio Grande. One of the
most resourceful and urelenting of the opposition papers was El
Democrat, which resisted all blandishments and threats of force
ma/eure and cheerfully continued to belabor America and
Americans. For instance, the March 23, 1918, issue reprinted a
Hearst editorial from the Los Angeles Examiner of a fortnight earlier,
under the head: "North America Confesses Its Evident Defeat in
Europe and Considers Annexing Mexico to Recoup Itself/' Another
number carried a translation of William Hard's article "Is America
Honest?" from the March 1918 issue of the Metropolitan, explaining
that the original had been smuggled through the censorship; the
article was printed again in an extra edition and still once more on
the next day. And on March 22 El Democrata came out with "The
Downfall of the United States Announced by an American ... a
notable editorial from the Metropolitan Magazine, edited by
Theodore Roosevelt." El Democrata's introduction of this typical anti-
Wilson editorial read: "Without any comment whatever on our part,
we present to the Mexican public the apocalyptic picture which a
great North American paints of the corruption of his people and the
chaotic state of its administration. Read and ponder, you Yankee-
lovers!" [3*5]
The text on this page is estimated to be only 29.19%
accurate

Perhaps goaded by such activities of the opposition, or


perhaps merely encouraged by his own success, Murray rapidly
warmed to his task. His initial hesitancy gave way to determination
and finally frank enthusiasm. His office force grew to eight, then to
more than twenty, with sixty-seven "correspondents" scattered
throughout Mexico, including American consuls and vice-consuls,
Allied and American businessmen, and friendly Mexicans. Military
Intelligence reports confirmed Murray's own belief that he was
"getting the Germans on the run," though certain intelligence
officers retained something of the British skepticism regarding
Murray's principal assistant and office manager, Arthur DeLima,
whose father was on the Allied blacklist of "Enemy Traders." Murray
explained the whole situation to CPI headquarters, and the
Committee loyally upheld him, H. N. Rickey, for instance, writing to
Rear Admiral Roger Welles of Naval Intelligence on October 29,
1918, of the Committee's satisfaction with Murray and his work. The
first medium planned for the CPI campaign in Mexico was the
moving picture. George Mooser had thought of giving exhibitions on
certain public squares, but Major R. M. Campbell, military attache,
advised that the appearance of propaganda would be avoided if the
CPI films were quietly introduced into the programs of regular movie
theaters. The problem, here, however, was that most of the theaters
in Mexico City were owned by an American who was on the Allied
blacklist. Mooser advised that the name should be restored to
respectability for the sake of the film program, and, although the
files do not show whether this was done, in two weeks Allied films
were running, while Mooser himself was anxiously awaiting arrival of
his own pictures from Vera Cruz. When, some months later the first
full-length CPI film arrived, it proved to be Pershing's Crusaders.
Murray had it tactfully renamed America at War, but enemy agents
saw to it that the earlier title was made known in the country from
which some other Pershing crusaders had withdrawn scarcely a year
before. Some of the exhibitors raised a point of delicacy [326]
The text on this page is estimated to be only 29.27%
accurate

about showing this particular picture, and Murray felt


obliged to remind them of the blacklist which would cut them off
from future film supplies. In spite of difficulties such as this,
however, the CPI movie effort was considered a great success,
reaching an estimated 4,500,000 people by the end of the war.
When the Armistice came, the CPI was in virtual command of the
whole movie situation, and plans had been made for the final
domination of the business through a central film exchange
controlled by the United States government. As Robert Murray said
in his final report to Creel: "It goes almost without saying that
among a population in which illiterates unfortunately predominate,
motion pictures possess an enormous influence. . . . German agents
saw to it diligently in the beginning that [our pictures] met with an
uproariously hostile reception from the audiences to which they were
shown. Frequently the police were summoned to restore order.
Complaints to the authorities were made by our opponents that our
pictures were inciting riots, and that the screening of portraits of the
President, Gen. Pershing, and other notable personages and of the
American flag floating at the forefront of marching troops or at the
masthead of naval units, constituted an insult to the Mexican
government and people and were in violation of Mexico's neutrality.
On various occasions our displays were halted until the local
authorities could be convinced by tactful explanations, and by
private exhibitions given for their benefit, that the pictures might
properly be allowed on view. "Gradually the demonstrations in the
cines lessened, and finally ceased. The pictures won their way. The
attitude of the public altered until after a few months we were
repaid for our persistence by reports from our agents, telling of
cheering and applause in place of hoots and yells, and even of
'Vivas!' being given for the flag, the President, American war vessels,
and American soldiers." The visual appeal was also made through
posters (printed both in Mexico and the United States) and large
"news pic 
The text on this page is estimated to be only 29.10%
accurate

