Статті в журналах з теми "Anonymous channel"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Anonymous channel.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Anonymous channel".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Annisa, Annisa, and Sany Dwita. "Pengaruh Jalur Pelaporan Dan Power Distance Terhadap Niat Melakukan Whistleblowing." JURNAL EKSPLORASI AKUNTANSI 2, no. 4 (December 9, 2020): 3419–33. http://dx.doi.org/10.24036/jea.v2i4.293.

Повний текст джерела
Анотація:
This paper aims at examining the effect of wrongdoing reporting channels (anonymous and non-anonymous). Intention to report fraud via anonymous reporting channel are hypothesized to be higher than through non-anonymous reporting channel. As Hoftsede research of Indonesian culture, Indonesia has high score (78) on power distance dimention. This research uses experimental method to 152 students of Undergraduate of Accounting in UNP. By using eight-case scenarios, partispants were asked to answer the possibility to whistleblow the unethical behavior that occurred in the organization which was done by their manager or peer. The intention to report fraud via anonymous reporting channel is higher rather than via non-anonymous reporting channel. We also find that low power distance has positif impact for whistleblowing decision. Taken together, these findings contribute to the exising literature on accounting ethics.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Utami, Ni Made Mega Abdi, Gugus Irianto, and Yeney Widya Prihatiningtias. "Analyzing the effect of financial reward, personal cost and reporting channel on whistleblowing intentions utilizing an experimental study." International Journal of Research in Business and Social Science (2147- 4478) 9, no. 2 (March 15, 2020): 125–32. http://dx.doi.org/10.20525/ijrbs.v9i2.614.

Повний текст джерела
Анотація:
This study aims to determine the effect of financial rewards (given and not given), personal costs (low and high) and reporting channels (anonymous and non-anonymous) on whistleblowing intentions. This study also analyzes the interaction effects among financial reward and personal cost, financial reward and reporting channel as well as personal cost and reporting channel on whistleblowing intentions. Participants in this study involve 65 finance and accounting employees of state universities in Bali. This research employs a 2x2x2 experimental design. The results of this study indicate that whistleblowing intentions are greater when given financial rewards compared to not given financial rewards, in low personal cost compared with a high personal cost, reported through anonymous reporting channels than in non-anonymous reporting channels. The results of the interaction effect indicate that greater whistleblowing occurs when given a financial reward (case at a low personal cost), through non-anonymous reporting channels. The results also confirm that higher whistleblowing intentions appear in a low personal cost through anonym reporting channels.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Miceli, Marcia P., Bonnie L. Roach, and Janet P. Near. "The Motivations of Anonymous Whistle-Blowers: The Case of Federal Employees." Public Personnel Management 17, no. 3 (September 1988): 281–96. http://dx.doi.org/10.1177/009102608801700304.

Повний текст джерела
Анотація:
The “Deep Throat” case during Watergate — in which a well-placed unidentified source called attention to governmental wrongdoing — exemplifies the complexities created by anonymous whistle-blowing. What anonymous whistle-blowers may lose in credibility they gain in protection from reprisal. The trade-offs facing the potential whistle-blower who decides to remain unidentified are examined empirically using survey data from 8500 federal employees. Propositions derived from a model of bystander intervention (Latané & Darley, 1970) are investigated, with consideration of three decision points: whether the observer of organizational wrongdoing should blow the whistle, whether the whistle-blower should act anonymously, and whether the whistle-blower should report the wrong-doing through internal channels or to someone outside the organization. The results suggest a compounding of the last two decisions: in fact, the choice of channels represents one of four distinct strategies. Whistle-blowers may be anonymous or identified with either external or internal channels, but the conditions under which they do so vary dramatically. The whistle-blower who, like “Deep Throat,” chooses to use an anonymous external channel faces a series of interrelated and complex decisions.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Triantafyllou, Anna, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Erkuden Rios, and Eider Iturbe. "TOWARDS AN ANONYMOUS INCIDENT COMMUNICATION CHANNEL FOR ELECTRIC SMART GRIDS." Azerbaijan Journal of High Performance Computing 2, no. 1 (June 30, 2019): 7–28. http://dx.doi.org/10.32010/26166127.2019.2.1.7.28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Juang, W. S., C. L. Lei, and C. Y. Chang. "Anonymous channel and authentication in wireless communications." Computer Communications 22, no. 15-16 (September 1999): 1502–11. http://dx.doi.org/10.1016/s0140-3664(99)00108-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Nurhalizah, Karinna Heydy, and Ilham Maulana Saud. "Pengaruh Tingkat Keseriusan Pelanggaran, Reporting Channel, dan Retaliasi Terhadap Niat Melakukan Whistleblowing." Reviu Akuntansi dan Bisnis Indonesia 5, no. 2 (December 24, 2021): 164–84. http://dx.doi.org/10.18196/rabin.v5i2.12376.

Повний текст джерела
Анотація:
Latar Belakang:Saat ini telah banyak terjadi kecurangan seperti korupsi, pemalsuan laporan keuangan, suap menyuap, dan lain sebagainya. Adanya kasus kecurangan ini menimbulkan banyak kerugian. Oleh sebab itu maka dibutuhkan suatu kebijakan untuk mencegah maupun mengungkap adanya kecurangan salah satunya yaitu dengan menerapkan kebijakan whistleblowing. Kebijakan whistleblowing sudah diterapkan di berbagai perusahaan seperti perusahaan Telkom, Pertamina, Astra Group, Direktorat Jenderal Pajak, dan lain-lain. Namun untuk melakukan whistleblowing seseorang akan dipengaruhi oleh berbagai faktor seperti tingkat keseriusan pelanggaran, reporting channel, dan retaliasi.Tujuan:Penelitian ini bertujuan untuk menganalisis pengaruh tingkat keseriusan pelanggaran (rendah dan tinggi), reporting channels (anonymous reporting channel dan non-anonymous reporting channel), dan retaliasi (rendah dan tinggi) terhadap niat melakukan whistleblowing.Metode Penelitian:Pendekatan pada penelitian ini menggunakan eksperimen 2x2x2 between subjects effects dengan 165 subjek penelitian. Subjek dalam penelitian ini adalah mahasiswa S1 Program Studi Akuntansi Universitas Muhammadiyah Yogyakarta. Sampel dalam penelitian ini dipilih menggunakan metode purposive sampling. Alat analisis yang digunakan adalah Analysis of Variance (ANOVA).Hasil Penelitian:Hasil penelitian menunjukkan bahwa tingkat keseriusan pelanggaran tidak berpengaruh positif signifikan terhadap niat melakukan whistleblowing, adanya anonymous reporting channel lebih efektif untuk meningkatkan niat seseorang melakukan whistleblowing, dan retaliasi rendah lebih efektif untuk meningkatkan niat seseorang melakukan whistleblowing. Dalam kondisi tingkat keseriusan pelanggaran tinggi, anonymous reporting channel, dan retaliasi rendah lebih efektif dalam meningkatkan niat seseorang untuk melaporkan tindakan pelanggaran.Keterbatasan Penelitian:Responden pada penelitian hanya terbatas mahasiswa akuntansi FEB UMY angkatan 2018 di mana mahasiswa belum memahami kondisi sesungguhnya yang terjadi dalam dunia kerja.Keaslian/Novetly Penelitian:Penelitian ini merupakan replikasi dari penelitian terdahulu dengan mengganti variabel financial reward dengan tingkat keseriusan pelanggaran dan mengubah subyek serta lokasi penelitian.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Aldawsari, Layla S., and Tom Altman. "Naming in Multichannel with Beeps in the Strong Model." Applied Sciences 10, no. 20 (October 14, 2020): 7164. http://dx.doi.org/10.3390/app10207164.

