84 research outputs found

    An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving

    Get PDF

    Essays on Prosocial Price Premiums

    Get PDF
    abstract: In two independent and thematically connected chapters, I investigate consumers' willingness to pay a price premium in response to product development that entails prosocial attributes (PATs), those that allude to the reduction of negative externalities to benefit society, and to an innovative participatory pricing design called 'Pay-What-You-Want' (PWYW) pricing, a mechanism that relinquishes the determination of payments in exchange for private goods to the consumers themselves partly relying on their prosocial preferences to drive positive payments. First, I propose a novel statistical approach built on the choice based contingent valuation technique to estimate incremental willingness to pay (IWTP) for PATs that accounts for consumer heterogeneity, dependence in the decision making processes, and incentive compatibility. I validate the approach by estimating IWTP for a variety of PATs and contrast the theoretical and managerial benefits of using the proposed approach over extant techniques used in the literature for this purpose. Second, I propose a general and flexible statistical modeling framework for estimating PWYW payments that exceed zero. It relies on the joint estimation of three types of consumer decision processes namely, the consumer propensity to default to an explicit price recommendation, the propensity to pay a least legitimate price, and the payment of a freely-chosen non-zero payment. Of particular interest is the model's ability to account for a wide variety of design constraints such as the setting of price bounds, explicit price recommendations, and the provision of a menu of discrete prices to choose from. I validate the approach by estimating PWYW payments for a variety of products such as music licenses, snacks, and sports tickets. I specifically examine and report the differential impact of three managerially controllable variables namely, 'payment anonymity', 'information on payment recipients' and 'information of product value/quality'.Dissertation/ThesisDoctoral Dissertation Business Administration 201

    A decision-making model to guide securing blockchain deployments

    Get PDF
    Satoshi Nakamoto, the pseudo-identity accredit with the paper that sparked the implementation of Bitcoin, is famously quoted as remarking, electronically of course, that “If you don’t believe it or don’t get it, I don’t have time to try and convince you, sorry” (Tsapis, 2019, p. 1). What is noticeable, 12 years after the famed Satoshi paper that initiated Bitcoin (Nakamoto, 2008), is that blockchain at the very least has staying power and potentially wide application. A lesser known figure Marc Kenisberg, founder of Bitcoin Chaser which is one of the many companies formed around the Bitcoin ecosystem, summarised it well saying “…Blockchain is the tech - Bitcoin is merely the first mainstream manifestation of its potential” (Tsapis, 2019, p. 1). With blockchain still trying to reach its potential and still maturing on its way towards a mainstream technology the main question that arises for security professionals is how do I ensure we do it securely? This research seeks to address that question by proposing a decision-making model that can be used by a security professional to guide them through ensuring appropriate security for blockchain deployments. This research is certainly not the first attempt at discussing the security of the blockchain and will not be the last, as the technology around blockchain and distributed ledger technology is still rapidly evolving. What this research does try to achieve is not to delve into extremely specific areas of blockchain security, or get bogged down in technical details, but to provide a reference framework that aims to cover all the major areas to be considered. The approach followed was to review the literature regarding blockchain and to identify the main security areas to be addressed. It then proposes a decision-making model and tests the model against a fictitious but relevant real-world example. It concludes with learnings from this research. The reader can be the judge, but the model aims to be a practical valuable resource to be used by any security professional, to navigate the security aspects logically and understandably when being involved in a blockchain deployment. In contrast to the Satoshi quote, this research tries to convince the reader and assist him/her in understanding the security choices related to every blockchain deployment.Thesis (MSc) -- Faculty of Science, Computer Science, 202

