Sample records for e-commerce security issues

  1. E-Commerce and Security Governance in Developing Countries

    NASA Astrophysics Data System (ADS)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  2. Perceived Security Determinants in E-Commerce among Turkish University Students

    ERIC Educational Resources Information Center

    Yenisey, M.M.; Ozok, A.A.; Salvendy, G.

    2005-01-01

    Perceived security is defined as the level of security that users feel while they are shopping on e-commerce sites. The aims of this study were to determine items that positively influence this feeling of security by users during shopping, and to develop guidelines for perceived security in e-commerce. An experiment allowed users with different…

  3. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    ERIC Educational Resources Information Center

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  4. Retail E-Commerce Security Status among Fortune 500 Corporations

    ERIC Educational Resources Information Center

    Zhao, Jensen J.; Zhao, Sherry Y.

    2012-01-01

    The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…

  5. A Low-Cost and Secure Solution for e-Commerce

    NASA Astrophysics Data System (ADS)

    Pasquet, Marc; Vacquez, Delphine; Rosenberger, Christophe

    We present in this paper a new architecture for remote banking and e-commerce applications. The proposed solution is designed to be low cost and provides some good guarantees of security for a client and his bank issuer. Indeed, the main problem for an issuer is to identify and authenticate one client (a cardholder) using his personal computer through the web when this client wants to access to remote banking services or when he wants to pay on a e-commerce site equipped with 3D-secure payment solution. The proposed solution described in this paper is MasterCard Chip Authentication Program compliant and was experimented in the project called SOPAS. The main contribution of this system consists in the use of a smartcard with a I2C bus that pilots a terminal only equipped with a screen and a keyboard. During the use of services, the user types his PIN code on the keyboard and all the security part of the transaction is performed by the chip of the smartcard. None information of security stays on the personal computer and a dynamic token created by the card is sent to the bank and verified by the front end. We present first the defined methodology and we analyze the main security aspects of the proposed solution.

  6. Agents Based e-Commerce and Securing Exchanged Information

    NASA Astrophysics Data System (ADS)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  7. The Effect of Knowledge of Online Security Risks on Consumer Decision Making in B2C e-Commerce

    ERIC Educational Resources Information Center

    Wang, Ping An

    2010-01-01

    This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…

  8. Research on mobile electronic commerce security technology based on WPKI

    NASA Astrophysics Data System (ADS)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  9. E-commerce Review System to Detect False Reviews.

    PubMed

    Kolhar, Manjur

    2017-08-15

    E-commerce sites have been doing profitable business since their induction in high-speed and secured networks. Moreover, they continue to influence consumers through various methods. One of the most effective methods is the e-commerce review rating system, in which consumers provide review ratings for the products used. However, almost all e-commerce review rating systems are unable to provide cumulative review ratings. Furthermore, review ratings are influenced by positive and negative malicious feedback ratings, collectively called false reviews. In this paper, we proposed an e-commerce review system framework developed using the cumulative sum method to detect and remove malicious review ratings.

  10. Marketing Mix for E-Commerce

    ERIC Educational Resources Information Center

    Pogorelova, Elena V.; Yakhneeva, Irina V.; Agafonova, Anna N.; Prokubovskaya, Alla O.

    2016-01-01

    The relevance of the analyzed issue is caused by the need to study the process of transformation of marketing in e-commerce, as the active involvement of business organizations in the field of e-business is often accompanied by problems of applying the usual marketing tools in a virtual environment. The article seeks to identify changes in the…

  11. The Effect of Non-technical Factors in B2C E-Commerce

    NASA Astrophysics Data System (ADS)

    Sanayei, Ali; Shafe'Ei, Reza

    As e-commerce grows across industries worldwide , business are building web sites for presence as well as for online business. It is more than transferring current business operations to a new medium. This situation requires explaining main models, changing infrastructures, and notice to customer needs as their vital rights. Whilst increasing numbers of firms have launched themselves on the Internet, they are trying to consideration of the strategic implications of developing, implementing or running a Web site. Global competition, laws, and customer preferences are among the issues being affected by e-commerce. In this study many factors that effect on e-commerce are considered these factors have no technical issue in nature. Companies related factors, customers' knowledge, customers' trust and customers' behavior are the main effective factors in development of B2C e-commerce. In this research we surveyed the mentioned aspects by offering questionnaire to experts of e-commerce for companies. The results show there is a meaningful relationship between perception, knowledge, trust and attitude of customers and the company's capabilities in the other side with B2C e-commerce development.

  12. 77 FR 29747 - Orbit E-Commerce, Inc., Orion Ethanol, Inc., Pacificnet, Inc., PainCare Holdings, Inc., Pay88...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Orbit E-Commerce, Inc., Orion Ethanol, Inc., Pacificnet, Inc., PainCare Holdings, Inc., Pay88, Inc., Rahaxi, Inc., and Raven Biofuels International Corp... there is a lack of current and accurate information concerning the securities of Orbit E-Commerce, Inc...

  13. Teaching e-Commerce Personalization Technology: The Need for a Comprehensive View

    ERIC Educational Resources Information Center

    Sicilia, Miguel-Angel

    2005-01-01

    Personalization technology has become an important topic in e-commerce, fostered by the emergence of the relationship-marketing paradigm. But teaching e-commerce personalization technology is a challenging task, since it requires a balance between marketing and management and technical implementation issues that must be calibrated according to the…

  14. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  15. The Development Model Electronic Commerce of Regional Agriculture

    NASA Astrophysics Data System (ADS)

    Kang, Jun; Cai, Lecai; Li, Hongchan

    With the developing of the agricultural information, it is inevitable trend of the development of agricultural electronic commercial affairs. On the basis of existing study on the development application model of e-commerce, combined with the character of the agricultural information, compared with the developing model from the theory and reality, a new development model electronic commerce of regional agriculture base on the government is put up, and such key issues as problems of the security applications, payment mode, sharing mechanisms, and legal protection are analyzed, etc. The among coordination mechanism of the region is discussed on, it is significance for regulating the development of agricultural e-commerce and promoting the regional economical development.

  16. An eCommerce Development Case: Your Company's eCommerce Web Site

    ERIC Educational Resources Information Center

    Ballenger, Robert M.

    2007-01-01

    This case provides a real-world semester long project-oriented case study for students enrolled in an electronic commerce course that has a significant development component. The case provides the technical framework in the form of functional requirements for students to design and build a fully functional transaction processing e-commerce Web…

  17. A Vulnerability Assessment of the U.S. Small Business B2C E-Commerce Network Systems

    ERIC Educational Resources Information Center

    Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A.

    2011-01-01

    Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…

  18. Information Security Trends and Issues in the Moodle E-Learning Platform: An Ethnographic Content Analysis

    ERIC Educational Resources Information Center

    Schultz, Christopher

    2012-01-01

    Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…

  19. E-Commerce Marketing State Competency Profile.

    ERIC Educational Resources Information Center

    Ohio State Univ., Columbus. Tech Prep Curriculum Services.

    This profile provides the curricular framework for Ohio Tech Prep programs in e-commerce marketing beginning in high school and continuing through the end of the associate degree. It includes a comprehensive set of e-commerce marketing competencies that reflect job opportunities and skills required for e-commerce marketing professionals today and…

  20. 15 CFR 19.19 - Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt? 19.19 Section 19.19 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.19...

  1. 15 CFR 19.19 - Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt? 19.19 Section 19.19 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.19...

  2. 15 CFR 19.19 - Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt? 19.19 Section 19.19 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.19...

  3. 15 CFR 19.19 - Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt? 19.19 Section 19.19 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.19...

  4. 15 CFR 19.19 - Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Will Commerce entities issue a refund if money is erroneously collected on a Commerce debt? 19.19 Section 19.19 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.19...

  5. Security Implications of Electronic Commerce: A Survey of Consumers and Businesses.

    ERIC Educational Resources Information Center

    Furnell, S. M.; Karweni, T.

