Search results

1 – 10 of 336
Article
Publication date: 1 February 2005

David C. Chou, David C. Yen and Amy Y. Chou

To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.

3200

Abstract

Purpose

To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.

Design/methodology/approach

A range of virtual private network concepts and technologies are identified and compared. The capability, suitability, and pros and cons of adopting virtual private network for electronic commerce are discussed. An economic analysis is used to compare the cost and benefit of adopting virtual private network in organizations.

Findings

This paper provides information about virtual private network technology. It also indicates the advantages and disadvantages of adopting virtual private network for electronic commerce practices. The economic analysis provides a real example of technology adoption decision making. Strategic implications of adopting virtual private network are detected.

Practical implications

The economic analysis on adopting virtual private network provides an example of information technology selection decision for the electronic commerce community.

Originality/value

This paper provides an economic approach to analyzing the decision process for information technology adoption. It suggests that the integration of virtual private network into electronic commerce architecture would perform secure and inexpensive online transactions for adopters of this new technology.

Details

Industrial Management & Data Systems, vol. 105 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 13 November 2017

Bruce Massis

The purpose of this study is to examine the use of a virtual private network (VPN) as an additional protective strategy for patrons using library computers.

354

Abstract

Purpose

The purpose of this study is to examine the use of a virtual private network (VPN) as an additional protective strategy for patrons using library computers.

Design/methodology/approach

This study is a literature review and commentary on this topic that has been addressed by professionals, researchers and practitioners.

Findings

Credit must be given to those libraries who have made free VPN services available to their patrons, thus encouraging off-site usage of library resources through this extra layer of authentication in an effort to provide them with a trust level of privacy beyond their standard expectations. Should the library not provide such a service at present, at least an individual can add a VPN to one’s protective bag of tricks to, perhaps, in an effort to place even a limited constraint on those who would do them harm when online.

Originality/value

The value in exploring this topic is to provide some context and potential options for patrons through their use of a VPN.

Details

Information and Learning Science, vol. 118 no. 11/12
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 4 September 2007

Karri Huhtanen, Bilhanan Silverajan and Jarmo Harju

The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers…

Abstract

Purpose

The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers and are forced to use network address translation (NAT) and port forwarding to solve connectivity issues to the different home services. This paper seeks to introduce a secure connectivity solution utilising both IPv6 and IPv6 transition mechanisms in cooperation with existing virtual private network (VPN) solutions.

Design/methodology/approach

The proposed solution to avoid route conflicts and other problems with private IPv4 address space collisions is to utilise 6to4, an IPv6 transition mechanism, to obtain routable IPv6 network addresses first for the home network and services and then, to utilise the same IPv6 network for connectivity by bridging it over a VPN connection to the mobile terminal.

Findings

The paper finds that the adoption of this solution and these technologies will depend on how useful they are seen by vendors or service providers and included in their products. Regular vendors and service providers probably want to wait until there is a greater customer need. On the other hand, customers do not know about the possibilities before they are shown to them in practice. The best approach to this challenge is to find a cooperating vendor, or even better, a service provider willing to develop the concept further and to integrate it into the devices and services they are already offering.

Originality/value

The technologies for enhancing home service connectivity are already available. In the proof‐of‐concept implementation the paper has shown that all these components can be integrated and utilised to build home routers for present and future home networks. The technical disadvantages and challenges are solvable with further work and the whole concept is ready to be turned into products and services. As indicated in the paper, one of the issues for further work is to find and convince a vendor or service provider to integrate the proposed solution in their home router.

Details

Campus-Wide Information Systems, vol. 24 no. 4
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 18 December 2019

David A. Makin and Leanna Ireland

The purpose of this paper is to explore to what extent the legal environment influences a user’s choice to employ privacy-enhancing technologies (PETs). Drawing upon existing…

Abstract

Purpose

The purpose of this paper is to explore to what extent the legal environment influences a user’s choice to employ privacy-enhancing technologies (PETs). Drawing upon existing theoretical frames specific to arbitrariness and uncertainty, this research examines whether interest in PETs is influenced by the legal environment of a country.

Design/methodology/approach

Using data from Google Trends, the International Property Rights Index, Freedom House and the Organization for Economic Cooperation and Development, the research analyzes interest in Tor, VPN technology and pretty good privacy (PGP) in 153 countries between 2012 and 2016.

Findings

Findings suggest both countries with both higher and lower arbitrariness and uncertainty of law are associated with an increased interest in Tor and PGP. However, interest in VPN technology does not appear influenced by the legal environment and, instead, is influenced by freedom within the press.

Research limitations/implications

The dual use nature of Tor and PGP is influenced by law enforcement and judiciary effectiveness and transparency and arbitrariness contributing to the public’s interest in decentralized technological protections.

Practical implications

Law enforcement should continue to police via the technologies rather than shutting them down to protect the identities of those needing to use these technologies for legitimate purposes. Only by embracing the technologies, as opposed to seeing them as hurdles to be banned, may law enforcement agencies remain vigilant to the threats posted by nefarious actors.

Originality/value

In this study, the authors introduce a more robust measure of interest in PETs, and do so with a larger, more substantive sample. By situating this interest within the context of policing, the authors can document the dual use nature of the technology, which can be useful in guiding future research, specifically in the area of policy development and officer training.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 May 2003

Vassilis Prevelakis and Angelos Keromytis

Proposes the use of a special purpose drop‐in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized…

Abstract

Proposes the use of a special purpose drop‐in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Sieve is meant to be used like an external modem: the user only needs to plug it in. Its existence is transparent to the user, requiring no modification to the workstation configuration. To function in this role, Sieve has been designed to be compact, low‐cost, requiring little administration or maintenance. Discusses the features and advantages of the system and demonstrates how Sieve was used in various application areas (home, university environment, etc.).

Details

Internet Research, vol. 13 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 7 July 2023

Wuyan Liang and Xiaolong Xu

In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication…

Abstract

Purpose

In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication gap between dysphonia and hearing people. The purpose of this paper is to devote the alignment between SL sequence and nature language sequence with high translation performance.

Design/methodology/approach

SL can be characterized as joint/bone location information in two-dimensional space over time, forming skeleton sequences. To encode joint, bone and their motion information, we propose a multistream hierarchy network (MHN) along with a vocab prediction network (VPN) and a joint network (JN) with the recurrent neural network transducer. The JN is used to concatenate the sequences encoded by the MHN and VPN and learn their sequence alignments.

Findings

We verify the effectiveness of the proposed approach and provide experimental results on three large-scale datasets, which show that translation accuracy is 94.96, 54.52, and 92.88 per cent, and the inference time is 18 and 1.7 times faster than listen-attend-spell network (LAS) and visual hierarchy to lexical sequence network (H2SNet) , respectively.

Originality/value

In this paper, we propose a novel framework that can fuse multimodal input (i.e. joint, bone and their motion stream) and align input streams with nature language. Moreover, the provided framework is improved by the different properties of MHN, VPN and JN. Experimental results on the three datasets demonstrate that our approaches outperform the state-of-the-art methods in terms of translation accuracy and speed.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 12 October 2012

Stefan Larsson, Måns Svensson, Marcin de Kaminski, Kari Rönkkö and Johanna Alkan Olsson

The purpose of this study is to understand more of online anonymity in the global file sharing community in the context of social norms and copyright law. The study describes the…

2137

Abstract

Purpose

The purpose of this study is to understand more of online anonymity in the global file sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of VPN or similar service related to age, gender, geographical location, as well as analysing the correlation with file sharing frequencies.

Design/methodology/approach

This study is to a large extent descriptively collecting data through a web‐based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), allowing the authors to link the survey from the main logo of their site. In 72 hours the authors received over 75,000 responses, which gives the opportunity to compare use of anonymity services with factors of age, geographical region, file sharing frequency, etc.

Findings

Overall, 17.8 per cent of the respondents use a VPN or similar service (free or paid). A core of high frequency uploaders is more inclined to use VPN or similar services than the average file sharer. Online anonymity practices in the file sharing community are depending on how legal and social norms correlate (more enforcement means more anonymity).

Research limitations/implications

The web‐based survey was in English and mainly attracted visitors on The Pirate Bays' web page. This means that it is likely that those who do not have the language skills necessary were excluded from the survey.

Practical implications

This study adds to the knowledge of anonymity practices online in terms of traceability and identification. This means that it shows some of the conditions for legal enforcement in a digital environment.

Social implications

This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable.

Originality/value

The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file sharing community is therefore likely unique.

Details

Journal of Research in Interactive Marketing, vol. 6 no. 4
Type: Research Article
ISSN: 2040-7122

Keywords

Content available
Article
Publication date: 1 June 2004

375

Abstract

Details

Aircraft Engineering and Aerospace Technology, vol. 76 no. 3
Type: Research Article
ISSN: 0002-2667

Article
Publication date: 20 November 2023

Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain and Mahdi Nasrullah Al-Ameen

The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…

Abstract

Purpose

The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them as “security tools” in this paper, unless otherwise specified) are designed to protect the security and privacy of people in the digital environment. However, inappropriate use of these tools can lead to unexpected consequences that are preventable. Hence, it is significant to examine why users do not understand the security tools.

Design/methodology/approach

The authors conducted a qualitative study with 40 participants in the USA to investigate the prevalent misconceptions of people regarding security tools, their perceptions of data access and the corresponding impact on their usage behavior and data protection strategies.

Findings

While security vulnerabilities are often rooted in people’s internet usage behavior, this study examined user’s mental models of the internet and unpacked how the misconceptions about security tools relate to those mental models.

Originality/value

Based on the findings, this study offers recommendations highlighting the design aspects of security tools that need careful attention from researchers and industry practitioners, to alleviate users’ misconceptions and provide them with accurate conceptual models toward the desired use of security tools.

Details

Information & Computer Security, vol. 32 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 1 March 2004

Peter Christian Murphy

Peter Christian (Chris) Murphy had worked his way up the “food chain” at AT&T for 19 years, culminating in his position as Sales Center Vice President for South Florida. When he…

1145

Abstract

Peter Christian (Chris) Murphy had worked his way up the “food chain” at AT&T for 19 years, culminating in his position as Sales Center Vice President for South Florida. When he and a coworker realized there was an opportunity in the marketplace for a small, nimble company to take advantage of emerging communications technology that a stodgy, lumbering corporation would have trouble integrating into its service package, Chris decided to jump into an entrepreneurial opportunity.

Details

New England Journal of Entrepreneurship, vol. 7 no. 2
Type: Research Article
ISSN: 2574-8904

1 – 10 of 336