26 resultados para Electronic commerce - Security measures

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper disseminates the findings from a study into the factors impacting technological innovation adoption and diffusion specific to the deployment of electronic-commerce strategies within professional service sector SMEs in Ireland. Confirmatory factor analysis was performed and seven factors relating to a firm's external/internal environment were found to underpin adoption. These are: electronic-commerce capability; willingness to change/rate of response to new technologies; technological opportunity recognition; customer orientation; sensitivity to competitive/customer environments; perceptions of technology feasibility; and e-skills development mechanisms. t-tests revealed differences between adopters and non-adopters, and forward stepwise logistic regression is used to assess the extent to which these seven factors actually predict electronic-commerce adoption. It was found that electronic-commerce capability and the willingness to change/rate of response to new technologies are the two most important factors affecting adoption behaviours. © Imperial College Press.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this study, 137 corn distillers dried grains with solubles (DDGS) samples from a range of different geographical origins (Jilin Province of China, Heilongjiang Province of China, USA and Europe) were collected and analysed. Different near infrared spectrometers combined with different chemometric packages were used in two independent laboratories to investigate the feasibility of classifying geographical origin of DDGS. Base on the same dataset, one laboratory developed a partial least square discriminant analysis model and another laboratory developed an orthogonal partial least square discriminant analysis model. Results showed that both models could perfectly classify DDGS samples from different geographical origins. These promising results encourage the development of larger scale efforts to produce datasets which can be used to differentiate the geographical origin of DDGS and such efforts are required to provide higher level food security measures on a global scale.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Organizing and managing channels of distribution is an important marketing task. Due to the emergence of electronic commerce on the Internet, e-channel distribution systems have been adopted by many manufacturers. However, academic and anecdotal evidence both point to the pressures arising from this new e-channel manufacturing environment. Questions marks therefore remain on how the addition of this e-channel affects the traditional marketing strategies of leasing and selling. We set up several two-period dual-channel models in which a manufacturer sells a durable product through both a manufacturer-owned e-channel and an independent reseller (leaser) who adopts selling (leasing) to consumers. Our main results indicate that, direct selling cost aside, product durability plays an important role in shaping the strategies of all members. With either marketing strategy, the additional expansion of an e-channel territory may secure Pareto gains, in which all members benefit.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually update their typical security measures. Attackers often have a long-term interest in their targets. Due to a number of factors such as scale, architecture and nonproductive traffic however it makes difficult to detect them using typical intrusion detection techniques. Cyber early warning systems (CEWS) aim at alerting such attempts in their nascent stages using preliminary indicators. Design and implementation of such systems involves numerous research challenges such as generic set of indicators, intelligence gathering, uncertainty reasoning and information fusion. This paper discusses such challenges and presents the reader with compelling motivation. A carefully deployed empirical analysis using a real world attack scenario and a real network traffic capture is also presented.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

High-speed field-programmable gate array (FPGA) implementations of an adaptive least mean square (LMS) filter with application in an electronic support measures (ESM) digital receiver, are presented. They employ "fine-grained" pipelining, i.e., pipelining within the processor and result in an increased output latency when used in the LMS recursive system. Therefore, the major challenge is to maintain a low latency output whilst increasing the pipeline stage in the filter for higher speeds. Using the delayed LMS (DLMS) algorithm, fine-grained pipelined FPGA implementations using both the direct form (DF) and the transposed form (TF) are considered and compared. It is shown that the direct form LMS filter utilizes the FPGA resources more efficiently thereby allowing a 120 MHz sampling rate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study finds evidence that attempts to reduce costs and error rates in the Inland Revenue through the use of e-commerce technology are flawed. While it is technically possible to write software that will record tax data, and then transmit it to the Inland Revenue, there is little demand for this service. The key finding is that the tax system is so complex that many people are unable to complete their own tax returns. This complexity cannot be overcome by well-designed software. The recommendation is to encourage the use of agents to assist taxpayers or simplify the tax system. The Inland Revenue is interested in saving administrative costs and errors by encouraging electronic submission of tax returns. To achieve these objectives, given the raw data it would seem clear that the focus should be on facilitating the work of agents.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A system capable of deployment as a microwave security sensor which can automatically reject background clutter is presented. The principle of operation is based on analog homodyne detection using 1. Q single side-band down conversion of an AM backscattered modulating signal envelope. A demonstrator is presented which operates with a carrier frequency of 2 GHz and 500 KHz backscattered signal. When deployed in a multipath rich open plan office environment the S/N ratio obtained at the detection output was better than 20 dB at 20 in range with 20 dBm EIRP in a 2 MHz detection bandwidth despite the presence of time varying and static clutter. (C) 2009 Wiley Periodicals, Inc. Microwave Opt Technol Lett 51: 2492-2495, 2009; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/mop.24636

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms.