5,046 research outputs found

    Mobile telecommunication networks and mobile commerce : towards its applications in chinese market

    Get PDF
    La télécommunication mobile connecte les personnes de n'importe où à tout moment. La transmission de la voix et des données à travers les réseaux de télécommunication mobile permet d'envoyer des informations et de diriger des transactions d'une manière nouvelle. Cela crée un nouveau domaine d'affaires qui s'appelle du commerce mobile, une affaire étendue basée sur l'Internet avec de nombreux des caractéristiques uniques ajoutés. Comme un soutien fondamental du plate-forme, les réseaux de la télécommunication mobile joue un rôle essentiel dans le commerce mobile. Leurs caractéristiques techniques et le déploiement déterminent l'essence pour le commerce mobile. Dans cette mémoire, nous étudions et présentons les caractéristiques techniques des technologies communications mobiles du réseau 1G à 3G et au-delà. Nous étudions également les technologies WLAN et WAP qui sont courantes dans le commerce mobile en Chine et dans le monde. Le commerce mobile est en train de se développer, le nombre d'utilisateurs de téléphones mobiles sont de plus en plus en Chine et dans ce monde. Les utilisateurs mobiles énormes en Chine ainsi que la maturité des technologies 3G affichent un fort potentiel pour offrir et d'adopter plus les nouveaux services mobiles. Après réviser l'évolution du commerce mobile et l'histoire du succès i-mode au Japon, nous nous concentrons sur le mobile du marché chinois de manière à découvrir son marché, l'infrastructure du réseau mobile, et le modèle d'affaires. Fondé sur la base de notre enquête sur le commerce mobile chinois, nous présentons, selon notre jugement, les services mobiles et des applications que sont convenables pour la Chine. Parmi eux, nous pensons qu'il y a la tendance sur les services basés sur la localisation et services orientées de l'architectures. Cette tendance peut attirer plus d'attention à offrir de nouveaux services. En plus, elle peut offrir des services d'intégration et de personnalisation qui viennent de fournisseurs de services mobiles et des utilisateurs finaux. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : Gestion intégrée et écosystémique, Principe de précaution, Communication entre acteurs, Risques sur l'environnement et la santé

    A Decentralized Personal Data Store based on Ethereum: Towards GDPR Compliance

    Get PDF
    Sharing personal data with service providers is a fundamental resource for the times we live in. But data sharing represents an unavoidable issue, due to improper data treatment, lack of users\u27 awareness to whom they are sharing with, wrong or excessive data sharing from end users who ignore they are exposing personal information. The problem becomes even more complicate if we try to consider the devices around us: how to share devices we own, so that we can receive pervasive services, based on our contexts and device functionalities. The European Authority has provided the General Data Protection Regulation (GDPR), in order to implement protection of sensitive data in each EU member, throughout certification mechanisms (according to Art. 42 GDPR). The certification assures compliance to the regulation, which represent a mandatory requirement for any service which may come in contact with sensitive data. Still the certification is an open process and not constrained by strict rule. In this paper we describe our decentralized approach in sharing personal data in the era of smart devices, being those considered sensitive data as well. Having in mind the centrality of users in the ownership of the data, we have proposed a decentralized Personal Data Store prototype, which stands as a unique data sharing endpoint for third party services. Even if blockchain technologies may seem fit to solve the issue of data protection, because of the absence of a central authority, they lay to additional concerns especially relating such technologies with specifications described in the regulation. The current work offers a contribution in the advancements of personal data sharing management systems in a distributed environment by presenting a real prototype and an architectural blueprint, which advances the state of the art in order to meet the GDPR regulation. Address those arisen issues, from a technological perspective, stands as an important challenge, in order to empower end users in owning their personal data for real

    CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines

    Get PDF
    Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to multimedia content search from, a technical, and socio-economic perspective. The technical perspective includes an up to date view on content based indexing and retrieval technologies, multimedia search in the context of mobile devices and peer-to-peer networks, and an overview of current evaluation and benchmark inititiatives to measure the performance of multimedia search engines. From a socio-economic perspective we inventorize the impact and legal consequences of these technical advances and point out future directions of research

    An Empirical Assessment of Users\u27 Information Security Protection Behavior towards Social Engineering Breaches

