90 research outputs found

    Сборник текстов по обучению профессионально-ориентированному чтению на английском языке для студентов специальностей 1-28 01 01 – "Экономика электронного бизнеса" 1-28 01 02 – "Электронный маркетинг"

    Get PDF
    Rakhuba Valery Ivanovich. Основы электронного бизнеса и маркетинга. Learning Textbook professionally oriented reading in EnglishСборник текстов по обучению профессионально-ориентированному чтению на английском языке предназначается для студентов специальностей 1-28 01 01 Экономика электронного бизнеса и 1-28 01 02 Электронный маркетинг. Тематика текстов дает достаточно полное представление о практической реализации принципов деятельности в этих сферах экономической активности

    CHORUS Deliverable 2.2: Second report - identification of multi-disciplinary key issues for gap analysis toward EU multimedia search engines roadmap

    Get PDF
    After addressing the state-of-the-art during the first year of Chorus and establishing the existing landscape in multimedia search engines, we have identified and analyzed gaps within European research effort during our second year. In this period we focused on three directions, notably technological issues, user-centred issues and use-cases and socio- economic and legal aspects. These were assessed by two central studies: firstly, a concerted vision of functional breakdown of generic multimedia search engine, and secondly, a representative use-cases descriptions with the related discussion on requirement for technological challenges. Both studies have been carried out in cooperation and consultation with the community at large through EC concertation meetings (multimedia search engines cluster), several meetings with our Think-Tank, presentations in international conferences, and surveys addressed to EU projects coordinators as well as National initiatives coordinators. Based on the obtained feedback we identified two types of gaps, namely core technological gaps that involve research challenges, and “enablers”, which are not necessarily technical research challenges, but have impact on innovation progress. New socio-economic trends are presented as well as emerging legal challenges

    22nd Annual Conference on Legal Issues for Financial Institutions

    Get PDF
    Materials from the 22nd Annual Conference on Legal Issues for Financial Institutions held by UK/CLE in April of 2002

    Consumers Perspectives on Using Biometric Technology With Mobile Banking

    Get PDF
    The need for applying biometric technology in mobile banking is increasing due to emerging security issues, and many banks’ chief executive officers have integrated biometric solutions into their mobile application protocols to address these evolving security risks. This quantitative study was performed to evaluate how the opinions and beliefs of banking customers in the Mid-Atlantic region of the United States might influence their adoption of mobile banking applications that included biometric technology. The research question was designed to explore how performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), perceived credibility (PC), and task-technology fit (TTF) affected customer adoption of biometric technology with mobile banking. The conceptual framework extended the unified theory of acceptance and use of technology by including PC and TTF. The responses to a web-based questionnaire that was distributed to 228 mobile banking customers were analyzed using SPSS AMOS (Version 23) to create structural equation models, a multiple linear regression model, and an analysis of variance (ANOVA) model. The results showed that PE, EE, TTF, and FC were the significant factors affecting customer acceptance of biometric technology with mobile banking. SI and PC were nonsignificant factors and had low positive correlations. The results of this study suggest that biometric technology can mitigate the risks associated with security attacks by identifying the customer during the bank transaction. The results also support positive social change by demonstrating how biometric technology can secure banks from fraud, prevent crime, and improve liveness detection

    A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage

    Full text link
    Security has become a significant concern with the increased popularity of cloud storage services. It comes with the vulnerability of being accessed by third parties. Security is one of the major hurdles in the cloud server for the user when the user data that reside in local storage is outsourced to the cloud. It has given rise to security concerns involved in data confidentiality even after the deletion of data from cloud storage. Though, it raises a serious problem when the encrypted data needs to be shared with more people than the data owner initially designated. However, searching on encrypted data is a fundamental issue in cloud storage. The method of searching over encrypted data represents a significant challenge in the cloud. Searchable encryption allows a cloud server to conduct a search over encrypted data on behalf of the data users without learning the underlying plaintexts. While many academic SE schemes show provable security, they usually expose some query information, making them less practical, weak in usability, and challenging to deploy. Also, sharing encrypted data with other authorized users must provide each document's secret key. However, this way has many limitations due to the difficulty of key management and distribution. We have designed the system using the existing cryptographic approaches, ensuring the search on encrypted data over the cloud. The primary focus of our proposed model is to ensure user privacy and security through a less computationally intensive, user-friendly system with a trusted third party entity. To demonstrate our proposed model, we have implemented a web application called CryptoSearch as an overlay system on top of a well-known cloud storage domain. It exhibits secure search on encrypted data with no compromise to the user-friendliness and the scheme's functional performance in real-world applications.Comment: 146 Pages, Master's Thesis, 6 Chapters, 96 Figures, 11 Table

