244 research outputs found

    Spyware prevention using graphical passwords

    Get PDF
    our future work will be based on Click-based graphical password schemes require a user to click on a set of points on one or more presented background images. With the Pass Points and to create users to a password by clicking five ordered points anywhere on the given image.  CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. To log in, users must correctly the repeated sequence of clicks, with each click falling within the acceptable tolerance of original point. To implemented this aspect, along with a scheme converting the user-entered graphical password into a cryptographic verification key and “robust discretization” scheme. It consisted of three overlapping grids (invisible to the user) used to determine whether the click-points are login attempt were close enough to the original points to be accepted.

    Consumer online purchase behaviour: perception versus expectation

    Get PDF
    Conceptualising online customer behaviour is very important, as more and more customers are interested in buying products through online. To capture online customer behaviour, this study has conducted empirical research in Bangladesh among general online customers who have experience in online buying or have an intention to buy from online boutique websites in Bangladesh. In this regard, the quality-purchase interaction model that was developed, based on both customer perception and the expectation of buying online from business-to-consumer electronic-commerce in Bangladesh, was used to capture actual customer behaviour or behavioural intention for online purchasing. We conducted path analysis through LISREL to reveal the causal relation between independent and dependent variables. There are some significant differences between online buying behaviour and the behavioural intention to buy online, that is between customers who have experience of online buying from a boutique website and those who have the intention to buy online but have not yet gotten an online buying experience

    Habitual Test Packet Generation And Fault Localization

    Get PDF
    now a day’s Networks are getting larger and more complex, hence network admin depend on normal tools such as ping and to trace route debug the problems. We are proposing automatic and systematic approach for testing and debugging networks called “Automatic Test Packet Generation and Fault Localization”. ATPG read router configurations and generates a unique model. This model is generating a minimum set of test packets to exercise every link in network exercise every rule in the network. Test packets are sent periodically and detected failure trigger a separate mechanism to localize the fault. ATPG can detect both functional testing and performance testing problems. ATPG complements but goes beyond earlier work in static checking or fault localization. We describe our prototype ATPG implementation and results on two real-world data sets applications: like Stanford University’s backbone network and Internet2. We find that small number of test packets suffices test all rules in these networks

    Service delivery through mobile-government (mGov): Driving factors and cultural impacts

    Get PDF
    The mobile-Government (mGov) service system is conducted through an open network, and it is virtual. This service mode and pattern change inevitably necessitates a behavioral change in citizen attitudes and intentions. Nevertheless, this new pattern of service delivery through mGov has hardly been systematically investigated by any researchers. The objective of this current research is twofold. First, we attempt to reveal the sources of beliefs for developing intention toward the mGov (ITM) system. Then, as the second objective, we investigate cultural influence as the reason for a difference in consumer attitudes and intentions toward mGov. In this regard, the empirical study was conducted in Bangladesh and the USA, which have potential differences in the cultural traits listed by Hofstede. From our statistical analysis, we have identified the sources of beliefs for both Bangladeshi and USA consumers.We observed clear differences in sources of beliefs and their influence on attitudes leading to intention, which demonstrates support for our second objective which was designed to verify the cultural impacts on belief-attitude relations.We understand that these different sources of beliefs influence cognitive, affective, and connative attitudes toward mGov in different ways

    Privacy enhanced and web based service composition

    Get PDF
    Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers. Most existing service selection schemas only focus on the functional QoS properties of services such as throughput, latency and response time, or on their trust and reputation level. By contrast, the risk of privacy breaches arising from the selection of component services whose privacy policy is not compliant with customers’ privacy preferences is largely ignored. In this paper, we propose a novel privacy-preserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users’ privacy requirements and providers’ privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer. We demonstrate our approach using a travel agency Web service as an example of service composition

    Organizational Characteristics of B2B Adopters in the Canadian Manufacturing Sector

    Get PDF
    This paper presents selected preliminary results from a study of B2B e-commerce adoption by Canadian manufacturing firms. The goal of the broad research project IS to describe the behaviour of Canadian manufacturers with respect to adoption of B2B technologies and

    An Empirical Investigation of Factors Influencing the Development of Positioning Strategy

    Get PDF
    This study empirically tests a comprehensive set of relevant factors taken into consideration by the firms while developing positioning strategy, some of them for the first time in this context, and subsequently examines the impact of positioning strategy on firm's financial and non-financial performance. The positioning strategy is posited to be influenced by customer orientation, competitor orientation, innovation orientation, environmental dynamism, and marketing capability. Product life cycle and industry environment serve as control variables in hierarchical regression. The findings of this study are based on a sample of top management of 194 manufacturing concerns from Canadian technology sector

    Implementation of Quality Management Practice in E-Commerce

    Get PDF
    Implementation of quality management practice in E-Commerce (EC) is a relatively new challenging area to researchers and managers. Proliferation of EC provides an opportunity to quality management gurus to reshape quality dimensions suitable for real sustainability, expan

    Collaboration in Combating Identity Fraud

    Get PDF
    The problem of identity theft is complex, spans the boundaries of many organizations, companies and countries, and affects numerous entities in different ways at different times. However, given the nature of the problem, it is extremely difficult and costly for an indi

    Measures of Identity Fraud

    Get PDF
    Identity fraud (IDF) is the fastest growing white-collar crime in many countries and specifically in developed countries. IDF is not a new phenomenal in human societies; the history of IDF can be traced back to hundreds of years ago. What has made it the center of attention in the past few years is the acceleration in the frequency and the impacts of IDF to individuals and businesses. One of the preliminary steps in managing IDF as a global phenomenon is to understand the scope of the problem and measure its different aspects. By realizing the importance of developing measurement systems in this area, and the recognition of a gap in this area of research, this study presents the previous approaches in developing IDF measurement systems, and uses them as benchmarks for developing and proposing a comprehensive measurement system for assessing IDF
    • …
    corecore