90 research outputs found
Сборник текстов по обучению профессионально-ориентированному чтению на английском языке для студентов специальностей 1-28 01 01 – "Экономика электронного бизнеса" 1-28 01 02 – "Электронный маркетинг"
Rakhuba Valery Ivanovich. Основы электронного бизнеса и маркетинга. Learning Textbook
professionally oriented reading in EnglishСборник текстов по обучению профессионально-ориентированному чтению
на английском языке предназначается для студентов специальностей 1-28 01 01
Экономика электронного бизнеса и 1-28 01 02 Электронный маркетинг.
Тематика текстов дает достаточно полное представление о практической
реализации принципов деятельности в этих сферах экономической активности
CHORUS Deliverable 2.2: Second report - identification of multi-disciplinary key issues for gap analysis toward EU multimedia search engines roadmap
After addressing the state-of-the-art during the first year of Chorus and establishing the existing landscape in
multimedia search engines, we have identified and analyzed gaps within European research effort during our second year.
In this period we focused on three directions, notably technological issues, user-centred issues and use-cases and socio-
economic and legal aspects. These were assessed by two central studies: firstly, a concerted vision of functional breakdown
of generic multimedia search engine, and secondly, a representative use-cases descriptions with the related discussion on
requirement for technological challenges. Both studies have been carried out in cooperation and consultation with the
community at large through EC concertation meetings (multimedia search engines cluster), several meetings with our
Think-Tank, presentations in international conferences, and surveys addressed to EU projects coordinators as well as
National initiatives coordinators. Based on the obtained feedback we identified two types of gaps, namely core
technological gaps that involve research challenges, and “enablers”, which are not necessarily technical research
challenges, but have impact on innovation progress. New socio-economic trends are presented as well as emerging legal
challenges
22nd Annual Conference on Legal Issues for Financial Institutions
Materials from the 22nd Annual Conference on Legal Issues for Financial Institutions held by UK/CLE in April of 2002
Consumers Perspectives on Using Biometric Technology With Mobile Banking
The need for applying biometric technology in mobile banking is increasing due to emerging security issues, and many banks’ chief executive officers have integrated biometric solutions into their mobile application protocols to address these evolving security risks. This quantitative study was performed to evaluate how the opinions and beliefs of banking customers in the Mid-Atlantic region of the United States might influence their adoption of mobile banking applications that included biometric technology. The research question was designed to explore how performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), perceived credibility (PC), and task-technology fit (TTF) affected customer adoption of biometric technology with mobile banking. The conceptual framework extended the unified theory of acceptance and use of technology by including PC and TTF. The responses to a web-based questionnaire that was distributed to 228 mobile banking customers were analyzed using SPSS AMOS (Version 23) to create structural equation models, a multiple linear regression model, and an analysis of variance (ANOVA) model. The results showed that PE, EE, TTF, and FC were the significant factors affecting customer acceptance of biometric technology with mobile banking. SI and PC were nonsignificant factors and had low positive correlations. The results of this study suggest that biometric technology can mitigate the risks associated with security attacks by identifying the customer during the bank transaction. The results also support positive social change by demonstrating how biometric technology can secure banks from fraud, prevent crime, and improve liveness detection
A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage
Security has become a significant concern with the increased popularity of
cloud storage services. It comes with the vulnerability of being accessed by
third parties. Security is one of the major hurdles in the cloud server for the
user when the user data that reside in local storage is outsourced to the
cloud. It has given rise to security concerns involved in data confidentiality
even after the deletion of data from cloud storage. Though, it raises a serious
problem when the encrypted data needs to be shared with more people than the
data owner initially designated. However, searching on encrypted data is a
fundamental issue in cloud storage. The method of searching over encrypted data
represents a significant challenge in the cloud.
Searchable encryption allows a cloud server to conduct a search over
encrypted data on behalf of the data users without learning the underlying
plaintexts. While many academic SE schemes show provable security, they usually
expose some query information, making them less practical, weak in usability,
and challenging to deploy. Also, sharing encrypted data with other authorized
users must provide each document's secret key. However, this way has many
limitations due to the difficulty of key management and distribution.
We have designed the system using the existing cryptographic approaches,
ensuring the search on encrypted data over the cloud. The primary focus of our
proposed model is to ensure user privacy and security through a less
computationally intensive, user-friendly system with a trusted third party
entity. To demonstrate our proposed model, we have implemented a web
application called CryptoSearch as an overlay system on top of a well-known
cloud storage domain. It exhibits secure search on encrypted data with no
compromise to the user-friendliness and the scheme's functional performance in
real-world applications.Comment: 146 Pages, Master's Thesis, 6 Chapters, 96 Figures, 11 Table
Evidence-based Accountability Audits for Cloud Computing
Cloud computing is known for its on-demand service provisioning and has now become mainstream. Many businesses as well as individuals are using cloud services on a daily basis. There is a big variety of services that ranges from the provision of computing resources to services such as productivity suites and social networks. The nature of these services varies heavily in terms of what kind of information is being out-sourced to the cloud provider. Often, that data is sensitive, for instance when PII is being shared by an individual. Also, businesses that move (parts of) their processes to the cloud are actively participating in a major paradigm shift from having data on-premise to transfering data to a third-party provider.