torials." The latter device had been suggested bv William P.


Blocker, vice-consul at Piedras Negras, and billboards and window
displays were constructed to show twelve pictures at a time. They
were kept well filled, though the material was not always perfectly
adapted to the CPI purpose. In the beginning there were more
pictures of Poilus than of Doughboys, and even the most intuitive
Mexican must have had trouble in discovering the message for him
in pictures of a Lithuanian celebration in McKinley Park, Chicago, or
of logging operations in the Northwest. In the field of
pamphleteering, so important in all countries where the CPI worked,
Murray's first production was a translation of Brand Whitlock's
Belgica in an edition of 10,000, and this was followed by How the
War Came to America. By the end of the war, the Mexico office had
distributed more than 985,000 pamphlets through its own agents,
and at least 100,000 leaflets without imprint had been broadcast
through insertion in patent-medicine packages. A mailing list of
Americans and influential Mexicans was maintained, and every
message went to them on a special letterhead which significantly
omitted the names of the three Cabinet members of the Committee.
Murray wrote Creel on March 13, 1918: "It would not do to give our
German friends and their Mexican friends a chance to shout that the
American War, Navy, and State Secretaries were trying to influence
public sentiment in Mexico/' So only Creel's and Murray's names
appeared on the letterhead, but the threat of force was not
overlooked even here, for at the bottom of each sheet was the
legend: "THE WAR. REMEMBER: THE UNITED STATES CANNOT
LOSE!" Though movies and pamphlets were vital in the Mexican
work, the reader will not be surprised to learn that here, as
elsewhere, news was the chief vehicle of propaganda, or at least the
basis for everything else. Besides the daily cable service, which
brought a total of more than 4,400,000 words, the CPI maintained a
system of daily and weekly news bulletins which the Mexican
government carried post-free through the [328]
The text on this page is estimated to be only 28.89%
accurate

mails. These bulletins were under George F. Weeks, director


of the Mexican News Bureau, who also inaugurated one of the most
unusual of all CPI publishing projects— a small English-language
news-letter for circulation in the United States, in the belief that our
own misunderstanding of the Mexican situation was at least partly to
blame for difficulties between the two countries. This paper,
something like an Official Bulletin, for Mexico, was published from
October 3, 1918, to January 30, 1919. Neutral and pro-Ally papers in
Mexico were delighted to receive the CPI news service, which was
not only free but also timely and interesting. But for some papers
special inducements seemed necessary. When Creel sent Robert
Murray the first check for $2,000 for expenses on February 21, 1918,
he cabled: "Under no circumstances subsidize papers either directly
or indirectly. Make no financial arrangements with Allied committees
until submitted to me/' But just two days later Murray was proposing
that papers in the interior should be helped in buying the Associated
Press service; he suggested that the offer might come through the
American Chamber of Commerce in Mexico City so that the United
States government would apparently not be involved. It is not
certain whether this plan was carried through, but Creel did not raise
objection when informed that George Agnew Chamberlain, the
novelist who at that time was our consul-general in Mexico, planned
to canvass the American colony for $7,500 monthly to be used
largely for advertising. And on March 15, 1918, when Creel was
informed that pro-Ally papers in Guadalajara and Monterrey seemed
to be weakening, he specifically told Murray to use his own
judgment about contributing. This was not to be regarded as a
precedent, but at the same time Creel offered to help arrange
another form of subsidy without cost to the CPI: "We can exert
pressure here to have American firms place advertising under control
American Committee and greatly enlarge appropriations." [329]
The text on this page is estimated to be only 28.79%
accurate

