Search results

1 – 10 of 249
Article
Publication date: 1 December 2005

Dan Eigeles

This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between…

1099

Abstract

Purpose

This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement.

Design/methodology/approach

To understand the needs and motivators for the concept, the areas of technology, policies, law, and human mindsets are discussed. The I3A is introduced by discussing two examples of possible solutions that would use the concept in e‐commerce.

Findings

In essence, I3A offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments. The paper argues that for the first time I3A creates a true public key infrastructure (TPKI) and leverages the benefits and the potential of existing and future PKI under one common unconstrained umbrella.

Originality/value

Focuses on a TPKI.

Details

Information Management & Computer Security, vol. 13 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 4 December 2017

Hafeez Idowu Agbabiaka, Emmanuel Olufemi Omisore and Oluwafemi Odunsi

The purpose of this paper is to examine multivariate analysis of challenges faced by patrons of medical tourism in Lagos metropolis, Nigeria.

Abstract

Purpose

The purpose of this paper is to examine multivariate analysis of challenges faced by patrons of medical tourism in Lagos metropolis, Nigeria.

Design/methodology/approach

Systematic sampling technique was employed to select 15 specialized private hospitals and 14 Public hospitals in the study area, resulting to a sample size of 29 hospitals. Ten patrons were contacted in each of the selected hospitals; consequently, 290 patrons were sampled.

Findings

The major challenges faced across the selected hospitals in the study area as revealed by this study included time spent in transit to hospital (PKI=3.96 and Mean Dev.=0.77), payment procedure is quick and simple (PKI=3.86 and Mean Dev.=0.67), package pricing is not transparent (PKI=3.76 and Mean Dev. =0.57), hospital facilities and equipment are not easily accessible (PKI=3.63 and Mean Dev.=0.44), Doctors do not pay enough attention to patrons (PKI=3.61 and Mean Dev.=0.42), Doctors do not give adequate explanation of patrons condition (PKI=3.49 and Mean Dev.=0.30), High cost of treatments (PKI=3.32 and Mean Dev.=0.13). The result of multiple regression analysis that produced (R2=0.933, F=296.080, p=0.000) meaning that challenges faced by patrons explain 99.3 percent variation of their destination choice.

Originality/value

The study revealed that challenges face by patrons determine their destination choice.

Details

International Journal of Tourism Cities, vol. 3 no. 4
Type: Research Article
ISSN: 2056-5607

Keywords

Article
Publication date: 1 December 2002

Sunil Hazari

The explosive growth of e‐commerce has resulted in organizations sharing data over the Internet with other Netcentric organizations. Advances in telecommunications and networked…

1369

Abstract

The explosive growth of e‐commerce has resulted in organizations sharing data over the Internet with other Netcentric organizations. Advances in telecommunications and networked applications are forcing dramatic changes in corporate functions, such as supply chain management, enterprise resource planning and customer relationship management. Online transactions with business partners and customers has prompted e‐businesses to re‐evaluate their security strategy, to avoid network downtime and being unable to connect to upstream partners and suppliers. Presence of a robust security architecture is essential to the success of netcentric organizations. Public key infrastructure (PKI) is one such technology that may offer benefits to Netcentric organizations, being a system of services, technology, protocols and standards that can be used as a solution for providing secure transactions. There are many factors that make PKI implementation difficult. This paper provides an overview of PKI technology, insight into challenges, as well as impact of implementing PKI in Netcentric organizations.

Details

Logistics Information Management, vol. 15 no. 5/6
Type: Research Article
ISSN: 0957-6053

Keywords

Article
Publication date: 1 December 2005

Stefanos Gritzalis

This paper aims to describe good‐practice guidance on how a secure and efficient public key infrastructure (PKI) can be developed to support secure and efficient…

Abstract

Purpose

This paper aims to describe good‐practice guidance on how a secure and efficient public key infrastructure (PKI) can be developed to support secure and efficient government‐to‐government and government‐to‐citizen electronic communication.

Design/methodology/approach

The main approach is to review and discuss the present situation.

Findings

The European Union (EU) has launched a comprehensive strategy framework and emerging actions on security and privacy issues. To this direction, a number of relevant initiatives have been put on (e.g. cyber security task force, awareness campaigns, promotion of good practices, improved exchange of information mechanisms, etc.). Their results will provide the basis for the work towards a secure information infrastructure. An important aspect towards this direction is the deployment of a PKI.

Originality/value

Provides a balanced good‐practice guidance for the exploitation of PKI by the public sector of the EU member states.

Details

Information Management & Computer Security, vol. 13 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 December 2005

Javier Lopez, Rolf Oppliger and Günther Pernul

To overview and discuss the technical, economical, legal, and social reasons why public key infrastructures (PKIs) have failed so far, summarizing the lessons learned, and giving…

1183

Abstract

Purpose

To overview and discuss the technical, economical, legal, and social reasons why public key infrastructures (PKIs) have failed so far, summarizing the lessons learned, and giving expectations about the future development of the field.

Design/methodology/approach

A detailed analysis of the developments in the PKI field, pointing out the achievements so far and the issues that still remain unsolved.

Findings

The possible reasons for the failure of PKI technology.

Originality/value

Identifies and analyses the problems of PKIs considering the different perspectives, i.e. not only the technical issues but also other issues like the economical, legal, and social issues that have also influenced the failure of PKIs.

Details

Internet Research, vol. 15 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 March 2002

James Backhouse

Electronic commerce denotes the use of electronic means, usually the Internet, for creating and often fulfilling contracts without the use of face‐to‐face encounters. In recent…

Abstract

Electronic commerce denotes the use of electronic means, usually the Internet, for creating and often fulfilling contracts without the use of face‐to‐face encounters. In recent years many countries have passed legislation to render to the electronic signature the same significance in contract formation as the traditional hand‐written signature. The general desire is to promote user trust and confidence in the process of authentication in the information age. Leading the charge to transform their traditional business into e‐commerce is the financial services industry, although many other sectors have begun to develop their electronic marketplace with gusto. What this means for money laundering is that wealth may be rapidly moved around the globe and so layering and integration become child's play. Online brokers, bankers and intermediaries of all varieties already accept instructions from clients using traditional user name and password type authentication. But the flawed nature of this type of authentication is rapidly forcing the adoption of public key cryptography with digital signatures and digital certificates. Unless a financial services institution can be absolutely certain about the identity of the online client, it is taking very great risks to accept instructions on their behalf. Recent advances in public key cryptography provide an enabling platform for the secure transaction of business.

Details

Journal of Financial Crime, vol. 9 no. 3
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 October 1999

Stephen Wilson

Public key infrastructure (PKI) has been discussed for some time but has yet to command much attention from business or policy makers. The benefits of chaining certificate…

Abstract

Public key infrastructure (PKI) has been discussed for some time but has yet to command much attention from business or policy makers. The benefits of chaining certificate authorities (CA) together have not been obvious and confusion has reigned over the proper role of government. But a new PKI model emphasises control and audit, so that certificates may be issued to different user groups under their own rules, with external assurance of fitness for purpose. This type of model is supported by existing standards certification and accreditation processes. No special new authorities are needed and complex cross‐certification protocols are avoided. Other advantages of an accreditation‐based PKI include a non‐government peak authority, an opt‐in, bottom‐up growth path, easily understood business language for all the elements of the PKI, and clarification of the legal liability of all CAs, in particular the peak authority.

Details

Information Management & Computer Security, vol. 7 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 1 January 2001

Jeanne Hermann

110

Abstract

Details

Library Hi Tech News, vol. 18 no. 1
Type: Research Article
ISSN: 0741-9058

Content available
Article
Publication date: 1 January 2001

Rachel Cheng

185

Abstract

Details

Library Hi Tech News, vol. 18 no. 1
Type: Research Article
ISSN: 0741-9058

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

1 – 10 of 249