291 research outputs found

    A Taxonomy of Security Threats and Solutions for RFID Systems

    Get PDF
    RFID (Radio Frequency Identification) is a method of wireless data collection technology that uses RFID tags or transponders to electronically store and retrieve data. RFID tags are quickly replacing barcodes as the “identification system of choice” [1]. Since RFID devices are electronic devices, they can be hacked into by an outsider, and their data can be accessed or modified without the user knowing. New threats to RFID-enabled systems are always on the horizon. A systematic classification should be used to categorize these threats to help reduce confusion. This paper will look at the problem of security threats towards RFID systems, and provide a taxonomy for these threats

    Physical Unclonable Functions and Their Applications to Vehicle System Security

    Full text link

    Fashion Industry

    Get PDF
    Fashion is a lot more than providing an answer to primary needs. It is a way of communication, of distinction, of proclaiming a unique taste and expressing the belonging to a group. Sometimes to an exclusive group. Currently, the fashion industry is moving towards hyperspace, to a multidimensional world that is springing from the integration of smart textiles and wearable technologies. It is far beyond aesthetics. New properties of smart textiles let designers experiment with astonishing forms and expressions. There are also surprising contrasts and challenges: a new life for natural fibers, sustainable fabrics and dyeing techniques, rediscovered by eco-fashion, and "artificial apparel," made of wearable electronic components. How is this revolution affecting the strategies of the fashion industry

    From truth to trust: the impact of blockchain traceability on trust in product authenticity

    Get PDF
    In the global marketplace, customers are increasingly unaware of the source, provenance, and authenticity of products. Early research has shown that the introduction of blockchain technology into the supply chain area can make it more transparent and trustworthy. As a platform that supports distributed, cryptographically secure, auditable transactions, blockchain has expanded from the domain of digital cryptocurrency into the domain of physical asset provenance and ownership tracking and tracing. This research examines blockchain support of trust in product authenticity adopting a two-paper dissertation format. In the first conceptual paper, I develop a conceptual framework on blockchain technology\u27s unique features and characteristics and how it can boost trust in product authenticity. The second paper adopts the conceptual framework to test through a vignette experiment the effects of blockchain traceability, product identification, and the interaction between them on trust in product origin authenticity. Academics can use this research to develop new instruments to inform practice about how blockchain can boost trust in product authenticity. Results from this study can inform managers considering investments into blockchain solutions and unique product identification as a customer product authenticity, brand protection, or anti-counterfeiting strategy

    Market Piracy in the Design-Based Industry : Economics and Policy regulation

    Get PDF
    Market piracy in the design-based industry is an expanding worldwide phenomenon (Grossman and Shapiro, 1988a,b; Chaudhry and Walsh, 1996; Schultz II and Saprito, 1996). It deserves a great deal of attention both because of its impressive international dimension (Verma, 1996) and its intrinsic illegality, ambiguity and powerfull potential links with criminal organizations (Andreano and Sigfried, 1980; Fiorentini and Peltzman, 1995). The aim of this paper is to develop theoretical arguments about economic agents' behavior and to shed some light on the main regulatory issues of illegal markets. At a first sight the room for rational incentives to commercial piracy is self-evident. On one hand, an original backpack by the Italian stylist Prada costs, for instance, 510inManhattan,NewYork,andabootlegcopycosts 510 in Manhattan, New York, and a bootleg copy costs 70 in Rome, just in front of Castel Sant'Angelo. On the other hand, the number of units sold can be impressive: as an example Louis Vuitton sells 3.5 millions units per year. Market piracy is usually noticed in sectors such as luxury goods or fashion, but piracy can also be observed in more traditional sectors such as car manufacturers, "bureautic" industry, cooking utensils, aircraft-parts and so on.

    Applications of Blockchain Technology in International Logistics - a Case Study

    Get PDF
    This work gives some insights about the beneficial impact that blockchain technology could have on the trust paradigm of modern supply chains, especially in the international logistics sector. The first two parts cover a non-technical but detailed description of how the Bitcoin protocol works and a deep dive on the possible applications of blockchain technology in the logistics industry. The third part is reserved for the Case Study, theorized with the help of Luxottica
    • …
    corecore