Повний текст джерела
Анотація:
In this paper, a system of anonymous processes is considered that communicates with beeps through multiple channels in a synchronous communication model. In beeping channels, processes are limited to hearing either a beep or a silence from the channel with no collision detection. A strong model is assumed in which a process can beep on any single channel and listen on any specific channel during a single round. The goal is to develop distributed naming algorithms for two models where the number of processes is either known or unknown. A Las Vegas algorithm was developed for naming anonymous processes when the number of processes is known. This algorithm has an optimal time complexity of O(nlogn) rounds and uses O(nlogn) random bits, where n is the number of processes for the largest group. For the model with an unknown number of processes, a Monte Carlo algorithm was developed, which has an optimal running time of O(nlogn) rounds and a probability of success that is at least 1−12Ω(logn). The algorithms solve the naming problem in new models where processes communicate through multiple channels.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hwang, Min-Shiang, Cheng-Chi Lee, and Ji-Zhe Lee. "A New Anonymous Channel Protocol in Wireless Communications." AEU - International Journal of Electronics and Communications 58, no. 3 (January 2004): 218–22. http://dx.doi.org/10.1078/1434-8411-54100232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Banerjee, Debasmit, Mahmoud Taghizadeh, and Subir Biswas. "Anonymous network coexistence with slotted wireless channel access." Computer Communications 55 (January 2015): 80–101. http://dx.doi.org/10.1016/j.comcom.2014.09.010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ciobanu, Gabriel, and Cristian Prisacariu. "Coordination by Timers for Channel-Based Anonymous Communications." Electronic Notes in Theoretical Computer Science 175, no. 2 (June 2007): 3–17. http://dx.doi.org/10.1016/j.entcs.2007.03.002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

HURZHI, S. "The current threatening trends in the use of Telegram channels to the damage of state interests." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 162–69. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249297.

Повний текст джерела
Анотація:
The principles, conditions and features of Telegram messenger operation are revealed. The state interests in the information sphere in the conditions of spreading of social Internet services and Telegram channels are defined. The tendencies of using anonymous messengers, especially pro-Russian Telegram channels, are outlined. Ukraine’s rating of resilience to Russian misinformation has been determined. The possibilities of Telegram channels for manipulating public opinion and spreading misinformation are detailed. Threats of the functioning of anonymous Telegram channels in Ukraine have been identified. The state’s achievements in blocking banned content are highlighted. The directions of the improvement of the level of media literacy and digital awareness of the population are summarized. The necessity of legislative regulation of the Telegram channel activity in Ukraine is substantiated.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Pang, Liaojun, Man Kou, Mengmeng Wei, and Huixian Li. "Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel." IEEE Access 7 (2019): 84091–106. http://dx.doi.org/10.1109/access.2019.2924654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Johansson, Elka, and Peter Carey. "Detecting Fraud: The Role of the Anonymous Reporting Channel." Journal of Business Ethics 139, no. 2 (May 8, 2015): 391–409. http://dx.doi.org/10.1007/s10551-015-2673-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Adil, Muhammad, Mohammed Amin Almaiah, Alhuseen Omar Alsayed, and Omar Almomani. "An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks." Sensors 20, no. 8 (April 18, 2020): 2311. http://dx.doi.org/10.3390/s20082311.

Повний текст джерела
Анотація:
Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper, an edge node scheme is proposed to address the issue of jamming attack in WSNs. Three edge nodes are used in the deployed area of WSN, which have different transmission frequencies in the same bandwidth. The different transmission frequencies and Round Trip Time (RTT) of transmitting signal makes it possible to identify the jamming attack channel in WSNs transmission media. If an attacker jams one of the transmission channels, then the other two edge nodes verify the media serviceability by means of transmitting information from the same deployed WSNs. Furthermore, the RTT of the adjacent channel is also disturbed from its defined interval of time, due to high frequency interference in the adjacent channels, which is the indication of a jamming attack in the network. The simulation result was found to be quite consistent during analysis by jamming the frequency channel of each edge node in a step-wise process. The detection rate of jamming attacks was about 94% for our proposed model, which was far better than existing schemes. Moreover, statistical analyses were undertaken for field-proven schemes, and were found to be quite convincing compared with the existing schemes, with an average of 6% improvement.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Mao, Chang M., and David C. DeAndrea. "How Anonymity and Visibility Affordances Influence Employees’ Decisions About Voicing Workplace Concerns." Management Communication Quarterly 33, no. 2 (November 25, 2018): 160–88. http://dx.doi.org/10.1177/0893318918813202.

