152 research outputs found

    Invisible Security

    Get PDF

    Digital Piracy of MP3s: Consumer and Ethical Predispositions

    Get PDF
    Purpose – Illegal downloading of music has become an inexorable and rampant activity particularly among college students who have been little deterred by industry legal actions. The purpose of this research is to examine the present state of downloading and how ethical orientation and attitudes towards MP3 piracy impact such activities. The paper also aims to use ethical scenarios as a way of understanding the ethical reasoning in illegal downloading. Design/methodology/approach – Key research questions are proposed that are related to illegal downloading. A sample of 364 university students was used to examine each research question. Statistical results are reported. Findings – The results clearly show that downloading continues at a high rate today driven by a strong belief that it is not ethically wrong. Ethical orientation was found to be positively associated with awareness of the social cost of downloading, consequences of downloading, and ethical belief in downloading. Ethical scenarios show that ethical orientation is also associated with downloading activities and with stealing. Other results indicate that respondents believe that their peers are more prone to stealing music and downloading MP3s illegally. Fear of consequences does seem to have an impact on the propensity to download illegally. Practical implications – The paper contributes to inform industry representatives that appeals to ethics or guilt are not likely to deter illegal downloading measurably. The use of punishment for downloaders may have a short-term effect but other (more positive) measures are required. Originality/value – No research has examined downloading of MP3s in the manner developed in this paper. The paper contributes to a better understanding of consumer behavior among those who download. The results provide insight into a serious problem in the recording industry that is likely to persist in the distant future unless sound measures are developed

    When Cost-Efficient Technologies Meet Politics: A Case Study of Radical Wireless Network Implementation

    Get PDF
    Cost efficiency has been a dominant perspective in the traditional IT literature. However, in complex technology and business environment, the widely recognized cost efficient assumption of information technology has been increasingly challenged. Drawing from a case study of wireless network implementation situated in a politically sensitive workplace, this paper provided practice insights for IT managers in today’s networked economy. More specifically, stories experienced in the case study illustrated that despite well-calculated cost efficiency of wireless network infrastructure, the radical implementation process in the case organization encountered enormous challenges and opposition due to the fact that administrators failed to consider various stakeholders’ positions and interests. Eventually, the implementation objectives and outcome were considerably undermined. Implications from this empirical case research reemphasized the significance of understanding political forces situated in any business environment where different stakeholders hold conflicting interests. Lessons learned from the case story further encouraged IT managers and policy makers to better strategize emerging information technology in general and wireless networks in particular as the whole global society and business environment are increasingly facing an emerging wireless world

    Reve\{a,i\}ling the risks: a phenomenology of information security

    Get PDF
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, we are able to give a phenomenological explanation of the electronic voting controversy in the Netherlands

    Banknote authentication using chaotic elements technology.

    Get PDF
    The counterfeit banknote is a growing threat to the society since the advancements in the field of computers, scanners and photocopiers, as they have made the duplication process for banknote much simpler. The fake note detection systems developed so far have many drawbacks such as high cost, poor accuracy, unavailability, lack of user-friendliness and lower effectiveness. One possible solution to this problem could be the use of a system uniquely linked to the banknote itself. In this paper, we present a unique identification and authentication process for the banknote using chaotic elements embedded in it. A chaotic element means that the physical elements are formed from a random process independent from human intervention. The chaotic elements used in this paper are the random distribution patterns of such security fibres set into the paper pulp. A unique ID is generated from the fibre pattern obtained from UV image of the note, which can be verified by any person who receives the banknote to decide whether the banknote is authentic or not. Performance analysis of the system is also studied in this paper

    Pandrecht:Een rechtsvergelijkend onderzoek naar de gevolgen van het vuistloze en stille karakter van het pandrecht

