15 research outputs found

    Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

    Get PDF
    There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance of processor implementations, revealing hidden computing process. Leveraging Microarchitectural resources, adversaries can potentially launch Timing-Based Side-Channel Attacks in order to leak information via timing. In view of these security threats against computing hardware, we analyse current attacks that take advantage of Microarchitectural elements in shared computing hardware. Our analysis focuses only on Timing-Based Side-Channel Attacks against the components of modern PC platforms - with references being made also to other platforms when relevant - as opposed to any other variations of Side-Channel Attacks which have a broad application range. To this end, we analyse Timing Attacks performed against processor and cache components, again with references to other components when appropriate

    Brand Experiences, Retail Scenarios, and Brand Images in the Fashion Industry

    No full text
    Postmodern consumers experience fashion brands within numerous in-store and out-of-store contexts, and they tend to focus on their holistic experience with the brands across various retail scenarios. In a fashion brand context, the interaction of multiple retail environments greatly affects consumer behavior towards the brands. The objective of this chapter is to provide a review of the main issues related to brand management and customer experience management in a co-creation perspective. By overviewing the literature on brand management, retailing, and consumer behavior, the authors provide relevant insights for academics and practitioners to arrive at a more comprehensive understanding of the fashion brand experience and fashion brand image

    Effective Surveillance Management during Service Encounters: A Conceptual Framework

    No full text
    This chapter aims to theoretically examine effective surveillance management (ESM) during service encounters within the servicescape and provide a conceptual framework for the study of this topic in a service management perspective. It analyses antecedents, dimensions and effects of ESM. This study especially proposes as antecedents both improving customer service experience along with meeting customers\u2019 need for security and implementing a surveillance service-oriented strategy that includes secure and safe servicescape design, deterrent communication, and trained and motivated security staff. This chapter suggests also that the dimensions of ESM (customer-physical service environment encounters, customer-technological surveillance systems encounters, and customer-security staff encounters) contribute to enhancing service quality, experience quality, and staff productivity. The integration of these dimensions, antecedents, and effects create a theoretically grounded framework that can serve as a starting point for future studies about this topic in the field of service management

    Effective surveillance management during service encounters: A conceptual framework

    No full text
    This chapter aims to theoretically examine effective surveillance management (ESM) during service encounters within the servicescape and provide a conceptual framework for the study of this topic in a service management perspective. It analyses antecedents, dimensions and effects of ESM. This study especially proposes as antecedents both improving customer service experience along with meeting customers' need for security and implementing a surveillance service-oriented strategy that includes secure and safe servicescape design, deterrent communication, and trained and motivated security staff. This chapter suggests also that the dimensions of ESM (customer-physical service environment encounters, customer-technological surveillance systems encounters, and customer-security staff encounters) contribute to enhancing service quality, experience quality, and staff productivity. The integration of these dimensions, antecedents, and effects create a theoretically grounded framework that can serve as a starting point for future studies about this topic in the field of service management
    corecore