Search results

1 – 3 of 3
Article
Publication date: 12 June 2017

Vivek V. Jog and Senthil Murugan T.

Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But…

Abstract

Purpose

Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks.

Design/methodology/approach

In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks.

Findings

DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack.

Originality/value

This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 10 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 7 February 2022

Shih-Chih Chen, Tung-Hsiang Chou, Tanaporn Hongsuchon, Athapol Ruangkanjanases, Santhaya Kittikowit and Tse-Ching Lee

In this era of smartphone applications, brands are actively developing applications to occupy the consumer’s mobile phone space, adding many practical functions to their…

2272

Abstract

Purpose

In this era of smartphone applications, brands are actively developing applications to occupy the consumer’s mobile phone space, adding many practical functions to their applications to increase brand exposure or consumer interest in the brand. Augmented reality (AR) has evolved rapidly in the past decade because of technological breakthroughs, making AR no longer an untouchable technology, but one that can be easily used on almost every phone. Therefore, this study aims to combine extended customer experience with AR marketing activities to explain and predict usage and purchase intention.

Design/methodology/approach

The eight key factors integrated into the extended customer experience are used as environmental stimulation factors, and Wanna Kicks and FitGlasses are used as experimental environments. A total of 193 valid samples were collected from users with AR experience. The empirical data is processed and verified by partial least squares in this study.

Findings

Customer experience has received increasing attention in the field of marketing research. This study developed a model to evaluate the antecedents and consequences of AR marketing activities by systematically adding customer experience, continuance intention, purchase intention and customer engagement, and then linking them to the AR application environment. This study presents the academic and practical implications, which can provide future research directions and references for brand marketing strategies and AR applications.

Originality/value

This study adds interactivity, vividness, perceived usefulness and novelty to the extended concept of customer experience. Therefore, the authors proposed that the extended customer experience can be used to measure the perceptions related to AR applications. This study is expected to provide scholars and practitioners in AR fields with a better understanding of the causes and consequences of customer experience with innovative technologies and to suggest effective marketing recommendations.

研究目的

在这个智能手机应用时代, 品牌积极发展能占据消费者的手机空间的应用软件, 在已有的应用软件上增加了许多实用性功能来增加品牌曝光或消费者对品牌的兴趣。增强现实 (AR) 在过去十年中由于技术突破从而发展迅速, 让AR不再触不可及, 而是几乎可以在每部手机上轻松使用的技术。因此, 本研究通过结合 AR 营销活动以及延展顾客体验, 来以解释和预测用户使用和购买意向。

研究设计/方法/途径

本研究用延展顾客体验模型中的八项关键因素来作为环境刺激因素, Wanna Kicks 和 FitGlasses 用作实验环境。 本研究从具有 AR 经验的用户那里收集193个有效样本。数据通过偏最小二乘法来进行处理和验证。

研究发现

客户体验在营销领域受到越来越多的关注。本研究通过系统地添加客户的 体验、持续意向、购买意向和客户参与度, 然后将它们链接到 AR 应用环境来评估AR 营销活动的前因和后果来建立了一项模型。本研究提出了学术和实践意义, 可以提供未来的研究方向品牌营销策略和AR应用提供参考。

研究原创性/价值

这项研究对客户体验扩展概念增加了交互性、生动性、感知有用性、以及新颖性。因此, 我们建议延展客户体验模型可运用于衡量与 AR 应用相关的用户感知。本研究旨在为学者和AR领域的从业者关于创新技术的客户体验的因果提供更进一步的认知, 并提出有效的营销建议。

Article
Publication date: 8 July 2020

Michael Rogerson, Andrew Crane, Vivek Soundararajan, Johanne Grosvold and Charles H. Cho

This paper investigates how organisations are responding to mandatory modern slavery disclosure legislation. Experimentalist governance suggests that organisations faced with…

3029

Abstract

Purpose

This paper investigates how organisations are responding to mandatory modern slavery disclosure legislation. Experimentalist governance suggests that organisations faced with disclosure requirements such as those contained in the UK Modern Slavery Act 2015 will compete with one another, and in doing so, improve compliance. The authors seek to understand whether this is the case.

Design/methodology/approach

This study is set in the UK public sector. The authors conduct interviews with over 25% of UK universities that are within the scope of the UK Modern Slavery Act 2015 and examine their reporting and disclosure under that legislation.

Findings

The authors find that, contrary to the logic of experimentalist governance, universities' disclosures as reflected in their modern slavery statements are persistently poor on detail, lack variation and have led to little meaningful action to tackle modern slavery. They show that this is due to a herding effect that results in universities responding as a sector rather than independently; a built-in incapacity to effectively manage supply chains; and insufficient attention to the issue at the board level. The authors also identity important boundary conditions of experimentalist governance.

Research limitations/implications

The generalisability of the authors’ findings is restricted to the public sector.

Practical implications

In contexts where disclosure under the UK Modern Slavery Act 2015 is not a core offering of the sector, and where competition is limited, there is little incentive to engage in a “race to the top” in terms of disclosure. As such, pro-forma compliance prevails and the effectiveness of disclosure as a tool to drive change in supply chains to safeguard workers is relatively ineffective. Instead, organisations must develop better knowledge of their supply chains and executives and a more critical eye for modern slavery to be combatted effectively. Accountants and their systems and skills can facilitate this development.

Originality/value

This is the first investigation of the organisational processes and activities which underpin disclosures related to modern slavery disclosure legislation. This paper contributes to the accounting and disclosure modern slavery literature by investigating public sector organisations' processes, activities and responses to mandatory reporting legislation on modern slavery.

Access

Year

Content type

Article (3)
1 – 3 of 3