Search results

1 – 10 of 162
Article
Publication date: 26 August 2014

Michael Roland, Josef Langer and Rene Mayrhofer

The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and…

Abstract

Purpose

The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and debugging. Today, it is difficult for developers to get access to a near field communication (NFC)-secure element in current smartphones. Moreover, the security constraints of smartcards make in-circuit emulation and debugging of applications impractical. Therefore, an environment that emulates a secure element brings significant advantages for developers.

Design/methodology/approach

The authors' approach to such an environment is the emulation of Java Card applets on top of non-Java Card virtual machines (e.g. Android Dalvik VM), as this would facilitate the use of existing debugging tools. As the operation principle of the Java Card VM is based on persistent memory technology, the VM and applications running on top of it have a significantly different life cycle compared to other Java VMs. The authors evaluate these differences and their impact on Java VM-based Java Card emulation. They compare possible strategies to overcome the problems caused by these differences, propose a possible solution and create a prototypical implementation to verify the practical feasibility of such an emulation environment.

Findings

While the authors found that the Java Card inbuilt persistent memory management is not available on other Java VMs, they present a strategy to model this persistence mechanism on other VMs to build a complete Java Card run-time environment on top of a non-Java Card VM. Their analysis of the performance degradation in a prototypical implementation caused by additional effort put into maintaining persistent application state revealed that the implementation of such an emulation environment is practically feasible.

Originality/value

This paper addresses the problem of emulating a complete Java Card run-time environment on top of non-Java Card virtual machines which could open and significantly ease the development of NFC secure element applications.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 April 2016

Dominik Gruntz, Christof Arnosti and Marco Hauri

The purpose of this paper is to present a smartphone-based physical access control system in which the access points are not directly connected to a central authorization server…

Abstract

Purpose

The purpose of this paper is to present a smartphone-based physical access control system in which the access points are not directly connected to a central authorization server, but rather use the connectivity of the mobile phone to authorize a user access request online by a central access server. The access points ask the mobile phone whether a particular user has access or not. The mobile phone then relays such a request to the access server or presents an offline ticket. One of the basic requirements of our solution is the independence from third parties like mobile network operators, trusted service managers and handset manufacturers.

Design/methodology/approach

The authentication of the smartphone is based on public key cryptography. This requires that the private key is stored in a secure element or in a trusted execution environment to prevent identity theft. However, due to the intended independence from third parties, subscriber identity module (SIM)-based secure elements and embedded secure elements (i.e. separate hardware chips on the handset) were not an option and only one of the remaining secure element architectures could be used: host card emulation (HCE) or a microSD-based secure element.

Findings

This paper describes the implementation of such a physical access control system and discusses its security properties. In particular, it is shown that the HCE approach cannot solve the relay attack under conservative security assumptions and an implementation based on a microSD secure element is presented and discussed. Moreover, the paper also describes an offline solution which can be used if the smartphone is not connected to the access server. In this case, an access token is sent to the access point in response to an access request. These tokens are renewed regularly and automatically whenever the smartphone is connected.

Originality/value

In this paper, a physical access control system is presented which operates as fast as existing card-based solutions. By using a microSD-based secure element (SE), the authors were able to prevent the software relay attack. This solution is not restricted to microSD-based SEs, it could also be implemented with SIM-based or embedded secure elements (with the consequence that the solution depends on third parties).

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 August 2023

P.S. JosephNg

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that…

92

Abstract

Purpose

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that empowers hotel users to get to the room using a mobile access key. Advancing secured facilities, mobile phone “Near Field Communication” (NFC) innovation as the entrance device by carrying out an application containing an imitated mobile key for explicit verification access is used.

Design/methodology/approach

The proposed system is evaluated by triangulation of experimental, numerical and rational evaluation using partial least square structural equation modeling (PLS-SEM) with Malaysian hotel guests and employees.

Findings

The discoveries with the hypothesis supported validated that the suggested solution can eliminate physical cards, boost protection and encourage a contactless ecosystem. Theoretical, management and societal contributions are discussed here.

Research limitations/implications

This experiment comes with the constraints that it was conducted in only two hotels and does not fully reflect the choices of a wider range of travellers. Secondly, the cost of existing NFC smart locks is still relatively high, and along with the development of technology, the price will decrease when supply exceeds demand.

Practical implications

To promote high-security attributes, NFC technology as the access system by implementing an application containing an emulated smart key for specific authentication access is used. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Social implications

To promote high-security attributes, NFC technology is used as the access system by implementing an application containing an emulated smart key for specific authentication access. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Originality/value

The novelty of this study comes from the use of commonly available smartphone NFC features that are yet to be applied in the tourism ecosystem. The research provokes the applied concept of mobile smartkeys.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 5 March 2018

Bojun Fan, Hannah Ji, June Wei and Sherwood Lambert

This paper aims to develop a set of tactical electronic business solutions for the electronic credit card issuing industry.

Abstract

Purpose

This paper aims to develop a set of tactical electronic business solutions for the electronic credit card issuing industry.

Design/methodology/approach

Specifically, a strategic credit card issuing (SCCI) model is developed to analyze e-business in the credit card issuing industry. Second, a set of tactical solutions is derived on the basis of the SCCI model. Third, pattern analysis is conducted on the basis of data collected from dominant credit card issuing companies to further investigate the implementation status on these electronic business solutions in the credit card issuing industry.

Findings

The findings show that three categories of electronic business solution items can be classified. The average variability of electronic business implementation patterns for business-to-business, business-to-customer and business-to-internal in each company shows a variety of electronic business strategies implemented by these dominant companies.

Originality/value

The results will help managers and executives when they make strategic and tactical decisions on electronic business in the credit card issuing industry.