Again, when German propagandists attempted to convince


Mexico that the Fourth Liberty Loan had failed, Creel authorized an
extra appropriation of $2,000 for straight newspaper advertising,
which read in part: "From the time that the Kaiser forced the United
States to enter the war to make the world safe for democracy, the
government has requested loans of $1 5,000,000,000. The American
people have contributed $18,972,955,650. If it were necessary in
order to conquer the Kaiser, they would contribute
$100,000,000,000. And in order to gain the victory they will send to
Germany 10,000,000 soldiers/' But some papers remained stubborn
in spite of the bait of advertising, the threat of newsprint embargo,
and the cutting of communications. El Democrats, for instance,
survived all of these attacks and continued to show a news-
gathering ability that bordered on the supernatural. It offered its
readers what purported to be up-to-the-minute reports of German
victories in France, in spite of the fact that no such messages were
coming over the Allied-controlled cables. Creel told George Weeks on
April 11, 1918: "None of El Democrata's cables go from this country
at all. They are faked in Mexico City. We are watching El Democrata's
mail and telegraph very closely, and have practically shut them off
from communication with this country." And still the German victory
news appeared in El Democrata's columns as long as there was a
German army in the field, and then the attack was shifted to the
terms of peace. One of the special approaches to the Mexican press
was a United States tour, similar to those for other foreign journalists
as planned by Perry Arnold, but in this case especially elaborate. The
CPI kept in the background, but made all arrangements and paid the
bill, which was nearly $10,000. Wilfred E. Wiegand of the Associated
Press Mexican bureau accompanied the group of editors, who were
transported in a special Pullman car from Laredo to New York to
Seattle and return, with the tour under the direction of Lieutenant P.
S. O'Reilly, U.S.N.R. El Democrat was not invited. [330]
The text on this page is estimated to be only 29.18%
accurate

Perhaps the most "Wilsonian" of Robert Murray's projects


for winning the sympathy of the Mexican people was establishment
of American Reading Rooms in seven cities, with approved literature,
newspapers, and periodicals always available. Growing out of this
scheme was the even more ambitious one of American classes in
English, French, bookkeeping, and shorthand. This was immediately
popular, and it was reported that 30,000 students were enrolled. It
was with the greatest reluctance that Murray gave up this particular
phase of the work when the general demobilization order for his
office was received toward the end of January 1919. He thought
there was still work to be done in Mexico. It was not until twenty
years later, however, with establishment of the Division of Cultural
Relations in the Department of State, that the American government
once again frankly addressed itself to the problem of educational
propaganda in Latin America. But Ernest Poole, director of the
Foreign Press Bureau, pleaded that the work of the CPI might not be
ended with the war. In a long, careful, and thought-provoking report
to Creel on December 30, 1918, he urged continuation of a
government bureau to employ the media of news, films, and
features, and keep the official picture of the United States before the
masses of the world, ". . . to clear away all points of
misunderstanding or misconception that already prevail or that will
arise in foreign countries in regard to this nation, its life, work,
ideals, and opinions, its purposes both here and abroad/' * * * But
as Poole was writing that report, CPI offices were making ready to
close, one by one, throughout the world. The last far-flung outpost
would not cease propaganda work until the Committee itself went
out of existence in June 1919, but almost from the moment of the
Armistice CPI agents in various countries raised new anxious
questions for the future. On November 14, Mrs. Whitehouse in Berne
told Edgar Sisson about the attempted Bolshevik strike: "Official of
Swiss government suggests that it would be most helpful to
The text on this page is estimated to be only 28.99%
accurate

