252,356 research outputs found
The Influence of Perceived Risk on the uptake of Mobile Money Services by SMEs Operations in Karagwe District, Tanzania
Mobile money services (MMS) USAge through mobile phones and other ICT tools has increased with time and dramatically pave the way in business communication among Small and Medium Enterprises (SMEs) in Tanzania. Some of SME operators in Karagwe District are escaping from MMS USAge due to perceived risk associated with financial communication and hence pulls down its USAge. The growth of MMS and perceived risk embodied in it is taking a crucial part in business communication. A study sought to analyse the influences of perceived risk on MMS USAge to support SME business undertaking. Perceived risk theory was reviewed and become a corners stone for this study. It can be recalled that, risk is the stake in use and individual feeling which is subjected in certainty. Variables in mobile MMS USAge including financial risk, performance risk and SME business operation were identified and measured using quantitative techniques. Questionnaires were designed to collect data from all respondent. Data were collected from 154 runners of micro, small and medium enterprises using simple random sampling method. Data were analysed by sing SPSS version 22 in which descriptive analysis were used to analyses demographic data while factor analysis were used to test the study hypothesis. The study found that financial and operational risks are negatively and significantly influences MMS USAge in business operation. This study highlights remedial action for players of MMS in business operation which will facilitate to mitigate perceived risk and enhance smooth running SME business orientation. Furthermore, the study recommends that the Government should institute the developed ICT policies and other legislation to enforce MMS USAge security and regulate its uptakes
Heavy Hitters and the Structure of Local Privacy
We present a new locally differentially private algorithm for the heavy
hitters problem which achieves optimal worst-case error as a function of all
standardly considered parameters. Prior work obtained error rates which depend
optimally on the number of users, the size of the domain, and the privacy
parameter, but depend sub-optimally on the failure probability.
We strengthen existing lower bounds on the error to incorporate the failure
probability, and show that our new upper bound is tight with respect to this
parameter as well. Our lower bound is based on a new understanding of the
structure of locally private protocols. We further develop these ideas to
obtain the following general results beyond heavy hitters.
Advanced Grouposition: In the local model, group privacy for
users degrades proportionally to , instead of linearly in
as in the central model. Stronger group privacy yields improved max-information
guarantees, as well as stronger lower bounds (via "packing arguments"), over
the central model.
Building on a transformation of Bassily and Smith (STOC 2015), we
give a generic transformation from any non-interactive approximate-private
local protocol into a pure-private local protocol. Again in contrast with the
central model, this shows that we cannot obtain more accurate algorithms by
moving from pure to approximate local privacy
The Impacts of Privacy Rules on Users' Perception on Internet of Things (IoT) Applications: Focusing on Smart Home Security Service
Department of Management EngineeringAs communication and information technologies advance, the Internet of Things (IoT) has changed the way people live. In particular, as smart home security services have been widely commercialized, it is necessary to examine consumer perception. However, there is little research that explains the general perception of IoT and smart home services. This article will utilize communication privacy management theory and privacy calculus theory to investigate how options to protect privacy affect how users perceive benefits and costs and how those perceptions affect individuals??? intentions to use of smart home service. Scenario-based experiments were conducted, and perceived benefits and costs were treated as formative second-order constructs. The results of PLS analysis in the study showed that smart home options to protect privacy decreased perceived benefits and increased perceived costs. In addition, the perceived benefits and perceived costs significantly affected the intention to use smart home security services. This research contributes to the field of IoT and smart home research and gives practitioners notable guidelines.ope
Confirmation of Nelson A. Rockefeller as Vice President of the United States
Report issued by House Committee on the Judiciary following its hearings on the nomination of Nelson Rockefeller to be the 41st Vice President of the United States. President Gerald Ford had nominated Rockefeller pursuant to Section 2 of the Twenty-Fifth Amendment following Fordâs succession to the presidency upon President Richard Nixonâs resignation.https://ir.lawnet.fordham.edu/twentyfifth_amendment_watergate_era/1013/thumbnail.jp
Gaussian Operations and Privacy
We consider the possibilities offered by Gaussian states and operations for
two honest parties, Alice and Bob, to obtain privacy against a third
eavesdropping party, Eve. We first extend the security analysis of the protocol
proposed in M. Navascues et al., Phys. Rev. Lett. 94, 010502 (2005). Then, we
prove that a generalized version of this protocol does not allow to distill a
secret key out of bound entangled Gaussian states
Privacy Issues of the W3C Geolocation API
The W3C's Geolocation API may rapidly standardize the transmission of
location information on the Web, but, in dealing with such sensitive
information, it also raises serious privacy concerns. We analyze the manner and
extent to which the current W3C Geolocation API provides mechanisms to support
privacy. We propose a privacy framework for the consideration of location
information and use it to evaluate the W3C Geolocation API, both the
specification and its use in the wild, and recommend some modifications to the
API as a result of our analysis
Review on Data Security in Cloud Computing
Cloud Computing is a set of Information Technology Services, like network, software system, storage, hardware, software, and resources and these services are provided to a customer over a internet. These services of Cloud Computing are delivered by third party provider who owns the infrastructure. This technology has a major potential to bring the numerous benefits, however, it faces the risks in terms of unintended economic and security impacts. Cloud computing technology offers a great potential to improve the civil military, interoperability, information sharing and infrastructure resilience. The great benefits offered by the cloud computing technology, data security concerns about their availability, confidentiality, integrity and loss of governance have a great influence on risk management decision process. The paper assesses how security and privacy issues transpire in the context of cloud computing and examines ways in which they might be addressed. This paper aims to solve privacy and security in cloud computing. The methodology used involves encrypting and decrypting data to ensure privacy and security in the cloud
Recommended from our members
Exploiting CAFS-ISP
In the summer of 1982, the ICLCUA CAFS Special Interest Group defined three subject areas for working party activity. These were: 1) interfaces with compilers and databases, 2) end-user language facilities and display methods, and 3) text-handling and office automation. The CAFS SIG convened one working party to address the first subject with the following terms of reference: 1) review facilities and map requirements onto them, 2) "Database or CAFS" or "Database on CAFS", 3) training needs for users to bridge to new techniques, and 4) repair specifications to cover gaps in software. The working party interpreted the topic broadly as the data processing professional's, rather than the end-user's, view of and relationship with CAFS. This report is the result of the working party's activities. The report content for good reasons exceeds the terms of reference in their strictest sense. For example, we examine QUERYMASTER, which is deemed to be an end-user tool by ICL, from both the DP and end-user perspectives. First, this is the only interface to CAFS in the current SV201. Secondly, it is necessary for the DP department to understand the end-user's interface to CAFS. Thirdly, the other subjects have not yet been addressed by other active working parties
- âŚ