627 resultados para electronic payment services

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The inclusion or not of chat services within Virtual Reference (VR) is an important topic for university libraries. Increasingly, email supported by a Frequently Asked Questions (FAQ) database is suggested in the scholarly literature as the preferred, cost-effective means for providing university VR services. This paper examines these issues and identifies some best practices for university library VR services relating to chat and email service, collaborative service provision, services staffing, and staff training. Further studies are required to more completely identify best practices for the complete range of VR services.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Specialist care consultations were identified by two research nurses using documentation in patient records, appointment diaries, electronic billing services and on-site observations at a 441-bed long term care facility. Over a six-month period there were 3333 consultations (a rate of 1511 consultations per year per 100 beds). Most consultations were for general practice (n = 2589, 78%); these consultations were mainly on site (99%), with only 27 taking place off site. There were 744 consultations for specialities other than general practice. A total of 146 events related to an emergency or unplanned hospital admission. The remaining medical consultations (n = 598, 18%) related to 23 medical specialities. The largest number of consultations were for surgery (n = 106), podiatry (n = 100), nursing services including wound care (n = 74), imaging (n = 41) and ophthalmology (n = 40). Many services which are currently being provided on site to metropolitan long-term care facilities could be provided by telehealth in both urban and rural facilities.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality over wired networks and Wireless Transport Layer Security (WTLS) between a wireless device and a Wireless Application Protocol (WAP) gateway. The paper presents our analysis of security properties in the proposed protocols using formal method tools: Casper and FDR2. We also highlight issues concerning payment security in the proposed protocols.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Initial crack widely exists in the welded members of steel bridge induced by the welding procedure or by the fatigue damage crack initiation. The behavior of crack growth with a view to fatigue damage accumulation on the tip of cracks is discussed. Fatigue life of welded components with initial crack in bridges under traffic loading is investigated. Based on existing fatigue experiment results of welded members with initial crack and the fatigue experiment results of welded bridge members under constant stress cycles, the crack would keep semi-elliptical shape with variable ratio of a/c during the crack propagation. Based on the concept of continuum damage accumulated on the tip of fatigue cracks,the fatigue damage law suitable for steel bridge members under traffic loading is modified to consider the crack growth.The virtual crack growth method and the semi-elliptical crack shape assumption are proposed in this paper to deduce a new model of fatigue crack growth rate for welded bridge members under traffic loading. And the calculated method of the stress intensity factor necessary for evaluation of the fatigue life of welded bridge members with cracks is discussed.The proposed fatigue crack growth model is then applied to calculate the crack growth and the fatigue life of existing welded members with fatigue experimental results. The fatigue crack propagation computation results show that the ratio of crack depth to the half crack surface length a/c is variable during crack propagation process and the stress cycle increases with the increase of a0/c0 with certain a0/t0 .The calculated and measured fatigue lives are generally in good agreement,at some initial conditions of cracking, for welded members widely used in steel bridges.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New mobile digital communication technologies present opportunities for advertisers to capitalize on the evolving relationships of consumers with their mobile devices and their desire to access enhanced information services while mobile (m-services). Consumers already use mobile devices (cell phones, personal mobile digital assistants) for traditional phone calls and message handling (e.g., Kalakota and Robinson, 2002; Sullivan Mort and Drennan, 2002). The combination of rapidly developing mobile digital technology and high uptake rates of mobile devices presents enormous potential for delivery of m-services through these devices (Bitner, Brown, and Meuter, 2000). M-services encompass a wide variety of types including the ability to trade stock, to book theater and movie tickets while accessing seating plans online, to send and receive text and pictures, and receive personalized direct advertising such as alerts for shopping bargains. Marketing communications, and specifically advertising, may be delivered as an m-service and termed m-services advertising, forming part of the broader category of m-services. However, advertising research has not yet addressed the area of m-services and needs to do so to be able to take advantage of the advanced interactivity (Yadav and Varadarajan, 2005) of mobile communication devices. Such advertising research is likely to help develop open attitudes and responses to new business models as has been advocated for other new technology such as advanced television (Tauder, 2005). In this article, we model the factors influencing the use of m-services, in the context of consumers' existing relationships with mobile devices. First, we address the value propositions underpinning consumer involvement with mobile devices. Next, we canvass the types of involvement relevant to this consumption domain and argue that involvement, together with personal attributes innovativeness and self-efficacy, will influence use of m-services. Finally, implications for advertising delivered as an m-service are discussed, the potential for m-services advertising as part of m-commerce are canvassed, and directions for future research identified.