Search results

11 – 20 of 37
Article
Publication date: 4 April 2016

Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh and Ke Chen

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is…

Abstract

Purpose

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is becoming very common. These mobile electronic services typically use a knowledge-based authentication method to authenticate a user (claimed identity). However, this authentication method is vulnerable to several security attacks. To counter the attacks and to make the authentication process more secure, this paper aims to investigate the use of touch dynamics biometrics in conjunction with a personal identification number (PIN)-based authentication method, and demonstrate its benefits in terms of strengthening the security of authentication services for mobile devices.

Design/methodology/approach

The investigation has made use of three light-weighted matching functions and a comprehensive reference data set collected from 150 subjects.

Findings

The investigative results show that, with this multi-factor authentication approach, even when the PIN is exposed, as much as nine out of ten impersonation attempts can be successfully identified. It has also been discovered that the accuracy performance can be increased by combining different feature data types and by increasing the input string length.

Originality/value

The novel contributions of this paper are twofold. Firstly, it describes how a comprehensive experiment is set up to collect touch dynamics biometrics data, and the set of collected data is being made publically available, which may facilitate further research in the problem domain. Secondly, the paper demonstrates how the data set may be used to strengthen the protection of resources that are accessible via mobile devices.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 October 2019

Ewan Sutherland

The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale…

Abstract

Purpose

The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management.

Design/methodology/approach

An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE

Findings

The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software.

Research limitations/implications

Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE.

Practical implications

Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president.

Originality/value

A first analysis of a telecommunications sanctions case.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 6 August 2021

Rudi Wessel Pretorius, Sanet Carow, Graeme Wilson and Peter Schmitz

This paper aims to showcase and critically review the value of selected pedagogies in which real-world engagements are used to enhance sustainability learning in an open, distance…

Abstract

Purpose

This paper aims to showcase and critically review the value of selected pedagogies in which real-world engagements are used to enhance sustainability learning in an open, distance and e-learning (ODeL) context in the Global South. The paper considers opportunities, issues, alternatives and implementation guidelines.

Design/methodology/approach

The School of Ecological and Human Sustainability (University of South Africa) serves as case study, with blended and fully online learning used as examples of pedagogies. The assessment of these pedagogies uses examples of learning activities and exercises, critical reflections on feedback by lecturers and students and consideration against criteria for real-world learning.

Findings

The experiences showcased illustrate that despite challenges in ODeL, real-world engagements can be used successful as pedagogy for sustainability learning in the Global South context. Limited access to ICTs can be mitigated through mobile technologies and free and open software applications, as illustrated by the examples in this paper.

Research limitations/implications

The case study approach and qualitative methodology present limitations, with focus on only two examples. However, significant depth is achieved with the assessment of these examples, while the recommendations and lessons learnt can be applied in other contexts, thus expanding on the knowledge and experience in this field.

Originality/value

This paper showcases innovative approaches to incorporate real-world engagements for sustainability learning in ODeL. Application of real-world engagements in ODeL in the Global South context is original and addresses the need for teaching and learning strategies responding to the digital divide and contributing to expand access to higher education and an Afrocentric discourse to best practice.

Details

International Journal of Sustainability in Higher Education, vol. 22 no. 6
Type: Research Article
ISSN: 1467-6370

Keywords

Article
Publication date: 21 July 2022

Nadia Smaili and Audrey de Rancourt-Raymond

The purpose of this study is to examine the risks of the metaverse ecosystem. This study provides an overview of the metaverse and its evolution and discusses the various fraud…

2371

Abstract

Purpose

The purpose of this study is to examine the risks of the metaverse ecosystem. This study provides an overview of the metaverse and its evolution and discusses the various fraud risks it poses for organizations (including boards of directors, forensic accountants, auditors and accountants). Given the advantages of the metaverse and the growing interest it is attracting from organizations, this paper sheds light on the importance of mitigating its risks.

Design/methodology/approach

Based on a systematic review of the literature on the metaverse and analysis of the fraud triangle, this study examines the different fraud risks it poses. More specifically, this study analyzes 21 articles on the metaverse published between 2021 and 2022 and attempts to answer the following research questions: What are the risks inherent in the metaverse? What are the fraud risks associated with it? What are the opportunities and pressures it brings? What is the rationalization underlying its use? This study conducts the analysis on two levels, that of the individual (user) and that of the organization. This paper summarizes the findings of publications on the metaverse in 2021 and 2022 to discover its various definitions and the opportunities and risks it represents.