    Four Essays on Economic Preferences

    Get PDF
    This thesis consists of four independent chapters. Each chapter contributes experimental evidence to our knowledge on economic preferences. Chapter one shows that a preference for truth-telling per se is even more prevalent than previous research suggests. Chapter 2 investigates the relationship between economic preferences and psychological personality measures and arrives at the conclusion that the degree of association between the two concepts is rather small and that they are complementary in explaining heterogeneity in life outcomes. Chapter 3 validates non-incentivized survey measures for key economic preferences, i.e. risk taking, time discounting and social preferences, by examining their predictive power for behavior in incentivized economic choice experiments. Chapter 4 shows that the variation in preferences across countries as documented in Falk, Becker, Dohmen, Enke, Huffman, and Sunde (2015) has deep cultural origins. Chapter 1 attends to what is often called a non-standard preference: a preference for truth-telling per se.2 We implement a truth-telling experiment, in which misreporting cannot be detected and participants have a strong monetary incentive to misreport, with a representative population sample which we call at home. We nd that aggregate reporting behavior closely resembles the distribution that would result if everyone reported truthfully. This contrasts previous evidence from laboratory experiments which also documented substantial levels of truthful reporting as well, but consistently found considerable degrees of cheating. Since our partici pants made their reports via the phone while participants in laboratory experiments typically entered their reports into the computer, we conduct an additional laboratory experiment to rule out the possibility that the difference between behavior in our study and previous research is mainly driven by the difference in communication modes. Similarly, we can rule out that it is the difference in the subject pools - a representative sample versus the typical student participants in laboratory experiments - that explains the much higher level of truth-telling in our study: the behavior of the students in our representative sample does not differ from the behavior of the rest of the sample. Chapter 2 examines the relationship between economic preferences and psychological personality measures. Using data from incentivized laboratory experiments and representative samples of the German population it shows that the association between the two concepts is rather low and that the two concepts are complementary in explaining heterogeneity in life outcomes. Chapter 3 validates survey measures for the six key economic preferences - risk taking, time discounting, trust, altruism, positive and negative reciprocity - by assessing their (joint) explanatory power in explaining behavior in incentivized choice experiments. This results in a preference module consisting of two items per preference - one typically being a hypothetical version of the incentivized experiment and the other one being a subjective self-assessment. Next, we adjust the module by reducing complexity and excluding culturally loaded wording to allow implementability across heterogeneous participants, e.g. in terms of cultural or educational background, and across survey modes. We test this "streamlined" module in the field in 22 countries of diverse cultural backgrounds. The resulting feedback calls for only minor adjustments and overall confirms a good implementability of our preference module. Chapter 45 explores whether differences in culture can explain part of the varia tion in economic preferences we see across countries around the globe as documented in Falk, Becker, Dohmen, Enke, Huffman, and Sunde (2015) by using a specific feature of languages as a proxy for culture. Speakers of languages which require the speaker to grammatically mark the future when talking about future events are less patient and less prosocial than speakers of languages which lack such a grammatical requirement. Heterogeneity in preferences across countries and cultures seems to be partly driven by deep cultural differences

    Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains

    Get PDF
    Publicly Verifiable Zero-Knowledge proofs are known to exist only from setup assumptions such as a trusted Common Reference String (CRS) or a Random Oracle. Unfortunately, the former requires a trusted party while the latter does not exist. Blockchains are distributed systems that already exist and provide certain security properties (under some honest majority assumption), hence, a natural recent research direction has been to use a blockchain as an alternative setup assumption. In TCC 2017 Goyal and Goyal proposed a construction of a publicly verifiable zero-knowledge (pvZK) proof system for some proof-of-stake blockchains. The zero-knowledge property of their construction however relies on some additional and not fully specified assumptions about the current and future behavior of honest blockchain players. In this paper, we provide several contributions. First, we show that when using a blockchain to design a provably secure protocol, it is dangerous to rely on demanding additional requirements on behaviors of the blockchain players. We do so by showing an “attack of the clones” whereby a malicious verifier can use a smart contract to slyly (not through bribing) clone capabilities of honest stakeholders and use those to invalidate the zero-knowledge property of the proof system by Goyal and Goyal. Second, we propose a new publicly verifiable zero-knowledge proof system that relies on non-interactive commitments and on an assumption on the min-entropy of some blocks appearing on the blockchain. Third, motivated by the fact that blockchains are a recent innovation and their resilience in the long run is still controversial, we introduce the concept of collapsing blockchain, and we prove that the zero-knowledge property of our scheme holds even if the blockchain eventually becomes insecure and all blockchain players eventually become dishonest