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The construction industry is categorised as being an information-intensive industry and described as one of the most important industries in any developed country, facing a period of rapid and unparalleled change (Industry Science Resources 1999) (Love P.E.D., Tucker S.N. et al. 1996). Project communications are becoming increasingly complex, with a growing need and fundamental drive to collaborate electronically at project level and beyond (Olesen K. and Myers M.D. 1999; Thorpe T. and Mead S. 2001; CITE 2003). Yet, the industry is also identified as having a considerable lack of knowledge and awareness about innovative information and communication technology (ICT) and web-based communication processes, systems and solutions which may prove beneficial in the procurement, delivery and life cycle of projects (NSW Government 1998; Kajewski S. and Weippert A. 2000). The Internet has debatably revolutionised the way in which information is stored, exchanged and viewed, opening new avenues for business, which only a decade ago were deemed almost inconceivable (DCITA 1998; IIB 2002). In an attempt to put these ‘new avenues of business’ into perspective, this report provides an overall ‘snapshot’ of current public and private construction industry sector opportunities and practices in the implementation and application of web-based ICT tools, systems and processes (e-Uptake). Research found that even with a reserved uptake, the construction industry and its participating organisations are making concerted efforts (fortunately with positive results) in taking up innovative forms of doing business via the internet, including e-Tendering (making it possible to manage the entire tender letting process electronically and online) (Anumba C.J. and Ruikar K. 2002; ITCBP 2003). Furthermore, Government (often a key client within the construction industry),and with its increased tendency to transact its business electronically, undoubtedly has an effect on how various private industry consultants, contractors, suppliers, etc. do business (Murray M. 2003) – by offering a wide range of (current and anticipated) e-facilities / services, including e-Tendering (Ecommerce 2002). Overall, doing business electronically is found to have a profound impact on the way today’s construction businesses operate - streamlining existing processes, with the growth in innovative tools, such as e-Tender, offering the construction industry new responsibilities and opportunities for all parties involved (ITCBP 2003). It is therefore important that these opportunities should be accessible to as many construction industry businesses as possible (The Construction Confederation 2001). Historically, there is a considerable exchange of information between various parties during a tendering process, where accuracy and efficiency of documentation is critical. Traditionally this process is either paper-based (involving large volumes of supporting tender documentation), or via a number of stand-alone, non-compatible computer systems, usually costly to both the client and contractor. As such, having a standard electronic exchange format that allows all parties involved in an electronic tender process to access one system only via the Internet, saves both time and money, eliminates transcription errors and increases speed of bid analysis (The Construction Confederation 2001). Supporting this research project’s aims and objectives, researchers set to determine today’s construction industry ‘current state-of-play’ in relation to e-Tendering opportunities. The report also provides brief introductions to several Australian and International e-Tender systems identified during this investigation. e-Tendering, in its simplest form, is described as the electronic publishing, communicating, accessing, receiving and submitting of all tender related information and documentation via the internet, thereby replacing the traditional paper-based tender processes, and achieving a more efficient and effective business process for all parties involved (NT Governement 2000; NT Government 2000; NSW Department of Commerce 2003; NSW Government 2003). Although most of the e-Tender websites investigated at the time, maintain their tendering processes and capabilities are ‘electronic’, research shows these ‘eTendering’ systems vary from being reasonably advanced to more ‘basic’ electronic tender notification and archiving services for various industry sectors. Research also indicates an e-Tender system should have a number of basic features and capabilities, including: • All tender documentation to be distributed via a secure web-based tender system – thereby avoiding the need for collating paperwork and couriers. • The client/purchaser should be able to upload a notice and/or invitation to tender onto the system. • Notification is sent out electronically (usually via email) for suppliers to download the information and return their responses electronically (online). • During the tender period, updates and queries are exchanged through the same e-Tender system. • The client/purchaser should only be able to access the tenders after the deadline has passed. • All tender related information is held in a central database, which should be easily searchable and fully audited, with all activities recorded. • It is essential that tender documents are not read or submitted by unauthorised parties. • Users of the e-Tender system are to be properly identified and registered via controlled access. In simple terms, security has to be as good as if not better than a manual tender process. Data is to be encrypted and users authenticated by means such as digital signatures, electronic certificates or smartcards. • All parties must be assured that no 'undetected' alterations can be made to any tender. • The tenderer should be able to amend the bid right up to the deadline – whilst the client/purchaser cannot obtain access until the submission deadline has passed. • The e-Tender system may also include features such as a database of service providers with spreadsheet-based pricing schedules, which can make it easier