Повний текст джерела
Анотація:
Employees can provide invaluable input to organizations when they can freely express their opinions at work. Employees, however, may not believe that it is safe or efficacious to voice their concerns. How features of communication channels affect employees’ safety and efficacy perceptions is largely ignored in existing voice models. Therefore, this study seeks to understand how the anonymity and visibility affordances of a communication channel influence employees’ safety and efficacy perceptions, and, thus, their intention to engage in prohibitive voice at work. Two between-subjects experiments were conducted to test how these channel affordances affect voicing behavior in organizations. The results indicate that the more anonymous and less visible participants perceive a voicing channel to be, the safer and the more efficacious they evaluate the channel. Theoretical and practical implications, limitations, and future research directions are discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

BOUDA, JAN, and JOSEF ŠPROJCAR. "QUANTUM COMMUNICATION BETWEEN ANONYMOUS SENDER AND ANONYMOUS RECEIVER IN THE PRESENCE OF STRONG ADVERSARY." International Journal of Quantum Information 09, no. 02 (March 2011): 651–63. http://dx.doi.org/10.1142/s0219749911007691.

Повний текст джерела
Анотація:
While many scenarios of anonymous communication can be solved by various famous classical techniques including mix nets or dining cryptographers (DC), an abundant amount of anonymous tasks remains open. In this paper, we present a solution to one such task. Our protocol serves as a private communication channel for quantum messages while ensuring that both the sender and the receiver stay anonymous in a set of all parties. Our protocol is a continuation of our previous work on anonymous transmission of quantum information. The protocol does not require trusted parties, and is secure against an active adversary. It can also withstand denial of service attacks. The protocol exhibits an advantage of quantum resources over classical because no classical solution is known (in the same security settings). Entanglement swapping technique is used to create "symmetry" in the protocol, which makes it very transparent and easier to analyze. The security analysis we present is heavily based on our previous work on quantum anonymous communication. The task we implement is also a nice illustration of a cryptographic task where two parties in a multi-party protocol can be dishonest at the same time, but are not cooperating.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Shi, Leyi, Yuxiao Song, Zhiyu Xue, Yihao Liu, and Honglong Chen. "SACT: A New Model of Covert Communication Based on SDN." Sensors 20, no. 24 (December 19, 2020): 7300. http://dx.doi.org/10.3390/s20247300.

Повний текст джерела
Анотація:
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability. Software Defined Network (SDN) boasts more freedom thanks to its separation of the control plane from the data plane. In this paper, a new anonymous communication tracking model SDN-based Anonymous Communication Tracking (SACT) is proposed, which introduces network watermarking into SDN and combines IP time hidden channel and symbol expansion technology. In addition, we introduce a hopping protection mechanism to improve the anti detection ability of the watermark as well. The experimental results show that in a variety of simulated network environments, SACT achieves excellent detection rate and bit error rate, thus it is sufficient to determine the communication relationship between the two parties. Meanwhile, SACT solves the deployment problem of anonymous tracking and improves the availability and scalability of covert communication.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Barbancho, A. M., and A. Peinado. "Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications." Computer Networks 43, no. 6 (December 2003): 777–85. http://dx.doi.org/10.1016/s1389-1286(03)00318-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Yang, Chou-Chen, Yuan-Liang Tang, Ren-Chiun Wang, and Hung-Wen Yang. "A secure and efficient authentication protocol for anonymous channel in wireless communications." Applied Mathematics and Computation 169, no. 2 (October 2005): 1431–39. http://dx.doi.org/10.1016/j.amc.2004.10.073.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Li, Xie, and Ren Yanli. "Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles." International Journal of Digital Crime and Forensics 6, no. 2 (April 2014): 40–51. http://dx.doi.org/10.4018/ijdcf.2014040103.

Повний текст джерела
Анотація:
Broadcast encryption provides a method of secure multi-receiver communications, where a broadcaster can encrypt a message for a set S of users who are listening to a broadcast channel. Most identity-based broadcast encryption (IBBE) schemes are not anonymous, which means the attacker can obtain the identities of all receivers from the ciphertext. In this paper, the authors propose an efficient anonymous IBBE scheme in bilinear groups of prime order, where any attacker cannot get the identities of the receivers from the ciphertext. The scheme has constant size ciphertext and achieves adaptive security based on the asymmetric decisional bilinear Diffie-Hellman Exponent (DBDHE) assumption without random oracles. The proposed scheme improves efficiency and security of anonymous IBBE schemes simultaneously.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Emura, Keita, Akira Kanaoka, Satoshi Ohta, and Takeshi Takahashi. "Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation." Journal of Information Security and Applications 34 (June 2017): 84–91. http://dx.doi.org/10.1016/j.jisa.2016.12.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

ŠPROJCAR, JOSEF. "PROPOSAL OF A SEMIFORMAL MODEL OF ANONYMOUS COMMUNICATION." International Journal of Foundations of Computer Science 20, no. 03 (June 2009): 523–48. http://dx.doi.org/10.1142/s0129054109006711.

Повний текст джерела
Анотація:
We present a semiformal model of anonymous communication with several participants performing several anonymous actions on several messages, e.g. in digital pseudosignatures. The goal is to design a model having enough expressive power to model simple as well as very complex anonymous communication patterns.Our model concentrates on anonymity of a sender, a receiver, and on the relationship anonymity. However, the model is easy to adopt to other types of anonymity. A special anonymous channel formalism is introduced and extensively explored in this paper. The formalism builds on the top of so-called estimation procedure which takes knowledge of the adversary and processes it to find anonymous participants. Some other, already published, models of anonymity, e.g. the model of Hughes and Shmatikov or of Halpern and O'Neill, are compatible with our model – they could be used as building blocks together with (or instead of) our estimation procedure. Therefore, the tools developed for those models can be easily adapted to be used with our model.We use protocol runs and an observational equivalence on the runs which is induced by adversary's knowledge. This is a well developed area of the theoretical computer science and many tools developed therein can be adapted to work with our model. Our model is also open to many additional features, e.g. the possibility to include probability distributions on anonymity sets.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Walters, W. Patrick, and Jürgen Bajorath. "On the evolving open peer review culture for chemical information science." F1000Research 4 (November 25, 2015): 1350. http://dx.doi.org/10.12688/f1000research.7460.1.

Повний текст джерела
Анотація:
Compared to the traditional anonymous peer review process, open post-publication peer review provides additional opportunities -and challenges- for reviewers to judge scientific studies. In this editorial, we comment on the open peer review culture and provide some guidance for reviewers of manuscripts submitted to the Chemical Information Science channel of F1000Research.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Kaigo, Muneo. "Internet Aggregators Constructing the Political Right Wing in Japan." JeDEM - eJournal of eDemocracy and Open Government 5, no. 1 (November 20, 2013): 59–79. http://dx.doi.org/10.29379/jedem.v5i1.184.

