211 research outputs found

    Information effect in Social Commerce: A case of TicketMonster

    Get PDF
    Social Commerce sites are in vogue enough to be recognized as a new trend in online shopping arena. Social Commerce can be defined as the electronic commerce triggered by social media. It has been growing very rapidly with enormous discount rate, quality services and precise information. This research analyzes effects of posted numeric information on daily sales volumes. Hetrosckedasticity arises with the real transaction data that was acquired from TicketMonster which is one of the biggest Social Commerce sites in Korea. Therefore, GLS model was applied to have results that original price, discounted price, minimum quantity to have discounted price, and maximum units of sales are statistically significant. Minimum quantity of sales to meet the requirement to have discounted prices has threshold effect on the purchase of consumers like the ways they have group buying on the Internet. However, additional studies are required to identify if this correlated information can be results of reasonable estimates by the vendors and the intermediary or play a role of signal to attract sales. More research opportunities are addressed on services types, consumer groups and information richness

    Risk Management Decision Making for Security and Trust in Hardware Supply Chains

    Get PDF
    Modern cyber-physical systems are enabled by electronic hardware and embedded systems. The security of these sub-components is a concern during the design and operational phases of cyber-physical system life cycles. Compromised electronics can result in mission-critical failures, unauthorized access, and other severe consequences. As systems become more complex and feature greater connectivity, system owners must make decisions regarding how to mitigate risks and ensure resilience and trust. This paper provides an overview of research efforts related to assessing and managing risks, resilience, and trust with an emphasis on electronic hardware and embedded systems. The research takes a decision-oriented perspective, drawing from the perspectives of scenario planning and portfolio analysis, and describes examples related to the risk-based prioritization of cyber assets in large-scale systems

    Information technology policy : first steps for the new South Africa

    Get PDF
    Bibliography: pages 183-200.The fundamental question is not whether South Africa should have a National Information Technology Policy to exploit Information Technology (IT), but more fundamentally what kind of government policies and programs for IT make sense. In today's competitive world what kind of policies and programs will be for the betterment of South Africa's economic and social structures? How can the South African government use IT to increase international competitiveness, and at the same time enhance economic and technological progress and create social improvement in the country? These and many other fundamental questions are the basis for this investigation. The starting point of this research was to compare South African IT to that in other countries; Expert opinion was obtained to identify speciïŹc issues, goals and technologies, and to propose ideas for government policies to: i) increase the country's competitiveness, ii) enhance its economic and technological progress, and iii) uplift its people. The main points emerging from this research are that the South African government needs to formulate a National IT Policy in order to direct the development of IT. Competitiveness, progress and social upliftment are inseparable and must be balanced when positioning such a policy. The policy should be directed from a high level to ensure that its recommendations are followed

    How “Familiness” Influences the Business: Cases from the Luxury Industry

    Get PDF
    In the current literature, several authors have exploredthe peculiarities of family businesses (Aronoff & Ward, 1995;Astrachan & Shanker, 2003; La Porta et al., 1999). On the otherhand, attention has been devoted on the characteristics of luxuryfirms (among others Mosca, 2008; Brioschi, 2005; Aiello &Donvito, 2006). However, to the best knowledge of the authors, noattempts have been made so far to investigate the “familiness”and the entrepreneurial orientation in family firms operating inthe luxury market. This article starts from the availableliterature on the subject, and aims to show how the strengthsarising from the fact of having an entrepreneurial family andbeing a luxury brand, are interwoven. The synergy that is thuscreated, leads to a fundamental competitive advantage, creatingloyalty and making the products highly desirable. The paperfurther investigates the relationship that exists betweensuccessful brands in the luxury market and the family componentof the company. It also shows how “familiness”1 can contributeactively to the success of a brand in the market of high-endgoods, and how it can ensure the longevity of family businessesoperating on the luxury market

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    Wagon Tracks. Volume 13, Issue 2 (February, 1999)

    Get PDF

    Cape Town brown haze study summary of publicity

    Get PDF
    • 

    corecore