    1999-01-01

    Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…

  6. 76 FR 81793 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... Commerce Control List), Category 9 Aerospace and Propulsion, Product Group E is amended by revising the...'' ``technology'' for repair, rebuild and overhaul. Excluded from 9E001 to 9E003 control are: technical data...

  7. Determinants of trust in B2C e-commerce and their relationship with consumer online trust

    NASA Astrophysics Data System (ADS)

    Bojang, Ismaila; Medvedev, Maxim A.; Spasov, Kamen B.; Matvevnina, Arina I.

    2017-12-01

    The aim of this research was to investigate specific determinants or factors that influence consumer online trust in the B2C e-commerce with a focus on consumers. Constructs such as perceived security, perceived privacy, perceived third party assurance, perceived reputation, perceived familiarity and perceived website quality and their relationship with online trust in the B2C context were studied. In conducting the research, a convenience sampling technique was adopted in carrying out the survey. Questionnaires were distributed to the target respondents and the data were analyzed using SPSS version 24. A Pearson's correlation was used to test the six hypotheses identified in this study. The results provided evidence that perceived security has the greatest influence on online trust. This was followed closely by perceived reputation and finally perceived privacy. This clearly shows that e-commerce consumer population considers these factors very imperative in engendering their trust in the virtual B2C e-commerce environment.

  8. Research on JD e-commerce's delivery model

    NASA Astrophysics Data System (ADS)

    Fan, Zhiguo; Ma, Mengkun; Feng, Chaoying

    2017-03-01

    E-commerce enterprises represented by JD have made a great contribution to the economic growth and economic development of our country. Delivery, as an important part of logistics, has self-evident importance. By establishing efficient and perfect self-built logistics systems and building good cooperation models with third-party logistics enterprises, e-commerce enterprises have created their own logistics advantages. Characterized by multi-batch and small-batch, e-commerce is much more complicated than traditional transaction. It's not easy to decide which delivery model e-commerce enterprises should adopt. Having e-commerce's logistics delivery as the main research object, this essay aims to find a more suitable logistics delivery model for JD's development.

  9. Predicting Internet/E-Commerce Use.

    ERIC Educational Resources Information Center

    Sexton, Randall S.; Johnson, Richard A.; Hignite, Michael A.

    2002-01-01

    Describes a study that analyzed variables in order to identify accurate predictors of individuals' use of the Internet and e-commerce. Results of survey research and a neural network identifies gender, overall computer use, job-related use, and home access as important characteristics that should influence use of the Internet and e-commerce.…

  10. Framing the Future: An E-Commerce Operation.

    ERIC Educational Resources Information Center

    Mitchell, John

    This document reports on a study that analyzes the business management processes of Australia's Framing the Future program (FTF) in terms of the extent to which they demonstrate e-commerce principles. Chapter 1 describes the concept of e-commerce in relation to vocational education and training (VET). It defines e-commerce as any business…

  11. Universities Improve Services with E-Commerce.

    ERIC Educational Resources Information Center

    Palmer, Gina Adams

    2001-01-01

    This follow-up to a December 2000 article provides more details on Stanford University's venture into the "sell-side" of e-commerce, then describes another "sell-side" success story at the University of Wisconsin. Madison. Discusses experiences on the "buy-side" of e-commerce at the Massachusetts Institute of…

  12. Middle and small manufacture enterprise e-commerce application systems research

    NASA Astrophysics Data System (ADS)

    Zhu, Mingqiang

    2017-04-01

    With the extensive application of electronic commerce in manufacturing enterprises, e-commerce the influence of operation is increasingly becoming the focus of academic and business circles on the basis, this paper probes into the influence of e-commerce on the operation of the enterprise for the manufacturing enterprises to correctly understand the performance of e-commerce to provide a little help. The article first analyses e-commerce new environment on medium manufacturing enterprise requires, current medium manufacturing enterprise achieved e-commerce has many difficult, should e-commerce correctly awareness, and full planning, and points step implementation, and e-commerce and enterprise integration, and construction features of e-commerce platform, and procurement and supply chain of collaborative management, and attention customer management, and variety e-commerce of mode mixed, and flexible effective operations, and logistics socialization, views, focus on small and medium manufacturing enterprises in e-commerce applications to be innovative in design, production and management of agile and flexible production strategies.

  13. Analysis of Spatial Pattern and Influencing Factors of E-Commerce

    NASA Astrophysics Data System (ADS)

    Zhang, Y.; Chen, J.; Zhang, S.

    2017-09-01

    This paper aims to study the relationship between e-commerce development and geographical characteristics using data of e-commerce, economy, Internet, express delivery and population from 2011 to 2015. Moran's I model and GWR model are applied to analyze the spatial pattern of E-commerce and its influencing factors. There is a growth trend of e-commerce from west to east, and it is obvious to see that e-commerce development has a space-time clustering, especially around the Yangtze River delta. The comprehensive factors caculated through PCA are described as fundamental social productivity, resident living standard and population sex structure. The first two factors have positive correlation with e-commerce, and the intensity of effect increases yearly. However, the influence of population sex structure on the E-commerce development is not significant. Our results suggest that the clustering of e-commerce has a downward trend and the impact of driving factors on e-commerce is observably distinct from year to year in space.

  14. Security Considerations for E-Mental Health Interventions

    PubMed Central

    Bennett, Anthony James; Griffiths, Kathleen Margaret

    2010-01-01

    Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions. PMID:21169173

  15. E-commerce and its Impact on Logistics Requirements

    NASA Astrophysics Data System (ADS)

    Zákorová, Eva

    2017-05-01

    The contribution will focus on the development of e-commerce. The extent of the development of internet by age category will be assessed and the development of this factor will be monitored by correlation analysis. Analysis of logistics operators will be performed in the field courier, express and parcel shipments. Market competitiveness B2C will focus on flexibility in delivery, evening delivery or on weekends, term delivery (increasing the cost of tracking shipments and their records), use and offering banking products with secure payment system, readiness deliver the goods via its own fueling point. On the contrary, legal provision regulating the entrance to the parking are, entrance into pedestrian zone service may limit or prevent.

  16. Libraries and E-Commerce: Improving Information Services and Beyond.

    ERIC Educational Resources Information Center

    Harris, Lesley Ellen

    2000-01-01

    Explains e-commerce and discusses how it can be used by special libraries. Highlights include library goals; examples of successful uses of e-commerce; how e-commerce can improve information services, including access to information, new information resources, delivery of information, and broadening information markets; and developing an…

  17. Marketing E-Commerce by Social media using Product Recommendations and user Embedding

    NASA Astrophysics Data System (ADS)

    Ramalingam, V. V.; Pandian, A.; Masilamani, Kirthiga

    2018-04-01

    MarketingE-CommercebySodal media is the best way to improve marketing and business widely.The major issues faced with E-commerce and Social media interfacing is cold- start cross-site problem. The cold-start problem occurs at a situation when user is not having the history of purchase records.For the user who does not have a history of purchase records, we have introduced a method of finding the users’ interested product without knowing any of the demographic information of the user. The product is recommended on basesof visits i.e., the item which is most likely to be visited by the users occur in the hit list. This product is rated at the top position for the users to purchase. The e-commerce with social media sites uses the strategy of user embedding and product recommendations. The product recommendations are achieved by incorporating LatentDirichlet Allocation(LDA), Re Ranking and Collaborative Filtering algorithms. The proposed framework can enhance the recommendation system by embedding products and users. This shows the potential of solving cold-start cross-site problem across the e-commerce and social media sites and enhances the marketing strategy.

  18. Study on storage efficiency of the fresh food e-commerce

    NASA Astrophysics Data System (ADS)

    Wang, Xin; Sun, Jie; Li, Huihui

    2017-06-01

    As the last cake in the area of e-commerce industry, the temperature of fresh food e-commerce is always rising starting from about 2014. This paper is based on the imperfection that the existing study about fresh food e-commerce is lack of studies on storage efficiency. And we took some variables in this paper such as consumers’ satisfaction and length for preservation and storage time. On this basis we built the model of storage efficiency of fresh food e-commerce. We find that as the development of fresh food e-commerce, the fresh food e-commerce enterprise will pay more attention to the consumers’ satisfaction. They can take some effective ways like reducing the wastage of fresh food and lengthening the refreshing time of fresh food and so on.

