Line 67: |
Line 67: |
| <p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p> | | <p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p> |
| | | |
− | <h2>Technology Brie</h2> | + | <h2>Technology Brief</h2> |
| | | |
| <p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p> | | <p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p> |
− | <p class="inline-spacer"></p>
| + | |
− | <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).<ref>McClelland, C. (2017, November 20).<i>[https://medium.com/iotforall/iot-explained-how-does-an-iot-system-actually-work-e90e2c435fe7 IoT Explained — How Does an IoT System Actually Work?]</i> Retrieved from medium.com</ref></p><p class="inline"> Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.</p> | + | <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).<ref>McClelland, C. (2017, November 20).<i>[https://medium.com/iotforall/iot-explained-how-does-an-iot-system-actually-work-e90e2c435fe7 IoT Explained — How Does an IoT System Actually Work?]</i> Retrieved from medium.com</ref></p><p class="inline"> Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.</p> |
| <p class="inline-spacer"></p> | | <p class="inline-spacer"></p> |
| <p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p> | | <p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p> |
Line 89: |
Line 89: |
| <h2>Canadian Government Use</h2> | | <h2>Canadian Government Use</h2> |
| | | |
− | <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,<ref>Treasury Board of Canada. (2013, April 1).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27088 Standard on Optimizing Websites and Applications for Mobile Devices].</i> Retrieved from tbs-sct.gc.ca</ref> the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing<ref>Canada, T. B. (2018, June). <i>[https://www.canada.ca/en/treasury-board-secretariat/services/information-technology/digital-policy-ideas-stage-what-we-heard-report.html Digital Policy: Ideas Stage - Report on What We Heard].</i> Retrieved from canada.ca</ref> an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.</p> | + | <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,<ref>Treasury Board of Canada. (2013, April 1).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27088 Standard on Optimizing Websites and Applications for Mobile Devices].</i> Retrieved from tbs-sct.gc.ca</ref> the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing<ref>Treasury Board of Canada. (2018, June). <i>[https://www.canada.ca/en/treasury-board-secretariat/services/information-technology/digital-policy-ideas-stage-what-we-heard-report.html Digital Policy: Ideas Stage - Report on What We Heard].</i> Retrieved from canada.ca</ref> an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.</p> |
| <p class="inline-spacer"></p> | | <p class="inline-spacer"></p> |
− | <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.<ref>Mungham, T. (2019, April 19).<i>[https://iot613.ca/speaker/tony-mungham/ Integrating IoT to Bring Ideas To Life – Use Cases at CBSA].</i> Retrieved from iot613.ca</ref> The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.</p><p class="highlighted inline mw-collapsible-content"> The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.</p> | + | <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.<ref>Mungham, T. (2019, April 19).<i>[https://iot613.ca/speaker/tony-mungham/ Integrating IoT to Bring Ideas To Life – Use Cases at CBSA].</i> Retrieved from iot613.ca</ref> The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.</p><p class="highlighted inline mw-collapsible-content"> The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.</p> |
| <p class="inline-spacer"></p> | | <p class="inline-spacer"></p> |
| <p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p> | | <p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p> |
Line 102: |
Line 102: |
| <p>Deploying IoT devices and platforms offers a number of benefits to organizations such as: assisting in monitoring overall business processes; improving customer experience; saving time and money; enhancing cost-effectiveness; enhancing employee productivity; integrating and adapting business models; improving business decisions; and generating more revenue. The IoT can also assist in real-time and near-to-real-time visibility of the IT ecosystem and help in the pursuit of transforming traditional business to a data-driven business. The business impact of new data from IoT can help inform situational awareness, drive process improvements, and lead to overall better business decision making.</p> | | <p>Deploying IoT devices and platforms offers a number of benefits to organizations such as: assisting in monitoring overall business processes; improving customer experience; saving time and money; enhancing cost-effectiveness; enhancing employee productivity; integrating and adapting business models; improving business decisions; and generating more revenue. The IoT can also assist in real-time and near-to-real-time visibility of the IT ecosystem and help in the pursuit of transforming traditional business to a data-driven business. The business impact of new data from IoT can help inform situational awareness, drive process improvements, and lead to overall better business decision making.</p> |
| | | |
− | <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.</p><p class="highlighted inline mw-collapsible-content"> In today’s integrated world, it is not enough to rely on business data from isolated business systems.</p> | + | <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.</p><p class="highlighted inline mw-collapsible-content"> In today’s integrated world, it is not enough to rely on business data from isolated business systems.</p> |
| | | |