Details

International Journal of Accounting & Information Management, vol. 26 no. 1
Type: Research Article
ISSN: 1834-7649

Keywords

Article
Publication date: 27 August 2024

Flokart Aliu

This study investigates near field communication (NFC) payment method adoption in the Republic of Kosova, aiming to understand factors influencing consumer behavior toward NFC…

Abstract

Purpose

This study investigates near field communication (NFC) payment method adoption in the Republic of Kosova, aiming to understand factors influencing consumer behavior toward NFC technology adoption. Using the Unified Theory of Acceptance and Use of Technology (UTAUT-3) model and perceived risk theory, the research seeks to establish relationships between various factors and user intentions regarding NFC payment technology.

Design/methodology/approach

Using a quantitative approach, the research used a comprehensive questionnaire of 40 questions rated on a seven-point Likert scale across 16 constructs aligned with the research objectives. A convenience sampling method was used, distributing electronic questionnaires to 200 individuals representing diverse demographics in the Republic of Kosova.

Findings

The study identified significant support for numerous hypotheses, demonstrating substantial correlations between factors like performance expectancy, effort expectancy, social influence, habit, facilitating conditions and personal innovativeness with behavioral intention to use and behavioral intention to adopt NFC payments.

Research limitations/implications

Because convenience sampling was used, there are restrictions on the study’s sample size. Moreover, although the study delves into noteworthy elements impacting the adoption of NFC payment systems, it might not cover all possible factors that could influence consumer behavior in this regard.

Practical implications

Policymakers, NFC product developers, companies in the technology and payment sectors and Republic of Kosova customers all gain strategically from the research’s findings. Policymakers may make informed judgments about legislation, improve product development and marketing tactics and empower consumers to accept NFC payments by having a better understanding of consumer preferences and behaviors related NFC technology.

Social implications

Understanding consumer preferences and behaviors regarding NFC technology can refine product development and marketing strategies, inform policymaking and empower consumers’ decisions about adopting NFC payments.

Originality/value

This study’s innovative approach in combining the UTAUT-3 model and perceived risk theory contributes significantly to the understanding of factors influencing users’ intentions in adopting emerging payment technologies, filling a gap in NFC payment literature.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Book part
Publication date: 8 November 2019

Uladzimir Parkhimenka

This chapter describes development and main achievements of the Belarusian IT sector which is today considered by experts to be the most promising and progressive part of the…

Abstract

This chapter describes development and main achievements of the Belarusian IT sector which is today considered by experts to be the most promising and progressive part of the national economy. Special attention of the analysis is given to the governmental policy to stimulate information and communication technology sector growth through special legal regulations (e.g., High-Tech Park as favorable business environment for IT business since 2005) and efforts to promote transition of Belarus to the “IT country” through number of national programs and legislative instruments, including the President's Decree on Digital Economy Development (2017). Main scenarios of the Belarusian IT sector future development are proposed and analyzed, including risks and opportunities on such four paths as being the global IT development outsourcing provider; exponentially growing own software product companies; becoming the regional or even global cryptocurrency hub; integrating IT in all parts of the domestic economy in order to build Industry 4.0 and digital society.

Article
Publication date: 1 March 1989

British government approves data network After months of preparation by HM Treasury's Central Computer and Telecommunications Agency (CCTA), the first phase of the Government Data…

Abstract

British government approves data network After months of preparation by HM Treasury's Central Computer and Telecommunications Agency (CCTA), the first phase of the Government Data Network (GDN) has now been accepted. Trials of GDN took place in January, and it has now been implemented for daily use in 178 Customs and Excise locations throughout Britain. GDN is operated by Racal Data Networks.

Details

The Electronic Library, vol. 7 no. 3
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 February 1989

Charles L. Citroen

Three types of software have been evaluated which can be used on IBM‐compatible microcomputers: programs for terminal emulation and communication, programs for conversion of…

Abstract

Three types of software have been evaluated which can be used on IBM‐compatible microcomputers: programs for terminal emulation and communication, programs for conversion of received data, and programs for storage and retrieval of literature information in local databases. With software for these three applications, data can be downloaded from external computers and directly used to build a local documentation system. Functions of these types of programs and general results of the tests are discussed. Criteria for selecting software for online searching, as well as for building local databases using external data downloaded from online searches, are given.

Details

Program, vol. 23 no. 2
Type: Research Article
ISSN: 0033-0337

Article
Publication date: 1 January 1987

Alison Jameson

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical…

Abstract

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical advances, applications and legal attitudes. There is also a review of current software for downloading. Recent developments mean a trend to higher internal memory and storage capacity, and greater transmission speeds. Packages now offer access to more than one host, give maximum assistance to the user without being menu‐driven and incorporate the latest developments in artificial intelligence. Disadvantages are in the length of time involved in the process and the fact that the legal issue of copyright has not yet been finalised. Database producers have turned to licensing under contract law, but there is still need to rely on user ethics, and the need for a standard permissions form is highlighted.

Details

Library Management, vol. 8 no. 1
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 1 February 1994

James Michalko and John Haeger

Operating at the crossroads of higher education, librarianship, technology application, and service delivery, the Research Libraries Group (RLG) is a powerful partner to…

Abstract

Operating at the crossroads of higher education, librarianship, technology application, and service delivery, the Research Libraries Group (RLG) is a powerful partner to institutional efforts. For 20 years, it has identified critical research needs, provided responsive solutions, and expanded access to new and untapped information resources. With its highly skilled staff, sophisticated technical resources, and successful track record in managing and supporting interactions among its members, RLG is well positioned to help research institutions address the information challenges of the 1990s.

Details

Library Hi Tech, vol. 12 no. 2
Type: Research Article
ISSN: 0737-8831

1 – 10 of 162