7 research outputs found

    AN ANALYSIS OF TRANSACTIONS IN E-PAYMENT SYSTEM USING MOBILE AGENTS

    Get PDF
    Commercial interactions between merchants and customers pose a significant concern as they are associated with a large volume of data and complex information, especially when there is a need for switching requirements. This paper presents an agent-based analysis of e-payment transactions with the switching operations. The model adopts an inter-bank transaction network and consists of a terminal point of sale (POI) and three essential players in e-payment: customer, bank (merchant), and the Switch. This study analyses the various payment interactions using agent technology. The agent coordinates movement while the negotiation protocol serves as an internal control of the payment agreements, while the interactive hosts are the platforms that determine the status of transactions. Each agent host is equipped with a Certification Authority (CA) to secure communication between the merchant and the customer. Different transactions that agents could make are examined with formal descriptions. The implementation is achieved in Jade and compares with the object serialization mechanism. The simulation results show higher quality adaptation of agent systems and evidence of agentisation of e-transaction with Switch.     &nbsp

    Social network analysis of B2B networks

    Get PDF
    The volume of information readily available in the EMarketplace is massive.Business-to-business (B2B) users, for instance, have an extensive chain of business relationships that have immensely generated a large volume of information. Although this raises problems of information overload, the data is embedded with rich and valuable information, such as internal structure and social networks.While other research focuses on discovering properties of B2C, C2C and P2P networks, there only exists limited work on B2B, attributable to the high complexity of the B2B structure.This paper presents a statistical analysis of B2B networks that amasses dispersed users' social relationships using a social network analysis technique.The investigation performed found that B2B networks are small-world, and thus follow a power-law distribution. The analysis also proved that B2B networks hold stable community structures

    An Integrated Architecture for Enhanced Structuring of Mobile Market Place

    Full text link

    Digital forensics trends and future

    Get PDF
    Nowadays, rapid evolution of computers and mobile phones has caused these devices to be used in criminal activities. Providing appropriate and sufficient security measures is a difficult job due to complexity of devices which makes investigating crimes involving these devices even harder. Digital forensic is the procedure of investigating computer crimes in the cyber world. Many researches have been done in this area to help forensic investigation to resolve existing challenges. This paper attempts to look into trends of applications of digital forensics and security at hand in various aspects and provide some estimations about future research trends in this area

    The legal regime for anti-cyberlaundering

    Get PDF
    Doctor Legum - LLDAlong with its inumerable wonders, the advent of the internet has brought with it very bad vices. The notion of convenience, which comes with the use of the internet, can be attributed to criminals who wish to disguise the proceeds of their ill-derived funds, or what is better known as cyberlaundering. Cyberlaundering is a phenomenon that seems negligible on face value, but, to the contrary, has very dire effects, especially on national economies, which are in no way trifling.This study describes the problem of cyberlaundering, pointing out the various legal issues pertaining to it. Given that cyberlaundering is a comparatively new crime, which is not yet conceptualized legally, criminal justice authorities find it hard to detect, investigate and prosecute cyberlaundering. An adequate legal regime against cyberlaundering is currently non-existent, as there is presently no concise international or national legal framework in place to contain the problem. Whilst the chief focus of the thesis is to devise a legal framework to combat cyberlaundering, considerable attention is also devoted to the tension that arises between public and private interests, amongst several other legal issues that come to play along the way. This is a debate that necessarily arises when legislatures resort to more radical anti-cyberlaundering laws. The study advocates a middle ground, which leads to the desired end of curbing the exponential growth of cyberlaundering, at the very least

    Cognitive Foundations for Visual Analytics

    Get PDF
    In this report, we provide an overview of scientific/technical literature on information visualization and VA. Topics discussed include an update and overview of the extensive literature search conducted for this study, the nature and purpose of the field, major research thrusts, and scientific foundations. We review methodologies for evaluating and measuring the impact of VA technologies as well as taxonomies that have been proposed for various purposes to support the VA community. A cognitive science perspective underlies each of these discussions
    corecore