52 research outputs found

    On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining

    Get PDF
    Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the government curtails underground economic activities and facilitates tax management via ubiquitous e-invoice information processing and intelligence mining for B2C transactions with management realized via privacy-preserved and robust consumer carriers. In this paper, we study the concept of carriers, a medium that facilitates the transfer of an e-invoice from a business to a consumer in a B2C transaction. Implementations of carriers not only depend on the underlying hardware, software, and network infrastructures that support their services, but also on consumers willingness to use them. In this paper, we review Taiwans Second Generation E-invoicing System, which is designed to promote the use of e-invoices in the consumer sector, and identify four problems that require further attention. These problems are: (1) no e-invoice data for immediate review; (2) limited readability of carriers by POS (Point of Sales); (3) lack of seamless integration into purchase behaviors; and (4) carrier traceability. We then discuss possible solutions to overcome these concerns, in hope of offering some insight into future mobile commerce based on e-invoice carriers in the cloud computing era

    The survey on Near Field Communication

    Get PDF
    PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    E-SCAPE New tools and new opportunities for the localization of Expo 2015 general interest services along the Canale Cavour, a backbone of the Milan-Turin urban region

    Get PDF
    Publication of the Alta Scuola Politecnica project "E-SCAPE. New tools and new opportunities for the localization of Expo 2015 general interest services along the Canale Cavour, a backbone of the Milan-Turin urban region

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Marketing plan for a High-Tech Product

    Get PDF
    The purpose of this study was to prepare a market analysis for a start-up company in the area of High-Tech and mobile applications market. The outcome of the research was a marketing plan and business recommendations for the case company. The research process included action research, interviews with the representatives of the case company and direct observations. The action research included selection of a focus, clarifying theories, identifying research question, then collecting and analysing the data, and finally completing the marketing plan and drawing the conclusions. The interviews were con-ducted at the beginning of the thesis process and took a form of discussions with the start-up idea owners. The business idea of the case company was to combine the mobile application business and environmental consciousness among private users. The major findings and observations in the field revealed that the mobile applications business is blooming and the corresponding market is growing, as well as peoples' awareness of the environmental issues is growing. When it comes to the environmental aspects, people have more trust to the information shared by private individuals and people like themselves, rather than authorities and bigger commercial organizations, especially those involved in the construction business. Thus, the research results were showing favourable situation and a good business potential for the case company, willing to combine mobile application and environmental issues. For the marketing strategy, the author recommends to focus on entering the market with own service offer, in order to create visibility, build the brand image and attract the customers, with further keeping them on using the service. It is recommended to launch the major service (free for the end users) along with additional features, which customers can buy for a separate fee. Finally, 95% of customer satisfaction in service rating should be aimed at and expanding to the international market (Baltic states and Northern Europe for the beginning) later on. For the future steps the author recommends to prepare a budgeting plan and a 1st year implementation program, since those were left out from the current research. For the long-term planning, it is recommended to evaluate the results of the 1st year operations, so that the marketing strategy could be corrected accordingly

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Dia-Continua: An Information System for Type 1 Diabetes Consultation. (Interoperability, Privacy, and Information Quality on a FHIR-Based Information System for Type 1 Diabetes Consultations based on Patient-Generated Health Data)

    Get PDF
    Patient-generated health data (PGHD) is required to monitor chronic conditions like Type 1 Diabetes (T1D). This data includes information from medical devices like insulin pumps and continuous glucose monitors and lifestyle insights from commercial wearables devices such as smartwatches. To improve the quality of medical consultations, we need a unified information system that can integrate PGHD. Designing such a system will pose several challenges. The system should be able to navigate through fragmented information and the complexities of various data formats, proprietary interfaces, and storage methods while ensuring robust security, privacy, and adherence to data ownership principles. It should also enable controlled data sharing with healthcare providers (HCPs) and external entities such as national registries and informal caregivers. This dissertation details designing, developing, and testing an information system for individuals with T1D. The project involved integrative research in health informatics, collaboration with international projects, and collaboration with experienced users and HCPs to address three research questions. These questions focused on interoperability, the security and privacy of the information collected, and the quality of the information presented during consultations. The result is Dia-Continua, a Fast Healthcare Interoperability Resources (FHIR)-based information system with a microservices architecture orchestrated through Kubernetes on an Infrastructure as a Service (IaaS) platform. The system integrates data from various diabetes management devices, questionnaires, and PGHD. Furthermore, using SMART on FHIR for authorization and authentication enables data sharing and reuse with national registries and informal caregivers. Eleven interviews with HCPs evaluated Dia-Continua's new functionalities and information quality. Despite the limitations due to proprietary device systems, the system was assessed positively by HCPs, highlighting the need for a system like Dia-Continua that includes physical activity, sleep, and stress in medical consultations. Dia-Continua is a significant step for a patient-centred model for consultations in T1D. Future work should expand the system's model to other chronic diseases.Utviklingen av medisinske konsultasjoner for kroniske tilstander, spesifikt Type 1 Diabetes (T1D), avhenger i stor grad av pasientgenererte helsedata (PGHD). Disse dataene inkluderer informasjon fra medisinsk utstyr slik som insulinpumper, CGM, samt livsstils data fra kommersielt utstyr som sensorer på smartklokker og smarte ringer. Et helhetlig informasjonssystem som kan integrere PGHD er nødvendig for å forbedre informasjonskvalitet under medisinske konsultasjoner. Imidlertid bør et slikt system være i stand til å la brukeren navigere gjennom fragmentert informasjon og komplekse heterogene dataformater, proprietære grensesnitt og lagringsmetoder, samtidig som systemet sikrer robust sikkerhet, personvern og ivaretakelse av prinsipper for eierskap til data. Systemet bør også muliggjøre kontrollert deling av data med helsepersonell og eksterne aktører slik som nasjonale registre (Noklus) og pasientens omsorgspersoner. Denne avhandlingen beskriver design, utvikling, testing og evaluering av et nytt informasjonssystem for T1D basert på pasientens egne data. Prosjektet har involvert ulike samarbeidspartnere og profesjoner, samt samarbeid med internasjonale prosjekter, erfarne brukere og HP for å adressere de tre forskningsspørsmålene i prosjektet. Ett av resultatene er systemet Dia-Continua, et Fast Healthcare Interoperability Resources (FHIR)-basert informasjonssystem med en Microservice arkitektur orkestrert gjennom Kubernetes på en infrastruktur som en tjenesteplattform (Azure). Systemet integrerer data fra ulike diabetesenheter, spørreskjemaer og andre sensorer. Videre, ved å bruke «SMART on FHIR» for autorisasjon og autentisering, muliggjøres deling og gjenbruk av data med nasjonale registre og uformelle omsorgspersoner. Elleve intervjuer med helsepersonell ble gjort for å evaluere Dia-Continua sine nye funksjonaliteter, samt dets informasjonskvalitet. Til tross for begrensningene på grunn av proprietære standarder, ble systemet positivt mottatt av HP. Informantene understreket behovet for et system som Dia-Continua som inkluderer fysisk aktivitet, søvn og stress i medisinske konsultasjoner. Dia-Continua er et betydelig skritt fram mot en pasientsentrert modell for konsultasjoner i T1D. Fremtidig arbeid bør utvide systemets modell til andre kroniske sykdommer
    corecore