Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (23)

Search Parameters:
Keywords = audit trail

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
37 pages, 5718 KiB  
Review
Survey of Blockchain-Based Applications for IoT
by Ahmad Enaya, Xavier Fernando and Rasha Kashef
Appl. Sci. 2025, 15(8), 4562; https://doi.org/10.3390/app15084562 - 21 Apr 2025
Viewed by 1724
Abstract
The rapid growth of the Internet of Things (IoT) has introduced critical challenges related to security, scalability, and data integrity. Blockchain technology, with its decentralized, immutable, and tamper-resistant framework, presents a transformative solution to address these challenges. This study explores blockchain applications in [...] Read more.
The rapid growth of the Internet of Things (IoT) has introduced critical challenges related to security, scalability, and data integrity. Blockchain technology, with its decentralized, immutable, and tamper-resistant framework, presents a transformative solution to address these challenges. This study explores blockchain applications in the IoT, focusing on security, automation, scalability, and data sharing. Industry-specific applications, including supply chain management, smart cities, and healthcare, highlight the potential of blockchains to optimize operations, ensure compliance, and foster innovation. Additionally, blockchain technology enables robust audit trails, enhances accountability, and reduces fraud in sensitive IoT applications, such as finance and healthcare. The synergy between blockchains and the IoT creates a secure and transparent platform for managing device interoperability and data exchange, fostering seamless communication between diverse IoT components. Furthermore, this paper discusses layer 2 scaling techniques and tokenization to address scalability, ownership, monetization, and cost challenges, providing practical solutions for real-world deployments. Future directions emphasize integrating blockchain systems with artificial intelligence (AI), machine learning (ML), and edge computing, offering groundbreaking capabilities to further revolutionize IoT ecosystems. By merging these advanced technologies, organizations can build secure, scalable, and intelligent systems to drive innovation and trust. Full article
(This article belongs to the Special Issue Recent Advances in AI-Enabled Wireless Communications and Networks)
Show Figures

Figure 1

22 pages, 2821 KiB  
Article
Blockchain-Based Evidence Trustworthiness System in Certification
by Cristina Regueiro and Borja Urquizu
J. Cybersecur. Priv. 2025, 5(1), 1; https://doi.org/10.3390/jcp5010001 - 30 Dec 2024
Viewed by 1526
Abstract
Digital evidence is a critical component in today’s organizations, as it is the foundation on which any certification is based. This paper presents a risk assessment of evidence in the certification domain to identify the main security risks. To mitigate these risks, it [...] Read more.
Digital evidence is a critical component in today’s organizations, as it is the foundation on which any certification is based. This paper presents a risk assessment of evidence in the certification domain to identify the main security risks. To mitigate these risks, it also proposes an adaptation of an existing Blockchain-based audit trail system to create an evidence trustworthiness system enhancing security and usability. This system covers specific additional requirements from auditors: evidence confidentiality and integrity verification automation. The system has been validated with cloud service providers to increase the security of evidence for a cybersecurity certification process. However, it can be also extended to other certification domains. Full article
(This article belongs to the Special Issue Multimedia Security and Privacy)
Show Figures

Figure 1

35 pages, 607 KiB  
Article
Toward a New Era of Smart and Secure Healthcare Information Exchange Systems: Combining Blockchain and Artificial Intelligence
by Joseph Merhej, Hassan Harb, Abdelhafid Abouaissa and Lhassane Idoumghar
Appl. Sci. 2024, 14(19), 8808; https://doi.org/10.3390/app14198808 - 30 Sep 2024
Cited by 2 | Viewed by 4790
Abstract
Healthcare Information Exchange (HIE) is becoming a fundamental operation in current healthcare systems. In such systems, electronic health records (EHRs) are digitally stored inside each medical centers and, sometimes, are required to be shared between various healthcare facilities (HCFs). Indeed, sharing patient information [...] Read more.
Healthcare Information Exchange (HIE) is becoming a fundamental operation in current healthcare systems. In such systems, electronic health records (EHRs) are digitally stored inside each medical centers and, sometimes, are required to be shared between various healthcare facilities (HCFs). Indeed, sharing patient information is crucial and might be vulnerable to power outages, data misuse, privacy or security violations, and an audit trail. Hence, researchers have focused recently on cutting-edge technologies to develop secure HIE systems and ensure data privacy during transactions. Among such technologies, blockchain and artificial intelligence (AI) occupy a vital role in researchers’ focuses and efforts to detect risky transactions in HIE systems, thus enhancing their security and privacy. While the blockchain allows HCFs to link to each other without requiring a central authority, AI models offer an additional security layer when sharing patient data between HCFs. This paper presents a survey about HIE systems, and the aim is two-fold: we first present the architecture of HIE systems along with their challenges; then, we categorize and classify the current state-the-art-techniques that show the potential of using blockchain and AI technologies in such systems. Full article
Show Figures

