377,333 research outputs found

    TRENDS IN ELECTRONIC COMMERCE SECURITY: A MANAGERIAL BRIEF AND TEACHING NOTE

    Get PDF
    The Internet and similar networks provide new infrastructures for communications and commerce. These open networks interconnect computers across many different organizations with dramatically lower communications and distributed applications development costs. This motivates businesses to transfer commercial activity from closed private networks to open networks like the Internet. However, open network architectures are vulnerable to a number of different security threats. While many different hardware and software solutions exist to secure transactions over the Internet, greater consensus is required by companies and consumers on the processes, organizations and application of existing technical solutions for secure electronic commerce. Greater consensus on security among trading parties will lower the costs of electronic commerce and accelerate its deployment on the Internet.Information Systems Working Papers Serie

    The Effects of Mobility on Neighbourhood Social Ties

    Get PDF
    This research examines the strength of people's ties with close neighbours and the sensitivity thereof to changes in residential mobility, access to modes of public and private transport, and changes in the availability of modern communications technologies using the German Socio-economic Panel Study (SOEP). All forms of mobility have increased over time and are negatively associated with visiting neighbours. With further increases in mobility, close neighbours may become less relevant. Nevertheless, presently the incidence of visits with neighbours is sizeable; in contrast to the frequent assertion in the literature that the neighbourhood is of no importance.Neighbourhood, Social interactions, Mobility, Transport, Internet, Family ties

    Asynchronous distributed private-key generators for identity-based cryptography

    Get PDF
    An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed PKG has been suggested as a way to mitigate this problem for Boneh and Franklin’s IBE scheme, the security of this distributed protocol has not been proven and the proposed solution does not work over the asynchronous Internet. Further, a distributed PKG has not been considered for any other IBE scheme. In this paper, we design distributed PKG setup and private key extraction protocols in an asynchronous communication model for three important IBE schemes; namely, Boneh and Franklin’s IBE, Sakai and Kasahara’s IBE, and Boneh and Boyen’s BB1-IBE. We give special attention to the applicability of our protocols to all possible types of bilinear pairings and prove their IND-ID-CCA security in the random oracle model. Finally, we also perform a comparative analysis of these protocols and present recommendations for their use.

    UJI COBA IMPLEMENTASI VOIP PADA JARINGAN TELKOMSEL FLASH

    Get PDF
    ABSTRAKSI: Seiring berkembangnya teknologi pada saat ini kebutuhan akan telekomunikasi menjadi hal yang tidak bisa dihindari. Salah satu layanan teknologi yang sedang menjamur adalah internet yang menyediakan banyak layanan didalammya.Telkomsel Flash adalah layanan berbasiskan Internet, Multimedia, dan layanan berbasiskan IP lainnya. Layanan ini meliputi : Internet berkecepatan tinggi, Internet dial up, TV kabel, VPN (Virtual Private Network), VoIP ( Voice over Internet Protocol ), dan lain-lain yang sudah menggunakan teknologi HSDPA.Voice over Internet Protocol adalah teknologi yang menjadikan media internet untuk bisa melakukan komunikasi suara jarak jauh secara langsung. Sinyal suara analog, diubah menjadi data digital dan dikirimkan melalui jaringan berupa paket-paket data secara real time.Proyek akhir ini akan mengintegrasikan Voice over Internet Protocol dengan Telkomsel Flash. Dengan mengimplementasikan Voice over Internet Protocol pada jaringan Telkomsel Flash, maka dapat dilakukan pengetesan kelayakan dari implementasi tersebut dengan mengukur QoS (Quality Of Service).Kata Kunci : HSDPA, Internet, VoIP, QoSABSTRACT: Along expand technological at the moment, the needed of telecommunications can’t be avoided. One of technology service is internet that provide a lot of service in there.Telkomsel Flash is a service based on Internet, Multimedia, and Other IP service. This service cover : High-Speed Internet, Internet dial Up, TV Cable, VPN ( Virtual Private Network), Voip ( Voice Over Internet Protocol ), and others used technology HSDPA.Voice Over Internet Protocol is a technology that used media internet to be able to communications voice in long distance directly. Analogous Sinyal voice, turned into digital data and delivered through network as data packets in real time.This Final Project will integrate Voice Over Internet Protocol with Telkomsel Flash. Implementation Voice Over Internet Protocol at Telkomsel Flash network, so can be conducted the testing of elegibility from the implementation by measuring QoS ( Quality Of Service).Keyword: HSDPA, Internet, VoIP, Qo

    Technology Corner: Internet Packet Sniffers

    Get PDF
    The best way to understand an internet packet sniffer, hereafter “packet sniffer”, is by analogy with a wiretap. A wiretap is a piece of hardware that allows a person to eavesdrop on phone conversations over a telephone network. Similarly, a packet sniffer is a piece of software that allows a person to eavesdrop on computer communications over the internet. A packet sniffer can be used as a diagnostic tool by network administrators or as a spying tool by hackers who can use it to steal passwords and other private information from computer users. Whether you are a network administrator or information assurance specialist, it helps to have a detailed understanding of how packet sniffers work. And one of the best ways to acquire such an understanding is to build and modify an actual packet sniffer. But first, a disclaimer: the information contained in this paper is for educational purposes only—the use of packet sniffers to eavesdrop on private information is illegal, and violates the computer use policies of most organizations

