Search results
11 – 20 of 37Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh and Ke Chen
The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is…
Abstract
Purpose
The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is becoming very common. These mobile electronic services typically use a knowledge-based authentication method to authenticate a user (claimed identity). However, this authentication method is vulnerable to several security attacks. To counter the attacks and to make the authentication process more secure, this paper aims to investigate the use of touch dynamics biometrics in conjunction with a personal identification number (PIN)-based authentication method, and demonstrate its benefits in terms of strengthening the security of authentication services for mobile devices.
Design/methodology/approach
The investigation has made use of three light-weighted matching functions and a comprehensive reference data set collected from 150 subjects.
Findings
The investigative results show that, with this multi-factor authentication approach, even when the PIN is exposed, as much as nine out of ten impersonation attempts can be successfully identified. It has also been discovered that the accuracy performance can be increased by combining different feature data types and by increasing the input string length.
Originality/value
The novel contributions of this paper are twofold. Firstly, it describes how a comprehensive experiment is set up to collect touch dynamics biometrics data, and the set of collected data is being made publically available, which may facilitate further research in the problem domain. Secondly, the paper demonstrates how the data set may be used to strengthen the protection of resources that are accessible via mobile devices.
Details
Keywords
The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale…
Abstract
Purpose
The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management.
Design/methodology/approach
An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE
Findings
The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software.
Research limitations/implications
Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE.
Practical implications
Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president.
Originality/value
A first analysis of a telecommunications sanctions case.
Details
Keywords
Rudi Wessel Pretorius, Sanet Carow, Graeme Wilson and Peter Schmitz
This paper aims to showcase and critically review the value of selected pedagogies in which real-world engagements are used to enhance sustainability learning in an open, distance…
Abstract
Purpose
This paper aims to showcase and critically review the value of selected pedagogies in which real-world engagements are used to enhance sustainability learning in an open, distance and e-learning (ODeL) context in the Global South. The paper considers opportunities, issues, alternatives and implementation guidelines.
Design/methodology/approach
The School of Ecological and Human Sustainability (University of South Africa) serves as case study, with blended and fully online learning used as examples of pedagogies. The assessment of these pedagogies uses examples of learning activities and exercises, critical reflections on feedback by lecturers and students and consideration against criteria for real-world learning.
Findings
The experiences showcased illustrate that despite challenges in ODeL, real-world engagements can be used successful as pedagogy for sustainability learning in the Global South context. Limited access to ICTs can be mitigated through mobile technologies and free and open software applications, as illustrated by the examples in this paper.
Research limitations/implications
The case study approach and qualitative methodology present limitations, with focus on only two examples. However, significant depth is achieved with the assessment of these examples, while the recommendations and lessons learnt can be applied in other contexts, thus expanding on the knowledge and experience in this field.
Originality/value
This paper showcases innovative approaches to incorporate real-world engagements for sustainability learning in ODeL. Application of real-world engagements in ODeL in the Global South context is original and addresses the need for teaching and learning strategies responding to the digital divide and contributing to expand access to higher education and an Afrocentric discourse to best practice.
Details
Keywords
Nadia Smaili and Audrey de Rancourt-Raymond
The purpose of this study is to examine the risks of the metaverse ecosystem. This study provides an overview of the metaverse and its evolution and discusses the various fraud…
Abstract
Purpose
The purpose of this study is to examine the risks of the metaverse ecosystem. This study provides an overview of the metaverse and its evolution and discusses the various fraud risks it poses for organizations (including boards of directors, forensic accountants, auditors and accountants). Given the advantages of the metaverse and the growing interest it is attracting from organizations, this paper sheds light on the importance of mitigating its risks.
Design/methodology/approach
Based on a systematic review of the literature on the metaverse and analysis of the fraud triangle, this study examines the different fraud risks it poses. More specifically, this study analyzes 21 articles on the metaverse published between 2021 and 2022 and attempts to answer the following research questions: What are the risks inherent in the metaverse? What are the fraud risks associated with it? What are the opportunities and pressures it brings? What is the rationalization underlying its use? This study conducts the analysis on two levels, that of the individual (user) and that of the organization. This paper summarizes the findings of publications on the metaverse in 2021 and 2022 to discover its various definitions and the opportunities and risks it represents.
