Search results

1 – 10 of 353

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Article
Publication date: 2 March 2015

Peter Fernandez

The purpose of this study is to provide context for understanding why encryption is important and provide some examples of applications designed to make it easier than ever to…

521

Abstract

Purpose

The purpose of this study is to provide context for understanding why encryption is important and provide some examples of applications designed to make it easier than ever to control who has access to the information transmitted by the technology used.

Design/methodology/approach

This paper provides an overview of the topic.

Findings

It is important for libraries to take an active role in understanding the encryption technology being provided to their patrons and used by their staff. It can be easily assumed that information held by these technologies is secure in ways that it is not.

Originality/value

Information that is transmitted online is almost always done so in a way that can be easily intercepted. The easiest way to keep it secure is not to avoid having it be intercepted, but to encrypt it so that it is unintelligible when it is intercepted.

Details

Library Hi Tech News, vol. 32 no. 1
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 1 August 2016

Katie Elson Anderson

The use of mobile messaging (MM) or mobile instant messaging has grown in the past few years at astonishing rates.

1926

Abstract

Purpose

The use of mobile messaging (MM) or mobile instant messaging has grown in the past few years at astonishing rates.

Design/methodology/approach

This growth has prompted data gatherers and trend forecasters to look at the use of MM apps in different ways than in the past.

Findings

In a 2015 survey, The Pew Research Center asked about the use of MM apps separately from cell phone texting for the first time (Duggan, 2015).

Originality/value

Digital marketing site eMarketer.com published their first ever worldwide forecast for MM in 2015. This forecast report shows 1.4 billion current users of MM apps or 5 per cent of smartphone users accessing an MM app at least once a month. This is a 31.6 per cent increase from the previous year. The forecast predicts that by 2018, there will be two billion users, representing 80 per cent of smartphone users (eMarketer.com, 2015).

Details

Library Hi Tech News, vol. 33 no. 6
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 21 September 2021

Mahdi Ghaemi Asl, Muhammad Mahdi Rashidi and Seyed Ali Hosseini Ebrahim Abad

The purpose of this study is to investigate the correlation between the price return of leading cryptocurrencies, including Bitcoin, Ethereum, Ripple, Litecoin, Monero, Stellar…

Abstract

Purpose

The purpose of this study is to investigate the correlation between the price return of leading cryptocurrencies, including Bitcoin, Ethereum, Ripple, Litecoin, Monero, Stellar, Peercoin and Dash, and stock return of technology companies' indices that mainly operate on the blockchain platform and provide financial services, including alternative finance, democratized banking, future payments and digital communities.

Design/methodology/approach

This study employs a Bayesian asymmetric dynamic conditional correlation multivariate Generalized Autoregressive Conditional Heteroskedasticity (GARCH) (BADCC-MGARCH) model with skewness and heavy tails on daily sample ranging from August 11, 2015, to February 10, 2020, to investigate the dynamic correlation between price return of several cryptocurrencies and stock return of the technology companies' indices that mainly operate on the blockchain platform. Data are collected from multiple sources. For parameter estimation and model comparison, the Markov chain Monte Carlo (MCMC) algorithm is employed. Besides, based on the expected Akaike information criterion (EAIC), Bayesian information criterion (BIC), deviance information criterion (DIC) and weighted Deviance Information Criterion (wDIC), the skewed-multivariate Generalized Error Distribution (mvGED) is selected as an optimal distribution for errors. Finally, some other tests are carried out to check the robustness of the results.

Findings

The study results indicate that blockchain-based technology companies' indices' return and price return of cryptocurrencies are positively correlated for most of the sampling period. Besides, the return price of newly invented and more advanced cryptocurrencies with unique characteristics, including Monero, Ripple, Dash, Stellar and Peercoin, positively correlates with the return of stock indices of blockchain-based technology companies for more than 93% of sampling days. The results are also robust to various sensitivity analyses.

Research limitations/implications

The positive correlation between the price return of cryptocurrencies and the return of stock indices of blockchain-based technology companies can be due to the investors' sentiments toward blockchain technology as both cryptocurrencies and these companies are based on blockchain technology. It could also be due to the applicability of cryptocurrencies for these companies, as the price return of more advanced and capable cryptocurrencies with unique features has a positive correlation with the return of stock indices of blockchain-based technology companies for more days compared to the other cryptocurrencies, like Bitcoin, Litecoin and Ethereum, that may be regarded more as speculative assets.

Practical implications

The study results may show the positive role of cryptocurrencies in improving and developing technology companies that mainly operate on the blockchain platform and provide financial services and vice versa, suggesting that managers and regulators should pay more attention to the usefulness of cryptocurrencies and blockchains. This study also has important risk management and diversification implications for investors and companies investing in cryptocurrencies and these companies' stock. Besides, blockchain-based technology companies can add cryptocurrencies to their portfolio as hedgers or diversifiers based on their strategy.

Originality/value

This is the first study analyzing the connection between leading cryptocurrencies and technology companies that mainly operate on the blockchain platform and provide financial services by employing the Bayesian ssymmetric DCC-MGARCH model. The results also have important implications for investors, companies, regulators and researchers for future studies.

Details

Journal of Enterprise Information Management, vol. 34 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Article
Publication date: 30 September 2019

Krishna Prakasha, Balachandra Muniyal and Vasundhara Acharya

The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions…

Abstract

Purpose

The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism.

Design/methodology/approach

One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm.

Findings

The time consumed for the proposed research work shows that it is practical and acceptable.

Originality/value

The proposed research work is an efficient and enhanced user authentication mechanism.

Details

Information Discovery and Delivery, vol. 48 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Expert briefing
Publication date: 16 June 2020

Technology firms warn that building such a ‘backdoor’ would weaken encryption and security for all users and erode privacy.

Article
Publication date: 19 February 2018

Sathya D. and Ganesh Kumar P.

This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor…

Abstract

Purpose

This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.

Design/methodology/approach

Nowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Boneh et al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.

Findings

The combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.

Practical implications

The secured data aggregation is useful in health-related applications, military applications, etc.

Originality/value

The new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.

Article
Publication date: 10 July 2020

A.B. Feroz Khan and Anandharaj G

The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .

Abstract

Purpose

The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .

Design/methodology/approach

In this study, the authors proposed a multi layer security approach for the detection of DDoS in IoT environment, which protects the smart devices from DDoS, this scheme also reduces the computational cost in the network under mobility condition.

Findings

Even though many works have been done for the security of wireless sensor network (WSN), all works have focused on encryption which depends on the key management strategy. In this study, the authors proposed a multilayer approach to analyze the layer wise security issues and also proposed a threshold-based countermeasure (TBC) for replay attack in each layer.

Originality/value

The results indicate that the proposed algorithm lowers the computational costs and energy consumption than in modern schemes. Also, the proposed research work improves the scalability of sensor networks using the TBC.

Details

International Journal of Intelligent Unmanned Systems, vol. 9 no. 3
Type: Research Article
ISSN: 2049-6427

Keywords

Content available
Article
Publication date: 1 June 2003

424

Abstract

Details

Aircraft Engineering and Aerospace Technology, vol. 75 no. 3
Type: Research Article
ISSN: 0002-2667

1 – 10 of 353