  19. Electronic commerce: beyond the euphoria.

    PubMed

    Healy, J L; DeLuca, J M

    2000-01-01

    As the center of considerable media attention, case study articles, vendor research, and development efforts, electronic commerce technology is entering healthcare and having a profound effect. The simple truth, however, is that after the drama and excitement begins to wear off, completing a successful e-commerce implementation remains good old-fashioned hard, sometimes monotonous work. To be successful, e-commerce technologies must be planned and implemented with rigorous project standards, and incorporated with significant process and workflow reengineering to actually return significant value to the organization. This article briefs readers on the organizational issues they must consider in evaluating e-commerce readiness--cultural, executive and technological factors that either support or inhibit project and technology success. Readers will be left with the tools to conduct an electronic commerce "readiness assessment" to evaluate the immediate, mid- and long-term potential of electronic commerce; practical remediation strategies for better preparing the organization for the changes inherent in moving to an e-commerce-enabled business model; and comments from the field--advice from organizations that have successfully implemented e-commerce technologies into their ongoing operations.

  20. Online Consumer Reviews on Using E-Shopping Service of E-Commerce

    NASA Astrophysics Data System (ADS)

    Hurriyati, R.; Lisnawati; Rhamdani, F.

    2017-03-01

    The Internet has become the primary source of information for a large number of consumers and it enables consumers to share their opinions and experiences about goods and services. Online consumer reviews provide information and recommendations for prospective buyers and are helpful for decision-making on purchases. The purpose of this study is to assess the impact of online consumer reviews on a decision of using e-commerce services. Sample size has been conducted among 435 respondents of e-commerce customers who use google play. to test the research hypothesis path analysis. The result indicates that Positive and negative statements in reviews are strong influence consumers whether to use the services that offered by e-commerce, online consumer reviews have an impact on the consumer decision of using e-commerce services. Finally, some practical valuable feedback for future research and practical contribution has been made.

  1. Study on supply chain management in tourism e-commerce

    NASA Astrophysics Data System (ADS)

    Hu, Yaodong; Wu, Shuyan; Ma, Haiyan

    2009-07-01

    On-line customer research has been conducted for European and American markets by marketers and academics. Whilst e-Commerce and tourism develop rapidly in China, and the fraud information in E-commerce market makes the conditions of information asymmetry becoming more seriously, understanding of Chinese internet travelers is required. This paper reviews current research on supply chain management (SCM) within the context of tourism. SCM in the manufacturing industry has attracted widespread research interest over the past two decades, whereas studies of SCM in the tourism e-commerce are very limited. The potential benefit of considering not only individual enterprises but also the tourism value chain becomes evident. This paper presents the model e-market structure and process analysis of tourism e-commerce, and also sets up tourism supply chain and tourism e-commerce system to probe how to apply tourism ecommerce to promote the sustainable development of tourism. The paper also identifies key research questions in TSCM worthy of future theoretical and empirical exploration.

  2. Analysis on the integration of ERP and e-commerce

    NASA Astrophysics Data System (ADS)

    Wang, Yongqing; Shi, Yuliana

    2017-08-01

    With the continuous development of China's modern economic construction, a variety of information technology are emerging. The new economic development characterized by e-commerce has accelerated the globalization of the economy. In face of increasingly fierce market competition, for enterprises, the constructions of ERP and e-commerce are necessary ways to enhance the core competitiveness of enterprises. At present, most of the internal ERP systems and external e-commerce systems are in relatively independent state. However, with the increasing fierce market competition, a single mode of operation has been unable to meet the requirements of enterprise development. Accordingly, the effective integration of ERP and e-commerce in the new era has become one of the most important topics for enterprise development. This paper firstly analyzes the relationship between ERP and e-commerce, and then analyzes the necessity and feasibility of integration, and finally discusses the integration strategies and technologies.

  3. Intelligent agents for e-commerce applications

    NASA Astrophysics Data System (ADS)

    Vuppala, Krishna

    1999-12-01

    This thesis focuses on development of intelligent agent solutions for e-commerce applications. E-Commerce has several complexities like: lack of information about the players, learning the nature of one's business partners/competitors, finding the right business partner to do business with, using the right strategy to get best profit out of the negotiations etc. The agent models developed can be used in any agent solution for e-commerce. Concepts and techniques from Game Theory and Artificial Intelligence are used. The developed models have several advantages over the existing ones as: the models assume the non-availability of information about other players in the market, the models of players get updated over the time as and when new information comes about the players, the negotiation model incorporates the patience levels of the players and expectations from other players in the market. Power industry has been chosen as the application area for the demonstration of the capabilities and usage of the developed agent models. Two e-commerce scenarios where sellers and buyers can go through the power exchanges to bid in auctions, or make bilateral deals outside of the exchange are addressed. In the first scenario agent helps market participants in coordinating strategies with other participants, bidding in auctions by analyzing and understanding the behavior of other participants. In the second scenario, called "Power Traders Assistant" agent helps power trader, who buys and sells power through bilateral negotiations, in negotiating deals with his customers.

  4. Content management systems and E-commerce: a comparative case study

    NASA Astrophysics Data System (ADS)

    Al Rasheed, Amal A.; El-Masri, Samir D.

    2011-12-01

    The need for CMS's to create and edit e-commerce websites has increased with the growing importance of e-commerce. In this paper, the various features essential for e-commerce CMS's are explored. The aim of the paper was to find the best CMS solution for e-commerce which includes the best of both CMS and store management. Accordingly, we conducted a study on three popular open source CMS's for e-commerce: VirtueMart from Joomla!, Ubercart from Drupal, and Magento. We took into account features like hosting and installation, performance, support/community, content management, add on modules and functional features. We concluded with improvements that could be made in order to alleviate problems.

  5. E-Commerce Comes Slowly But Surely to Education.

    ERIC Educational Resources Information Center

    Revenaugh, Mickey

    2000-01-01

    Discusses why e-commerce is being used so sparingly by big business and school purchasers alike, the benefits on going on-line for school buyers, and the integration of e-commerce with the district's accounting and management information systems. Available online services are detailed. (GR)

  6. New Rage on Campus: E-Commerce Degrees.

    ERIC Educational Resources Information Center

    Dobbs, Kevin

    1999-01-01

    As electronic commerce expands, higher education attempts to keep up with the demand for instruction. Some universities have added a concentration in e-commerce to their master of business administration program and others are adding majors, certifications, or degrees. (JOW)

  7. 77 FR 43711 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300 to 799, revised as of January... II, in 5E002, after ``Related Controls'' and before ``Items'', add ``Related Definitions: N/A''. [FR...

  8. Cloud Security: Issues and Research Directions

    DTIC Science & Technology

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  9. E-Commerce and Privacy: Conflict and Opportunity.

    ERIC Educational Resources Information Center

    Farah, Badie N.; Higby, Mary A.

    2001-01-01

    Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)

  10. Rule-based statistical data mining agents for an e-commerce application

    NASA Astrophysics Data System (ADS)

    Qin, Yi; Zhang, Yan-Qing; King, K. N.; Sunderraman, Rajshekhar

    2003-03-01

    Intelligent data mining techniques have useful e-Business applications. Because an e-Commerce application is related to multiple domains such as statistical analysis, market competition, price comparison, profit improvement and personal preferences, this paper presents a hybrid knowledge-based e-Commerce system fusing intelligent techniques, statistical data mining, and personal information to enhance QoS (Quality of Service) of e-Commerce. A Web-based e-Commerce application software system, eDVD Web Shopping Center, is successfully implemented uisng Java servlets and an Oracle81 database server. Simulation results have shown that the hybrid intelligent e-Commerce system is able to make smart decisions for different customers.