Findings
This paper offers an insightful discussion of the advantages and risks the metaverse can bring. Because this analysis shows that any organization could be vulnerable to metaverse risks, this study provides organizations with strategies to deter, detect and prevent fraud and reputational risks. Regulatory bodies, financial authorities, board of directors and fraud investigators should all consider these risks before investing in the metaverse.
Originality/value
This paper adds new insights to the scarce research on the metaverse and cybersecurity by exploring the opportunities and risks it presents. It has several implications for organizations, boards of directors, management and regulatory authorities.
Details
Keywords
This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to…
Abstract
Purpose
This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future.
Design/methodology/approach
Based on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed.
Findings
Primarily due to property rights, employers in the USA have heretofore been granted wide latitude in monitoring employee communications. The BYOD trend has the potential to challenge this status quo.
Originality value
BYOD programs present discernable threats to employee privacy. Attention is also directed toward contributing elements such as wearable technology, cloud computing and company cultures.
Details
Keywords
Michael Hölzl, Endalkachew Asnake, Rene Mayrhofer and Michael Roland
The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile…
Abstract
Purpose
The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever.
Design/methodology/approach
A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications.
Findings
To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time.
Originality/value
By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.
Details
Keywords
Despite the emphasis on 21st century learning in our schools, the use of technology and the opportunity to think creatively is often lacking in our social studies curriculum…
Abstract
Despite the emphasis on 21st century learning in our schools, the use of technology and the opportunity to think creatively is often lacking in our social studies curriculum. Specifically, opportunities for students to apply the five themes of geography to the world around them is hard to undertake when teaching is primarily conducted via a traditional textbook or supplemented with only audio and visual materials. In order to give students an authentic opportunity to apply the five themes of geography and to build their 21st century learning skills through the use of creative thinking tasks, handheld global positioning system (GPS) devices were introduced to a middle grades classroom. This manuscript documents the steps taken with these handheld GPS devices over the course of a two-week unit on the five themes of geography. Following a detailed explanation of each day’s activity, a discussion highlights how the infusion of technology and the opportunity to think creatively created a culture of learning within the classroom.
Details
Keywords
This article aims to encourage universities to go beyond the significant obsession with the technical advances of the knowledge society and carefully assess both the…
Abstract
Purpose
This article aims to encourage universities to go beyond the significant obsession with the technical advances of the knowledge society and carefully assess both the epistemological and ethical principles that govern their existence. Ultimately, these principles will shape the future well being of both universities and civilization itself.
Design/methodology/approach
Provides a useful discussion on the future of universities.
Findings
The advance of modern technology is assessed within a context of philosophical assumptions such as promethean successism, platonic order, Cartesian rationalism, Newtonian certainty and modern materialism which are challenged by the uncertainties, complexities, and subjectivity promoted by existentialism, quantum physics, and chaos theory. The quest for wisdom takes us beyond the confines of the knowledge society to a values‐based, open, humble, caring and sharing community experience.
Practical implications
People, institutions and communities need to carefully assess their future development in terms of a carefully considered code of ethics and a clear understanding of the limits of their capacity for knowledge.
Originality/value
The thesis is not uncommon. The important difference is in the wide contextual and conceptual perspective together with a focus on urgency as we enter a very different future shaped by nanotechnology, biotechnology, computer science and robotology.
Details
Keywords
This chapter seeks to present a limited overview of some aspects of manipulated and/or fake images that contribute to society ‘becoming post-truth’. It subclassifies levels of…
Abstract
This chapter seeks to present a limited overview of some aspects of manipulated and/or fake images that contribute to society ‘becoming post-truth’. It subclassifies levels of manipulation and also presents the finding from a descriptive survey that gauges perceptions on awareness and recognisability of fake images. It also presents perceptions of effect on individuals of images modified for aesthetic reasons and carried by social media. The majority of respondents seemed affected by this, but with only a minority whose perception of self was affected. Another result of the survey is that there is a general mistrust of images not carried by gatekept sources.
Details