86,724 research outputs found

    Development of an M-commerce security framework

    Get PDF
    Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    Agent based mobile negotiation for personalized pricing of last minute theatre tickets

    Get PDF
    This is the post-print version of the final paper published in Expert Systems with Applications. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2012 Elsevier B.V.This paper proposes an agent based mobile negotiation framework for personalized pricing of last minutes theatre tickets whose values are dependent on the time remaining to the performance and the locations of potential customers. In particular, case based reasoning and fuzzy cognitive map techniques are adopted in the negotiation framework to identify the best initial offer zone and adopt multi criteria decision in the scoring function to evaluate offers. The proposed framework is tested via a computer simulation in which personalized pricing policy shows higher market performance than other policies therefore the validity of the proposed negotiation framework.The Ministry of Education, Science and Technology (Korea

    Shopping For Privacy: How Technology in Brick-and-Mortar Retail Stores Poses Privacy Risks for Shoppers

    Get PDF
    As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy practices, I call upon the Federal Trade Commission, the de facto privacy regulator in the United States, to increase its policing of physical retail stores to protect the shopper from any further harm

    Middleware Design Framework for Mobile Computing

    Get PDF
    Mobile computing is one of the recent growing fields in the area of wireless networking. The recent standardization efforts accomplished in Web services, with their XML-based formats for registration/discovery, service description, and service access, respectively UDDI, WSDL, and SOAP, certainly represent an interesting first step towards open service composition, which MA supports for mobile computing are expected to integrate within their frameworks soon. A middle-ware that can work even if the network parameters are changed can be a better solution for successful mobile computing. A middle-ware is proposed for handling the entire existing problem in distributed environment. Middleware is about integration and interoperability of applications and services running on heterogeneous computing and communication devices. The services it provides - including identification, authentication, authorization, soft-switching, certification and security - are used in a vast range of global appliances and systems, from smart cards and wireless devices to mobile services and e-Commerce

    GoGlobal: How can contemporary design collaboration and e-commerce models grow the creative industries in developing countries?

    Get PDF
    Using previous case studies by the authors and a current live project, this paper considers whether the creative industries in a developing country (Ghana, Africa) can be nurtured through design collaboration and an e-commerce model to contribute significant economic growth through increasing international trade. The paper draws on practical experience of five annual projects, with a focus on GoGlobal Africa. Initiated in 2005, GoGlobal is a collaborative design research activity between the University of Technology Sydney, the Royal College of Art, the London School of Economics, RMIT Melbourne, and other partnering organisations. GoGlobal Africa was initiated in 2008 with 3 phases: creative studio with design students from the RCA UK and KNUST Ghana; an e-commerce process for supply, distribution and marketing; and a “hub” location to facilitate project delivery and dissemination. The context to GoGlobal is informed by the UNCTAD studies of global creative industries

    eEnabled internet distribution for small and medium sized hotels: the case of hospitality SMEs in Athens

    Get PDF
    Advances in information and communications technologies (ICTs) have strategic implications for a wide range of industries. Tourism and hospitality have dramatically changed by the ICTs and the Internet and gradually emerge as the leading industry on online expenditure. The Internet revolutionised traditional distribution models, enabled new entries propelled both disintermediation and reintermediation and altered the sources of competitive advantage. This paper explores the strategic implications of ICTs and the perceived advantages and disadvantages of Internet distribution for small and medium-sized hospitality enterprises (SMEs). Primary research in Athens hotels demonstrates the effects of the Internet and ICTs for secondary markets, where there is lower penetration and ICT adoption. Interviews and questionnaires identified a number of strategies in order to optimise distribution. The analysis illustrates the strategic role of ICTs and the Internet for hospitality organisations and Small and Medium-sized organisations in general. Most hotels employ a distribution mix that determines the level and employment of the Internet. The paper demonstrates that only organisations that use ICTs strategically will be able to develop their electronic distribution and achieve competitive advantages in the future

    A Contribution to Theory Building for Mobile Marketing: Categorizing Mobile Marketing Campaigns through Case Study Research

    Get PDF
    Marketing experts consider the mobile device as an extremely promising marketing tool as it supports them to cope with their major challenge: getting time and attention from customers. Current mobile marketing research mostly covers success factors and acceptance analysis. Categorization, when addressed, lacks in appropriate foundation and is not linked to objectives at all. In this article we examine 55 case studies in order to identify relevant characteristics of mobile marketing campaigns. The outcome of the paper is the derivation of four mobile marketing standard types and an examination of campaign objectives that can be addressed by mobile marketing. The proposed scheme allows to unambiguously characterize any given mobile marketing campaign and to identify the respective objectives.
    • 

    corecore