Повний текст джерела
Анотація:
The Matome Saito are edited popular topic threads of the Ni-Channel anonymous bulletin board. The information on the Matome Saito is efficiently and concisely edited for those who do not usually access the vast Ni-Channel forum. This paper overviews the state and mechanism of the Ni-Channel forum of Japan, the edited blogs of Ni-Channel called Matome Saito, and aggregation of Matome Saito in relation to online aggregation and politics, with a focus on Japan and the December 2012 election. This paper examines the tone argument of the Matome Saito aggregation by conducting a content analysis of 148 politically related threads from November 16, 2012 to December 20, 2012 spanning the time period following the dissolving of the Japanese government by Prime Minister Noda to five days after the election.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Banerjee, Subhasish, Manash Pratim Dutta, and Chandan Tilak Bhunia. "An enhanced anonymous remote user authentication scheme using smart card in insecure communication channel." International Journal of Communication Networks and Distributed Systems 19, no. 4 (2017): 482. http://dx.doi.org/10.1504/ijcnds.2017.087392.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Banerjee, Subhasish, Manash Pratim Dutta, and Chandan Tilak Bhunia. "An enhanced anonymous remote user authentication scheme using smart card in insecure communication channel." International Journal of Communication Networks and Distributed Systems 19, no. 4 (2017): 482. http://dx.doi.org/10.1504/ijcnds.2017.10007999.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Lee, Cheng-Chi, Tsung-Hung Lin, and Chwei-Shyong Tsai. "Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications." Security and Communication Networks 5, no. 12 (February 29, 2012): 1375–78. http://dx.doi.org/10.1002/sec.430.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Noor, Fazal, Turki A. Kordy, Ahmad B. Alkhodre, Oussama Benrhouma, Adnan Nadeem, and Ali Alzahrani. "Securing Wireless Body Area Network with Efficient Secure Channel Free and Anonymous Certificateless Signcryption." Wireless Communications and Mobile Computing 2021 (October 7, 2021): 1–14. http://dx.doi.org/10.1155/2021/5986469.

Повний текст джерела
Анотація:
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e-health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity. A WBAN, on the other hand, is vulnerable to different cyberattacks due to the openness of the wireless environment and the privacy of people’s physiological data. A highly efficient and secure cryptographic scheme that can fulfill the needs of resource-constrained WBAN sensors and devices is considered necessary. First, we take a look at the most up-to-date security solutions for WBANs. Then, we go through some of the underlying concerns and challenges with WBAN security. We propose a new framework called secure channel free certificateless signcryption scheme for WBANs based on a hyperelliptic curve that can meet security requirements such as confidentiality, anonymity, integrity, resistance against unauthorized users, unforgeability, public verifiability, forward secrecy, and antireplay attack, all of which can be achieved with low computation and communication costs. The computation cost of the proposed scheme is 3.36 ms, which is much better than its counterpart schemes.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Sun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, and Zhengping Jin. "Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/172718.

Повний текст джерела
Анотація:
As a powerful tool in solving privacy preserving cooperative problems, secure multiparty computation is more and more popular in electronic bidding, anonymous voting, and online auction. Privacy preserving sequencing problem which is an essential link is regarded as the core issue in these applications. However, due to the difficulties of solving multiparty privacy preserving sequencing problem, related secure protocol is extremely rare. In order to break this deadlock, this paper first presents an efficient secure multiparty computation protocol for the general privacy-preserving sequencing problem based on symmetric homomorphic encryption. The result is of value not only in theory, but also in practice.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Mo, Jiaqing, Wei Shen, and Weisheng Pan. "An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems." Wireless Communications and Mobile Computing 2020 (April 23, 2020): 1–13. http://dx.doi.org/10.1155/2020/5686498.

Повний текст джерела
Анотація:
Wearable health monitoring system (WHMS), which helps medical professionals to collect patients’ healthcare data and provides diagnosis via mobile devices, has become increasingly popular thanks to the significant advances in the wireless sensor network. Because health data are privacy-related, they should be protected from illegal access when transmitted over a public wireless channel. Recently, Jiang et al. presented a two-factor authentication protocol on quadratic residues with fuzzy verifier for WHMS. However, we observe that their scheme is vulnerable to known session special temporary information (KSSTI) attack, privileged insider attack, and denial-of-service (DoS) attack. To defeat these weaknesses, we propose an improved two-factor authentication and key agreement scheme for WHMS. Through rigorous formal proofs under the random oracle model and comprehensive informal security analysis, we demonstrate that the improved scheme overcomes the disadvantages of Jiang et al.’s protocol and withstands possible known attacks. In addition, comparisons with several relevant protocols show that the proposed scheme achieves more security features and has suitable efficiency. Thus, our scheme is a reasonable authentication solution for WHMS.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Bumann, Dirk, and Jens Krause. "Front Individuals Lead in Shoals of Three-Spined Sticklebacks (Gasterosteus Aculeatus) and Juvenile Roach (Rutilus Rutilus)." Behaviour 125, no. 3-4 (1993): 189–98. http://dx.doi.org/10.1163/156853993x00236.

Повний текст джерела
Анотація:
AbstractFish shoals are usually seen as anonymous leaderless groups in which all individuals have the same influence on swimming velocity and direction. This hypothesis was tested by investigating swimming directions of shoals of roach (Rutilus rutilus) and three-spined stickleback (Gasterosteus aculeatus). In roach, the influence of front and rear fish on the shoal's swimming direction was compared by analysing video recordings. Front fish initiated new directions significantly more often and were followed by rear fish. In a second experiment two shoals of sticklebacks were released from two channels which were positioned at an angle relative to each other. The shoals usually appeared with a short time difference at the opening of the channels and then merged. Initially the two shoals faced in different directions based on the orientation of their respective channel and it was recorded which direction prevailed after the shoals had merged. The shoal that left the channel first, and therefore formed the front part of the merged shoal, clearly dominated the direction. Thus, both experiments gave evidence for front fish having a dominant influence on the direction of the shoal. In the context of sustained position preferences of individual fish, recently observed in roach, this suggests that fish shoals may have leaders over extended time periods.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Huang, Jin, Bo Xu, and Kun Qiu. "Modeling and Simulation of FC-AE-ASM Network." Advanced Materials Research 748 (August 2013): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amr.748.941.