  11. Trust models for efficient communication in Mobile Cloud Computing and their applications to e-Commerce

    NASA Astrophysics Data System (ADS)

    Pop, Florin; Dobre, Ciprian; Mocanu, Bogdan-Costel; Citoteanu, Oana-Maria; Xhafa, Fatos

    2016-11-01

    Managing the large dimensions of data processed in distributed systems that are formed by datacentres and mobile devices has become a challenging issue with an important impact on the end-user. Therefore, the management process of such systems can be achieved efficiently by using uniform overlay networks, interconnected through secure and efficient routing protocols. The aim of this article is to advance our previous work with a novel trust model based on a reputation metric that actively uses the social links between users and the model of interaction between them. We present and evaluate an adaptive model for the trust management in structured overlay networks, based on a Mobile Cloud architecture and considering a honeycomb overlay. Such a model can be useful for supporting advanced mobile market-share e-Commerce platforms, where users collaborate and exchange reliable information about, for example, products of interest and supporting ad-hoc business campaigns

  12. Research Reveals Scale of College Union E-Commerce.

    ERIC Educational Resources Information Center

    Conway, Guy Patrick; Henry, Wilma J.

    2000-01-01

    Reports results of a survey of member schools of the Association of College Unions International concerning extent of e-commerce being conducted on the Web. College Web sites were also evaluated for information on e-commerce activities. A list of institutions currently conducting interactive business and the type of business being conducted is…

  13. Learning in Introductory E-Commerce: A Project-Based Teamwork Approach

    ERIC Educational Resources Information Center

    Ngai, Eric W. T.

    2007-01-01

    In this paper, we describe an e-commerce teamwork-based project designed and implemented at the Hong Kong Polytechnic University (PolyU) for undergraduate business and management students. The teaching objectives of this e-commerce project are to develop the students' knowledge and skills, such as in the use of e-commerce site building tools,…

  14. Training as an E-Commerce Enabler.

    ERIC Educational Resources Information Center

    Darch, Helen; Lucas, Trevor

    2002-01-01

    An investigation into lack of skills and awareness as barriers to the use of electronic commerce by 20 small- to medium enterprises within the food industry in Queensland, Australia, found that lack of knowledge and technical skills and structural issues are barriers. A range of training and development strategies are needed. (Contains 20…

  15. The Comparison of Personalization Recommendation for E-Commerce

    NASA Astrophysics Data System (ADS)

    Ya, Luo

    Personalization recommendation is the key technology in E-commerce, which affects the performance of E-commerce system. This paper mainly introduces personalization recommendation system and its role, and several widely used recommendation technology. Through comparing and analyzing on the strengths and weaknesses of recommendation technology, it concludes that the combined application for a variety of techniques should satisfy the actual needs better.

  16. [E-commerce of pharmaceuticals].

    PubMed

    Shani, Segev

    2003-05-01

    The emergence of the Internet as a new communications and information technology caused major social and cultural changes. The dramatic increase in accessibility and availability of information empowered the consumer by closing the information gap between the consumer and different suppliers. The objective of this article is to review many new internet-supported applications related to the pharmaceutical market. E-commerce is divided into two major components: Business to Consumer (B to C), and Business to Business (B to B). The main applications in B to C are dissemination of medical and drug information, and the sale of drugs through the Internet. Medical information on the Internet is vast and very helpful for patients, however, its reliability is not guaranteed. Online pharmacies increase the accessibility and availability of drugs. Nevertheless, several obstacles such as security of the data provided (both financial and clinical) prevent the widespread use of online pharmacies. Another risk is the health authorities' inability to regulate Internet sites effectively. Therefore, unregulated sale of prescription drugs, fake or substandard, often occurs on the Internet. B to B relates to physicians, clinics, hospitals, HMO's and pharmaceutical companies. There is a vast number of applications ranging from clinical research, marketing and sales promotion, to drug distribution and logistics. In conclusion, the Internet is dynamic and has contributed to the development of numerous new applications in the field of pharmaceuticals. Regulatory authorities should be active in developing new policies that will deal with those new Internet-based applications.

  17. No Small Change: E-Commerce in Distance Education.

    ERIC Educational Resources Information Center

    Robinson, Evan T.

    2002-01-01

    Explains how electronic commerce (e-commerce) principles can be useful for distance education in higher education. Topics include business-to-business and business-to-consumer models; entering the marketplace; understanding the institution's capabilities; knowing the competition; and sound financial models. (LRW)

  18. 15 CFR 19.2 - Why has the Commerce Department issuing these regulations and what do they cover?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Why has the Commerce Department issuing these regulations and what do they cover? 19.2 Section 19.2 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION General Provisions § 19.2 Why has the Commerce...

  19. 15 CFR 19.2 - Why has the Commerce Department issuing these regulations and what do they cover?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Why has the Commerce Department issuing these regulations and what do they cover? 19.2 Section 19.2 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION General Provisions § 19.2 Why has the Commerce...

  20. 15 CFR 19.2 - Why has the Commerce Department issuing these regulations and what do they cover?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Why has the Commerce Department issuing these regulations and what do they cover? 19.2 Section 19.2 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION General Provisions § 19.2 Why has the Commerce...

  1. 15 CFR 19.2 - Why has the Commerce Department issuing these regulations and what do they cover?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Why has the Commerce Department issuing these regulations and what do they cover? 19.2 Section 19.2 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION General Provisions § 19.2 Why has the Commerce...

  2. 15 CFR 19.2 - Why has the Commerce Department issuing these regulations and what do they cover?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Why has the Commerce Department issuing these regulations and what do they cover? 19.2 Section 19.2 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION General Provisions § 19.2 Why has the Commerce...

  3. Incentive Issues in Information Security Management

    ERIC Educational Resources Information Center

    Lee, Chul Ho

    2012-01-01

    This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…

  4. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  5. What users want in e-commerce design: effects of age, education and income.

    PubMed

    Lightner, Nancy J

    2003-01-15

    Preferences for certain characteristics of an online shopping experience may be related to demographic data. This paper discusses the characteristics of that experience, demographic data and preferences by demographic group. The results of an online survey of 488 individuals in the United States indicate that respondents are generally satisfied with their online shopping experiences, with security, information quality and information quantity ranking first in importance overall. The sensory impact of a site ranked last overall of the seven characteristics measured. Preferences for these characteristics in e-commerce sites were differentiated by age, education and income. The sensory impact of sites became less important as respondents increased in age, income or education. As the income of respondents increased, the importance of the reputation of the vendor rose. Web site designers may incorporate these findings into the design of e-commerce sites in an attempt to increase the shopping satisfaction of their users. Results from the customer relationship management portion of the survey suggest that current push technologies and site personalization are not an effective means of achieving user satisfaction.

  6. E-Competent Australia: Report on the Impact of E-Commerce on the National Training Framework.

    ERIC Educational Resources Information Center

    Mitchell, John

    The impact of electronic commerce (e-commerce) on Australia's National Training Framework (NTF) was studied for the purpose of forecasting future demand for training in areas related to e-commerce and identifying appropriate responses by the NTF committee. The following were among the study's main data collection activities: reviews of the…

  7. Ferment in Business Education: E-Commerce Master's Programs.

    ERIC Educational Resources Information Center

    Durlabhji, Subhash; Fusilier, Marcelline R.

    2002-01-01

    A review of curriculum and course descriptions of 67 Web-based electronic commerce master's programs showed that the number of programs grew 76% over 8 months. More nontechnical than technology-centered courses are offered. Business schools are apparently viewing e-commerce as a completely new discipline. (Contains 26 references.) (SK)

  8. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  9. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  10. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  11. The impact of transaction trust on consumers' intentions to adopt m-commerce: a cross-cultural investigation.