have items from our service to the effect that such


disturbances in Europe, especially Switzerland, would interfere with
or even halt plans made by United States for feeding Europe." CPI
affairs themselves were not proceeding smoothly. On November 1 5
Creel applied for passports for the group he was sending to the
Peace Conference (including Sisson, Byoir, Bernays, Charles Hart,
Carl Walberg, Major H. E. Atterbury, and E. H. Shuster) , but shortly
he was cabling about his high displeasure with the way Bernays was
handling publicity for the group, and on November 25 said:
"Contrary to the press, the people that I sent abroad were part of
the Foreign Section, and will have nothing to do but purely
mechanical work in connection with distribution. I will have
absolutely nothing to do with the publicity of the Peace Conference,
nothing to do whatsoever with the organization of any personnel
that will go from here, and am going myself in a capacity personal to
the President. . . . The House Committee [The Inquiry?] in New York
had entire charge of getting the organization of experts together,
and the State Department is looking after others/' Meanwhile, the
intentions of our comrades in arms received new scrutiny. Hearley
reported from Rome that England was trying to persuade Italians
that Britain was their only true friend. Riis said that Copenhagen
newspapers feared the Peace Conference would leave open wounds
and cause enduring bitterness. Mrs. Whitehouse described on
December 10 the significant emphasis by both Reuters and Agence
Havas on reports of Senate opposition to President Wilson. And Paul
Perry cabled Sisson from London on December 12: "The different
views concerning the President's attitude are still those of
expectancy and they are being very much discussed particularly
those referring to the freedom of the seas. The opinions the most
often expressed are that Wilson came to France with certain definite
ideas founded on too small an appreciation of the situation in Europe
and that he is very likely to change his views when he meets and
confers with
The text on this page is estimated to be only 28.88%
accurate

statesmen who have the proper European outlook. Many


criticisms are also expressed here in regards to the increase of the
navy, but opinions are heard that the proposed addition to the navy
would be an asset if it insures cooperation with the navy of Great
Britain in preserving world peace. The press is in favor of the utmost
publicity in regards to the peace conference . . . but the majority of
the officials do not approve of the idea/' From another source Sisson
was informed on December 20: "The French are supposed to be
planning for the President, with very great ability, fetes and
entertainments to distract him from the object of his mission as
much as possible, and to be planning as many postponements and
delays in conference as divergence of President's opinion may
warrant, with the object of forcing his premature departure/' Then
on January 7, 1919, Walter Rogers in Paris reflected Peace
Commission anxiety regarding the tides of opinion at home. He
advised Perry Arnold: "Peace Commission wants following wireless
so as to be received here daily not later than 7:00 a.m. Paris time
substance front page news American press stop Editorial comment
dealing primarily with peace conference and problems of peace stop
Comment desired from not only leading Republican and Democratic
papers but also from papers like New YorJc Call and from weeklies
like New Republic, Collier's etcetera stop Also want brief review
proceedings of Congress with special reference to international
affairs stop . . . you personally prepare biweekly diagnosis state of
mind of country about Peace Conference and policies which country
wants adopted for instance in regard to sending American troops
Russia stop ... All material requested herein is part COMPUB service
and should be addressed to COMPUB." The CPI office in Berne on
February 4 reported that Swiss papers doubted the permanence of
the new world order. They believed "it is almost certain so called
World War not last war stop Without total revolution naive to believe
shall see [333]
The text on this page is estimated to be only 28.67%
accurate

