13 research outputs found

    Reliable OSPM schema for secure transaction using mobile agent in micropayment system

    Get PDF
    The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. The present paper is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction in mobile commerce. However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce (OSPM). The empirical operation are carried out on three types of transaction process considering maximum scenario of real time offline cases. Therefore, the current idea introduces two new parameters i.e. mobile agent and mobile token that can ensure better security and comparatively less network overhead

    An Endorsement-Based Mobile Payment System for a Disaster Area

    Get PDF
    AINA-2015 : IEEE 29th International Conference on Advanced Information Networking and Applications , Mar 24-27, 2015 , Gwangju, KoreaA payment system in a disaster area is essential for people to buy necessities such as groceries, clothing, and medical supplies. However, existing payment systems require the needed communication infrastructures (like wired networks and cellular networks) to enable transactions, so that these systems cannot be relied on in disaster areas, where these communication infrastructures may be destroyed. In this paper, we propose a mobile payment system, adopting infrastructure less mobile adhoc networks (MANETs), which allow users to shop in disaster areas while providing secure transactions. Specifically, we propose an endorsement-based scheme to guarantee each transaction and a scheme to provide monitoring based on location information, and thus achieve transaction validity and reliability. Our mobile payment system can also prevent collusion between two parties and reset and recover attacks by any user. Security is ensured by using location-based mutual monitoring by nearby users, avoiding thereby double spending in the system

    Design of secure mobile payment protocols for restricted connectivity scenarios

    Get PDF
    The emergence of mobile and wireless networks made posible the extensión of electronic commerce to a new area of research: mobile commerce called m-commerce, which includes mobile payment), that refers to any e-commerce transaction made from a mobile device using wireless networks. Most of the mobile payment systems found in the literatura are based on the full connectivity scenario where all the entities are directly connected one to another but do not support business models with direct communication restrictions between the entities of the system is not a impediment to perform comercial transactions. It is for this reason that mobile payment systems that consider those situations where direct communications between entities of the system is not posible (temporarily or permanently) basically due to the impossibility of one of the entities connected to the Internet are required. In order to solve the current shortage in the scientific world of previous research works that address the problema of on-line payment from mobile devices in connectivity restricted scenarios, in this thesis we propose a set of secure payment protocols (that use both symmetric and non-traditional asymmetric cryptography), which have low computational power requirements, are fit for scenarios with communications restrictions (where at least two of the entities of the system cannot exchange information in a direct way and must do it through another entity) and offer the same security capabilities as those protocols designed for full connectivity scenarios. The proposed protocols are applicable to other types of networks, such as vehicular ad hoc network (VANETs), where services exist which require on-line payment and scenarios with communication restrictions.On the other hand, the implementation (in a multiplatform programming language) of the designed protocols shows that their performance is suitable for devices with limited computational power.Postprint (published version

    Security Risk Tolerance in Mobile Payment: A Trade-off Framework

    Get PDF
    Security is identified as a major barrier for consumers in adopting mobile payment. Although existing literature has incorporated security into the Technology Acceptance Model (TAM), the Unified Theory of Acceptance, and the Use of Technology (UTAUT) and it has investigated the way in which security affects consumers’ acceptance of mobile payment, security is a factor only in diverse research models. Studies of mobile payment that focus on security are not available. Additionally, previous studies of mobile payment are based on Direct Carrier Billing- (DCB)-based mobile payment or Near Field Communication- (NFC)-based mobile payment. The results regarding security might not be applicable to Quick Response (QR) code-based mobile payment, the format that has become prevalent in recent years. As such, this study focuses on security of using mobile payment and develops a benefit-cost appraisal and a trade-off framework by integrating the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB), the Protection Motivation Theory (PMT), and the Rational Choice Theory (RCT). Particularly, this study introduces security risk tolerance into mobile payment study and sets it as the dependent variable. This study proposes that consumers’ security risk tolerance is shaped by their benefit-cost appraisal and their tradeoff process, regarding the use of mobile payment. Based on an online survey that collected data from 324 respondents in China, this study empirically tests and validates the research model. The findings suggest that consumers’ perceived benefit in using mobile payment is positively related to their security risk tolerance, whereas their perceived cost of using mobile payment is negatively related to their security risk tolerance. Convenience, safety, and savings positively affect consumers’ perceived benefit. The security threat positively affects consumers’ perceived cost. Payment tradition moderates consumers’ benefit-cost appraisal and trade-off process, but normative beliefs do not have a significant moderating effect. Self-efficacy only moderates the relationship between consumers’ perceived cost and their security risk tolerance. This study finds that males and females complete their benefit-cost appraisal and their trade-off process regarding security of using mobile payment very similarly. Gender differences only exist in the relationship between savings and consumers’ perceived benefit of using mobile payment

    Beyond the Ebook: Digital Ecologies and the Future of the Author-Publisher Relationship, and Bibliotek: A Novel

    Get PDF
    This thesis examines changes in book publishing arising from digital distribution and textual ecology, and how these affect the traditional publisher-author relationship. It considers how the inclusion of fan writers into the industry may help publishing develop in positive ways. The critical exegesis develops a model for a transformative, sharing readership to work with the industry, helping to revitalise the form; while the creative component, science fiction novel, Bibliotek, extrapolates how this model could function

    Um sistema de pagamentos electrónicos para serviços e conteúdos móveis com garantias fortes de acessibilidade

    Get PDF
    O mercado emergente de aplicações e serviços disponibilizados através de dispositivos móveis, em particular os terminais de redes celulares (vulgo telemóveis), potência um conjunto de modelos de negócio baseados no pagamento destes serviços por parte dos utilizadores. Mas se este potencial é uma realidade, é também paralelamente um desafio em que se tornam visíveis um conjunto de incógnitas e problemas, sobretudo técnicos, mas também ao nível dos modelos de negócio, que fazem com que a área de pagamentos móveis seja ainda imatura. Esta dissertação apresenta um sistema de pagamentos móveis para serviços e conteúdos de baixo valor, que tem como principais objectivos: 1) ser independente do operador móvel como meio de acesso; 2) cobrarmos os serviços c conteúdos móveis adquiridos pelos consumidores através das contas dos respectivos operadores e 3) permitir a partilha da mesma conta por vários utilizadores, independentemente do operador móvel que utilizam. ***/ Abstract - The emergent market of applications and services available through mobile devices, in particular mobile phones, enables a set of business models based on the payment of these services by the users. But if this potential is a reality, it is also a challenge in that a set of unanswered questions and problems, mostly technical, but also concerning business models level, still make mobile payments an immature area. The work described in this thesis includes the development and implementation of a mobile payment system for low value services and contends, whose main goals are: 1) to be independent of the mobile operator as the access means; 2) to charge the mobile services and contents acquired by consumers through their respective operators accounts and 3) to allow the sharing of the same account by several users, regardless of the mobile operator they use

    Data Spaces

    Get PDF
    This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical
    corecore