Findings

This paper offers an insightful discussion of the advantages and risks the metaverse can bring. Because this analysis shows that any organization could be vulnerable to metaverse risks, this study provides organizations with strategies to deter, detect and prevent fraud and reputational risks. Regulatory bodies, financial authorities, board of directors and fraud investigators should all consider these risks before investing in the metaverse.

Originality/value

This paper adds new insights to the scarce research on the metaverse and cybersecurity by exploring the opportunities and risks it presents. It has several implications for organizations, boards of directors, management and regulatory authorities.

Article
Publication date: 13 November 2017

William P. Smith

This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to…

Abstract

Purpose

This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future.

Design/methodology/approach

Based on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed.

Findings

Primarily due to property rights, employers in the USA have heretofore been granted wide latitude in monitoring employee communications. The BYOD trend has the potential to challenge this status quo.

Originality value

BYOD programs present discernable threats to employee privacy. Attention is also directed toward contributing elements such as wearable technology, cloud computing and company cultures.

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 2 November 2015

Michael Hölzl, Endalkachew Asnake, Rene Mayrhofer and Michael Roland

The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile…

Abstract

Purpose

The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever.

Design/methodology/approach

A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications.

Findings

To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time.

Originality/value

By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 July 2013

Miguel Gómez

Despite the emphasis on 21st century learning in our schools, the use of technology and the opportunity to think creatively is often lacking in our social studies curriculum…

Abstract

Despite the emphasis on 21st century learning in our schools, the use of technology and the opportunity to think creatively is often lacking in our social studies curriculum. Specifically, opportunities for students to apply the five themes of geography to the world around them is hard to undertake when teaching is primarily conducted via a traditional textbook or supplemented with only audio and visual materials. In order to give students an authentic opportunity to apply the five themes of geography and to build their 21st century learning skills through the use of creative thinking tasks, handheld global positioning system (GPS) devices were introduced to a middle grades classroom. This manuscript documents the steps taken with these handheld GPS devices over the course of a two-week unit on the five themes of geography. Following a detailed explanation of each day’s activity, a discussion highlights how the infusion of technology and the opportunity to think creatively created a culture of learning within the classroom.

Details

Social Studies Research and Practice, vol. 8 no. 2
Type: Research Article
ISSN: 1933-5415

Keywords

Article
Publication date: 1 April 2006

John Hinchcliff

This article aims to encourage universities to go beyond the significant obsession with the technical advances of the knowledge society and carefully assess both the

532

Abstract

Purpose

This article aims to encourage universities to go beyond the significant obsession with the technical advances of the knowledge society and carefully assess both the epistemological and ethical principles that govern their existence. Ultimately, these principles will shape the future well being of both universities and civilization itself.

Design/methodology/approach

Provides a useful discussion on the future of universities.

Findings

The advance of modern technology is assessed within a context of philosophical assumptions such as promethean successism, platonic order, Cartesian rationalism, Newtonian certainty and modern materialism which are challenged by the uncertainties, complexities, and subjectivity promoted by existentialism, quantum physics, and chaos theory. The quest for wisdom takes us beyond the confines of the knowledge society to a values‐based, open, humble, caring and sharing community experience.

Practical implications

People, institutions and communities need to carefully assess their future development in terms of a carefully considered code of ethics and a clear understanding of the limits of their capacity for knowledge.

Originality/value

The thesis is not uncommon. The important difference is in the wide contextual and conceptual perspective together with a focus on urgency as we enter a very different future shaped by nanotechnology, biotechnology, computer science and robotology.

Details

On the Horizon, vol. 14 no. 2
Type: Research Article
ISSN: 1074-8121

Keywords

Book part
Publication date: 8 July 2021

Ġorġ Mallia

This chapter seeks to present a limited overview of some aspects of manipulated and/or fake images that contribute to society ‘becoming post-truth’. It subclassifies levels of…

Abstract

This chapter seeks to present a limited overview of some aspects of manipulated and/or fake images that contribute to society ‘becoming post-truth’. It subclassifies levels of manipulation and also presents the finding from a descriptive survey that gauges perceptions on awareness and recognisability of fake images. It also presents perceptions of effect on individuals of images modified for aesthetic reasons and carried by social media. The majority of respondents seemed affected by this, but with only a minority whose perception of self was affected. Another result of the survey is that there is a general mistrust of images not carried by gatekept sources.

Details

Media, Technology and Education in a Post-Truth Society
Type: Book
ISBN: 978-1-80043-907-8

Keywords

Abstract

Details

Posthumanism in Digital Culture
Type: Book
ISBN: 978-1-80043-107-2

11 – 20 of 37