formed great family Europeans of London Paris Madrid


Rome Vienna Berlin Petrograd " And on February 1 5, Guy Croswell
Smith, who had succeeded Mrs. Whitehouse at Berne, paraphrased a
Basel newspaper: "Impression prevailing Wilson gave way to French
English imperialistic pressure stop Germany driven desperation. . . .
Hopeless Germany dangerous to European peace stop Germany and
Entente policies responsible for coming catastrophe by refusing
listen Wilson." Disquieting reports increased as the winter wore on to
Europe's first peaceful spring since 1914. French farmers might try
to turn battlegrounds into wheat fields once more, but only in
Russia, where armies still held the field and even "civil" life was on a
wartime basis, and in Latin America, where the prize of war-won
trade outshone everything else, were the agents of the Creel
Committee sanguine for the future. While the United States prepared
for its repudiation of Woodrow Wilson, for Teapot Dome and the Big
Bull Market, Europe also was on its way back to normalcy. Some
happy chapters were to be unfolded— the Nansen Office, Near East
Relief, Bryan shouting for joy from the press table at the Washington
Conference, Briand and Streseman walking arm in arm at Geneva,
Locarno, the International Labor Office, the Pact of Paris. . . . But
also there were the chapters on Reparations, debt-defaults, inflation,
famine, the Ruhr, the Riff, book-burning, race hatred, mass trials,
concentration camps, Manchuria, China, Ethiopia, Austria, Spain,
Czechoslovakia, Albania, Poland. . . . President Wilson was given the
military victory he wanted on November 11, 1918, and it seemed
that his spokesmen of the CPI had likewise triumphed. But in those
final weeks of the Committee on Public Information the realistic
members of the staff asked themselves if, after all, they had won
their fight for the mind of mankind. [334]
The text on this page is estimated to be only 26.25%
accurate

Part IV THE FUTURE


The text on this page is estimated to be only 28.64%
accurate

Chapter 16 BLUEPRINT FOR TOMORROW'S CPI Six days


before the end of the World War and the supposed victory in the
fight for the mind of mankind, George Creel received this letter from
William Allen White, Republican editor of the Emporia Gazette:
"November 5, 1918 "DEAR GEORGE: "Pardon me for neglecting your
letter of October 29, but I have been a very busy little person since
it came, saving our beloved country from the slimy clutches of your
Democratic Party, and now that the country is saved again I take up
your letter with joy.— I say joy because your letter discloses a
situation which comes to every man more or less, and I have just
been going through a parallel experience. "I have on the Gazette
one of those safe editorial writers who confines himself to
lambasting the Turk and soaking the Kaiser and estimating the
relation of the corn to the population, and who never has made me
trouble. He takes his typewriter in hand about a month ago and
writes what seemed to be a harmless editorial calling attention to
the fact that in the new reorganization of society men were getting
paid for manual labor, which requires little training, as much as
college professors used to get, who spent years in training. "I was in
New York making Liberty Loan speeches when he sent it to me, and
as I thought that it was a good thing that labor was coming into its
own, and that the laborer and the college professor were getting
about the- same, I glanced through it hurriedly, put a head on, 'The
Grand Shake-Up/ added a three-line cracker at the end, saying that
in the grand [337]
The text on this page is estimated to be only 28.83%
accurate

shake-up that was coming society was going to be


reorganized and justice would edge up a little closer to the
millennium. "I sent it back with a bunch of copy, it lay on the dead
hook until three or four days before the election, was printed, and
WHIZZ-BANG! the Third Ward blew up, down where the railroad
boys are getting two hundred bucks per month for fairly common
labor. The editorial was taken to mean a dirty Republican protest
against the Democrats paying the railroad men their hard-earned
wages, which was not my thought at all. . . ." Mr. White's engaging
reflections on the danger of writing for publication, and the almost
certain misunderstanding of motives, must have struck a responsive
chord in the heart of George Creel. Plenty of evidence may be found
of his mistaken snap judgments and his needless exuberance of
invective, but most frequently he was attacked either for total
irrelevancies or for sins which he had not committed. For instance,
he was often accused of "Kaiserism," yet the record seems to show
that he withstood the temptation to dictatorship not only with
courage but with considerable success. And he was accused of
cynicism and insincerity, whereas actually he was one of the most
"oversold" men in America on the very doctrines which he preached.
This book is not meant to defend Mr. Creel as a person, but to show
the CPI for what it was— a social innovation brilliantly conceived and
in many ways brilliantly executed. Its work is with us today. One
measure of the impact of the CPI on American life is the persistence
through two decades of the stereotypes which it gave us during the
war. Some of these are still accepted by scholars, some rejected, but
for the public mind the great majority are as clear today as when
they were vividly presented by Dean Ford's pamphleteers, Charles
Dana Gibson's artists, and Ernest Poole's feature writers. For
instance— the World War was a "People's War" and a "holy war of
ideas"; America, alone of all belligerents, was disinterested;
conscription [338]
The text on this page is estimated to be only 29.02%
accurate

