63,883 research outputs found

    Mobile Water Payment Innovations in Urban Africa

    Get PDF
    This study assess mobile payment options for water service bills in four urban African contexts. Systems are evaluated to identify differences in adoption levels and motivations and barriers to uptake; how costs are distributed among water service providers, mobile network operators, and customers; and mobile payment applications and designs. Data was collected through interviews with water service providers, mobile network operators and service regulators, as well as a household survey in one of the study regions and the aid of World Bank and national water regulator data. Mobile water payment adoption rates were low, but there was also evidence that key barriers such as limited awareness, lack of physical proof of payment, and high transaction tariffs, could be overcome. Increased mobile water payment is found to result in considerable savings in time and money for consumers, revenue for mobile network operators, and perhaps most importantly, strengthened finances for water service providers to improve their ability to provide sustainable service

    Future challenges and recommendations

    Get PDF
    Rapid advances in information technology and telecommunications, and in particular mobile and wireless communications, converge towards the emergence of a new type of ā€œinfostructureā€ that has the potential of supporting a large spectrum of advanced services for healthcare and health. Currently the ICT community produces a great effort to drill down from the vision and the promises of wireless and mobile technologies and provide practical application solutions. Research and development include data gathering and omni-directional transfer of vital information, integration of human machine interface technology into handheld devices and personal applications, security and interoperability of date and integration with hospital legacy systems and electronic patient record. The ongoing evolution of wireless technology and mobile device capabilities is changing the way healthcare providers interact with information technologies. The growth and acceptance of mobile information technology at the point of care, coupled with the promise and convenience of data on demand, creates opportunities for enhanced patient care and safety. The developments presented in this section demonstrate clearly the innovation aspects and trends towards user oriented applications

    Masquerade attack detection through observation planning for multi-robot systems

    Full text link
    The increasing adoption of autonomous mobile robots comes with a rising concern over the security of these systems. In this work, we examine the dangers that an adversary could pose in a multi-agent robot system. We show that conventional multi-agent plans are vulnerable to strong attackers masquerading as a properly functioning agent. We propose a novel technique to incorporate attack detection into the multi-agent path-finding problem through the simultaneous synthesis of observation plans. We show that by specially crafting the multi-agent plan, the induced inter-agent observations can provide introspective monitoring guarantees; we achieve guarantees that any adversarial agent that plans to break the system-wide security specification must necessarily violate the induced observation plan.Accepted manuscrip

    Resilience of multi-robot systems to physical masquerade attacks

    Full text link
    The advent of autonomous mobile multi-robot systems has driven innovation in both the industrial and defense sectors. The integration of such systems in safety-and security-critical applications has raised concern over their resilience to attack. In this work, we investigate the security problem of a stealthy adversary masquerading as a properly functioning agent. We show that conventional multi-agent pathfinding solutions are vulnerable to these physical masquerade attacks. Furthermore, we provide a constraint-based formulation of multi-agent pathfinding that yields multi-agent plans that are provably resilient to physical masquerade attacks. This formalization leverages inter-agent observations to facilitate introspective monitoring to guarantee resilience.Accepted manuscrip

    Continuous Audit Agent System

    Get PDF
    Recently, the provision of the real-time accounting reports over the Internet for the public corporation became popular. In response to this change on the service requirement, audit professionals considered to provide ā€œcontinuous auditingā€ to diminish or minimize the lag time of the provision of an audit opinion behind the occurrence of business events. Though has been proposed the concept at 80ā€™s, the provided implementation models of continuous auditing are still far beyond feasible. Major obstacles to hinder wide adoption in industry lie on two issues. (1) The development of continuous auditing system should be independent to the development of clientā€™s information system. (2) The audit procedures that could be implemented by agent base automatic audit system should not be limited to the analysis on corporation internal data. In this paper, an agent base continuous auditing model and system is proposed to tackle these two major concerns. Several kinds of mobile agents are initiated by an audit agency system to simulate the behaviors of a human auditor on the audit procedures to collect various audit evidences. Each kind of mobile agent simulates a specific kind of audit procedure and acts on behalf of a human auditor to access and to inspect audit-related information hosted in the distributed information source
    • ā€¦
    corecore