    PubMed

    Kao, Danny Tengti

    2009-04-01

    Mobile commerce (M-commerce) has been acknowledged as one of the most representative transaction types driving e-commerce worldwide; however, the potential security threats that keep consumers from M-commerce still confound the M-commerce industry. This research attempts to explore two questions: What are the dimensions of transaction trust that may significantly affect consumers' intentions to adopt M-commerce, and what are the cultural dimensions that may significantly moderate the impact of transaction trust on consumers' intentions to adopt M-commerce? A research framework based on the BATE model and Hofstede's cultural dimensions was established to identify how transaction trust and cultural value affect consumers' intentions to adopt M-commerce. Results revealed that transaction trust significantly affects consumers' intentions to adopt M-commerce. However, while uncertainty avoidance moderates the impacts of business trust and security on consumers' intentions of M-commerce adoption, both individualism/collectivism and long-term/short-term orientation moderate the relationship between security trust and consumers' intentions of M-commerce adoption.

  12. 78 FR 48298 - Amendment of Class E Airspace; Commerce, TX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-08

    ...-0269; Airspace Docket No. 13-ASW-3] Amendment of Class E Airspace; Commerce, TX AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Final rule. SUMMARY: This action amends Class E airspace at Commerce, TX. Additional controlled airspace is necessary to accommodate new Area Navigation (RNAV...

  13. E-commerce trade in invasive plants.

    PubMed

    Humair, Franziska; Humair, Luc; Kuhn, Fabian; Kueffer, Christoph

    2015-12-01

    Biological invasions are a major concern in conservation, especially because global transport of species is still increasing rapidly. Conservationists hope to anticipate and thus prevent future invasions by identifying and regulating potentially invasive species through species risk assessments and international trade regulations. Among many introduction pathways of non-native species, horticulture is a particularly important driver of plant invasions. In recent decades, the horticultural industry expanded globally and changed structurally through the emergence of new distribution channels, including internet trade (e-commerce). Using an automated search algorithm, we surveyed, on a daily basis, e-commerce trade on 10 major online auction sites (including eBay) of approximately three-fifths of the world's spermatophyte flora. Many recognized invasive plant species (>500 species) (i.e., species associated with ecological or socio-economic problems) were traded daily worldwide on the internet. A markedly higher proportion of invasive than non-invasive species were available online. Typically, for a particular plant family, 30-80% of recognized invasive species were detected on an auction site, but only a few percentages of all species in the plant family were detected on a site. Families that were more traded had a higher proportion of invasive species than families that were less traded. For woody species, there was a significant positive relationship between the number of regions where a species was sold and the number of regions where it was invasive. Our results indicate that biosecurity is not effectively regulating online plant trade. In the future, automated monitoring of e-commerce may help prevent the spread of invasive species, provide information on emerging trade connectivity across national borders, and be used in horizon scanning exercises for early detection of new species and their geographic source areas in international trade. © 2015 Society for

  14. An Exploratory Investigation of Requisite Skills Needed by Developers of E-Commerce Systems.

    ERIC Educational Resources Information Center

    Aladwani, Adel M.

    The aim of this exploratory study is to identify the skills needed by developers of Electronic Commerce (e-Commerce) systems. The paper proposes a framework pertaining to three categories of e-Commerce development knowledge: technical, human, and organizational. The initial findings reveal that there are some 16 possible e-Commerce skills tapping…

  15. Modeling the customer in electronic commerce.

    PubMed

    Helander, M G; Khalid, H M

    2000-12-01

    This paper reviews interface design of web pages for e-commerce. Different tasks in e-commerce are contrasted. A systems model is used to illustrate the information flow between three subsystems in e-commerce: store environment, customer, and web technology. A customer makes several decisions: to enter the store, to navigate, to purchase, to pay, and to keep the merchandize. This artificial environment must be designed so that it can support customer decision-making. To retain customers it must be pleasing and fun, and create a task with natural flow. Customers have different needs, competence and motivation, which affect decision-making. It may therefore be important to customize the design of the e-store environment. Future ergonomics research will have to investigate perceptual aspects, such as presentation of merchandize, and cognitive issues, such as product search and navigation, as well as decision making while considering various economic parameters. Five theories on e-commerce research are presented.

  16. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  17. Teaching E-Commerce Web Page Evaluation and Design: A Pilot Study Using Tourism Destination Sites

    ERIC Educational Resources Information Center

    Susser, Bernard; Ariga, Taeko

    2006-01-01

    This study explores a teaching method for improving business students' skills in e-commerce page evaluation and making Web design majors aware of business content issues through cooperative learning. Two groups of female students at a Japanese university studying either tourism or Web page design were assigned tasks that required cooperation to…

  18. Cyber security issues in online games

    NASA Astrophysics Data System (ADS)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  19. Security, privacy, and confidentiality issues on the Internet.

    PubMed

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  20. An affective e-commerce design for SMEs product marketing based on kansei engineering

    NASA Astrophysics Data System (ADS)

    Habyba, A. N.; Djatna, T.; Anggraeni, E.

    2018-04-01

    One of the SMEs problems in Indonesia in this information technology era is the inability to control the market. SMEs can use the e-commerce website to improve their competitiveness. It can be used as a marketing tool for SMEs to promote their products and expands the SMEs markets especially for the agroindustry SMEs where located in district area that still rely on local markets to sell their product. Some SMEs e-commerce websites have been developed in Indonesia but can not significantly increased the sales of SMEs product. Furthemore, the design of it is only able to meet the consumer need in function and usability. The development of e-commerce design should pay attention in high affective quality. This is because the affective responses effect the user’s perception of cognitive quality, usability and ease of use of e-commerce. This study is aimed to make e-commerce that can meet the affective needs of users. The result of Kansei words selection and extraction using TF-IDF are four design concepts of e-commerce website. The formulation of new SMEs e-commerce website design is resulted from the integration of four design concepts and four design elements. The “Natural-Formal” concept has the greatest value than other concepts after QTT-1 analysis. This concept can implemented as the new SMEs e-commerce website design.

  1. E-commerce for healthcare supply procurement.

    PubMed

    Arbietman, D; Lirov, E; Lirov, R; Lirov, Y

    2001-01-01

    The total investment of the more than fifty e-commerce startups that entered healthcare supply chain management in the past three years has surpassed $500 million. However, none of these early entrants has delivered on the initial promise of restructuring the entire supply chain, replacing the traditional intermediaries, or at least achieving substantial revenue. This article offers a new business-to-business (B2B) e-commerce solution classification paradigm and uses it to analyze the functional requirements for an effective and, efficient healthcare supply chain marketplace. The analysis exposes several fundamental B2B market complexities that prevent the early entrants from creating a solid customer base and reaching desired liquidity goals. It also identifies several technological solutions to the problems mentioned. These new technologies create a comprehensive and symmetric order-matching engine that is capable of aggregating buy orders, requesting quotes from multiple vendors simultaneously, and negotiating along multiple criteria.

  2. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  3. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  4. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  5. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  6. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  7. The Influence of Information Ecology on E-Commerce Initiatives.

    ERIC Educational Resources Information Center

    Detlor, Brian

    2001-01-01

    Explores the influence of an organization's information ecology, or internal information environment, on a firm's electronic commerce initiatives and plans. Reports results from a case study investigation on the adoption and use of an e-commerce initiative, a corporate portal, by participants at a large Canadian company. (Author/LRW)

  8. The Importance of Trust in Electronic Commerce.

    ERIC Educational Resources Information Center

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  9. Consumer's Buying Decision-Making Process in E-Commerce

    NASA Astrophysics Data System (ADS)

    Puspitasari, Nia Budi; Susatyo, Nugroho W. P.; Amyhorsea, Deya Nilan; Susanty, Aries

    2018-02-01

    The e-commerce growth and development in Indonesia is very rapid as well as the internet grows, but it is not well-balanced with the number of online buying transaction which is still relatively low. Even the today's biggest B2C e-commerce people in Indonesia, Lazada, has continually decreased online purchasing. This research is aimed to describe factors affecting online buying decision- making in the e-commerce Lazada. The type of this research is confirmatory research. The variable used is following conceptual model i.e. Electronic Word of Mouth (EWOM), social identity, risk perception, trust, and purchase intention. The data were obtained through the questionnaire with Likert scale 1-5. There are 104 people researching sample who meets the criteria as Lazada consumer that, at least do a transaction in recent six months. Data analyzing were done using Structural Equation Modelling (SEM) method by Analysis of Moment Structures (AMOS) software. The results showed that the purchase intention has positively related to the purchase decision. Variable EWOM toward trust has positive relation, variable social identity and risk perception have no any significant relation to trust. Variable risk perception toward purchase intention has no significant relation, while the variable trust has significant positive relation to purchase intention.