Повний текст джерела
Анотація:
Fibre Channel (FC) as a Universal Avionics Network (UAN) candidate solution for the advanced integrated avionics systems can enable high-bandwidth, low-latency, high-reliability and hard real-time communication on aircraft platforms spanning military and commercial applications. Fibre Channel Avionics Environment-Anonymous Subscriber Messaging protocol (FC-AE-ASM) is one of the five high level protocols in fiber channel avionic environment which is used to transport command, control, signal processing and sensor / video data of the aircraft[1,2].The objective of this paper is to conduct a modeling and simulation on the performance of the FC–AE-ASM network. Through modeling the message transmission of the FC-AE-ASM with accompanying Eclipse, some network performance parameters such as bandwidth, throughput and end-to-end message delay can be gained and analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Zhang, Jian, Kurt Pany, and Philip M. J. Reckers. "Under Which Conditions are Whistleblowing “Best Practices” Best?" AUDITING: A Journal of Practice & Theory 32, no. 3 (March 1, 2013): 171–81. http://dx.doi.org/10.2308/ajpt-50451.

Повний текст джерела
Анотація:
SUMMARY: Public companies are required by the Sarbanes-Oxley Act of 2002 to establish an anonymous reporting (whistleblowing) channel for employee reporting of questionable accounting practices. Corporate audit committees are provided flexibility in implementing this requirement and a controversial choice is the type of reporting channel. Most commentators argue that “best practices” call for an externally administered “hotline.” To examine the efficacy of externally administered versus internally administered channels we conducted a behavioral experiment. Our results reveal a significant main effect with reporting intentions being greater if the hotline is administered externally. We then examine whether this finding is robust across selected environmental and employee-specific conditions and find that it is not. Our results suggest that the primary reporting benefits of an externally administered hotline are for organizations with a history of poor responsiveness to whistleblowing and for employees registering relatively low on the proactivity scale. Specifically, we find that an externally administered hotline obtains higher reporting intentions under conditions wherein a previous incidence of whistleblowing notably failed to achieve a good outcome. Also, this effect is only statistically significant for participants registering as relatively low on a “proactivity” scale.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Zuckerman, Inon, Dor Mizrahi, and Ilan Laufer. "EEG Pattern Classification of Picking and Coordination Using Anonymous Random Walks." Algorithms 15, no. 4 (March 26, 2022): 114. http://dx.doi.org/10.3390/a15040114.

Повний текст джерела
Анотація:
Tacit coordination games are games where players are trying to select the same solution without any communication between them. Various theories have attempted to predict behavior in tacit coordination games. Until now, research combining tacit coordination games with electrophysiological measures was mainly based on spectral analysis. In contrast, EEG coherence enables the examination of functional and morphological connections between brain regions. Hence, we aimed to differentiate between different cognitive conditions using coherence patterns. Specifically, we have designed a method that predicts the class label of coherence graph patterns extracted out of multi-channel EEG epochs taken from three conditions: a no-task condition and two cognitive tasks, picking and coordination. The classification process was based on a coherence graph extracted out of the EEG record. To assign each graph into its appropriate label, we have constructed a hierarchical classifier. First, we have distinguished between the resting-state condition and the other two cognitive tasks by using a bag of node degrees. Next, to distinguish between the two cognitive tasks, we have implemented an anonymous random walk. Our classification model achieved a total accuracy value of 96.55%.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Croes, Emmelyn A. J., Marjolijn L. Antheunis, Alexander P. Schouten, Emiel J. Krahmer, and Daniëlle N. M. Bleize. "The effect of interaction topic and social ties on media choice and the role of four underlying mechanisms." Communications 43, no. 1 (March 26, 2018): 47–73. http://dx.doi.org/10.1515/commun-2017-0046.

Повний текст джерела
Анотація:
Abstract This study employed a scenario-based approach whereby participants were asked to choose which communication channel they prefer in certain situations. The first aim was to determine the effect of the topic of interactions and social ties on channel choice. The second aim was to examine the underlying mechanisms (controllability, anonymity, co-presence, and affective understanding) in the relation between interaction topic and social ties and channel choice. A questionnaire was administered among 238 participants, who were presented five communication scenarios with topics of low and high intimacy and four social ties, ranging from weak to strong. Results revealed that preference for face-to-face (FtF) communication was highest, followed by audio-only computer-mediated communication (CMC) and text-based CMC. Preference for FtF communication was higher when people valued feeling co-present and decreased when people valued feeling anonymous. Our results showed that communication channel choice is strategic and the choice for FtF ommunication, audio-only and text-based CMC largely depends on controllability, anonymity and co-presence.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Chang, Ya-Fen, Wei-Liang Tai, Po-Lin Hou, and Kuan-Yu Lai. "A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments." Symmetry 13, no. 7 (June 23, 2021): 1121. http://dx.doi.org/10.3390/sym13071121.

Повний текст джерела
Анотація:
Internet of Things (IoT) is composed of various kinds of devices such as cars, electrical appliances, machines and sensors. With IoT technologies, devices can exchange information through the network, people are allowed to get information collected by devices without interacting with them, and automatic operations for devices are realized. Because of the variety of IoT devices, some of them possess limited computational capability. On the other hand, data transmission in IoT networks is usually through a public channel. To ensure efficiency and security for IoT environments, Lee et al. proposed a three-factor authentication scheme with hash function and XOR operation. They claimed their scheme possessed superior properties and could resist common attacks. After analyzing their scheme, we find that their scheme is vulnerable to five flaws. In this paper, how these found flaws threaten Lee et al.’s scheme is shown in detail. Then, we propose an improvement to overcome the found flaws and preserve the advantages by employing ECC.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Zhang, Junsong, Qikun Zhang, Zhigang Li, Xianling Lu, and Yong Gan. "A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks." Security and Communication Networks 2021 (July 22, 2021): 1–11. http://dx.doi.org/10.1155/2021/4939589.

Повний текст джерела
Анотація:
The recent development of wireless body area network (WBAN) technology plays a significant role in the modern healthcare system for patient health monitoring. However, owing to the open nature of the wireless channel and the sensitivity of the transmitted messages, the data security and privacy threats in WBAN have been widely discussed and must be solved. In recent years, many authentication protocols had been proposed to provide security and privacy protection in WBANs. However, many of these schemes are not computationally efficient in the authentication process. Inspired by these studies, a lightweight and secure anonymous authentication protocol is presented to provide data security and privacy for WBANs. The proposed scheme adopts a random value and hash function to provide user anonymity. Besides, the proposed protocol can provide user authentication without a trusted third party, which makes the proposed scheme have no computational bottleneck in terms of architecture. Finally, the security and performance analyses demonstrate that the proposed scheme can meet security requirements with low computational and communication costs.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Ullah, Insaf, Muhammad Asghar Khan, Mohammed H. Alsharif, and Rosdiadee Nordin. "An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles." Sustainability 13, no. 19 (September 30, 2021): 10891. http://dx.doi.org/10.3390/su131910891.