    Deep pockets, packets, and harbours

    Get PDF
    Deep Packet Inspection (DPI) is a set of methodologies used for the analysis of data flow over the Internet. It is the intention of this paper to describe technical details of this issue and to show that by using DPI technologies it is possible to understand the content of Transmission Control Protocol/Internet Protocol communications. This communications can carry public available content, private users information, legitimate copyrighted works, as well as infringing copyrighted works. Legislation in many jurisdictions regarding Internet service providers’ liability, or more generally the liability of communication intermediaries, usually contains “safe harbour” provisions. The World Intellectual Property Organization Copyright Treaty of 1996 has a short but significant provision excluding liability for suppliers of physical facilities. The provision is aimed at communication to the public and the facilitation of physical means. Its extensive interpretation to cases of contributory or vicarious liability, in absence of specific national implementation, can prove problematic. Two of the most relevant legislative interventions in the field, the Digital Millennium Copyright Act and the European Directive on Electronic Commerce, regulate extensively the field of intermediary liability. This paper looks at the relationship between existing packet inspection technologies, especially the ‘deep version,’ and the international and national legal and regulatory interventions connected with intellectual property protection and with the correlated liabilities ‘exemptions. In analyzing the referred two main statutes, we will take a comparative look at similar interventions in Australia and Canada that can offer some interesting elements of reflection

    Policy, Federalism, and Regulating Broadband Internet Access

    Get PDF
    Following recent telecommunications mergers, local (mostly municipal and county) governments and the federal government are fighting over who should determine whether cable television systems must make their facilities available to unaffiliated providers of high-speed (“broadband”) Internet service. This intergovernmental dispute is only the latest in a series of such clashes regarding competition and communications policy. A brief review of the policy suggests that substantively, local open-access requirements are not yet warranted. However, the economics of federalism, primarily that the relevant markets are local, indicates that local governments should have the right to choose these policies, perhaps erroneously. Federal preemption could prevent learning from multiple independent local “experiments.” The best case for limiting local authority is if it is only the exploitation of opportunistic ability to extract nationwide rents in exchange for approving transfer of the incumbent’s cable franchise to an acquiring firm. Key Words: Federalism, Internet, regulation, vertical integration JEL Classification Numbers: H1, L5, L1 We find that the welfare change from increasing NHS output could easily be negative, particularly when extra spending is financed by distortionary taxes. In contrast, expanding private health care is always efficiency-improving in our simulations. In our central estimates, increasing private health care by a pound’s worth of output produces an efficiency gain of 55 pence, but increasing national health output produces a net efficiency loss of 32 pence per pound! One reason for these results is that increasing the output of rationed health care has ambiguous effects on the total deadweight losses from waiting costs, but these costs unambiguously fall when the private health sector expands. Financing policies by user fees avoids the efficiency costs of raising distortionary taxes, and it also produces efficiency gains by reducing waiting lists. In fact, increasing national health care output produces an overall efficiency gain in most of our simulations, rather than an efficiency loss, when the policy is financed by higher user fees rather than by distortionary taxes. Still, the policy is generally less efficient than a user fee–financed increase in private health care.

    Lessons Learned Too Well: Anonymity in a Time of Surveillance

    Get PDF
    It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator\u27s identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names. This Article traces the global development of technologies and regulations hostile to online anonymity, beginning with the early days of the Internet. Offering normative and pragmatic arguments for why communicative anonymity is important, this Article argues that anonymity is the bedrock of online freedom, and it must be preserved. U.S. anti-anonymity policies not only enable repressive policies abroad but also place at risk the safety of anonymous communications that Americans may someday need. This Article, in addition to providing suggestions on how to save electronic anonymity, calls for proponents of anti-anonymity policies to provide stronger justifications for such policies and to consider alternatives less likely to destroy individual liberties. In a time where surveillance technology and laws demanding identification abound, protecting the right to speak freely without fear of official retribution is critical to protecting these liberties

    Promoting global Internet freedom: policy and technology

    Get PDF
    This report provides information about US government and private sector efforts to promote and support global Internet freedom and a description of Internet freedom legislation and hearings from the 112th Congress. Modern communication tools such as the Internet provide a relatively inexpensive, accessible, easy-entry means of sharing ideas, information, and pictures around the world. In a political and human rights context, in closed societies when the more established, formal news media is denied access to or does not report on specified news events, the Internet has become an alternative source of media, and sometimes a means to organize politically. The openness and the freedom of expression allowed through social networking sites, as well as the blogs, video sharing sites, and other tools of today’s communications technology, have proven to be an unprecedented and often disruptive force in some closed societies. Governments that seek to maintain their authority and control the ideas and information their citizens receive are often caught in a dilemma: they feel that they need access to the Internet to participate in commerce in the global market and for economic growth and technological development, but fear that allowing open access to the Internet potentially weakens their control over their citizens. Internet freedom can be promoted in two ways, through legislation that mandates or prohibits certain activities, or through industry self regulation. Current legislation under consideration by Congress, the Global Online Freedom Act of 2011 (H.R. 3605), would prohibit or require reporting of the sale of Internet technologies and provision of Internet services to “Internetrestricting countries” (as determined by the State Department). Some believe, however, that technology can offer a complementary and, in some cases, better and more easily implemented solution to ensuring Internet freedom. They argue that hardware and Internet services, in and of themselves, are neutral elements of the Internet; it is how they are implemented by various countries that is repressive. Also, Internet services are often tailored for deployment to specific countries; however, such tailoring is done to bring the company in line with the laws of that country, not with the intention of allowing the country to repress and censor its citizenry. In many cases, that tailoring would not raise many questions about free speech and political repression. This report provides information about federal and private sector efforts to promote and support global Internet freedom and a description of Internet freedom legislation and hearings from the 112th Congress. Three appendixes suggest further reading on this topic and describe censorship and circumvention technologies
    • 

    corecore