  10. E-Commerce Content in Business School Curriculum: Opportunities and Challenges.

    ERIC Educational Resources Information Center

    Krovi, Ravindra; Vijayaraman, B. S.

    2000-01-01

    Explores the opportunities and challenges of introducing e-commerce concepts in business school curriculums. Examines the knowledge components of electronic commerce, including Web-based technology skills; and discusses the need for faculty training and development. (Author/LRW)

  11. Comparative analysis of e-commerce and social media based trading in Indonesia

    NASA Astrophysics Data System (ADS)

    Sfenrianto; Wang, Gunawan; Abdul, Halim; Nurul, Fajar Ahmad

    2017-09-01

    The growth of social media and e-commerce recently has caused the unique phenomenon in Indonesia. That phenomenon is online trading using social media like Facebook, Blackberry messenger, Whatsapp, etc. This phenomenon attracts the researcher to know how to use social media to trade, not using e-commerce marketplace like Lazada, Tokopedia, Bukalapak. The aim of the research is to know the profiling of product and buyer in e-commerce and social media and to do the comparison of that 2 channels based on eight purchase decision factors. Research conducted by taking surveys involving 306 respondents. For product and buyer profiling, this study identifies profile base on sex, education, area, jobs and online trading channel. For e-commerce & social media comparison, this study use 8 factors made based on previous related studies. Finding related purchase decision comparisons are: online trust and usability are the factors influencing people to buy the product via e-commerce. While, marketing mix, and interactivity are the factors why people buy the product via social media.

  12. Security, privacy, and confidentiality issues on the Internet

    PubMed Central

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  13. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...

  14. Study on the E-commerce platform based on the agent

    NASA Astrophysics Data System (ADS)

    Fu, Ruixue; Qin, Lishuan; Gao, Yinmin

    2011-10-01

    To solve problem of dynamic integration in e-commerce, the Multi-Agent architecture of electronic commerce platform system based on Agent and Ontology has been introduced, which includes three major types of agent, Ontology and rule collection. In this architecture, service agent and rule are used to realize the business process reengineering, the reuse of software component, and agility of the electronic commerce platform. To illustrate the architecture, a simulation work has been done and the results imply that the architecture provides a very efficient method to design and implement the flexible, distributed, open and intelligent electronic commerce platform system to solve problem of dynamic integration in ecommerce. The objective of this paper is to illustrate the architecture of electronic commerce platform system, and the approach how Agent and Ontology support the electronic commerce platform system.

  15. The Information Architecture of E-Commerce: An Experimental Study on User Performance and Preference

    NASA Astrophysics Data System (ADS)

    Wan Mohd, Wan Abdul Rahim; Md Noor, Nor Laila; Mehad, Shafie

    Too often, designers of e-commerce web sites use models, concepts, guidelines, and designs that focus on the artifacts while ignoring the context in which the artifacts will be used. Furthermore, the link between culture and usability in web site IA phenomenon is still considered as uncharted area, as it lacks much theoretical consideration. In an effort toward addressing the aforementioned issues, our study provides a theoretical and empirical link between cultural and usability through the application of ‘Venustas' (Delight) drawn from the architectural field and Hofstede's cultural dimensions. We use Islamic culture as the case study and report on the experiment to investigate the effect of the IA designs based on the cultural dimensions on e-commerce web sites. The result provides partial empirical support to the theorized link between culture and usability based on the usability measurement on user performance and preference. In addition, practical web site IA cultural design prescriptions are also provided.

  16. E-Commerce Topics for Business Education: Perceptions of Employers and Educators

    ERIC Educational Resources Information Center

    Gueldenzoph, Lisa E.

    2006-01-01

    E-commerce is a relatively new content area for business educators even though it includes a variety of business concepts such as marketing and desktop publishing. Whether developing a new course or integrating e-commerce concepts into existing courses, determining the topics that are important can be a challenge. This study sought to identify the…

  17. Analysis of usability factors affecting purchase intention in online e-commerce sites

    NASA Astrophysics Data System (ADS)

    Perdana, R. A.; Suzianti, A.

    2017-03-01

    The growing number of internet users plays a significant role in the emergence of a variety of online e-commerce sites to meet the needs of Indonesians. However, there are still some problems faced by the users in using e-commerce sites. Therefore, a research related to user experience on their purchase intention to foster e-commerce sites is required. This study is conducted to find out the relationship between usability factors on e-commerce users’ purchase intention using a case study by using SEM to analyse the usability of the website. The result of this study shows that credibility, readability and telepresence are usability factors that directly affect purchase intention, while simplicity, consistency and interactivity are usability factors that indirectly affect purchase intention. Therefore, we can conclude that Indonesian consumers are on the Early Majority phase in adopting Company A.

  18. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security... meetings, materials classified for national security purposes, the agency or individual (e.g., DOS, USCG... classified for national security purposes, the agency or individual (e.g., Department of State, U.S. Coast...

  19. Autonomy and paternalism in medical e-commerce.

    PubMed

    Mendoza, Roger Lee

    2015-08-01

    One of the overriding interests of the literature on health care economics is to discover where personal choice in market economies end and corrective government intervention should begin. Our study addresses this question in the context of John Stuart Mill's utilitarian principle of harm. Our primary objective is to determine whether public policy interventions concerning more than 35,000 online pharmacies worldwide are necessary and efficient compared to traditional market-oriented approaches. Secondly, we seek to determine whether government interference could enhance personal  utility maximization, despite its direct and indirect (unintended) costs on medical e-commerce. This study finds that containing the negative externalities of medical e-commerce provides the most compelling raison d'etre of government interference. It asserts that autonomy and paternalism need not be mutually exclusive, despite their direct and indirect consequences on individual choice and decision-making processes. Valuable insights derived from Mill's principle should enrich theory-building in health care economics and policy.

  20. A secured e-tendering modeling using misuse case approach

    NASA Astrophysics Data System (ADS)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.

  1. Web Services Security - Implementation and Evaluation Issues

    NASA Astrophysics Data System (ADS)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  2. Security of Mobile Agents on the Internet.

    ERIC Educational Resources Information Center

    Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare

    2001-01-01

    Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)

  3. Research on e-commerce transaction networks using multi-agent modelling and open application programming interface

    NASA Astrophysics Data System (ADS)

    Piao, Chunhui; Han, Xufang; Wu, Harris

    2010-08-01

    We provide a formal definition of an e-commerce transaction network. Agent-based modelling is used to simulate e-commerce transaction networks. For real-world analysis, we studied the open application programming interfaces (APIs) from eBay and Taobao e-commerce websites and captured real transaction data. Pajek is used to visualise the agent relationships in the transaction network. We derived one-mode networks from the transaction network and analysed them using degree and betweenness centrality. Integrating multi-agent modelling, open APIs and social network analysis, we propose a new way to study large-scale e-commerce systems.