    Evidence-based Accountability Audits for Cloud Computing

    Get PDF
    Cloud computing is known for its on-demand service provisioning and has now become mainstream. Many businesses as well as individuals are using cloud services on a daily basis. There is a big variety of services that ranges from the provision of computing resources to services such as productivity suites and social networks. The nature of these services varies heavily in terms of what kind of information is being out-sourced to the cloud provider. Often, that data is sensitive, for instance when PII is being shared by an individual. Also, businesses that move (parts of) their processes to the cloud are actively participating in a major paradigm shift from having data on-premise to transfering data to a third-party provider. However, many new challenges come along with this trend, which are closely tied to the loss of control over data. When moving to the cloud, direct control over geographical storage location, who has access to it and how it is shared and processed is given up. Because of this loss of control, cloud customers have to trust cloud providers that they treat their data in an appropriate and responsible way. Cloud audits can be used to check how data has been processed in the cloud (i.e., by whom, for what purpose) and whether or not this happened in compliance with what has been defined in agreed-upon privacy and data storage, usage and maintenance (i.e., data handling) policies. This way, a cloud customer can regain some of the control he has given up by moving to the cloud. In this thesis, accountability audits are presented as a way to strengthen trust in cloud computing by providing assurance about the processing of data in the cloud according to data handling and privacy policies. In cloud accountability audits, various distributed evidence sources need to be considered. The research presented in this thesis discusses the use of various heterogeous evidence sources on all cloud layers. This way, a complete picture of the actual data handling practices that is based on hard facts can be presented to the cloud consumer. Furthermore, this strengthens transparency of data processing in the cloud, which can lead to improved trust in cloud providers, if they choose to adopt these mechanisms in order to assure their customers that their data is being handled according to their expectations. The system presented in this thesis enables continuous auditing of a cloud provider's adherence to data handling policies in an automated way that shortens audit intervals and that is based on evidence that is produced by cloud subsystems. An important aspect of many cloud offerings is the combination of multiple distinct cloud services that are offered by independent providers. Data is thereby freuqently exchanged between the cloud providers. This also includes trans-border flows of data, where one provider may be required to adhere to more strict data protection requirements than the others. The system presented in this thesis addresses such scenarios by enabling the collection of evidence at providers and evaluating it during audits. Securing evidence quickly becomes a challenge in the system design, when information that is needed for the audit is deemed sensitive or confidential. This means that securing the evidence at-rest as well as in-transit is of utmost importance, in order not to introduce a new liability by building an insecure data heap. This research presents the identification of security and privacy protection requirements alongside proposed solutions that enable the development of an architecture for secure, automated, policy-driven and evidence-based accountability audits

    Technology and change in the hotel industry : the case of the hotel receptionist.

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre- DSC:D89388 / BLDSC - British Library Document Supply CentreGBUnited Kingdo

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Protecting the infrastructure: 3rd Australian information warfare & security conference 2002

    Get PDF
    The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year\u27s conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations. The papers cover many topics, all within the field of information warfare and its applications, now and into the future. The papers have been grouped into six streams: • Networks • IWAR Strategy • Security • Risk Management • Social/Education • Infrastructur

    Internet dispute resolution.

    Get PDF
    PhDThis thesis develops a model for the fair resolution of internet disputes. The internet has the potential to lead to international~ cross-border disputes being a powerful communications medium, that allows data exchanges in various media formats between a wide range of different users situated in distant locations. It explores the meaning of fairness for the resolution of such disputes. This thesis refers to the existing literature examining the private international law issues arising from cross-border interactions and transactions on the internet which make litigation and enforcement more costly and lengthy. For many disputes arising on the internet, alternative ways of resolving such disputes have to be found. This thesis contains a detailed exploration of the use of mediation and arbitration, using online technology. obviating the need for the parties and lawyers to meet face-to-face and leading to more efficient information processing, and thereby reducing cost and delay in dispute resolution. Binding dispute resolution and enforceability in cross-border cases are important for internet disputes and can be provided by online arbitration. Therefore, this thesis proceeds to examines in great detail the legal issues surrounding online arbitration. It looks at questions of due process in arbitration and covers the legal issues surrounding business-to-consumer arbitration comparing the European approach to that in the us. The thesis contains a detailed analysis of the Uniform Domain Name Dispute Resolution Procedure (UDRP) and considers to what extent the dispute resolution model established by the UDRP could or should sene as a model for other types of internet disputes. The conclusion from this examination of all aspects of internet dispute resolution is a model of dispute resolution. which encourages the use of online arbitration for internet disputes but, where there exists a substantial power imbalance between the disputants (such as the traditional business-to-consumer paradigm), subjects traditional commercial arbitration to more stringent due process standards for disputes
    corecore