Повний текст джерела
Анотація:
Internet of Vehicles (IoV) is a specialized breed of Vehicular Ad-hoc Networks (VANETs) in which each entity of the system can be connected to the internet. In the provision of potentially vital services, IoV transmits a large amount of confidential data through networks, posing various security and privacy concerns. Moreover, the possibility of cyber-attacks is comparatively higher when data transmission takes place more frequently through various nodes of IoV systems. It is a serious concern for vehicle users, which can sometimes lead to life-threatening situations. The primary security issue in the provision of secure communication services for vehicles is to ensure the credibility of the transmitted message on an open wireless channel. Then, receiver anonymity is another important issue, i.e., only the sender knows the identities of the receivers. To guarantee these security requirements, in this research work, we propose an anonymous certificateless signcryption scheme for IoV on the basis of the Hyperelliptic Curve (HEC). The proposed scheme guarantees formal security analysis under the Random Oracle Model (ROM) for confidentiality, unforgeability, and receiver anonymity. The findings show that the proposed scheme promises better security and reduces the costs of computation and communication.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Robertson, Jesse C., Chad M. Stefaniak, and Mary B. Curtis. "Does Wrongdoer Reputation Matter? Impact of Auditor-Wrongdoer Performance and Likeability Reputations on Fellow Auditors' Intention to Take Action and Choice of Reporting Outlet." Behavioral Research in Accounting 23, no. 2 (November 1, 2011): 207–34. http://dx.doi.org/10.2308/bria-50022.

Повний текст джерела
Анотація:
ABSTRACT We investigate the effects of auditor-wrongdoer reputations for performance and likeability on fellow auditors' intentions to take action in response to a questionable audit act. We also use this context to explore auditor selection of reporting outlets, when they do choose to take action. In an experiment with 181 auditors, main effects suggest that likeability reputation is a significant determinant of intention to take action, while performance reputation is marginally significant. As expected, interaction results indicate that auditors have the greatest intention to take action against less likeable, poor performers. Contrary to expectations, intention to take action against a more likeable, good performer is no lower than the mixed conditions. Thus, the influence of the two dimensions of reputation is complex. Additionally, we find auditors are more likely to whistle-blow internally than externally, and through non-anonymous outlets than anonymous outlets. Our contributions include exploring the impact of reputation on the actions of third parties, and advancing prior literature by considering the influence of wrongdoer attributes on reporting decisions and auditors' reporting channel preferences. Data Availability: Data are available from the first author upon request.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Noether, Shen, Adam Mackenzie, and The Monero Research Lab. "Ring Confidential Transactions." Ledger 1 (December 21, 2016): 1–18. http://dx.doi.org/10.5195/ledger.2016.34.

Повний текст джерела
Анотація:
This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central party or trusted setup. The original Monero protocol was based on CryptoNote, which uses ring signatures and one-time keys to hide the destination and origin of transactions. Recently the technique of using a commitment scheme to hide the amount of a transaction has been discussed and implemented by Bitcoin Core developer Gregory Maxwell. In this article, a new type of ring signature, A Multilayered Linkable Spontaneous Anonymous Group signature is described which allows one to include a Pedersen Commitment in a ring signature. This construction results in a digital currency with hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation. The author would like to note that early drafts of this were publicized in the Monero Community and on the #bitcoin-wizards IRC channel. Blockchain hashed drafts are available showing that this work was started in Summer 2015, and completed in early October 2015. An eprint is also available at http://eprint.iacr.org/2015/1098.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Guo, Junyan, and Ye Du. "A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network." Security and Communication Networks 2020 (August 25, 2020): 1–12. http://dx.doi.org/10.1155/2020/5167832.

Повний текст джерела
Анотація:
Currently, space information network (SIN) has become an increasingly important role in real life. As a large heterogeneous wireless network, SIN can better provide global mobile services to users anytime and anywhere, even in extreme geographic environments. In addition, there is no need to build the communication base-stations every few kilometers on the ground to ensure high service quality, which greatly reduces the construction costs and can be used as an economical communication method in sparsely populated areas. So there is a trend that more and more end users are more likely to get SIN services than traditional terrestrial cellular networks. However, due to the openness and publicity of the satellite wireless channel and the limited resources of the satellite nodes, the privacy and security cannot be perfectly guaranteed and may even be vulnerable to attacks initiated by the adversary such as replay attacks, impersonation attacks, and eavesdropping attacks. To improve the access security of SIN, researchers have proposed a series of authentication protocols based on different cryptographic assumptions. Nevertheless, existing research shows that these protocols cannot meet the requirements of higher and higher security and short authentication delay. In addition, these protocols are mainly based on public key cryptography mechanisms such as DLP and ECDLP, which can be solved by postquantum computers in polynomial time, so these protocols will no longer be secure. To solve the vulnerability of these protocols, in this paper, we propose a new RLWE-based anonymous mutual authentication and key agreement protocol, which guarantees higher security with low computational overhead even in the postquantum era. Detailed security analysis shows that our protocol meets security requirements and is resistant to a variety of known attacks. Besides, combining security comparison and performance analysis, our proposed protocol is more practical than other protocols in SIN.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Fisenko, P. V., and Yu P. Potekhina. "Changes in the characteristics of perception channels in the process of mastering the discipline «Osteopathy»." Russian Osteopathic Journal, no. 3 (October 5, 2021): 19–30. http://dx.doi.org/10.32885/2220-0975-2021-3-19-30.