  4. Continuous use of social commerce: Its conceptual relation with E-WOM, commitment and trust

    NASA Astrophysics Data System (ADS)

    Sami, Atyaf; Hashim, Kamarul Faizal; Yusof, Shafiz Affendi Mohd

    2016-08-01

    The popularity of social media has changed the way of doing business and introduces a new type of commerce known later as social commerce (s-commerce). Within s-commerce, consumer's loyalty and returning to use have reduced mainly because it is a high competitive environment, which is simply presented by products that proposed and announced rapidly to the market. S-commerce has a magic power called Electronic Word-of-Mouth (E-WOM). E-WOM enables consumers to make a collaboration decision as well as it enable business to reach up their consumers and their network in low cost and short time. Yet, to date, there is limited research that conducted the effect of E-WOM on consumer's continuous use behavior. Therefore, this study is an attempt to propose a value conceptual model that explains the relationship between e-WOM and continuous use behavior. This study serves not only to clarify the relationship between e-WOM and continuous use, but also to explain the mediating role of trust and commitment in this relationship; a theory known as Commitment-Trust theory is adopted. Additionally, drawing upon flow theory, this study examines flow experience determinants as predictors for promoting e-WOM among s-commerce consumers.

  5. An Analytical Framework for Evaluating E-Commerce Business Models and Strategies.

    ERIC Educational Resources Information Center

    Lee, Chung-Shing

    2001-01-01

    Considers electronic commerce as a paradigm shift, or a disruptive innovation, and presents an analytical framework based on the theories of transaction costs and switching costs. Topics include business transformation process; scale effect; scope effect; new sources of revenue; and e-commerce value creation model and strategy. (LRW)

  6. Overview of Climate Confluence Security Issues

    NASA Astrophysics Data System (ADS)

    Reisman, J. P.

    2011-12-01

    Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.

  7. Environmental impacts of the emerging digital economy: the e-for-environment e-commerce?

    PubMed

    Sui, Daniel Z; Rejeski, David W

    2002-02-01

    The Internet-led digital economy is changing both the production and consumption patterns at the global scale. Although great potential exists to harness information technology in general and the Internet in particular and improve the environment, possible negative impacts of e-commerce on the environment should also be considered and dealt with. In this forum, we discuss both the potential positive and negative impacts of e-commerce. Drawing from insights gained from the complexity theory, we also delineate some broad contours for environmental policies in the information age. Given the paradoxical nature of technological innovations, we want to caution the scientific community and policymakers not to treat the Internet as the Holy Grail for environmental salvation.

  8. Event-related potentials elicited by social commerce and electronic-commerce reviews.

    PubMed

    Bai, Yan; Yao, Zhong; Cong, Fengyu; Zhang, Linlin

    2015-12-01

    There is an increasing interest regarding the use of electroencephalography (EEG) in social commerce and electronic commerce (e-commerce) research. There are several reviews in the field of social commerce or e-commerce; these have great potential value and mining them is fundamental and significant. To our knowledge, EEG is rarely applied to study these. In this study, we examined the neural correlates of social commerce reviews (SCRs) and e-commerce reviews (ECRs) by using them as stimuli to evoke event-related potentials. All SCRs were from friends through a social media platform, whereas ECRs were from strangers through an e-commerce platform. The experimental design was similar to that of a priming paradigm, and included 40 pairs of stimuli consisting of product information (prime stimulus) and reviews (target stimulus). The results showed that the P300 component was successfully evoked by SCR and ECR stimuli. Moreover, the P300 components elicited by SCRs had higher amplitudes than those elicited by ECRs. These findings indicate that participants paid more attention to SCRs than to ECRs. In addition, the associations between neural responses and reviews in social commerce have the potential to assist companies in studying consumer behaviors, thus permitting them to enhance their social commerce strategies.

  9. Successful Implementation of a Computer-Supported Collaborative Learning System in Teaching E-Commerce

    ERIC Educational Resources Information Center

    Ngai, E. W. T.; Lam, S. S.; Poon, J. K. L.

    2013-01-01

    This paper describes the successful application of a computer-supported collaborative learning system in teaching e-commerce. The authors created a teaching and learning environment for 39 local secondary schools to introduce e-commerce using a computer-supported collaborative learning system. This system is designed to equip students with…

  10. End-user perspectives on e-commerce and health care web site quality.

    PubMed

    Le Rouge, Cynthia; De Leo, Gianluca

    2008-11-06

    We explore and compare the importance of various quality dimensions for health care and e-commerce web sites. The results show that the importance of various quality attributes for all except four of ten quality dimensions studied differ between health care and e-commerce web sites. These results can help health care managers to improve and/or to guide the design of their web sites.

  11. Configurable e-commerce-oriented distributed seckill system with high availability

    NASA Astrophysics Data System (ADS)

    Zhu, Liye

    2018-04-01

    The rapid development of e-commerce prompted the birth of seckill activity. Seckill activity greatly stimulated public shopping desire because of its significant attraction to customers. In a seckill activity, a limited number of products will be sold at varying degrees of discount, which brings a huge temptation for customers. The discounted products are usually sold out in seconds, which can be a huge challenge for e-commerce systems. In this case, a seckill system with high concurrency and high availability has very practical significance. This research cooperates with Huijin Department Store to design and implement a seckill system of e-commerce platform. The seckill system supports high concurrency network conditions and is highly available in unexpected situation. In addition, due to the short life cycle of seckill activity, the system has the flexibility to be configured and scalable, which means that it is able to add or re-move system resources on demand. Finally, this paper carried out the function test and the performance test of the whole system. The test results show that the system meets the functional requirements and performance requirements of suppliers, administrators as well as users.

  12. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  13. 76 FR 66181 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300-799, revised as of January 1... to read as follows: Supplement No. 1 to PART 774--THE COMMERCE CONTROL LIST * * * * * 1C118 Titanium...

  14. 76 FR 66181 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300-799, revised as of January 1... read as follows: Supplement No. 1 to PART 774--THE COMMERCE CONTROL LIST * * * * * 2B008 Assemblies or...

  15. E-commerce. Point, click, purchase.

    PubMed

    Menduno, M

    1999-10-01

    Many in health care may still be technology-shy, but there are big savings to be found in business-to-business e-commerce. Some experts estimate that electronic purchasing can trim 18 to 45 percent of costs out of the health care supply chain. That could revolutionize the $140 billion supply industry--but only if buyers and sellers can get on the same page. A whole host of companies are springing up to make that link. It won't be easy. "Anyone can do online ordering," says Joseph Miccio of NCI Consulting. "The real challenge for these vendors is to simultaneously connect all the players in the supply chain through a common database."

  16. Essays on Social Media Fundraising and E-Commerce

    ERIC Educational Resources Information Center

    Tan, Xue

    2017-01-01

    This dissertation has two components: social media fundraising and e-commerce. The first component of social media fundraising discusses social media users' charitable content generation in essay 1 and charitable giving in essay 2. In essay 1, we examine how reciprocity of followees affects social influence on users' charitable content generation.…

  17. 77 FR 46948 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-07

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... to 7A005. 0 C. On page 840, in 7A008, add ``License Requirements'' above ``Reason for Control''. 0 D... text to be added is set forth below: Supplement No. 1 to Part 774--The Commerce Control List...

  18. 6 CFR 27.204 - Minimum concentration by security issue.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...

  19. Water Security - National and Global Issues

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Campbell, A. A.; Moran, E. H.

    2010-12-01

    Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.

  20. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Trade (Continued) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... proposed. Secretarial review of national security issues shall be aided by information submitted by the...

  1. Transportation Security: Issues for the 111th Congress

    DTIC Science & Technology

    2009-05-15

    results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports

  2. Global Security Contingency Fund: Summary and Issue Overview

    DTIC Science & Technology

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  3. Green certification, e-commerce, and low-carbon economy for international tourist hotels.

    PubMed

    Chen, Long-Fei

    2018-05-22

    Increasing population and over-consumption are placing unprecedented demands on agriculture and natural resources. The Earth is suffering from global warning and environmental destruction while our agricultural systems are concurrently degrading land, water, biodiversity, and climate on a global scale. For a sustainable future, green certification, e-commerce, and environment education can boost low-carbon economy with decreasing carbon emissions, but very few researches address them for the hotel industry. This research studies the performance impact of e-commerce, international hotel chain, local hotel chain, and green certification for carbon emission reductions of international tourist hotels of Taiwan. It reveals that, after a sufficiently long time, there is an improvement in the environmental and economic performance of the green-certified hotel group. In addition, it reveals that, as recommended by the operation policy, the international hotel chain group together with e-commerce has better performance than local hotel chain. It is also discussed how to sustain the continuing improvement in low-carbon performance of the hotel industry.