was more democratic than voluntary service, but the


Liberty Loans were more democratic than taxation; the Allies
observed international law; unrestricted submarine warfare was
adopted because of German liking for SchrecIcIichJceit; Germany
alone conducted propaganda against our neutrality; England and
France were committed to President Wilson's program . . . and so
on. Some of the CPI stereotypes, such as the cruder pictures of
German atrociousness in the field of minor tactics, have become
blurred even in the popular mind, while disillusionment has wiped
away, for many, the last trace of Wilson internationalism, perhaps
the most important idea conveyed by the Committee. But by and
large the American people today hold the articles of faith which the
CPI, as spokesman for President Wilson, drew up in 1917 and 1918.
The stamp of the CPI is visible, however, not only in the popular
conception of World War history but also in official thinking about
"holding fast the inner lines" if America should become involved in
the new European War. Dozens of writers recently have told what
will happen to American life with the advent of "M-Day." Some
accounts are based on government reports, some place greater
reliance on the imagination, but in neither case has anyone
suggested a technique or a channel of propaganda which was not at
least tried by the CPI. Even radio broadcasting, unknown in 1918,
was at least simulated by the Four-Minute Men, and of course point-
to-point wireless was important for the Foreign Section. Most people
believe that if the United States should find itself in another war we
would have conscription of labor and wealth and an industrial
mobilization more immediate, more inflexible, and more complete
than during the World War. If so, the CPI formula could not be
followed exactly. We could not afford to have a "George Creel"
mediating between stern military necessity and the normal
procedure of civil life. Whether we should have the earlier type of
committee on public information, and what sort of man would head
it— those are questions on which the American people have not yet
spoken. [339]
The text on this page is estimated to be only 29.43%
accurate

But whether the main pattern were "totalitarian" or


"democratic/' the objectives sought and the general procedures
followed would be those of the CPI. Contrary to naive opinion,
conscription of wealth would not decrease the need for propaganda
of the "Fight or Buy Bonds" variety. As Goebbels and his colleagues
demonstrate, the "hammer and anvil of propaganda" must be
pounded even more noisily to gain popular acquiescence in policies
imposed from above. Whatever change might come over our state in
a new war, a "propaganda ministry" would hold a vital place in the
government. It is clear, for instance, that the present Division of
Cultural Relations in the Department of State needs only the
stimulus of increased international excitement to push it into frank
continuation of work begun by the CPI Latin American branch. And
there is an authentic Creel flavor in the Senate bill, introduced in
January 1938 by Senator Chavez of New Mexico and Senator
McAdoo of California, for construction of a superpower broadcasting
station near San Diego "to transmit programs upon high frequencies
to all the nations of the Western Hemisphere," the programs to be
"particularly designed to strengthen the spiritual, political, and
historical ties between the United States and such other nations of
the Western Hemisphere." Perhaps the Division of Cultural Relations
would be absorbed into a committee on public information upon
declaration of war, perhaps it would continue independently, but
either way it would follow in the steps of the Creel Committee's
Foreign Section, though presumably avoiding some of the errors of
that hastily contrived organization. Similarly on the home front, the
CPI is the clearly recognizable model for practically every plan of
government public relations in the event of war. The most important
blueprint has been prepared by a joint committee of the army and
navy. An understanding of its auspices and significance requires a
general statement of peacetime public relations of the War [ 34° ]
The text on this page is estimated to be only 29.47%
accurate