However, many new challenges come along with this trend, which are closely tied to the loss of control over data. When moving to the cloud, direct control over geographical storage location, who has access to it and how it is shared and processed is given up. Because of this loss of control, cloud customers have to trust cloud providers that they treat their data in an appropriate and responsible way. Cloud audits can be used to check how data has been processed in the cloud (i.e., by whom, for what purpose) and whether or not this happened in compliance with what has been defined in agreed-upon privacy and data storage, usage and maintenance (i.e., data handling) policies. This way, a cloud customer can regain some of the control he has given up by moving to the cloud.
In this thesis, accountability audits are presented as a way to strengthen trust in cloud computing by providing assurance about the processing of data in the cloud according to data handling and privacy policies. In cloud accountability audits, various distributed evidence sources need to be considered. The research presented in this thesis discusses the use of various heterogeous evidence sources on all cloud layers. This way, a complete picture of the actual data handling practices that is based on hard facts can be presented to the cloud consumer. Furthermore, this strengthens transparency of data processing in the cloud, which can lead to improved trust in cloud providers, if they choose to adopt these mechanisms in order to assure their customers that their data is being handled according to their expectations. The system presented in this thesis enables continuous auditing of a cloud provider's adherence to data handling policies in an automated way that shortens audit intervals and that is based on evidence that is produced by cloud subsystems.
An important aspect of many cloud offerings is the combination of multiple distinct cloud services that are offered by independent providers. Data is thereby freuqently exchanged between the cloud providers. This also includes trans-border flows of data, where one provider may be required to adhere to more strict data protection requirements than the others. The system presented in this thesis addresses such scenarios by enabling the collection of evidence at providers and evaluating it during audits.
Securing evidence quickly becomes a challenge in the system design, when information that is needed for the audit is deemed sensitive or confidential. This means that securing the evidence at-rest as well as in-transit is of utmost importance, in order not to introduce a new liability by building an insecure data heap. This research presents the identification of security and privacy protection requirements alongside proposed solutions that enable the development of an architecture for secure, automated, policy-driven and evidence-based accountability audits
Technology and change in the hotel industry : the case of the hotel receptionist.
SIGLEAvailable from British Library Document Supply Centre- DSC:D89388 / BLDSC - British Library Document Supply CentreGBUnited Kingdo
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Protecting the infrastructure: 3rd Australian information warfare & security conference 2002
The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year\u27s conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations.
The papers cover many topics, all within the field of information warfare and its applications, now and into the future.
The papers have been grouped into six streams:
• Networks
• IWAR Strategy
• Security
• Risk Management
• Social/Education
• Infrastructur
Internet dispute resolution.
PhDThis thesis develops a model for the fair resolution of internet disputes. The internet
has the potential to lead to international~ cross-border disputes being a powerful
communications medium, that allows data exchanges in various media formats
between a wide range of different users situated in distant locations. It explores the
meaning of fairness for the resolution of such disputes.
This thesis refers to the existing literature examining the private international law
issues arising from cross-border interactions and transactions on the internet which
make litigation and enforcement more costly and lengthy.
For many disputes arising on the internet, alternative ways of resolving such
disputes have to be found. This thesis contains a detailed exploration of the use of
mediation and arbitration, using online technology. obviating the need for the
parties and lawyers to meet face-to-face and leading to more efficient information
processing, and thereby reducing cost and delay in dispute resolution.
Binding dispute resolution and enforceability in cross-border cases are important
for internet disputes and can be provided by online arbitration. Therefore, this thesis
proceeds to examines in great detail the legal issues surrounding online arbitration.
It looks at questions of due process in arbitration and covers the legal issues
surrounding business-to-consumer arbitration comparing the European approach to
that in the us. The thesis contains a detailed analysis of the Uniform Domain Name
Dispute Resolution Procedure (UDRP) and considers to what extent the dispute
resolution model established by the UDRP could or should sene as a model for
other types of internet disputes.
The conclusion from this examination of all aspects of internet dispute resolution is
a model of dispute resolution. which encourages the use of online arbitration for
internet disputes but, where there exists a substantial power imbalance between the
disputants (such as the traditional business-to-consumer paradigm), subjects
traditional commercial arbitration to more stringent due process standards for
disputes
- …