    Get PDF
    User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people\u27s daily lives, the organization\u27s need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when it comes to social engineering. Unfortunately, there are few specific studies to understand factors that affect users\u27 information security protection behavior towards social engineering breaches. The focus of the information security literature is shifting from technology to user behavior in recent times. SETA (Security Education Training Awareness) program aids organizations in teaching their users about information security issues and expectations to prevent information security breaches. Information security policies depict the rules and regulations that everyone must follow utilizing an organization\u27s information technology resources. This research study used Protection Motivation Theory (PMT) combined with the SETA program and security policies to determine factors that affect users\u27 information security protection behavior towards social engineering breaches. This research study was an empirical and quantitative study to congregate data utilizing a web survey and PLS-SEM (Partial Least Squares Structural Equation Modeling) technique. As a result, the research study supported all three hypotheses associated with fear, including a positive impact of perceived severity on fear, perceived vulnerability on fear, and fear on protection motivation. Moreover, the research study substantiated the positive impact of perceived severity, perceived vulnerability, and response efficacy on protection motivation. Furthermore, the research study also confirmed the positive impact of protection motivation and the SETA program on protection behavior. The findings of this research study derived that, unswerving with the literature, social engineering has arisen as one of the biggest threats in information security. This research study explored factors impacting users\u27 information security protection behavior towards social engineering breaches. Support of all hypotheses for fear appeal is a substantial contribution in view of a lesser-researched fear appeal in preceding research using PMT. This research study provided the groundwork for encouraging and nurturing users\u27 information security protection behavior to prevent social engineering breaches. Finally, this research study contributes to the increasing phenomenon of social engineering in practice and future research

    Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model

    Get PDF
    With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age. There is no such thing as safe computing, and it is inevitable that security breaches will occur. Thus, security professionals and practices focus on two areas: security, preventing a breach from occurring, and resiliency, minimizing the damages once a breach has occurred. One of the most important practices for adding resiliency to source code is through obfuscation, a method of re-writing the code to a form that is virtually unreadable. This makes the code incredibly hard to decipher by attackers, protecting intellectual property and reducing the amount of information gained by the malicious actor. Achieving obfuscation through the use of self-modifying code, code that mutates during runtime, is a complicated but impressive undertaking that creates an incredibly robust obfuscating system. While there is a great amount of research that is still ongoing, the preliminary results of this subject suggest that the application of self-modifying code to obfuscation may yield self-maintaining software capable of healing itself following an attack

    Development of wireless-based low-cost current controlled stimulator for patients with spinal cord injuries

    Get PDF
    A spinal cord injury (SCI) has a severe impact on human life in general as well as on the physical status and condition. The use of electrical signals to restore the function of paralyzed muscles is called functional electrical stimulation (FES). FES is a promising way to restore mobility to SCI by applying low-level electrical current to the paralyzed muscles so as to enhance that person’s ability to function and live independently. However, due to the limited number of commercially available FES assisted exerciser systems and their rather high cost, the conventional devices are unaffordable for most peoples. It also inconvenient because of wired based system that creates a limitation in performing exercise. Thus, this project is concerned with the development of low-cost current controlled stimulator mainly for the paraplegic subjects. The developed device should be based on a microcontroller, wireless based system using Zigbee module, voltage-to-current converter circuit and should produce proper monophasic and biphasic current pulses, pulse trains, arbitrary current waveforms, and a trigger output for FES applications. The performances of the device will be assessed through simulation study and validated through experimental work. This device will be developed as in the new technique of the stimulator development with low cost and one of the contributing factors in Rehabilitation Engineering for patients with SCI

    Development of wireless-based low-cost current controlled stimulator for patients with spinal cord injuries

    Get PDF
    A spinal cord injury (SCI) has a severe impact on human life in general as well as on the physical status and condition. The use of electrical signals to restore the function of paralyzed muscles is called functional electrical stimulation (FES). FES is a promising way to restore mobility to SCI by applying low-level electrical current to the paralyzed muscles so as to enhance that person’s ability to function and live independently. However, due to the limited number of commercially available FES assisted exerciser systems and their rather high cost, the conventional devices are unaffordable for most peoples. It also inconvenient because of wired based system that creates a limitation in performing exercise. Thus, this project is concerned with the development of low-cost current controlled stimulator mainly for the paraplegic subjects. The developed device should be based on a microcontroller, wireless based system using Zigbee module, voltage-to-current converter circuit and should produce proper monophasic and biphasic current pulses, pulse trains, arbitrary current waveforms, and a trigger output for FES applications. The performances of the device will be assessed through simulation study and validated through experimental work. This device will be developed as in the new technique of the stimulator development with low cost and one of the contributing factors in Rehabilitation Engineering for patients with SCI
    • …
    corecore