Department and the Navy Department, and of the changes


which they envisage in the event of war. In the War Department, the
key unit is the Military Intelligence Division (G-2) of the General
Staff, charged with responsibility for public relations, intelligence,
and censorship. The Public Relations Section and the Press Section
maintain relations with the press and with comparable offices in the
navy. During peacetime, the War Department decentralizes its public
relations as much as possible, allowing the various Corps Areas and
other field offices to have direct access to the press, and to carry on
their own public relations according to general rules of policy. Thus,
during peace, the Public Relations Section in Washington is largely
concerned with routine duties of gathering, examining, and
mimeographing press material from various sections of the War
Department, receiving the help of an officer assigned from each
section of the department. As in all offices of both the army and
navy, every effort is made to deal with all civilians courteously and,
within the limits of policy, to give all possible assistance. Navy
publicity is handled by a branch of Naval Intelligence, which, in turn,
is under the Chief of Naval Operations. The present unit grew out of
the Information Section established in 1922, and at present is known
as the Public Relations Branch with Lieutenant Commander Leland P.
Lovette in charge. Two officers serve under him, one an assistant
and the other a director of press relations with a clerical staff of
three. A news room, commodious and well equipped, is maintained
for reporters, and releases are furnished with amazing speed. The
Public Relations Branch also cooperates with motion picture
producers and magazine writers, and undertakes ghost-writing
assignments. This office also keeps close tab on everything about
the navy printed in more than 400 newspapers in several languages,
and from time to time makes reports on the state of public opinion.
The Secretary of the Navy recently issued a memorandum which
read in part: "Officers of the several Bureaus and activities of the
Navy Department designated as [340
The text on this page is estimated to be only 29.23%
accurate

liaison officers with the Navy Department Public Relations


Branch will maintain close contact with the Press Section and furnish
such items as are suitable for publication. . . . Where circumstances
make departure from this procedure advisable, the responsible
officer who releases information . . . should communicate to the
Public Relations Branch the substance of his remarks." Recently the
navy has been less openhanded in its release of significant news,
one of the reasons for the change of policy being a desire to
"amortize the shock of censorship" in the event of war. Since the
beginning of 1937, progress reports on naval construction have not
been released, and correspondents are no longer permitted to go
with the fleet on maneuvers with the former frequency. Both the
army and the navy realize that in the event of war their public
relations programs would undergo change, and that the problems to
be faced would be common to the two branches of service.
Accordingly, the two departments have brought their public relations
programs closer together since January 1937, when a Special Joint
Army and Navy Public Relations Committee was appointed to
investigate the entire field, work out peacetime coordination of the
two services, and draw up the public relations part of the Industrial
Mobilization Plan. After four months of research, the committee
reported to the Army and Navy Joint Board. The report was
approved with minor changes on August 11, 1937. One °f the
recommendations was establishment of a Continuing Joint Army and
Navy Public Relations Committee, and this was formed toward the
end of 1937 with a membership of eight, divided equally between
the army and navy. It is a planning unit, not administrative. Four
sections, each comprised of one army and one naval officer, deal
with publicity, censorship, organization, legal matters. The
committee is now engaged in perfecting the general plans suggested
by the Special Committee. The Industrial Mobilization Plan covers far
more than public relations. It provides for other control units which
are de 
The text on this page is estimated to be only 28.66%
accurate

