20,500 research outputs found

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Encryption – use and control in E-commerce

    Get PDF
    The author describes how cryptography can be used to address modern business requirements such as identity protection, secure web access and digital signatures. Article by Robert Bond (Head of Innovation & Technology Group, Hobson Audley and Fellow of SALS). Published in Amicus Curiae - Journal of the Institute of Advanced Legal Studies and its Society for Advanced Legal Studies. The Journal is produced by the Society for Advanced Legal Studies at the Institute of Advanced Legal Studies, University of London

    Foundations of B2B electronic contracting

    Get PDF
    Nowadays, flexible electronic cooperation paradigms are required for core business processes to meet the speed and flexibility requirements dictated by fast-changing markets. These paradigms should include the functionality to establish the formal business relationship required by the importance of these core processes. The business relationship should be established in an automated, electronic way in order to match the speed and flexibility requirements mentioned above. As such, it should considerably improve on the ineffectiveness and inefficiency of traditional contracting in this context. The result of the establishment should be a detailed electronic contract that contains a complete specification of the intended cooperation between organizations. Electronic contracts should contain a precise and unambiguous specification of the collaboration at both the conceptual and technological level. Existing commercial software solutions for business-to-business contracting provide low level of automation and concentrate solely on the automated management of the contract enactment. However, in the modern, dynamic, business settings, an econtracting system has to support high automation of the e-contract establishment, enactment, and management. In the thesis, the business, legal, and technological requirements for the development of a highly automated e-contracting system are investigated. Models that satisfy these requirements and that can be used as a foundation for the implementation of an electronic contracting system are defined. First, the thesis presents the business benefits introduced to companies by highly automated electronic contracting. Next, a data and process analysis of electronic contracting is presented. The specification of electronic contracts and the required process support for electronic contract establishment and enactment are investigated. The business benefits and data and process models defined in the thesis are validated on the basis of two business cases from on-line advertising, namely the cases of online advertising in "De Telegraaf" and "Google". Finally, the thesis presents a specification of the functionalities that must be provided by an e-contracting system. A conceptual reference architecture that can be used as a starting point in the design and implementation of an electronic contracting system is defined. The work in the thesis is conducted on the intersection of the scientific areas of conceptual information and process modeling and specification on the one hand and distributed information system architecture modeling on the other hand

    Towards the adoption of E-Tendering in the public sector of the Egyptian construction industry

    Get PDF
    The construction public sector in Egypt, like most countries in the world, is tendering its projects through the traditional paper-based tendering procedure, which has many weaknesses including bureaucracy and lack of transparency. Due to the considerable volume of projects tendered each year, it was therefore essential to study the possibility of implementing another more efficient procedure that would overcome the inefficiencies of the paper-based tendering procedure. The main aim of this research is to improve the uptake of E-Tendering in Egypt through highlighting the best technical/operational practices that should be adopted, identifying the barriers, challenges and concerns of the Egyptian tenderers and providing solutions to address them. An identification and analysis of the current level of adoption/implementation of E-Tendering in Egypt is carried out through thoroughly examining the literature and through conducting two semi-structured face-to-face expert interviews. The findings show that there is evidence that Egypt is moving steadily but on a slower pace towards adopting E-Tendering within the governmental entities, especially that, so far, few steps/measures were taken in this regard towards the Egyptian tenderers. Hence, the barriers and concerns to the implementation of E-Tendering in many foreign countries have been thoroughly examined through the literature review. 19 challenges are highlighted and categorized into 4 categories: security challenges, user acceptance and staff resistance, accessibility issues and legal barriers. These challenges are then examined and ranked with respect to their importance by a panel of 15 academic and industry experts to identify whether or not they will face the Egyptian tenderers. The most important highlighted barriers are the SMEs access difficulties (Relative Importance Index RII%= 88.33%), the expected technical malfunctioning of the portal (RII% = 86.67%), the reluctance/resistance to change (RII% = 80%), the breach of confidentiality of information (RII% = 76.67%), the electronic signature problems (RII % = 76.67%) and the document tampering (RII% = 75%). In addition, literature is carefully examined to point out/come up with solutions/recommendations to the barriers, challenges and concerns of the tenderers in Egypt. The effectiveness of these solutions/recommendations is thoroughly analyzed by the same panel of experts. The findings showed that the identified barriers are completely neutralized and successfully addressed by the presented solutions/recommendations, hence, they should be adopted and implemented since improving the uptake of E-Tendering in Egypt is only achievable when addressing the needs of its stakeholders and especially the tenderers

    'Red flags of corruption'in world bank projects : an analysis of infrastructure contracts

