Search results for "Computer security"

showing 10 items of 433 documents

Key drivers of internet banking services use

2009

PurposeThe purpose of this paper is to analyse the determinants of internet banking use, paying special attention to the role of product involvement, perceived risk and trust.Design/methodology/approachThe impact of trust, perceived risks, product involvement and TAM beliefs (ease of use and usefulness) on internet banking adoption is tested through structural equation modelling techniques. The sample consists of 511 Spanish internet banking services users and the data are collected through an internet survey. Risk is measured as a formative construct.FindingsData analysis shows that TAM beliefs and perceived risks (security, privacy, performance and social) have a direct influence on e‐ban…

business.industryProduct involvementUsabilitySample (statistics)Library and Information SciencesComputer securitycomputer.software_genreStructural equation modelingComputer Science ApplicationsRisk perceptionFormative assessmentKey (cryptography)The InternetMarketingbusinesscomputerInformation SystemsOnline Information Review
researchProduct

Security of information in IT systems

2005

The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.

business.industrySocial engineering (security)Telecommunication securityInformation technologyEavesdroppingElectromagnetic emissionComputer securitycomputer.software_genreInformation protection policyInformation security managementSociologyTempestbusinesscomputerSPIE Proceedings
researchProduct

A Secure Spontaneous Ad-Hoc Network to Share Internet Access

2009

In this paper, we propose a secure spontaneous ad-hoc network to grant the access of the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system and the designed messages. We also validate the success of our proposal through several simulations and comparisons with a regular architecture. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low resource communities.

business.product_categoryVehicular ad hoc networkWireless networkComputer sciencebusiness.industryLow resourceWireless ad hoc networkMobile ad hoc networkComputer securitycomputer.software_genreDynamic circuit networkInternet accessArchitecturebusinesscomputerComputer network
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Transparency in transactive energy at distribution level

2017

A recent report from the German Energy Agency analyzes the possible introduction of the blockchain technology in energy transactions in power distribution. The issue deserves attention since the extensive digitalization of business models puts new challenges to utilities in the power sector. The German decision makers in the energy field claim that blockchain appears as a close perspective and, at the same time, the Gartner hypecycle puts this technology at the peak of inflated expectations in 2016. Diffuse perception however provides hints for further investigation on the topic. This paper provides insight into the problem of peer-to-peer energy exchange from a technical perspective, provi…

distributed generationtransactive energyComputer scienceRenewable Energy Sustainability and the Environment020209 energyEnergy (esotericism)Photovoltaic systemBiomedical EngineeringEnergy Engineering and Power Technology02 engineering and technologyAC powerBusiness modelAsset (computer security)Field (computer science)Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaTransparency (graphic)0202 electrical engineering electronic engineering information engineeringVoltage regulationIndustrial organizationenergy blockchain
researchProduct

Context-sensitive distraction warnings : effects on drivers' visual behavior and acceptance

2016

In this study, we investigated the effects of context-sensitive distraction warnings on drivers' in-car glance behaviors and acceptance. The studied prototype warning application functions on a smart phone. The novelty of the application is its proactive and context-sensitive approach to the adjustment of warning thresholds according to the estimated visual demands of the driving situation ahead. In our study, novice and experienced drivers conducted in-car tasks with a smart phone on a test track with and without the warnings. The application gave a warning if the driver's gaze was recognized to remain on the smart phone over a situation-specific threshold time, or if the driver was approa…

driver distractionSituation awarenessComputer sciencehyväksyminen (menettely)Applied psychologywarning systemHuman Factors and ErgonomicsContext (language use)Computer securitycomputer.software_genreEducationTask (project management)Distraction0502 economics and business0501 psychology and cognitive sciencessmart phone050107 human factorsta113050210 logistics & transportationta213Warning system05 social sciencesGeneral EngineeringtrustGazeHuman-Computer InteractionHardware and Architecturesituation awarenessluottamuscomputerSoftwareacceptance
researchProduct

An Initial Security Analysis of the Personal Transaction Protocol

2003

Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.

education.field_of_studybusiness.product_categorybusiness.industryPopulationComputer securitycomputer.software_genreMobile phoneAuthentication protocolDistributed transactionInternet accessThe InternetBusinesseducationMobile deviceDatabase transactioncomputer
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

Migrating from a Centralized Data Warehouse to a Decentralized Data Platform Architecture

2021

To an increasing degree, data is a driving force for digitization, and hence also a key asset for numerous companies. In many businesses, various sources of data exist, which are isolated from one another in different domains, across a heterogeneous application landscape. Well-known centralized solution technologies, such as data warehouses and data lakes, exist to integrate data into one system, but they do not always scale well. Therefore, robust and decentralized ways to manage data can provide the companies with better value give companies a competitive edge over a single central repository. In this paper, we address why and when a monolithic data storage should be decentralized for imp…

hajautetut järjestelmätComputer scienceDistributed computingtietovarastotData platform architectureDistributed data management02 engineering and technologydata warehousingAsset (computer security)Competitive advantageDecentralizationdistributed data managementkeskittäminen020204 information systems0202 electrical engineering electronic engineering information engineeringDigitizationtietojärjestelmäthajautusbusiness.industrytiedonhallinta020207 software engineeringData decentralizationtiedonhallintajärjestelmät113 Computer and information sciencesData warehousedata decentralizationyrityksetData warehousingdatadata platform architectureComputer data storageScalabilitytietohallintoKey (cryptography)business
researchProduct