Figure 1

25 pages, 1629 KiB  
Article
Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation
by Reshma Siyal, Jun Long, Muhammad Asim, Naveed Ahmad, Hanaa Fathi and Mohammad Alshinwan
Mathematics 2024, 12(13), 1956; https://doi.org/10.3390/math12131956 - 24 Jun 2024
Cited by 4 | Viewed by 1786
Abstract
Ensuring data confidentiality is a critical requirement for modern security systems globally. Despite the implementation of various access-control policies to enhance system security, significant threats persist due to insecure and inadequate access management. To address this, Multi-Party Authorization (MPA) systems employ multiple authorities [...] Read more.
Ensuring data confidentiality is a critical requirement for modern security systems globally. Despite the implementation of various access-control policies to enhance system security, significant threats persist due to insecure and inadequate access management. To address this, Multi-Party Authorization (MPA) systems employ multiple authorities for authorization and authentication, utilizing blockchain technology to store and access data securely, ensuring immutable and trusted audit trails. In this work, we propose a hybrid key-generation approach called the Identity and Attribute-Based Honey Encryption (IABHE) Algorithm combined with Deep Spiking Neural Network (DSNN) denoted by IABHE+DSNN for secure data sharing in a multi-party blockchain-based system. This approach incorporates various entities and multiple security functionalities to ensure data security. The data-sharing process involves several steps: initialization, authentication, initial registration, data protection, validation, and data sharing. Data protection is executed within the MapReduce framework, with data encryption performed using IABHE and key generation managed by DSNN. Experimental results demonstrate that the proposed IABHE+DSNN approach achieves a decryption time of 10.786 s, an encryption time of 15.765 s, and a key complexity of 0.887, outperforming existing methods. Full article
(This article belongs to the Special Issue New Advances in Cryptographic Theory and Application)
Show Figures

Figure 1

17 pages, 1231 KiB  
Article
Privacy and Security Mechanisms for B2B Data Sharing: A Conceptual Framework
by Wanying Li, Woon Kwan Tse and Jiaqi Chen
Information 2024, 15(6), 308; https://doi.org/10.3390/info15060308 - 26 May 2024
Cited by 1 | Viewed by 2653
Abstract
In the age of digitalization, business-to-business (B2B) data sharing is becoming increasingly important, enabling organizations to collaborate and make informed decisions as well as simplifying operations and hopefully creating a cost-effective virtual value chain. This is crucial to the success of modern businesses, [...] Read more.
In the age of digitalization, business-to-business (B2B) data sharing is becoming increasingly important, enabling organizations to collaborate and make informed decisions as well as simplifying operations and hopefully creating a cost-effective virtual value chain. This is crucial to the success of modern businesses, especially global business. However, this approach also comes with significant privacy and security challenges, thus requiring robust mechanisms to protect sensitive information. After analyzing the evolving status of B2B data sharing, the purpose of this study is to provide insights into the design of theoretical framework solutions for the field. This study adopts technologies including encryption, access control, data anonymization, and audit trails, with the common goal of striking a balance between facilitating data sharing and protecting data confidentiality as well as data integrity. In addition, emerging technologies such as homomorphic encryption, blockchain, and their applicability as well as advantages in the B2B data sharing environment are explored. The results of this study offer a new approach to managing complex data sharing between organizations, providing a strategic mix of traditional and innovative solutions to promote secure and efficient digital collaboration. Full article
(This article belongs to the Special Issue Digital Privacy and Security, 2nd Edition)
Show Figures

Figure 1

20 pages, 3027 KiB  
Article
Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains
by Stanly Wilson, Kwabena Adu-Duodu, Yinhao Li, Ringo Sham, Mohammed Almubarak, Yingli Wang, Ellis Solaiman, Charith Perera, Rajiv Ranjan and Omer Rana
Future Internet 2024, 16(4), 135; https://doi.org/10.3390/fi16040135 - 17 Apr 2024
Cited by 2 | Viewed by 2983
Abstract
The growing complexity of construction supply chains and the significant impact of the construction industry on the environment demand an understanding of how to reuse and repurpose materials. In response to this critical challenge, research gaps that are significant in promoting material circularity [...] Read more.
The growing complexity of construction supply chains and the significant impact of the construction industry on the environment demand an understanding of how to reuse and repurpose materials. In response to this critical challenge, research gaps that are significant in promoting material circularity are described. Despite its potential, the use of blockchain technology in construction faces challenges in verifiability, scalability, privacy, and interoperability. We propose a novel multilayer blockchain framework to enhance provenance tracking and data retrieval to enable a reliable audit trail. The framework utilises a privacy-centric solution that combines decentralised and centralised storage, security, and privacy. Furthermore, the framework implements access control to strengthen security and privacy, fostering transparency and information sharing among the stakeholders. These contributions collectively lead to trusted material circularity in a built environment. The implementation framework aims to create a prototype for blockchain applications in construction supply chains. Full article
(This article belongs to the Special Issue Blockchain and Web 3.0: Applications, Challenges and Future Trends)
Show Figures

Figure 1

16 pages, 1957 KiB  
Article
Auditing the Risk of Financial Fraud Using the Red Flags Technique
by Victor Munteanu, Marilena-Roxana Zuca, Adriana Horaicu, Laura-Andreea Florea, Cristina-Elena Poenaru and Gabriela Anghel
Appl. Sci. 2024, 14(2), 757; https://doi.org/10.3390/app14020757 - 16 Jan 2024
Cited by 1 | Viewed by 8010
Abstract
Major financial irregularities have contributed significantly to the destabilization of the world economy and the financial environment, by short circuiting investment flows and discrediting financial markets, with significant financial, social, and political consequences. Through the auditor’s key role of providing an independent, objective [...] Read more.
Major financial irregularities have contributed significantly to the destabilization of the world economy and the financial environment, by short circuiting investment flows and discrediting financial markets, with significant financial, social, and political consequences. Through the auditor’s key role of providing an independent, objective and professional opinion on the correctness of financial statements, the accounting profession has promoted a new procedure, the anti-fraud audit, which is responsible solely for financial prevention and fraud detection. Fraud detection audits have a methodology and a set of customized tools that help auditors in their mission to ensure the smooth execution of their audits. The purpose of this research is to conduct a comprehensive examination of both theoretical and practical aspects, with the objective of determining the risk profile of financial fraud among auditors. This will aid in preventing, detecting, and correcting such harmful practices. Through an empirical study of a fraudulent corporate entity, the quality of information contained within financial reports will be assessed, as well as the effectiveness of managerial decision-making substantiation. The data processing was carried out using the statistical software SPSS 19.0. when making graphs and interpreting the obtained results. Full article
Show Figures

Figure 1

10 pages, 1500 KiB  
Proceeding Paper
A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain
by Lakshman Kannan Venugopal, Rajappan Rajaganapathi, Abhishek Birjepatil, Sundararajan Edwin Raja and Gnanasaravanan Subramaniam
Eng. Proc. 2023, 59(1), 107; https://doi.org/10.3390/engproc2023059107 - 22 Dec 2023
Cited by 8 | Viewed by 1534
Abstract
The Blockchain-based information security framework for health care big data environments is a framework designed for the secure storage, access, and transmission of health care data in big data environments. It combines the privacy and security advantages of encryption and decentralized networks offered [...] Read more.
The Blockchain-based information security framework for health care big data environments is a framework designed for the secure storage, access, and transmission of health care data in big data environments. It combines the privacy and security advantages of encryption and decentralized networks offered by Blockchain technology with the scalability of distributed systems to provide an effective secure platform for big data applications. The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. It is also designed to be compatible with existing distributed computing and data querying technologies such as Hadoop and Spark, which will help organizations to improve the accessibility of health care data. The Blockchain-based framework will also provide an audit trail, allowing hospitals and other organizations to better monitor and control access to their data. This will enable organizations to ensure compliance with HIPAA and other regulations, while providing enhanced confidentiality and privacy to users and patients. Full article
(This article belongs to the Proceedings of Eng. Proc., 2023, RAiSE-2023)
Show Figures

Figure 1

19 pages, 597 KiB  
Article
Blockchain-Based Supply Chain Systems, Interoperability Model in a Pharmaceutical Case Study
by Yeray Mezquita, Blaž Podgorelec, Ana Belén Gil-González and Juan Manuel Corchado
Sensors 2023, 23(4), 1962; https://doi.org/10.3390/s23041962 - 9 Feb 2023
Cited by 11 | Viewed by 4560
Abstract
The main purpose of supply chain systems based on blockchain technology is to take advantage of technology innovations to ensure that a tracked asset’s audit trail is immutable. However, the challenge lies in tracking the asset among different blockchain-based supply chain systems. The [...] Read more.
The main purpose of supply chain systems based on blockchain technology is to take advantage of technology innovations to ensure that a tracked asset’s audit trail is immutable. However, the challenge lies in tracking the asset among different blockchain-based supply chain systems. The model proposed in this paper has been designed to overcome the identified challenges. Specifically, the proposed model enables: (1) the asset to be tracked among different blockchain-based supply-chain systems; (2) the tracked asset’s supply chain to be cryptographically verified; (3) a tracked asset to be defined in a standardized format; and (4) a tracked asset to be described with several different standardized formats. Thus, the model provides a great advantage in terms of interoperability between different blockchain-driven supply chains over other models in the literature, which will need to replicate the information in each blockchain platform they operate with, while giving flexibility to the platforms that make use of it and maintain the scalability of those logistic platforms. This work aims to examine the application of the proposed model from an operational point of view, in a scenario within the pharmaceutical sector. Full article
(This article belongs to the Special Issue Blockchain and Cloud Computing for Internet of Things)
Show Figures

Figure 1

27 pages, 617 KiB  
Article
Should We Cut the Cards? Assessing the Influence of “Take 5” Pre-Task Risk Assessments on Safety
by Jop Havinga, Mohammed Ibrahim Shire and Andrew Rae
Safety 2022, 8(2), 27; https://doi.org/10.3390/safety8020027 - 8 Apr 2022
Cited by 1 | Viewed by 15112
Abstract
This paper describes and analyses a particular safety practice, the written pre-task risk assessment, commonly referred to as a “Take 5”. The paper draws on data from a trial at a major infrastructure construction project. We conducted interviews and field observations during alternating [...] Read more.
This paper describes and analyses a particular safety practice, the written pre-task risk assessment, commonly referred to as a “Take 5”. The paper draws on data from a trial at a major infrastructure construction project. We conducted interviews and field observations during alternating periods of enforced Take 5 usage, optional Take 5 usage, and banned Take 5 usage. These data, along with evidence from other field studies, were analysed using the method of Functional Interrogation. We found no evidence to support any of the purported mechanisms by which Take 5 might be effective in reducing the risk of workplace accidents. Take 5 does not improve the planning of work, enhance worker heedfulness while conducting work, educate workers about hazards, or assist with organisational awareness and management of hazards. Whilst some workers believe that Take 5 may sometimes be effective, this belief is subject to the “Not for Me” effect, where Take 5 is always believed to be helpful for someone else, at some other time. The adoption and use of Take 5 is most likely to be an adaptive response by individuals and organisations to existing structural pressures. Take 5 provides a social defence, creating an auditable trail of safety work that may reduce anxiety in the present, and deflect blame in the future. Take 5 also serves a signalling function, allowing workers and companies to appear diligent about safety. Full article
Show Figures

Figure 1

18 pages, 1580 KiB  
Tutorial
Qualitative Methods with Nvivo Software: A Practical Guide for Analyzing Qualitative Data
by David B. Allsop, Joe M. Chelladurai, Elisabeth R. Kimball, Loren D. Marks and Justin J. Hendricks
Psych 2022, 4(2), 142-159; https://doi.org/10.3390/psych4020013 - 22 Mar 2022
Cited by 70 | Viewed by 37207
Abstract
From 1995–2016, there has been a 15-fold increase in qualitative scholarship in the social sciences, but the rigor and quality of published work has ranged widely. Little scholarship provides concrete, pragmatic explanations of (and directions regarding) the execution of systematic, high-rigor qualitative analysis. [...] Read more.
From 1995–2016, there has been a 15-fold increase in qualitative scholarship in the social sciences, but the rigor and quality of published work has ranged widely. Little scholarship provides concrete, pragmatic explanations of (and directions regarding) the execution of systematic, high-rigor qualitative analysis. The present article guides the developing qualitative researcher through technical and procedural aspects of analyzing qualitative data with specific attention to reliability and rigor. Guidance addressing transcription, importing data, forming coding pairs, performing initial/open coding (examples of three types), determining core themes, systematic team-based coding, maintaining a data audit trail, creating a Numeric Content Analysis (NCA) table, and preparing work for publication is provided. Materials include several tables and figures that offer practical demonstrations on how to use Nvivo in data analysis. Transcription tips and outsourcing benefits and cautions are also offered. Altogether, the present article provides qualitative researchers practical guidance for executing multiple stages of qualitative analysis. Full article
(This article belongs to the Special Issue Prominent Papers in Psych  2021–2023!)
Show Figures

Figure 1

16 pages, 3090 KiB  
Article
A Blockchain-Based Audit Trail Mechanism: Design and Implementation
by Cristina Regueiro, Iñaki Seco, Iván Gutiérrez-Agüero, Borja Urquizu and Jason Mansell
Algorithms 2021, 14(12), 341; https://doi.org/10.3390/a14120341 - 26 Nov 2021
Cited by 15 | Viewed by 10445
Abstract
Audit logs are a critical component in today’s enterprise business systems as they provide several benefits such as records transparency and integrity and security of sensitive information by creating a layer of evidential support. However, current implementations are vulnerable to attacks on data [...] Read more.
Audit logs are a critical component in today’s enterprise business systems as they provide several benefits such as records transparency and integrity and security of sensitive information by creating a layer of evidential support. However, current implementations are vulnerable to attacks on data integrity or availability. This paper presents a Blockchain-based audit trail mechanism that leverages the security features of Blockchain to enable secure and reliable audit trails and to address the aforementioned vulnerabilities. The architecture design and specific implementation are described in detail, resulting in a real prototype of a reliable, secure, and user-friendly audit trail mechanism. Full article
(This article belongs to the Special Issue Advances in Blockchain Architecture and Consensus)
Show Figures

Figure 1

16 pages, 1848 KiB  
Article
Trail Conditions and Community Use: Utilizing Geospatial Video to Guide the Adoption of a Spatial-Temporal Trail Audit Tool (STAT)
by Carissa Smock, Naomi Carlson and Chelsey Kirkland
Int. J. Environ. Res. Public Health 2021, 18(16), 8741; https://doi.org/10.3390/ijerph18168741 - 19 Aug 2021
Viewed by 3867
Abstract
Physical activity (PA), associated with all-cause mortality, morbidity, and healthcare costs, improves vitamin D absorption, immune response, and stress when completed outdoors. Rural communities, which experience PA inequities, rely on trails to meet PA guidelines. However, current trail audit methods could be more [...] Read more.
Physical activity (PA), associated with all-cause mortality, morbidity, and healthcare costs, improves vitamin D absorption, immune response, and stress when completed outdoors. Rural communities, which experience PA inequities, rely on trails to meet PA guidelines. However, current trail audit methods could be more efficient and accurate, which geospatial video may support. Therefore, the study purpose was (1) to identify and adopt validated instruments for trail audit evaluations using geospatial video and a composite score and (2) to determine if geospatial video and a composite score motivate (influence the decision to use) specific trail selection among current trail users. Phase 1 used a mixed-method exploratory sequential core design using qualitative data, then quantitative data for the development of the Spatial-temporal Trail Audit Tool (STAT). Geospatial videos of two Northeast Ohio trails were collected using a bicycle-mounted spatial video camera and video analysis software. The creation of STAT was integrated from Neighborhood Environment Walkability Scale (NEWS), Walk Score, and Path Environment Audit Tool (PEAT) audit tools based on four constructs: trail accessibility, conditions, amenities, and safety. Scoring was determined by three independent reviewers. Phase 2 included a mixed-method convergent core design to test the applicability of STAT for trail participant motivation. STAT has 20 items in 4 content areas computing a composite score and was found to increase trail quality and motivation for use. STAT can evaluate trails for PA using geospatial video and a composite score which may spur PA through increased motivation to select and use trails. Full article
Show Figures

