814 research outputs found

    Efficient Encoding and Transmission of Digital Receipts for Mobile Commerce

    Get PDF
    to discuss products and purchases in real-time. However, the transmission of digital receipts is still a problem, since often Internet connectivity is not available at the point of sale which hampers a real-time interaction. To overcome this problem with current technology, this paper presents a way to efficiently transmit a complete receipt in a QR-code, a certain kind of 2D matrix code (often also called “2D barcode”). Thereby, only a smartphone equipped with a camera is needed and Internet connectivity is not a problem anymore. However, due to size constraints, the encoding of a full receipt needs to be as efficient as possible. We present a custom, domain-specific encoding that was developed exactly for this purpose and show that our prototype implementation performs better than sophisticated, general purpose compression algorithms on this kind of data

    Studies in Trade and Investment: The Development Impact of Information Technology in Trade Facilitation

    Get PDF
    This chapter describes the impact of information technology (IT) in trade facilitation on small and medium-sized enterprises (SMEs) in the Philippines. The definition of SME varies across countries, and the Government of the Philippines has adopted one that includes micro- and cottage enterprises. The Government classifies establishments into four categories: (a) micro/cottage (1-9 persons in the workforce and with asset limit of P 3 million); (b) small (10-99 workers, with an asset limit of P 15 million); (c) medium (100-199 workers, with asset limit of P 100 million); and (d) large (more than 200 workers, and more than P 100 million in assets).Trade facilitation, automation, garment industry, IT, SMEs, export, customs, Philippines

    The Impact of Information Technology in Trade Facilitation on Small and Medium Enterprises in the Philippines

    Get PDF
    The paper is focusing on electronic lodgment through web-based applications of value-added service providers as the IT-based trade facilitation measure, the survey of Customs Brokers conducted in this study revealed that lodgment time in the Philippines dropped to one hour or less as a result, compared to previous lodgment times of one and a half to one day.Information Techonology, Trade Facilitation, SME, Philippines