    Get PDF
    If someone lends money to another person, he trusts that he will get his money back. Particularly in the context of commercial relationships, there is a need for more security. Such security can be achieved by a so-called security right on someone’s property. If the debtor does not pay back the borrowed money, the secured creditor can use his security right to sell the property. From the proceeds, he may recover his claim. The most common example of such a security right is the mortgage on a house. Another security right is the right of pledge. Movable goods and claims can be pledged. In former days, a good could only be pledged if the good was actually handed over to the creditor. If the debtor did pay his loan, he got his property back. One could think of the pawnshop. Since 1992, the Dutch Civil Code offers the possibility to pledge a good, while the debtor stays in possession. This means that the debtor can then continue to use the good, for example if the pledged good is a machine that is necessary for the business operations of the debtor. This PhD thesis analyzes the consequences such invisible security right leads to. Imagine the situation that a third person buys the pledged good from the debtor. Or that a third party gives a loan to the debtor because he thinks that there are enough means of recovery against the debtor’s property. Should there be stricter requirements for invisible security rights? Is the insolvency administrator obliged to give the pledged machine, which is necessary for the business operations, back to the creditor? These and other questions are answered in the PhD thesis. Additionally, solutions are developed to address the arising problems

    An End-User Development Perspective on State-of-the-Art Web Development Tools

    Get PDF
    We reviewed and analyzed nine commercially available web development tools from the perspective of suitability for end-user development to compare and contrast alternative and best-of-breed approaches for particular problem areas within web application development (Getting Started, Workflow, Level of Abstraction, Layout, Database, Application Logic, Testing and Debugging, Learning and Scaling, Security, Collaboration, and Deployment). End-user development involves the creation of dynamic websites with support for features like authentication, conditional display, and searching/sorting by casual web developers who have some experience creating static websites but little or no programming knowledge. We found that current tools do not lack functionality, but rather have a variety of problems in ease of use for end users who are nonprogrammers. In particular, while many tools offer wizards and other features designed to facilitate specific aspects of end-user development, none of the tools that we reviewed supports a holistic approach to web application development. We discuss the implications of these problems and conclude with recommendations for the design of improved web development tools that would lower the entry barrier into web programming

    What is Faith?

    Get PDF
    In lieu of an abstract, below is the essay\u27s first paragraph. Faith, like religion, is not impossible to define, but somewhat difficult to group into a single fixed description. There are no laws that require a person or a group of people to have faith; therefore faith comes from our own personal choices and happenings in life. Based on my own experiences in life so far, faith has been a pivotal part when it comes to my outlook on life and my trust in others as well as in myself. Faith also plays a leading role when it comes to my sister, Idia. Having a family member with a mental disability undeniably creates numerous challenges in life, but faith makes it somewhat more manageable and easier to be hopeful about the future

    BANKNOTE PRINTING AT MODERN CENTRAL BANKING: TRENDS, COSTS, AND EFFICIENCY

    Get PDF
    This paper examines trends in banknote printing during the period 2000-2005 for a crosssection of 56 central banks. Because of the high increase in the demand for currency in recent years, central banks have implemented new strategies to increase efficiency in the production of banknotes. Some of them, involve the private sector by means of different modalities (e.g. joint ventures, subsidiaries or purchase of banknotes from specialized companies), and the integration of banknote printing and cash processing in a single complex (e.g. Portugal and Colombia). A cost function using a panel data model with random effects was estimated. It was identified that the denomination structure, the size of banknotes, and the production method used by central banks have a significant impact on production costs. Government printing was found to be the most costly method, while private-sector involvement in the process substantially reduces production costs. Using a non-parametric efficient frontier model, it was found that most central banks have increased its technical efficiency during the period, especially in central banks where the privatesector has involved. Computing a Malmquist index through distance functions it was identified that central banks have showed a moderate increase in its productivity, primarily due to increases in efficiency and, in a lower proportion to technical change. In most of the cases, a positive change in efficiency is mainly the result of higher scale efficiency. This could obey to high increase in demand for currency.Central Banks, Banknote Printing, Efficiency Frontier, Cost Function, Panel Data, Malmquist Index. Classification JEL: E50; C33; C23; C43.
    • 

    corecore