• Title/Summary/Keyword: security and privacy

Search Result 1,492, Processing Time 0.026 seconds

Critical Success Factors for Electronic Commerce: Comparative Analysis between Korea and U.S.A. (전자상거래의 성공요인: 한미 비교분석)

  • Sung, Tae-Kyung;Lee, Sang-Kyu
    • Asia pacific journal of information systems
    • /
    • v.12 no.4
    • /
    • pp.37-53
    • /
    • 2002
  • The three main purposes of this paper are to (1) identify critical success factors(CSF's) for electronic commerce(EC), (2) investigate the explanatory power of these CSF's on firm performance, and (3) compare differences in evaluating CSF's and explaining impact of CSF's on performance between Korean and U.S.A. EC managers. Through a literature review and interviews with managers in EC firms, a list of 16 CSF's consisting of 111 items was compiled. In the second stage, questionnaires were administered to managers of EC companies in Seoul, Korea and Texas, U.S.A. Survey results show that CSF's have very significant explanatory power for firm performance in both Korean and U.S.A. While security, privacy, technical expertise, information about goods/services, and variety of goods/services are the most explanatory CSF's in Korea, evaluation of EC operations, technical expertise, and ease of use show most explanatory power in U.S.A. This analysis confirms the fact that customers use EC if they feel comfortable about navigating EC for information about a variety of goods/services without technical difficulty and in a secure and private way.

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San;Wei, Kuo-Jui;Chen, Ying-Chin;Sun, Yun-Hsiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5616-5642
    • /
    • 2016
  • Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

  • Li, Jiping;Ding, Yaoming;Xiong, Zenggang;Liu, Shouyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5556-5573
    • /
    • 2017
  • As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker's own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

Artificial Intelligence Applications as a Modern Trend to Achieve Organizational Innovation in Jordanian Commercial Banks

  • Al-HAWAMDEH, Majd Mohammed;AlSHAER, Sawsan A.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.3
    • /
    • pp.257-263
    • /
    • 2022
  • The objective of this study was to see how artificial intelligence applications affected organizational innovation in Jordanian commercial banks. Both independent and dependent variables were measured in three dimensions: expert systems, neural network systems, and fuzzy logic systems for artificial intelligence applications variable. Product innovation, process innovation, and management innovation for the organizational innovation variable. To achieve study objectives, a questionnaire was developed and distributed to a sample of one hundred fifty-three managers in Jordanian commercial banks, who were selected according to the simple random sampling method. Except for the neural network systems dimension, which comes in at an average level, the study indicated that there is a high level of organizational innovation and artificial intelligence applications. Furthermore, the findings revealed that artificial intelligence applications have a significant impact on organizational innovation in Jordanian commercial banks, with the most important artificial intelligence application being a fuzzy logic system. The study suggested keeping track of technological advancements in the field of artificial intelligence applications and incorporating them into banking operations by benchmarking with the best commercial bank practices and allocating a portion of the budget to technological applications and infrastructure development, as well as balancing between technology use and information security risks to ensure client privacy is protected.

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.2
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

Internet Governance in the light of Human Rights (인권적 관점에서 본 인터넷 거버넌스)

  • Park, Seong Hoon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.52-57
    • /
    • 2013
  • Information and Communication Technologies(ICTs) have substantially enlarged both the opportunities to realize one's human rights but have also resulted in the emergence of new challenges. ICTs are so deeply embedded and cental to almost all aspects of human activity. And ICTs are assuming an increasingly central role in all aspects of human and societal development across the world. But this is especially true of the right to privacy, which faces challenges such as profiling and data mining for public(including national security) and private purposes. ICTs access is a fundamental right for all humans in the information age. So we have need for regulation based on human rights in the digital age. And governments have a responsibility to protect individuals against violations of human rights and data protection by public authorities, but also by private entities. In addition, internet governance and multi-stakeholder principle have to be stressed on all of the internet issues because internet governance is included in the principle of democracy which have bottom-up communication and equality. So it is very importance that Internet Governance Forum is the space for a meaningful discussion on public policy issues relating to the internet.

  • PDF

Use of Drones in the cultural industries (드론의 문화산업분야 활용방안에 관한 연구)

  • Yoon, Hongkeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.99-112
    • /
    • 2015
  • Drones are more formally known as unmanned aerial vehicles without a human pilot aboard. Its flight is controlled either autonomously by onboard computers or by the remote control of a pilot on the ground. This research aims to analyze market trends and technological developments of drones, use cases and constraints of drones in the cultural industries take advantage of the possibility of future drones. Drones are looking for broadcasting, movie, theater, games, toys drones and racing games in a variety of cultural industry. The biggest problem of drone shall provide penalties for breaches of privacy and security issues in the debate. Drones performances are required such as battery capacity and compactness because of the technical limitations. The drones are expected to be used in various fields such as journalism drone, performance tools, augmented reality games, kidult culture. The drones can create a new cultural industry market such as the combination of robotics and drone journalism, drone crowded theater, utilizing drones character games, racing games etc. In conclusion, drones help reduce manpower, time and costs dramatically and will contribute to creating added value in the cultural industries.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

A Study on the Environments for Older People with Cognitive Impairments (인지장애 노인의 환경에 대한 연구)

  • Moon, Chang-Ho
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.5 no.9
    • /
    • pp.107-116
    • /
    • 1999
  • The purpose of this study is to present reference materials for the planning and research of related environments by introducing the theoretical background and samples of the environments for older people with cognitive impairments. Major contents of the study include cognitive impairments and residential facility of older people, model environments for special care unit, therapeutic dimensions of environments, outdoor garden, activity calendar, and site-visits of the sample facilities. Some results of the study could be summarized as follows ; 1) Special care unit for the people with cognitive impairments has been required and developed. 2) Weiss Institute, Corrine Dolan Alzheimer Center, and Wood Place in Oakmont were analyzed as model environments. 3) Therapeutic dimensions such as safety & security, awareness & orientation, opportunities for socialization, regulated sensory stimulation, provisions for privacy, ties to the healthy & familiar, and autonomy & control were proposed. 4) The advantages of outdoor garden for the people with cognitive impairments were explained. 5) Activity calendar for a facility was introduced and recognized as a essential guide for environment planning. 6) Sample facilities showed small size households and various ideas of environments for the older people with cognitive impairments.

  • PDF

EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market

  • Li, Hongwei;Yang, Yi;Wen, Mi;Luo, Hongwei;Lu, Rongxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3937-3954
    • /
    • 2014
  • With the increasing electricity consumption and the wide application of renewable energy sources, energy auction attracts a lot of attention due to its economic benefits. Many schemes have been proposed to support energy auction in smart grid. However, few of them can achieve range query, ranked search and personalized search. In this paper, we propose an efficient multi-keyword range query (EMRQ) scheme, which can support range query, ranked search and personalized search simultaneously. Based on the homomorphic Paillier cryptosystem, we use two super-increasing sequences to aggregate multidimensional keywords. The first one is used to aggregate one buyer's or seller's multidimensional keywords to an aggregated number. The second one is used to create a summary number by aggregating the aggregated numbers of all sellers. As a result, the comparison between the keywords of all sellers and those of one buyer can be achieved with only one calculation. Security analysis demonstrates that EMRQ can achieve confidentiality of keywords, authentication, data integrity and query privacy. Extensive experiments show that EMRQ is more efficient compared with the scheme in [3] in terms of computation and communication overhead.