    Get PDF
    "Red flags"are indicators of potential issues regarding governance failure, collusion or corruption in projects. While some specific red flags can be powerful indicators of issues to be addressed, the hypothesis of this paper is that many proposed red flags are potentially too ubiquitous and randomly distributed to be useful as indicators of significant governance failure. The paper examines project documentation from a small sample of World Bank water and sanitation projects in an attempt to collect data on the presence or absence of 13 commonly accepted red flags. This paper finds that: (i) almost every contract reviewed raised at least one of 13 red flags analyzed; (ii) potentially tainted contracts did not exhibit notably more red flags than control contracts; and (iii) the occurrence of multiple red flags in the same contract was rare enough to suggest that joint occurrence was largely by chance, not as a result of a strongly causal inter-relationship between flags. The ubiquity and apparent randomness of these red flags suggests that their roll-out as a monitoring tool requires additional thought as to interpretation, context and use. The paper examines an alternate tool for uncovering potential problem projects -- supplier concentration. Across a very small sample, there does appear to be a relationship between such concentration and potential problem projects.Post Conflict Reconstruction,Debt Markets,Government Procurement,Investment and Investment Climate,Literature&Folklore

    Intersemiotic translation of contracts into digital environments

    Get PDF
    An intersemiotic translation is any form of translation that involves at least two different semiotic codes; for example, the translation from words to images, to numerical code, or to non-verbal sounds. One of the most widespread examples of intersemiotic translation in the contemporary world is transposing natural language into machine language in digital environments. In this case, if the source text is a legal text, we encounter a particular type of intersemiotic translation, namely an intersemiotic legal translation in a digital environment. This paper will focus on the intersemiotic legal translation of contracts in digital environments, and is divided into two parts. In the first part (Section Ways of intersemiotically translating a contract using digital tools), we will analyze four possible uses of the intersemiotic translation of contracts in a digital context. In particular, we will highlight the technical characteristics of intersemiotic translation, its limitations, and its potential in different phases of contract management, namely the drafting of the document, the agreement, the archiving of the document, and the execution of contractual clauses. We will examine different digital tools that exploit intersemiotic translation, such as contract drafting tools and online platforms that allow for the conclusion of electronic contracts, document archiving in blockchains, and building smart contracts. When analyzing these uses of intersemiotic translation in the digital environment, we will highlight four types of output that can represent the product of intersemiotic translation in the digital environment: epistemic effects, legal effects, digital effects, and economic effects. In the second part (Section A tool for translating the contract intersemiotically), we will describe a hypothetical prototype that, in light of the four potential uses of intersemiotic translation, could represent a support tool to simplify the communication between professionals and clients through the drafting of legal documents with the aid of dynamic forms and, eventually, with the help of artificial intelligence (AI). Beyond facilitating the dialogue between legal professionals and their clients, we use interfaces to allow clients to create their own drafts of their documents and the lawyer to work on the drafts drawn up by the customer, correct them, and structure them in order to guarantee the validity of the document. The system can also be designed to archive legal documents and private deeds securely and entrust them to a professional by using blockchain technology and automating the execution of some contractual clauses via smart contract protocols

    Systematic review of the literature, research on blockchain technology as support to the trust model proposed applied to smart places

    Get PDF
    The smart places are vulnerable with corrupted or compromised data, with the false integration of new devices, and devices with firmware versions inconsistent. These risks worsen with the increasing volume and diversity of data, devices, infrastructures and users connected to the Web. The systematic review of the literature were selected 190 documents, which reveals the growing interest on the theme of blockchain technology with the publication of 14 documents in 2014 to about 100 already in 2017. The articles focused on the areas bitcoin (about 40%), IoT (about 30%), financial (about 15%), cryptocurrencies, electronic government (about 12%), smart contracts, smart cities, business (with about 10% each) and health (about 5%). This perspective confirms the generic model study data supported in blockchain technology for smart places, especially when applied to smart cities and the specific field of the mobility ecosystem, with the use of the new concepts of the application of blockchain in IoT, smart contracts and e-governance.info:eu-repo/semantics/publishedVersio

    TERMS: Techniques for electronic resources management

    Get PDF
    Librarians and information specialists have been finding ways to manage electronic resources for over a decade now. However, much of this work has been an ad hoc and learn-as-you-go process. The literature on electronic resource management shows this work as being segmented into many different areas of traditional librarian roles within the library. In addition, the literature show how management of these resources has driven the development of various management tools in the market as well as serve as the greatest need in the development of next generation library systems. TERMS is an attempt to create a series of on-going and continually developing set of management best practices for electronic resource management in libraries

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators

    Land fraud and inappropriate dealings in an electronic environment : An Australian and New Zealand perspective

    Get PDF
    The thesis presented in this paper is that the land fraud committed by Matthew Perrin in Queensland and inflicted upon Roger Mildenhall in Western Australia demonstrates the need for urgent procedural reform to the conveyancing process. Should this not occur, then calls to reform the substantive principles of the Torrens system will be heard throughout the jurisdictions that adopt title by registration, particularly in those places where immediate indefeasibility is still the norm. This paper closely examines the factual matrix behind both of these frauds, and asks what steps should have been taken to prevent them occurring. With 2012 bringing us Australian legislation embedding a national e-conveyancing system and a new Land Transfer Act for New Zealand we ask what legislative measures should be introduced to minimise the potential for such fraud. In undertaking this study, we reflect on whether the activities of Perrin and the criminals responsible for stealing Mildenhall's land would have succeeded under the present system for automated registration utilised in New Zealand
    corecore