    Security and privacy issues in some special-puropse networks

    Get PDF
    This thesis is about providing security and privacy to new emergent applications which are based on special-purpose networks. More precisely, we study different aspects regarding security and privacy issues related to sensor networks, mobile ad hoc networks, vehicular ad hoc networks and social networks.Sensor networks consist of resource-constrained wireless devices with sensor capabilities. This emerging technology has a wide variety of applications related to event surveillance like emergency response, habitat monitoring or defense-related networks.Ad hoc networks are suited for use in situations where deploying an infrastructure is not cost effective or is not possible for any other reason. When the nodes of an ad hoc network are small mobile devices (e.g. cell phones or PDAs), such a network is called mobile ad hoc network. One of many possible uses of MANETs is to provide crisis management services applications, such as in disaster recovery, where the entire communication infrastructure is destroyed and reestablishing communication quickly is crucial. Another useful situation for MANETs is a scenario without fixed communication systems where there is the need for any kind of collaborative computing. Such situation can occur in both business and military environments.When the mobile nodes of a MANET are embedded in cars, such a network is called Vehicular Ad hoc Network (VANET). This kind of networks can be very useful to increase the road traffic safety and they will be deployed for real use in the forthcoming years. As a proof of that, eight important European vehicle manufacturers have founded the CAR 2 CAR Communication Consortium. This non-profit organisation is dedicated to the objective of further increasing traffic safety and efficiency by means of inter-vehicle communications.Social networks differ from the special-purpose networks commented above in that they are not physical networks. Social networks are applications that work through classic networks. They can be defined as a community of web users where each user can publish and share information and services. Social networks have become an object of study both in computer and social sciences, with even dedicated journals and conferences.The special-purpose networks described above provide a wide range of new services and applications. Even though they are expected to improve the society in several ways, these innovative networks and their related applications bring also security and privacy issues that must be addressed.This thesis solves some security and privacy issues related to such new applications and services. More specifically, it focuses on:·Secure information transmission in many-to-one scenarios with resource-constrained devices such as sensor networks.·Secure and private information sharing in MANETs.·Secure and private information spread in VANETs.·Private resource access in social networks.Results presented in this thesis include four contributions published in ISI JCR journals (IEEE Transactions on Vehicular Technology, Computer Networks (2) and Computer Communications) and two contributions published in two international conferences (Lecture Notes in Computer Science).Esta tesis trata diversos problemas de seguridad y privacidad que surgen al implantar en escenarios reales novedosas aplicaciones basadas en nuevos y emergentes modelos de red. Estos nuevos modelos de red difieren significativamente de las redes de computadores clásicas y son catalogadas como redes de propósito especial. Específicamente, en este trabajo se estudian diferentes aspectos relacionados con la seguridad de la información y la privacidad de los usuarios en redes de sensores, redes ad hoc móviles (MANETs), redes ad hoc vehiculares (VANETs) y redes sociales.Las redes de sensores están formadas por dispositivos inalámbricos muy limitados a nivel de recursos (capacidad de computación y batería) que detectan eventos o condiciones del entorno donde se instalan. Esta tecnología tiene una amplia variedad de aplicaciones entre las que destacan la detección de emergencias o la creación de perímetros de seguridad. Una MANET esta formada por nodos móviles conectados entre ellos mediante conexiones inalámbricas y de forma auto-organizada. Este tipo de redes se constituye sin la ayuda de infraestructuras, por ello son especialmente útiles en situaciones donde implantar una infraestructura es inviable por ser su coste demasiado elevado o por cualquier otra razón. Una de las muchas aplicaciones de las MANETs es proporcionar servicio en situaciones críticas (por ejemplo desastres naturales) donde la infraestructura de comunicaciones ha sido destruida y proporcionar conectividad rápidamente es crucial. Otra aplicación directa aparece en escenarios sin sistemas de comunicación fijos donde existe la necesidad de realizar algún tipo de computación colaborativa entre diversas máquinas. Esta situación se da tanto en ámbitos empresariales como militares.Cuando los nodos móviles de una MANET se asocian a vehículos (coches, camiones.), dicha red se denomina red ad hoc vehicular o VANET. Este tipo de redes pueden ser muy útiles para incrementar la seguridad vial y se espera su implantación para uso real en los próximos años. Como prueba de la gran importancia que tiene esta tecnología, los ocho fabricantes europeos más importantes han fundado la CAR 2 CAR Communication Consortium. Esta organización tiene como objetivo incrementar la seguridad y la eficiencia del tráfico mediante el uso de comunicaciones entre los vehículos.Las redes sociales se diferencian de las redes especiales descritas anteriormente en que éstas no son redes físicas. Las redes sociales son aplicaciones que funcionan a través de las redes de computadores clásicas. Una red de este tipo puede ser definida como una comunidad de usuarios web en donde dichos usuarios pueden publicar y compartir información y servicios. En la actualidad, las redes sociales han adquirido gran importancia ofreciendo un amplio abanico de posibilidades a sus usuarios: trabajar de forma colaborativa, compartir ficheros, búsqueda de nuevos amigos, etc.A continuación se resumen las aplicaciones en las que esta tesis se centra según el tipo de red asociada:·Transmisión segura de información en escenarios muchos-a-uno (múltiples emisores y un solo receptor) donde los dispositivos en uso poseen recursos muy limitados. Este escenario es el habitual en redes de sensores.·Distribución de información de forma segura y preservando la privacidad de los usuarios en redes ad hoc móviles.·Difusión de información (con el objeto de incrementar la seguridad vial) fidedigna preservando la privacidad de los usuarios en redes ad hoc vehiculares.·Acceso a recursos en redes sociales preservando la privacidad de los usuarios. Los resultados de la tesis incluyen cuatro publicaciones en revistas ISI JCR (IEEE Transactions on Vehicular Technology, Computer Networks (2) y Computer Communications) y dos publicaciones en congresos internacionales(Lecture Notes in Computer Science)

    Near Field Communication

    Get PDF
    Near Field Communication (NFC) is a technology that enables a device to communicate with another at a maximum distance of around 20cm or less. Currently, mobile phone manufacturers, banking institutions and mobile network providers are attempting to apply this technology to Smartphones and other handheld devices because of the opportunity to enable the consumer to use commercial services more easily. This paper discusses the expected increase in mobile payments using Near Field Communication, possible uses and the risks associated with carrying out transactions over a wireless network. We also discuss a real world implementation of an NFC based loyalty card system for retail.DOI:http://dx.doi.org/10.11591/ijece.v2i3.23

    Effects of Information Technology on Organisational Performance in Nigerian Banking Industries

    Get PDF
    Nigerian banks have benefited from global technology innovation. Introduction of Information and Communication Technologies (ICT) have affected employee performance and customers’ responses .This thesis examined customer’s and employee’s responses to technology innovation, and their effects on the performance of the Nigerian banks.  Fifteen (20) major banks were selected for the research. Two null hypotheses based on sets of questionnaires distributed to selected banks’ employees and customers were formulated to test whether there is no significant relationship between technology innovation and customer’s satisfaction; and between technological innovation and Nigerian banks employee’s performance. Four hundred and fifty ( 450) questionnaires were distributed to customers to test the first hypothesis out of which 400 were collected which is 88.88% of the distributed questionnaires, Chi square   was used to test the hypothesis . Findings revealed that technological innovation influenced banks employee’s performance, customer’s satisfaction and improvement in banks profitability. The study recommends effective management of technological innovation for improved employees performance, customer’s satisfaction, sustainable profit, increased return on investment, returns on equity, and to promote competitiveness in the Nigerian banking industry.
    • …
    corecore