    Towards non-technological innovation: communicating environmental science to the tourism workforce

    Get PDF
    Karmen LuĹľar investigated cross-sectoral communication as an example of non-technological innovation. Her study aims to improve environmental science communication to the tourism workforce. The study highlights the importance of detailed knowledge of the audience and provides recommendations regarding the messages and the media to be used

    An Efficient Proxy Raffle Protocol with Anonymity-Preserving

    Get PDF
    [[abstract]]In 2005, Chen et al. implemented a proxy raffle scheme for the Internet. Unfortunately, their scheme is unable to withstand Denial of Service (DoS) and impersonation attacks. We consequently propose a novel version of this scheme, in this paper, which can resist these malicious attacks. The security of our scheme is based on symmetric and asymmetric cryptosystems. A timestamp mechanism is also applied to prevent suffering the replay attack. Specifically, the communication load of our scheme is less than that of Chen et al.'s scheme. Thus, we can implement our method for the Internet as well as mobile devices

    Real-Time QoS Monitoring and Anomaly Detection on Microservice-based Applications in Cloud-Edge Infrastructure

    Get PDF
    Ph. D. Thesis.Microservices have emerged as a new approach for developing and deploying cloud applications that require higher levels of agility, scale, and reliability. A microservicebased cloud application architecture advocates decomposition of monolithic application components into independent software components called \microservices". As the independent microservices can be developed, deployed, and updated independently of each other, it leads to complex run-time performance monitoring and management challenges. The deployment environment for microservices in multi-cloud environments is very complex as there are numerous components running in heterogeneous environments (VM/container) and communicating frequently with each other using REST-based/REST-less APIs. In some cases, multiple components can also be executed inside a VM/container making any failure or anomaly detection very complicated. It is necessary to monitor the performance variation of all the service components to detect any reason for failure. Microservice and container architecture allows to design loose-coupled services and run them in a lightweight runtime environment for more e cient scaling. Thus, containerbased microservice deployment is now the standard model for hosting cloud applications across industries. Despite the strongest scalability characteristic of this model which opens the doors for further optimizations in both application structure and performance, such characteristic adds an additional level of complexity to monitoring application performance. Performance monitoring system can lead to severe application outages if it is not able to successfully and quickly detecting failures and localizing their causes. Machine learning-based techniques have been applied to detect anomalies in microservice-based cloud-based applications. The existing research works used di erent tracking algorithms to search the root cause if anomaly observed behaviour. However, linking the observed failures of an application with their root causes by the use of these techniques is still an open research problem. Osmotic computing is a new IoT application programming paradigm that's driven by the signi cant increase in resource capacity/capability at the network edge, along with support for data transfer protocols that enable such resources to interact more seamlessly with cloud-based services. Much of the di culty in Quality of Service (QoS) and performance monitoring of IoT applications in an osmotic computing environment is due to the massive scale and heterogeneity (IoT + edge + cloud) of computing environments. To handle monitoring and anomaly detection of microservices in cloud and edge datacenters, this thesis presents multilateral research towards monitoring and anomaly detection on microservice-based applications performance in cloud-edge infrastructure. The key contributions of this thesis are as following: • It introduces a novel system, Multi-microservices Multi-virtualization Multicloud monitoring (M3 ) that provides a holistic approach to monitor the performance of microservice-based application stacks deployed across multiple cloud data centers. • A framework forMonitoring, Anomaly Detection and Localization System (MADLS) which utilizes a simpli ed approach that depends on commonly available metrics o ering a simpli ed deployment environment for the developer. • Developing a uni ed monitoring model for cloud-edge that provides an IoT application administrator with detailed QoS information related to microservices deployed across cloud and edge datacenters.Royal Embassy of Saudi Arabia Cultural Bureau in London, government of Saudi Arabi
    • …
    corecore