| <p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way.<ref>Department of Finance Canada. (2018, October 19).<i>[https://www.fin.gc.ca/afr-rfa/2018/report-rapport-eng.asp Annual Financial Report of the Government of Canada].</i> Retrieved from fin.gc.ca</ref> Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.<ref>Treasury Board of Canada. (2006, June 26).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12062 Policy on Management of Materiel].</i> Retrieved from tbs-sct.gc.ca</ref></p> | | <p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way.<ref>Department of Finance Canada. (2018, October 19).<i>[https://www.fin.gc.ca/afr-rfa/2018/report-rapport-eng.asp Annual Financial Report of the Government of Canada].</i> Retrieved from fin.gc.ca</ref> Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.<ref>Treasury Board of Canada. (2006, June 26).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12062 Policy on Management of Materiel].</i> Retrieved from tbs-sct.gc.ca</ref></p> |
Line 112: |
Line 112: |
| <p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems.<ref>Mariani, J. (2017, February 14).<i>[https://www2.deloitte.com/insights/us/en/focus/internet-of-things/regulating-iot-technology-role-of-government.html Guiding the IoT to safety].</i> Retrieved from deloitte.com</ref> This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p> | | <p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems.<ref>Mariani, J. (2017, February 14).<i>[https://www2.deloitte.com/insights/us/en/focus/internet-of-things/regulating-iot-technology-role-of-government.html Guiding the IoT to safety].</i> Retrieved from deloitte.com</ref> This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p> |
| <p class="inline-spacer"></p> | | <p class="inline-spacer"></p> |
− | <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities.<ref>Communications Security Establishment. (2017, June).<i>[https://www.cse-cst.gc.ca/en/node/2097/html/27699#a4 Internet of Things - The Future is Now].</i> Retrieved from cse-cst.gc.ca</ref> In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties.<ref>Canada. (2017, September 1).<i>[https://www.getcybersafe.gc.ca/cnt/blg/pst-20170901-en.aspx How to #ConnectSmarter on the Internet of Things (IoT)].</i> Retrieved from getcybersafe.gc.ca</ref> Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.</p><p class="highlighted inline mw-collapsible-content"> In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered. As with any emerging technology, mitigations and streamlined patch solutions are not always available.</p> | + | <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities.<ref>Communications Security Establishment. (2017, June).<i>[https://www.cse-cst.gc.ca/en/node/2097/html/27699#a4 Internet of Things - The Future is Now].</i> Retrieved from cse-cst.gc.ca</ref> In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties.<ref>Get Cyber Safe. (2017, September 1).<i>[https://www.getcybersafe.gc.ca/cnt/blg/pst-20170901-en.aspx How to #ConnectSmarter on the Internet of Things (IoT)].</i> Retrieved from getcybersafe.gc.ca</ref> Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.</p><p class="highlighted inline mw-collapsible-content"> In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered. As with any emerging technology, mitigations and streamlined patch solutions are not always available.</p> |
| <p class="inline-spacer"></p> | | <p class="inline-spacer"></p> |
| <p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p> | | <p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p> |
Line 141: |
Line 141: |
| | | |
| <p>Lastly, SSC may wish to consider evaluating the current Service Catalogue in order to determine where IoT can be leveraged to improve efficiencies, reduce costs, and reduce administrative burdens of existing services as well as how a new IoT service could be delivered on a consistent basis. Any new procurements of devices or platforms should have high market value and can be on-boarded easily onto the GC network.</p> | | <p>Lastly, SSC may wish to consider evaluating the current Service Catalogue in order to determine where IoT can be leveraged to improve efficiencies, reduce costs, and reduce administrative burdens of existing services as well as how a new IoT service could be delivered on a consistent basis. Any new procurements of devices or platforms should have high market value and can be on-boarded easily onto the GC network.</p> |
| + | |
| + | <h2>References</h2> |
| </div> | | </div> |
− |
| |
− | <!--
| |
− | <h2>References</h2>
| |
− | <ol>
| |
− | <li>Diedrich, H. (2016). <i>Ethereum: Blockchains, Digital Assets, Smart Contracts, Decentralized Autonomous Organizations.</i> Scotts Valley: CreateSpace Independent Publishing Platform.</li>
| |
− | <li>Furlonger, D., & Kandaswamy, R. (25 July 2018). <i>[https://www.gartner.com/document/3883991 Hype Cycle for Blockchain Technologies].</i> Retrieved on 23 May 2019</li>
| |
− | <li>Gilder, G. (2018). Life After Google: <i>The Fall of Big Data and the Rise of the Blockchain Economy.</i> New Jersey: Gateway Editions.</li>
| |
− | <li>Gupta, V. (28 February 2017). <i>[https://hbr.org/2017/02/a-brief-history-of-blockchain A Brief History of Blockchain].</i> Retrieved on 23 May 2019</li>
| |
− | <li>Orcutt, M. (19 February 2019). <i>[https://www.technologyreview.com/s/612974/once-hailed-as-unhackable-blockchains-are-now-getting-hacked/ Once hailed as unhackable, blockchains are now getting hacked].</i> Retrieved on 23 May 2019</li>
| |
− | <li>Secretariat, T. B. (29 March 2019). <i>[https://www.canada.ca/en/government/system/digital-government/digital-operations-strategic-plan-2018-2022.html Digital Operations Strategic Plan: 2018-2022].</i> Retrieved on 23 May 2019</li>
| |
− | <li>Vallée, J.-C. L. (April 2018). <i>[https://www.conferenceboard.ca/temp/7dc77c07-7e5a-4be6-ad6d-7d1070f9ac20/9591_Cautious%20Optimism_BR.pdf Adopting Blockchain to Improve Canadian Government Digital Services].</i> Retrieved on 23 May 2019</li>
| |
− | </ol>
| |
− | -->
| |
| | | |
| {{#css: | | {{#css: |