Search results
1 – 10 of 336David C. Chou, David C. Yen and Amy Y. Chou
To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.
Abstract
Purpose
To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.
Design/methodology/approach
A range of virtual private network concepts and technologies are identified and compared. The capability, suitability, and pros and cons of adopting virtual private network for electronic commerce are discussed. An economic analysis is used to compare the cost and benefit of adopting virtual private network in organizations.
Findings
This paper provides information about virtual private network technology. It also indicates the advantages and disadvantages of adopting virtual private network for electronic commerce practices. The economic analysis provides a real example of technology adoption decision making. Strategic implications of adopting virtual private network are detected.
Practical implications
The economic analysis on adopting virtual private network provides an example of information technology selection decision for the electronic commerce community.
Originality/value
This paper provides an economic approach to analyzing the decision process for information technology adoption. It suggests that the integration of virtual private network into electronic commerce architecture would perform secure and inexpensive online transactions for adopters of this new technology.
Details
Keywords
The purpose of this study is to examine the use of a virtual private network (VPN) as an additional protective strategy for patrons using library computers.
Abstract
Purpose
The purpose of this study is to examine the use of a virtual private network (VPN) as an additional protective strategy for patrons using library computers.
Design/methodology/approach
This study is a literature review and commentary on this topic that has been addressed by professionals, researchers and practitioners.
Findings
Credit must be given to those libraries who have made free VPN services available to their patrons, thus encouraging off-site usage of library resources through this extra layer of authentication in an effort to provide them with a trust level of privacy beyond their standard expectations. Should the library not provide such a service at present, at least an individual can add a VPN to one’s protective bag of tricks to, perhaps, in an effort to place even a limited constraint on those who would do them harm when online.
Originality/value
The value in exploring this topic is to provide some context and potential options for patrons through their use of a VPN.
Karri Huhtanen, Bilhanan Silverajan and Jarmo Harju
The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers…
Abstract
Purpose
The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers and are forced to use network address translation (NAT) and port forwarding to solve connectivity issues to the different home services. This paper seeks to introduce a secure connectivity solution utilising both IPv6 and IPv6 transition mechanisms in cooperation with existing virtual private network (VPN) solutions.
Design/methodology/approach
The proposed solution to avoid route conflicts and other problems with private IPv4 address space collisions is to utilise 6to4, an IPv6 transition mechanism, to obtain routable IPv6 network addresses first for the home network and services and then, to utilise the same IPv6 network for connectivity by bridging it over a VPN connection to the mobile terminal.
Findings
The paper finds that the adoption of this solution and these technologies will depend on how useful they are seen by vendors or service providers and included in their products. Regular vendors and service providers probably want to wait until there is a greater customer need. On the other hand, customers do not know about the possibilities before they are shown to them in practice. The best approach to this challenge is to find a cooperating vendor, or even better, a service provider willing to develop the concept further and to integrate it into the devices and services they are already offering.
Originality/value
The technologies for enhancing home service connectivity are already available. In the proof‐of‐concept implementation the paper has shown that all these components can be integrated and utilised to build home routers for present and future home networks. The technical disadvantages and challenges are solvable with further work and the whole concept is ready to be turned into products and services. As indicated in the paper, one of the issues for further work is to find and convince a vendor or service provider to integrate the proposed solution in their home router.
Details
Keywords
David A. Makin and Leanna Ireland
The purpose of this paper is to explore to what extent the legal environment influences a user’s choice to employ privacy-enhancing technologies (PETs). Drawing upon existing…
Abstract
Purpose
The purpose of this paper is to explore to what extent the legal environment influences a user’s choice to employ privacy-enhancing technologies (PETs). Drawing upon existing theoretical frames specific to arbitrariness and uncertainty, this research examines whether interest in PETs is influenced by the legal environment of a country.
Design/methodology/approach
Using data from Google Trends, the International Property Rights Index, Freedom House and the Organization for Economic Cooperation and Development, the research analyzes interest in Tor, VPN technology and pretty good privacy (PGP) in 153 countries between 2012 and 2016.
Findings
Findings suggest both countries with both higher and lower arbitrariness and uncertainty of law are associated with an increased interest in Tor and PGP. However, interest in VPN technology does not appear influenced by the legal environment and, instead, is influenced by freedom within the press.
Research limitations/implications
The dual use nature of Tor and PGP is influenced by law enforcement and judiciary effectiveness and transparency and arbitrariness contributing to the public’s interest in decentralized technological protections.
Practical implications
Law enforcement should continue to police via the technologies rather than shutting them down to protect the identities of those needing to use these technologies for legitimate purposes. Only by embracing the technologies, as opposed to seeing them as hurdles to be banned, may law enforcement agencies remain vigilant to the threats posted by nefarious actors.
Originality/value
In this study, the authors introduce a more robust measure of interest in PETs, and do so with a larger, more substantive sample. By situating this interest within the context of policing, the authors can document the dual use nature of the technology, which can be useful in guiding future research, specifically in the area of policy development and officer training.
Details
Keywords
Vassilis Prevelakis and Angelos Keromytis
Proposes the use of a special purpose drop‐in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized…
Abstract
Proposes the use of a special purpose drop‐in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Sieve is meant to be used like an external modem: the user only needs to plug it in. Its existence is transparent to the user, requiring no modification to the workstation configuration. To function in this role, Sieve has been designed to be compact, low‐cost, requiring little administration or maintenance. Discusses the features and advantages of the system and demonstrates how Sieve was used in various application areas (home, university environment, etc.).
Details
Keywords
In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication…
Abstract
Purpose
In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication gap between dysphonia and hearing people. The purpose of this paper is to devote the alignment between SL sequence and nature language sequence with high translation performance.
Design/methodology/approach
SL can be characterized as joint/bone location information in two-dimensional space over time, forming skeleton sequences. To encode joint, bone and their motion information, we propose a multistream hierarchy network (MHN) along with a vocab prediction network (VPN) and a joint network (JN) with the recurrent neural network transducer. The JN is used to concatenate the sequences encoded by the MHN and VPN and learn their sequence alignments.
Findings
We verify the effectiveness of the proposed approach and provide experimental results on three large-scale datasets, which show that translation accuracy is 94.96, 54.52, and 92.88 per cent, and the inference time is 18 and 1.7 times faster than listen-attend-spell network (LAS) and visual hierarchy to lexical sequence network (H2SNet) , respectively.
Originality/value
In this paper, we propose a novel framework that can fuse multimodal input (i.e. joint, bone and their motion stream) and align input streams with nature language. Moreover, the provided framework is improved by the different properties of MHN, VPN and JN. Experimental results on the three datasets demonstrate that our approaches outperform the state-of-the-art methods in terms of translation accuracy and speed.
Details
Keywords
Stefan Larsson, Måns Svensson, Marcin de Kaminski, Kari Rönkkö and Johanna Alkan Olsson
The purpose of this study is to understand more of online anonymity in the global file sharing community in the context of social norms and copyright law. The study describes the…
Abstract
Purpose
The purpose of this study is to understand more of online anonymity in the global file sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of VPN or similar service related to age, gender, geographical location, as well as analysing the correlation with file sharing frequencies.
Design/methodology/approach
This study is to a large extent descriptively collecting data through a web‐based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), allowing the authors to link the survey from the main logo of their site. In 72 hours the authors received over 75,000 responses, which gives the opportunity to compare use of anonymity services with factors of age, geographical region, file sharing frequency, etc.
Findings
Overall, 17.8 per cent of the respondents use a VPN or similar service (free or paid). A core of high frequency uploaders is more inclined to use VPN or similar services than the average file sharer. Online anonymity practices in the file sharing community are depending on how legal and social norms correlate (more enforcement means more anonymity).
Research limitations/implications
The web‐based survey was in English and mainly attracted visitors on The Pirate Bays' web page. This means that it is likely that those who do not have the language skills necessary were excluded from the survey.
Practical implications
This study adds to the knowledge of anonymity practices online in terms of traceability and identification. This means that it shows some of the conditions for legal enforcement in a digital environment.
Social implications
This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable.
Originality/value
The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file sharing community is therefore likely unique.
Details
Keywords
Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain and Mahdi Nasrullah Al-Ameen
The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…
Abstract
Purpose
The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them as “security tools” in this paper, unless otherwise specified) are designed to protect the security and privacy of people in the digital environment. However, inappropriate use of these tools can lead to unexpected consequences that are preventable. Hence, it is significant to examine why users do not understand the security tools.
Design/methodology/approach
The authors conducted a qualitative study with 40 participants in the USA to investigate the prevalent misconceptions of people regarding security tools, their perceptions of data access and the corresponding impact on their usage behavior and data protection strategies.
Findings
While security vulnerabilities are often rooted in people’s internet usage behavior, this study examined user’s mental models of the internet and unpacked how the misconceptions about security tools relate to those mental models.
Originality/value
Based on the findings, this study offers recommendations highlighting the design aspects of security tools that need careful attention from researchers and industry practitioners, to alleviate users’ misconceptions and provide them with accurate conceptual models toward the desired use of security tools.
Details
Keywords
Peter Christian (Chris) Murphy had worked his way up the “food chain” at AT&T for 19 years, culminating in his position as Sales Center Vice President for South Florida. When he…
Abstract
Peter Christian (Chris) Murphy had worked his way up the “food chain” at AT&T for 19 years, culminating in his position as Sales Center Vice President for South Florida. When he and a coworker realized there was an opportunity in the marketplace for a small, nimble company to take advantage of emerging communications technology that a stodgy, lumbering corporation would have trouble integrating into its service package, Chris decided to jump into an entrepreneurial opportunity.