scendants of the War Trade Board, the War Industries


Board, and other emergency establishments of the World War. The
Public Relations Administration provided in the plan would be the
successor of the CPI. Its functions would be: 1 . To coordinate
publicity programs of government departments and agencies. 2. To
serve as an information bureau to which the nation and the world
might look for accurate and unbiased facts regarding war aims. 3. To
combat disaffection at home. '4. To counteract enemy propaganda
both at home and abroad. 5. To organize all existing propaganda
media for the prosecution of the war. 6. To secure the cooperation of
the press, the radio, and the film industry. 7. To formulate and
administer rules of censorship. Plans have been drawn for securing
the instantaneous backing of individuals and groups in the fields of
newspapers and magazines, advertising, pictures, radio, civic
cooperation. The organization of the Public Relations Administration,
shown by the chart on the next page, is more than merely
reminiscent of the CPI and the Censorship Board. This proposal
comes from the army and navy, but if it should seem like military
infringement on the domain of the civil government, two things
should be remembered: ( i ) That the distinction between civil and
military government can be all but obliterated in time of war; and (2)
that even at the present moment of American neutrality certain
legislators are willing to go at least as far as the fighting men. The
well known May Bill, for instance, introduced March i, 1938, by
Representative Andrew Jackson May of Kentucky, would establish
price-fixing, control of property and services, a system of priorities in
all trade and industry, and limitation of profits. The May Bill has
received considerable support, though attacked by liberals. The
comment of the Philadelphia Record was typical of the opposition
attitude: "In the first [343]
The text on this page is estimated to be only 26.96%
accurate

INDUSTRIAL MOBILIZATION PLAN Public Relations


Administration THE PRESIDENT | ADMINISTRATIONS ONE REP.
EACH INDEPENDENT BOARDS AND COMMISSIONS ONE REP. EACH
ADMINISTRATOR OF PUBLIC RELATIONS DEPUTY ADMINISTRATOR
PUBLIC RELATIONS COUNCIL COORDINATING \ /LIAISON AND A
COMMITTEE DIRECTOR OF PUBLICITY ADVISORY \/ COM AMITTEE
ADMINISTRATION DIRECTOR OF COMMUNICATION CONTROL
(CENSORSHIP) ADVISORY PUBLICITY II RADIO I PICTURES NEWS
.2 ADVERTIS ING rt v II §F CIVIC COOPERATION as s \/ COM
\MITTEE COMMUNICATION CONTROL ARMY NAVY One Blueprint for
Tomorrow's CPI place, the new bill . . . doesn't take the profits out of
war. In the second place, after ducking this basic issue, the bill goes
on to reduce these United States to a dictatorship, going far beyond
anything we have ever tried or needed in our greatest war
emergencies." The minority report on the May Bill said it proposed
"Congressional hara-kiri/' [ 344 ]
The text on this page is estimated to be only 28.99%
accurate

Section 6 of the May Bill, providing a system of "universal


licensing/' is important. No person in industries named by the
President could do business without license from the government,
and of course the license could be revoked if performance were not
"patriotic." By the letter of the law the press would not be affected
("This section shall not apply to the publication or distribution of
newspapers, periodicals, or books") . But in the House Report on the
hearings, this "comment" was printed: "This section empowers the
President to license and completely control all forms of human life
and endeavor and to fix the terms, at his own whim, on which he
will grant the licenses. It makes one exception— a legislative bribe
to 'newspapers, periodicals, and books/ which shall be exempt. But
newspapers are subject to every other provision— registration, draft,
and hedged around in such a way as to easily eliminate the freedom
of the press. Newsprint could be denied or placed at prohibitive price
levels." Another of the important "mobilization" bills is the one
introduced by Senator Josh Lee of Oklahoma on February 28, 1939,
providing for conscription of wealth through forced i per cent loans
redeemable anytime within fifty years at the discretion of the
government, with individual amounts assigned on the basis of
property ownership by local committees similar to the draft boards of
the last war. The Lee Bill is interesting for a number of reasons,
among them this argument advanced in its favor: "In the last war
the government, in order to raise money, was even compelled to find
pretty girls, dress them up as attractively as possible, get them to go
out in front of the curtains in theaters, and make four-minute
speeches begging for enough money to buy food for the soldiers
who were at that time facing death in the trenches." Though the
Veterans of Foreign Wars endorsed the Lee Bill, the Treasury, War,
and Navy Departments seem to have turned thumbs down.
Conscription of lives and dollars and resources and labor may well be
expected in any lengthy war, [345]
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!

ebookball.com

You might also like