Повний текст джерела
Анотація:
Introduction. Perception is a holistic reflection of objects and phenomena. A person has all the channels of perception — auditory, visual, kinesthetic. Only the expression degree of each channel in the overall structure of perception is different. Psychologists studied the specific weight of perception channels in its overall structure in a single-stage «slice». There is no reliable data on changes in perception in one group of subjects over a long period of time. Osteopathic researches have examined the development of touch during learning process. At the same time, there have not been studied the dynamics of perception as a whole system.The goal of the study is to research the changes of the perception channels among students of the cycle of professional retraining in the specialty «Osteopathy» in the process of 4-year education and to compare it with the perception channels characteristics of teachers of the cycle.Materials and methods. From 2018 to 2021 a cohort, prospective study was conducted. The study involved persons enrolled in a long (3,5 years) cycle of professional retraining in the specialty «Osteopathy» from I to IV courses — 63 people (35 men, 28 women, age from 26 to 52 years, median 36,5 years), and also teachers of osteopathy with at least 5 years of work experience — 20 people (14 men, 6 women, age from 31 to 55 years, median 48 years). An annual survey was conducted based on the questionnaire of S. A. Efremtseva «Diagnostics of the dominant perceptual modality», which consists of 48 questions aimed at identifying the predominant (dominant) channels of perception in three directions: auditory, visual or kinesthetic. The maximum score for each of the three modality channels is 16, the minimum is 0. The survey was anonymous. In the questionnaire, the participants provided only data on their gender, age, study group number, and the date of the study.Results. The general structure of the students′ perception underwent changes during their learning. The specific weight of the kinesthetic channel in the general structure of listeners′ perception grew annually and doubled in the IV year in comparison with the beginning of training. At the same time, the specific weight of other channels of perception decreased steadily. The expression of all channels of listeners′ perception in absolute numbers also increased (p<0,005). The kinesthetic channel showed the most stable positive dynamics. Its expression began to grow already in the second year of the learning (p<0,001), while the expression of the auditory and visual channels had a statistically significant difference only when comparing 3rd and 4th years of the learning (p<0,005). The perception channels among the teachers of osteopathy were characterized by high absolute indices with similar values for individual channels. In half of the subjects, the kinesthetic channel prevailed in the structure of perception, and in the second half the polymodal channel prevailed with a high rate of kinesthetics. The expression of all perception channels of the osteopathic school students during the learning process gradually approached to that of the osteopathy teachers. At the 4th year of the learning, students did not statistically significantly differ from teachers by the absolute values of perception channels indicators.Conclusion. The students of the osteopathic school showed a regular increase in the expression of all perception channels during their learning (p<0,005). The expression of the kinesthetic channel grew most rapidly. The largest increasing across all channels occurred in the 4th year of the learning. During the first three years of the learning, the listeners, in terms of the perception channels expression, gradually approached the teachers who had high indicators by all channels. At the 4th year, the students did not differ statistically significantly from the teachers. Therefore, the primary training in osteopathy should last at least 3,5–4 years for the high perception index formation of perception of an osteopathic physician.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Fisenko, P. V., and Yu P. Potekhina. "Changes in the characteristics of perception channels in the process of mastering the discipline «Osteopathy»." Russian Osteopathic Journal, no. 3 (October 5, 2021): 19–30. http://dx.doi.org/10.32885/2220-0975-2021-3-19-30.

Повний текст джерела
Анотація:
Introduction. Perception is a holistic reflection of objects and phenomena. A person has all the channels of perception — auditory, visual, kinesthetic. Only the expression degree of each channel in the overall structure of perception is different. Psychologists studied the specific weight of perception channels in its overall structure in a single-stage «slice». There is no reliable data on changes in perception in one group of subjects over a long period of time. Osteopathic researches have examined the development of touch during learning process. At the same time, there have not been studied the dynamics of perception as a whole system.The goal of the study is to research the changes of the perception channels among students of the cycle of professional retraining in the specialty «Osteopathy» in the process of 4-year education and to compare it with the perception channels characteristics of teachers of the cycle.Materials and methods. From 2018 to 2021 a cohort, prospective study was conducted. The study involved persons enrolled in a long (3,5 years) cycle of professional retraining in the specialty «Osteopathy» from I to IV courses — 63 people (35 men, 28 women, age from 26 to 52 years, median 36,5 years), and also teachers of osteopathy with at least 5 years of work experience — 20 people (14 men, 6 women, age from 31 to 55 years, median 48 years). An annual survey was conducted based on the questionnaire of S. A. Efremtseva «Diagnostics of the dominant perceptual modality», which consists of 48 questions aimed at identifying the predominant (dominant) channels of perception in three directions: auditory, visual or kinesthetic. The maximum score for each of the three modality channels is 16, the minimum is 0. The survey was anonymous. In the questionnaire, the participants provided only data on their gender, age, study group number, and the date of the study.Results. The general structure of the students′ perception underwent changes during their learning. The specific weight of the kinesthetic channel in the general structure of listeners′ perception grew annually and doubled in the IV year in comparison with the beginning of training. At the same time, the specific weight of other channels of perception decreased steadily. The expression of all channels of listeners′ perception in absolute numbers also increased (p<0,005). The kinesthetic channel showed the most stable positive dynamics. Its expression began to grow already in the second year of the learning (p<0,001), while the expression of the auditory and visual channels had a statistically significant difference only when comparing 3rd and 4th years of the learning (p<0,005). The perception channels among the teachers of osteopathy were characterized by high absolute indices with similar values for individual channels. In half of the subjects, the kinesthetic channel prevailed in the structure of perception, and in the second half the polymodal channel prevailed with a high rate of kinesthetics. The expression of all perception channels of the osteopathic school students during the learning process gradually approached to that of the osteopathy teachers. At the 4th year of the learning, students did not statistically significantly differ from teachers by the absolute values of perception channels indicators.Conclusion. The students of the osteopathic school showed a regular increase in the expression of all perception channels during their learning (p<0,005). The expression of the kinesthetic channel grew most rapidly. The largest increasing across all channels occurred in the 4th year of the learning. During the first three years of the learning, the listeners, in terms of the perception channels expression, gradually approached the teachers who had high indicators by all channels. At the 4th year, the students did not differ statistically significantly from the teachers. Therefore, the primary training in osteopathy should last at least 3,5–4 years for the high perception index formation of perception of an osteopathic physician.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Lee, Misuk. "Will this search end up with booking? Modeling airline booking conversion of anonymous visitors." Journal of Tourism Analysis: Revista de Análisis Turístico 27, no. 2 (July 3, 2020): 237–50. http://dx.doi.org/10.1108/jta-11-2019-0038.