for a potential tenderer to electronically prepare and analyse a tender. Research indicates the efficiency of an e-Tender process is well supported internationally, with a significant number, yet similar, e-Tender benefits identified during this investigation. Both construction industry and Government participants generally agree that the implementation of an automated e-Tendering process or system enhances the overall quality, timeliness and cost-effectiveness of a tender process, and provides a more streamlined method of receiving, managing, and submitting tender documents than the traditional paper-based process. On the other hand, whilst there are undoubtedly many more barriers challenging the successful implementation and adoption of an e-Tendering system or process, researchers have also identified a range of challenges and perceptions that seem to hinder the uptake of this innovative approach to tendering electronically. A central concern seems to be that of security - when industry organisations have to use the Internet for electronic information transfer. As a result, when it comes to e-Tendering, industry participants insist these innovative tendering systems are developed to ensure the utmost security and integrity. Finally, if Australian organisations continue to explore the competitive ‘dynamics’ of the construction industry, without realising the current and future, trends and benefits of adopting innovative processes, such as e-Tendering, it will limit their globalising opportunities to expand into overseas markets and allow the continuation of international firms successfully entering local markets. As such, researchers believe increased knowledge, awareness and successful implementation of innovative systems and processes raises great expectations regarding their contribution towards ‘stimulating’ the globalisation of electronic procurement activities, and improving overall business and project performances throughout the construction industry sectors and overall marketplace (NSW Government 2002; Harty C. 2003; Murray M. 2003; Pietroforte R. 2003). Achieving the successful integration of an innovative e-Tender solution with an existing / traditional process can be a complex, and if not done correctly, could lead to failure (Bourn J. 2002).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Inward export activities for services companies have been largely neglected in the literature. Little is known about how professional service firms export to overseas consumers who travel to the domestic market of the firm. This study utilizes a resource-based perspective (RBV) to explore the main barriers and drivers of export performance for professional education services. A case study of Australia’s education industry, as well as interviews with executives from four Australian education institutions, was conducted. Findings show that inward exporters confront most barriers in the domestic market where the service is provided, and drivers of export performance combine firm- and country-specific resources.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The role of particular third sector organisations, Social Clubs, in supporting gambling through the use of EGMs in venues presents as a difficult social issue. Social Clubs gain revenue from gambling activities; but also contribute to social well-being through the provision of services to communities. The revenues derived from gambling in specific geographic locales has been seen by government as a way to increase economic development particularly in deprived areas. However there are also concerns about accessibility of low-income citizens to Electronic Gaming Machines (EGMS) and the high level of gambling overall in these deprived areas. We argue that social capital can be viewed as a guard against deleterious effects of unconstrained use of EGM gambling in communities. However, it is contended that social capital may also be destroyed by gambling activity if commercial business actors are able to use EGMs without community obligations to service provision. This paper examines access to gambling through EGMs and its relationship to social capital and the consequent effect on community resilience, via an Australian case study. The results highlight the potential two-way relationship between gambling and volunteering, such that volunteering (and social capital more generally) may help protect against problems of gambling, but also that volunteering as an activity may be damaged by increased gambling activity. This suggests that, regardless of the direction of causation, it is necessary to build up social capital via volunteering and other social capital activities in areas where EGMS are concentrated. The study concludes that Social Clubs using EGMs to derive funds are uniquely positioned within the community to develop programs that foster social capital creation and build community resilience in deprived areas.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Potentially harmful substance use is common, but many affected people do not receive treatment. Brief face-to-face treatments show impact, as do strategies to assist self-help remotely, by using bibliotherapies, computers or mobile phones. Remotely delivered treatments offer more sustained and multifaceted support than brief interventions, and they show a substantial cost advantage as users increase in number. They may also build skills, confidence and treatment fidelity in providers who use them in sessions. Engagement and retention remain challenges, but electronic treatments show promise in engaging younger populations. Recruitment may be assisted by integration with community campaigns or brief opportunistic interventions. However, routine use of assisted self-help by standard services faces significant challenges. Strategies to optimize adoption are discussed. ----- ----- Research Highlights: ► Many people with risky or problematic drinking do not currently receive treatment. ► Assisted self-help has a significant impact and can be delivered at low cost. ► Maximal effects from assisted self-help require engagement of potential users. ► Marketing campaigns and integration into existing service models may assist.