465,457 research outputs found

    Present State and Future Directions of Digital Payments System: A Historical and Bibliographic Examination

    Get PDF
    Purpose: The purpose of this research is to conduct a bibliographic analysis of digital payment systems.   Theoretical framework:  The digital payments system is a technologically advanced payment system that enables individuals, businesses, and nations to become self-sufficient, contactless, and tap-less when conducting transactions. Understanding the significance of the digital payment system is crucial.  There remains much to investigate and discover.   Design/methodology/approach:  The using of an academic search method on the Scopus database, a bibliometric study of 714 publications on digital payment systems from the year 2000 to 2022 was conducted. For this experiment, we made use of Biblioshiny, an R-based web application available in the Bibliometrix package. We were able to identify significant publications, authors, nations, and article themes by using the software's automatic technique. We studied the citations, co-citations, and social networks.   Findings:  The results were able to identify significant publications, authors, nations, and article themes by using the software's automatic technique. We studied the citations, co-citations, and social networks. The statistics revealed that the number of publications increased gradually in the early years, followed by a sharp rise between the years 2005 and 2022. These years correspond to the political attempts to recover from the 2008 global financial crisis. India conducts the most significant scientific research in this field, followed by United States and China.   Research, Practical & Social implications:  This study not only identifies the research fields in digital payment systems, but also identifies the central key themes with possible research directions, in the area of electronic money, mobile money, authentication, security, Internet of things, blockchain, FinTech, mobile banking and Covid – 19.   Originality/value:  The findings of this study may be used by policymakers to inform the design of digital payment systems, policy initiatives, and other policy measures. Banking, financial planning, and investment management professionals would understand the rising concerns completely. Therefore, researchers, practitioners, and policymakers will use the current literature while doing fresh research on the Payments system's strengths and weaknesses

    Buffer Overflow Vulnerability Diagnosis For Commodity Software

    Get PDF
    Buffer overflow attacks have been a computer security threat in software-based systems andapplications for decades. The existence of buffer overflow vulnerabilities makes the systemsusceptible to Internet worms and denial of service (DDoS) attacks which can cause hugesocial and financial impacts. Due to its importance, buffer overflow problem has been intensively studied. Researchershave proposed different techniques to defend against unknown buffer overflow attacks. Theyhave also investigated various solutions, including automatic signature generation, automatic patch generation, etc., to automatically protect computer systems with known vulnerabilities. The effectiveness and efficiency of the automatic signature generation approaches andthe automatic patch generation approaches are all based on the accurate understanding ofthe vulnerabilities, the buffer overflow vulnerability diagnosis (BOVD). Currently, the results of automatic signature generation and automatic patch generation are far from satisfaction due to the insufficient research results from the automatic BOVD. This thesis defines the automatic buffer overflow vulnerability diagnosis (BOVD) problemand provides solutions towards automatic BOVD for commodity software. It targets oncommodity software when source code and symbol table are not available. The solutionscombine both of the dynamic analysis techniques and static analysis techniques to achievethe goal. Based on the observation that buffer overflow attack happens when the size of the destination buffer is smaller than the total number of writes after the data copy process if the buffer overflow attack happens through a data copy procedure, the diagnosis results return the information of the size of destination buffer, the total number of writes of a data copy procedure and how the user inputs are related with them. They are achieved through bound analysis, loop analysis and input analysis respectively. We demonstrate the effectiveness of this thesis approach using real world vulnerable applications including the buffer overflow vulnerabilities attacked by the record-setting Slammer and Blaster worms. This thesis also does the complete case study for buffer overflow vulnerabilities which may have independent interests to researchers. Our buffer overflow case study results can help other researchers to design more effective defense systems and debugging tools against buffer overflow attacks

    Formalising responsibility modelling for automatic analysis

    Get PDF
    Modelling the structure of social-technical systems as a basis for informing software system design is a difficult compromise. Formal methods struggle to capture the scale and complexity of the heterogeneous organisations that use technical systems. Conversely, informal approaches lack the rigour needed to inform the software design and construction process or enable automated analysis. We revisit the concept of responsibility modelling, which models social technical systems as a collection of actors who discharge their responsibilities, whilst using and producing resources in the process. Responsibility modelling is formalised as a structured approach for socio-technical system requirements specification and modelling, with well-defined semantics and support for automated structure and validity analysis. The effectiveness of the approach is demonstrated by two case studies of software engineering methodologies
    corecore