Повний текст джерела
Анотація:
Purpose Over the past two decades, online booking has become a predominant distribution channel of tourism products. As online sales have become more important, understanding booking conversion behavior remains a critical topic in the tourism industry. The purpose of this study is to model airline search and booking activities of anonymous visitors. Design/methodology/approach This study proposes a stochastic approach to explicitly model dynamics of airline customers’ search, revisit and booking activities. A Markov chain model simultaneously captures transition probabilities and the timing of search, revisit and booking decisions. The suggested model is demonstrated on clickstream data from an airline booking website. Findings Empirical results show that low prices (captured as discount rates) lead to not only booking propensities but also overall stickiness to a website, increasing search and revisit probabilities. From the decision timing of search and revisit activities, the author observes customers’ learning effect on browsing time and heterogeneous intentions of website visits. Originality/value This study presents both theoretical and managerial implications of online search and booking behavior for airline and tourism marketing. The dynamic Markov chain model provides a systematic framework to predict online search, revisit and booking conversion and the time of the online activities.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Orús, Carlos, Raquel Gurrea, and Sergio Ibáñez-Sánchez. "The impact of consumers’ positive online recommendations on the omnichannel webrooming experience." Spanish Journal of Marketing - ESIC 23, no. 3 (December 2, 2019): 397–414. http://dx.doi.org/10.1108/sjme-08-2019-0067.

Повний текст джерела
Анотація:
Purpose This purpose of this paper is to analyze how consumers’ online recommendations affect the omnichannel webrooming experience based on the internet, physical and mobile channels. Design/methodology/approach Two experimental studies are implemented. Study 1 analyzes the impact of an online review on the physical interaction with the product. Study 2 modifies the moment of receiving the online recommendation and its social tie. Findings Webrooming improves the shopping experience. Online recommendations from anonymous customers increase confidence in the product’s adequacy, although this effect depends on the moment of receiving the recommendation and the level of confidence before interacting physically with the product. Friend recommendations reinforce preferences regardless of previous online experiences. Research limitations/implications This research examines the effects of different types of online recommendations on offline shopping experiences, choice and confidence. Confidence is stressed as a key variable in omnichannel behavior. Practical implications The findings offer practical value for electronic word-of-mouth marketing, omnichannel marketing, as well as online and physical channel management. Originality/value This is one of the first studies that examine the impact of online consumer recommendations on shopping experiences combining online, mobile and physical channels. The results reveal the importance of recommendations’ source and moment of reception for determining consumers’ preferences, choice and confidence.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Kaplan, Steven E., and Joseph J. Schultz. "Intentions to Report Questionable Acts: An Examination of the Influence of Anonymous Reporting Channel, Internal Audit Quality, and Setting." Journal of Business Ethics 71, no. 2 (January 25, 2007): 109–24. http://dx.doi.org/10.1007/s10551-006-0021-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Sattar, Zina. "A Practical E-Test System." International Journal of Emerging Technologies in Learning (iJET) 14, no. 21 (November 18, 2019): 110. http://dx.doi.org/10.3991/ijet.v14i21.10866.

Повний текст джерела
Анотація:
this article presents an encryption system which has many characteristics, like anonymity, originality, correctness, confidentiality, durability and confirmation as well as no need to any trusted authority. Besides that the submitted system gives an evidence of the successful submission by using anonymity property. Additional to use the anonymous return channel, also use the timed-based solution. The proposed system has been implemented and its results were measured. The preliminary findings in this paper seem very promising. Also, the results show that the system is applicable and will yield good results if applied to new generations of mobile phones. Furthermore, the results show that the method is more efficient and faster than the system already in place.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Mo, Jiaqing, Zhongwang Hu, Hang Chen, and Wei Shen. "An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing." Wireless Communications and Mobile Computing 2019 (February 4, 2019): 1–12. http://dx.doi.org/10.1155/2019/4520685.

Повний текст джерела
Анотація:
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Gallegati, Silvia, Luca Aquilanti, Valerio Temperini, Gloria Polinesi, and Giorgio Rappelli. "The Impact of Coronavirus Information-Seeking Behavior on Dental Care Access: A Cross-Sectional Questionnaire-Based Study." International Journal of Environmental Research and Public Health 18, no. 22 (November 17, 2021): 12050. http://dx.doi.org/10.3390/ijerph182212050.

Повний текст джерела
Анотація:
Health information-seeking behavior provides a variety of benefits, such as reducing knowledge gaps and educating individuals outside the medical office. This study aimed at evaluating if different sources used to gather information on COVID-19 could affect the willingness to undergo dental appointments. An anonymous survey was posted on social media. The 1003 respondents used several channels of communication, clearly distinguishing reliable from unreliable ones. Multiple logistic regression estimated the effect of different information channels on the probability of being strongly influenced by COVID-19 in accessing upcoming dental appointments. Newspapers were the most-used channel of information (61.2%), blogs and forums the least used (11.2%). Overall, the more an individual was informed, the higher was the risk of missing upcoming dental care appointments (OR 2.05, CI 1.45–2.90, p < 0.001). The two most reliable channels of communication were identified in journals/websites of medicine and healthcare professionals. Women proved to be more active in gathering information and relying on less secure but more personal channels, such as social media and friends and family, thus having an increased risk of being influenced by COVID-19 information regarding upcoming dental care appointments (OR 3.62, CI 0.85–15.52, p < 0.1 and OR 1.60, CI 1.00–2.58, p < 0.1, respectively). Social media should have a greater presence on the side of medical service providers to avoid distortions of information and fake news that ultimately cause fear among citizens and compromise their health. Healthcare professionals and institutions should adapt their communication channels based on the audience they want to address to optimize the education and information of the final users.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Ma, Xue Chao, and Yan Bo Liu. "Research and Application of Information Hiding Algorithm." Applied Mechanics and Materials 672-674 (October 2014): 2009–12. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.2009.

Повний текст джерела
Анотація:
Along with the development of the computer technology and the Internet, information hiding is given increasing attention. All kinds of the important information, such as government information, business information, personal privacy etc, should be transmitted safely. In the future, information hiding will play a very important role in the network to protect the information from damage. The content of this thesis is presented as follows: The analysis of the basic theory and concept of information hiding; The analysis and application of the space domain algorithms, transform (frequency) domain algorithm, etc focusing on the technology of digital watermarking, covert channel and anonymous communications. The theory of wavelet analysis and the experimental models are discussed deeply, basing on which the research and application of the wavelet is explored in the field of information hiding.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії