Search results

21 – 30 of over 7000
Article
Publication date: 1 October 2001

Michel Andrieu

This article examines the future of e‐money as a payment instrument and some of the microeconomic policy issues it will raise. The paper is in two parts. This first part focuses…

2868

Abstract

This article examines the future of e‐money as a payment instrument and some of the microeconomic policy issues it will raise. The paper is in two parts. This first part focuses on the various forms which electronic money is likely to take in the future, and considers key technological and economic factors that will shape its evolution. Part 2, to be published in the next issue of foresight, examines some of the major regulatory and institutional issues that are likely to have a bearing on the adoption of e‐money, notably concerns related to the regulation of payment systems, security, privacy and consumer protection.

Details

Foresight, vol. 3 no. 5
Type: Research Article
ISSN: 1463-6689

Keywords

Content available
Article
Publication date: 1 March 2001

141

Abstract

Details

Sensor Review, vol. 21 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 January 1998

Martin Myhill

The University of Exeter Library, in conjunction with NatWest UK and Mondex, commenced a pilot smartcard project in October 1996. The smartcard functions as a campus card

Abstract

The University of Exeter Library, in conjunction with NatWest UK and Mondex, commenced a pilot smartcard project in October 1996. The smartcard functions as a campus card, combining many different features such as identification, student voting, building access, registration, electronic payment — and a library card. Of all these applications, the library card is compulsory. The pilot project concentrates on identification features of current smartcard technology but recent developments, especially an International standard multiple operating system (MULTOS), will increase potential applications for libraries and other agencies. Despite encountering many operational and technical obstacles, the University of Exeter project is now in its second year of operation.

Details

The Electronic Library, vol. 16 no. 1
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 5 December 2017

Saravanan K. and Saraniya S.

We propose cloud IoT based LMS (Livestock Management System) with three features. i) Animal healthcare monitoring and recording using IoT sensors via wearable collar, ii) Animal…

Abstract

Purpose

We propose cloud IoT based LMS (Livestock Management System) with three features. i) Animal healthcare monitoring and recording using IoT sensors via wearable collar, ii) Animal livestock identification using UID for animals (smart tag) and owners (smart card), iii) QR code reading, processing and display of the details in mobile via wireless technologies.

Design/methodology/approach

The developed animal monitoring device is used to detect animal physiological parameters such as body temperature; physical gestures like sitting, standing, eating and heartbeat, environmental parameters such as air temperature and relative humidity. Also, e-animal husbandry information network management system is the comprehensive web-based animal husbandry software designed for better interaction between veterinary hospital, veterinary doctor, owner, farmer and animal husbandry management.

Findings

Animal monitoring device mounted on the neck sense the values and predict the health status of the animal by using cloud IoT analytics platform. The accuracy of the system is 90 per cent and it can be well placed in the livestock environment.

Research limitations/implications

This research is carried out in livestock cows located in Tirunelveli district. The practical difficulty was in placing sensors on the animal. The digital feed from the farmers and the veterinary hospital is input in the animal husbandry management software.

Practical implications

The developed system can be implemented for monitoring the health status of the animal from anywhere using mobile applications. Also, the digitized animal information helps the government to take the right decisions on policies and fund allocation.

Social implications

The implemented system can be easily scaled up to large environments by using wireless communication and animal husbandry data will be available immediately. UID scheme for animals can uniquely identify the animal and its details.

Originality/value

The proposed work implements novel livestock monitoring and analytics system along with Aadhar (Unique ID) for animal. The proposed UID scheme is innovative and unique.

Details

Sensor Review, vol. 38 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 June 2004

Alan D. Smith

The information revolution, coupled with the strategic leveraging of the Internet, has exposed a number of relatively open societies to the dangers of cybercriminal and…

9181

Abstract

The information revolution, coupled with the strategic leveraging of the Internet, has exposed a number of relatively open societies to the dangers of cybercriminal and cyberterrorist acts, especially in commercial business transactions. With the development of e‐commerce, this commercial dark side has become known as cybercrime and has taken on many forms that affect the perceptions of the way we shop online. Corporations should realize that these threats to their online businesses have strategic implications to their business future and take proper measures to ensure that these threats are eliminated or significantly reduced so that consumer confidence in the Internet as an alternative means of shopping is maintained. These counter measures, coined as cybersecurity, have been developed to ensure the safety of consumer privacy and information and allow for a carefree shopping experience. There is need for the development of models that will allow corporations to study the effects of cybercrime on online consumer confidence and to counter through leveraging the benefits associated with the latest developments in cybersecurity. With these two facets of e‐commerce impacting the online consumer, corporations must ensure that the security measures taken will ultimately prevail to assure that consumers will continue to use the Internet to satisfy their shopping needs.

Details

Online Information Review, vol. 28 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 May 1991

The story of Charles Babbage (1791–1871) is one that is well known to cyberneticians and systems scientists. His contribution to, and impact on, modern computing is recognised not…

Abstract

The story of Charles Babbage (1791–1871) is one that is well known to cyberneticians and systems scientists. His contribution to, and impact on, modern computing is recognised not only in the country of his birth but also worldwide. In particular, he played a leading role in the evolution of difference engines. Although it has often been said that the first difference engine was invented by Charles Babbage in 1821, it is also claimed that it was Johann Helfrich Müller (1746–1830), a German engineer and master builder, who presented the first idea of a difference engine. Others were also involved, and the text by Michael Lindgren Glory and Failure: The Difference Engines of Johann Muller, Charles Babbage and George and Edvard Scheutz (MIT Press, Cambridge, Mass., 1990) is well worth reading.

Details

Kybernetes, vol. 20 no. 5
Type: Research Article
ISSN: 0368-492X

Article
Publication date: 1 May 2003

Victoria Skoularidou and Diomidis Spinellis

Enumerates and compares a number of security‐enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software…

2310

Abstract

Enumerates and compares a number of security‐enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software and/or hardware, are capable of protecting the client’s software integrity and its environment. The most important methodologies include the reference monitor model, firewalls, and virtual machines. Software implementations are the Java Sandbox, and the code signing concept. Hardware that can be used includes smart cards, and the TCPA/Palladium security initiative. Describes their most important features and provide a review and comparative study based on a number of criteria. Believes that ongoing research can empower these mechanisms for protecting network clients in a more effective way.

Details

Information Management & Computer Security, vol. 11 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Content available

Abstract

Details

European Business Review, vol. 17 no. 4
Type: Research Article
ISSN: 0955-534X

Keywords

Open Access
Article
Publication date: 7 September 2020

Will Brown, Melanie King and Yee Mey Goh

This paper is premised upon an analysis of 26 cities within the UK regarding their smart city projects. Each city was analyzed through news articles, reports and policy documents…

Abstract

This paper is premised upon an analysis of 26 cities within the UK regarding their smart city projects. Each city was analyzed through news articles, reports and policy documents to ascertain the level of each city's development as a smart city. Each was coded by separating the projects into five types, which were ranked on a scale from 0 (no plans for use) to 5 (project type in use). The most common types are the provision of open data and the creation of business ecosystems as the primary driver of the smart city. However, many councils and enterprises proclaim smartness before the technology is actually in use, making it difficult to separate what is utilised and what is under development. Therefore, this paper further carried out an analysis of 20 cities and their intended plans to usher in the smart city, to observe the expected emergence of smart city technology. This was achieved by interrogating various roadmaps and policy documents produced by the respective cities. It was found that the most prevalent form of emergent smart city technology is the rollout of 5G and increased educational programmes alongside a proliferation of internet of things and electric vehicle usage.

Details

Emerald Open Research, vol. 1 no. 5
Type: Research Article
ISSN: 2631-3952

Keywords

Article
Publication date: 1 October 1999

Vesna Hassler and Helmut Biely

The Digital Signature Project (ELU‐project) is coordinated by the STUZZA, a subsidiary of the leading Austrian business banks. The aim of the project is to establish an…

1199

Abstract

The Digital Signature Project (ELU‐project) is coordinated by the STUZZA, a subsidiary of the leading Austrian business banks. The aim of the project is to establish an infrastructure for applying smart card‐based digital signatures in banking and electronic commerce applications. One important requirement is to conform to all relevant international standards to ensure interoperability in case of a later connection to an international certification infrastructure. One part of the infrastructure is a public directory in the form of an LDAP‐server from which the X.509v3 certificates of the public signature keys can be retrieved. To provide for integrity, strong data authenticity and non‐repudiation of all directory information it was important to apply some security features that have not been standardized for LDAP yet. In this way the user can be sure that he is talking to the trusted directory when retrieving certificates and certificate‐related information. In this paper we give an overview of the project and some insights into some of the interesting parts of the system specification and design.

Details

Internet Research, vol. 9 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

21 – 30 of over 7000