Figure 1

20 pages, 6205 KiB  
Article
Research and Development of Blockchain Recordkeeping at the National Archives of Korea
by Hosung Wang and Dongmin Yang
Computers 2021, 10(8), 90; https://doi.org/10.3390/computers10080090 - 21 Jul 2021
Cited by 8 | Viewed by 4976
Abstract
In 2019, the National Archives of Korea (NAK) developed a blockchain recordkeeping platform to conduct R&D on recordkeeping approaches. This paper introduces two types of R&D studies that have been conducted thus far. The first is the use of blockchain transaction audit trail [...] Read more.
In 2019, the National Archives of Korea (NAK) developed a blockchain recordkeeping platform to conduct R&D on recordkeeping approaches. This paper introduces two types of R&D studies that have been conducted thus far. The first is the use of blockchain transaction audit trail technology to ensure the authenticity of audiovisual archives, i.e., the application of blockchain to a new system. The second uses blockchain technology to verify whether the datasets of numerous information systems built by government agencies are managed without forgery or tampering, i.e., the application of blockchain to an existing system. Government work environments globally are rapidly shifting from paper records to digital. However, the traditional recordkeeping methodology has not adequately kept up with these digital changes. Despite the importance of responding to digital changes by incorporating innovative technologies such as blockchain in recordkeeping practices, it is not easy for most archives to invest funds in experiments on future technologies. Owing to the Korean government’s policy of investing in digital transformation, NAK’s blockchain recordkeeping platform has been developed, and several R&D tasks are underway. Hopefully, the findings of this study will be shared with archivists around the world who are focusing on the future of recordkeeping. Full article
(This article belongs to the Special Issue Blockchain Technology and Recordkeeping)
Show Figures

Figure 1

12 pages, 2624 KiB  
Article
Blockchain-Based Traceability System That Ensures Food Safety Measures to Protect Consumer Safety and COVID-19 Free Supply Chains
by Adnan Iftekhar and Xiaohui Cui
Foods 2021, 10(6), 1289; https://doi.org/10.3390/foods10061289 - 4 Jun 2021
Cited by 97 | Viewed by 13302
Abstract
The world is facing an unprecedented socio-economic crisis caused by the novel coronavirus infection (COVID-19). The virus is also spreading through the import and export food supply chains. The Chinese authorities have discovered the COVID-19 virus in various imported frozen meat packages. Traceability [...] Read more.
The world is facing an unprecedented socio-economic crisis caused by the novel coronavirus infection (COVID-19). The virus is also spreading through the import and export food supply chains. The Chinese authorities have discovered the COVID-19 virus in various imported frozen meat packages. Traceability plays a vital role in food quality and food safety. The Internet of Things (IoT) provides solutions to overseeing environmental conditions, product quality, and product traceability. These solutions are traditionally based on a centralized architecture, which does not guarantee tamper-proof data sharing. The blockchain is an emerging technology that provides tamper-proof data sharing in real-time. This article presents a blockchain-enabled supply chain architecture to ensure the availability of a tamper-proof audit trail. This tamper-proof audit trail helps to make sure that all safety measures are undertaken to minimize the risk of COVID-19 and other bacteria, fungi, and parasites being present in the frozen meat supply chain. Full article
(This article belongs to the Special Issue Novel Concepts in Food Safety Strategy)
Show Figures

Graphical abstract

Back to TopTop