  4. Perceived Compatibility and the Adoption of B2C E-Commerce by Non-buyers

    NASA Astrophysics Data System (ADS)

    Hernández-García, Ángel; Iglesias-Pradas, Santiago; Chaparro-Peláez, Julián; Pascual-Miguel, Félix

    The purpose of this article is to study the factors which affect the intention to buy online for users who have never made any prior purchase using the electronic channel, with special focus to the role of perceived compatibility. To do so, an adoption model for e-commerce was proposed on the basis of the Technology Adoption Model (TAM) and the Innovations Diffusion Theory (IDT). In order to validate the model, data gathered amongst Spanish consumers who had no experience using e-commerce, were analyzed using the partial least squares (PLS) method. The results have demonstrated the importance of perceived compatibility as a significant factor to foster non-buyers' adoption of electronic business-to-consumer e-commerce (eB2C).

  5. E-Commerce New Venture Performance: How Funding Impacts Culture.

    ERIC Educational Resources Information Center

    Hamilton, R. H.

    2001-01-01

    Explores the three primary methods of funding for e-commerce startups and the impact that funding criteria have had on the resulting organizational cultures. Highlights include self-funded firms; venture capital funding; corporate funding; and a table that compares the three types, including examples. (LRW)

  6. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    NASA Astrophysics Data System (ADS)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  7. 76 FR 34577 - Wassenaar Arrangement 2010 Plenary Agreements Implementation: Commerce Control List, Definitions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 740, 743, and 774 [Docket No. 110124056-1301-02] RIN 0694-AF11 Wassenaar Arrangement 2010 Plenary Agreements Implementation: Commerce Control List, Definitions, Reports; Correction AGENCY: Bureau of Industry and Security, Commerce. ACTION...

  8. 6 CFR 27.204 - Minimum concentration by security issue.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  9. Digital Discernment: An E-Commerce Web Site Evaluation Tool

    ERIC Educational Resources Information Center

    Sigman, Betsy Page; Boston, Brian J.

    2013-01-01

    Students entering the business workforce today may well share some responsibility for developing, revising, or evaluating their company's Web site. They may lack the experience, however, to critique their employer's Web presence effectively. The purpose of developing Digital Discernment, an e-commerce Web site evaluation tool, was to prepare…

  10. The Challenges in Developing VET Competencies in E-Commerce.

    ERIC Educational Resources Information Center

    Mitchell, John

    A formative evaluation was begun of an innovative project funded by the Australian National Training Authority (ANTA) to develop competencies and qualifications in e-commerce. The formative evaluation was designed to focus on inputs, processes, and interim outputs, identifying both good practice and areas for improvement. Findings to date…

  11. 15 CFR Supplement No. 1 to Part 738 - Commerce Country Chart

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Commerce Country Chart No. Supplement No. 1 to Part 738 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...

  12. 15 CFR Supplement No. 1 to Part 738 - Commerce Country Chart

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Commerce Country Chart No. Supplement No. 1 to Part 738 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...

  13. 15 CFR Supplement No. 1 to Part 738 - Commerce Country Chart

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Commerce Country Chart No. Supplement No. 1 to Part 738 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...

  14. 15 CFR Supplement No. 1 to Part 738 - Commerce Country Chart

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Commerce Country Chart No. Supplement No. 1 to Part 738 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...

  15. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...

  16. Cloud Computing Security Issue: Survey

    NASA Astrophysics Data System (ADS)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  17. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  18. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  19. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  20. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  1. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  2. 15 CFR 2008.18 - Information Security Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  3. 15 CFR 2008.18 - Information Security Oversight Committee.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  4. 15 CFR 2008.18 - Information Security Oversight Committee.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  5. 15 CFR 2008.18 - Information Security Oversight Committee.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  6. 15 CFR 2008.18 - Information Security Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  7. Security Issues in mGovernment

    NASA Astrophysics Data System (ADS)

    Kumar, Manish; Hanumanthappa, M.; Reddy, Bhavanam Lakshma

    E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the government domain attempt to take the next step and exploit the latest wireless technologies in order to provide ubiquitous services for mobile users. However, this approach involves some hidden risks mainly due to the inherent insecurity of the air medium and the vulnerabilities of the wireless systems. Thus, in this paper we investigate the security gaps and considerations which should be taken into account for an m-government system. Finally, we provide a list of security guidelines and policies, which the users of the system should be aware of and follow in order to avoid security attacks.

  8. Web Server Security on Open Source Environments

    NASA Astrophysics Data System (ADS)

    Gkoutzelis, Dimitrios X.; Sardis, Manolis S.

    Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.

  9. Implications of Electronic Commerce for Fiscal Policy

    NASA Astrophysics Data System (ADS)

    Goolsbee, Austan

    In this chapter, I will consider both sides of the relationship between electronic commerce and fiscal policy. For the impact of electronic commerce on fiscal policy, I will pay particular attention to the potential sales-tax revenue losses. The data suggest that the potential losses are actually modest over the next several years. I will also consider the reverse relationship - how fiscal policy affects Internet commerce. Here the evidence suggests that taxes have a sizable effect. I point out, though, that this only supports special treatment if there is some positive externality. Without one, the tax system will lead to excessive online buying to avoid taxes. I will then deal the neglected issue of taxes and Internet access, which can create large deadweight costs both because demand may be price-sensitive and because taxes can slow the spread of new technologies. Finally, I offer some discussion of the international context of taxes and the Internet and the international temptations to raise rates on E-commerce.

  10. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-04-05

    Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3  reverse the spread of nuclear and biological weapons and...secure nuclear materials;  advance peace, security, and opportunity in the greater Middle East;  invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose

  11. Developing E-commerce and improving resource management.

    PubMed

    Friedman, Barbara B; Sunseri, Albert

    2002-01-01

    The pressure on Materials Managers, Information Technology Managers and Chief Executive Officer's has never been greater to re-imagine, re-invent, and re-architect their operations. The need for speed and for emerging Internet skills and sensibilities has led many operations to look to E-business service providers for assistance. The United States market for E-business services, including consulting, IT outsourcing, software development, and system integration has grown from $7.01 billion in 1998 to approximately $10.3 million in 2000 according to Dataquest. With the growth in E-business accelerating, the market is expected to mushroom to $59 billion by 2003. Material Managers know they must introduce E-commerce to their business strategy, but many are not sure how, which is driving them to consulting and services companies. There is confusion in the ranks on whether they need to change their business model and systems structure in order to do this, and the organization is reevaluating how to move forward in the dot.com world.

  12. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2015-01-01

    ... 15 Commerce and Foreign Trade 2 2015-01-01 2015-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  13. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  14. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  15. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  16. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  17. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  18. Privacy and security issues in teleradiology.

    PubMed

    White, Peter

    2004-10-01

    Teleradiology is now well established within healthcare in the USA, but ethico-legal concepts surrounding this innovation remain unclear. New legislation, the Health Insurance Portability and Accountability Act, as well as ethical guidelines and common law demonstrate the importance being placed on security of electronic data and the protection of patients' personal data. Radiologists need to be aware of the security, privacy, and confidentiality issues which relate to teleradiology, so that they can safeguard not only their own interests but also the best interests of their patients.

  19. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2017-01-01

    ... 15 Commerce and Foreign Trade 2 2017-01-01 2017-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. No. 1...

  20. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2016-01-01

    ... 15 Commerce and Foreign Trade 2 2016-01-01 2016-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. No. 1...

  1. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2018-01-01

    ... 15 Commerce and Foreign Trade 2 2018-01-01 2018-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. No. 1...

  2. 76 FR 79054 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction 0 In Title 15 of the Code of Federal Regulations, Parts 300 to 799, revised as of... entry in the table under Reasons for control for NS Column 1 and adding an entry following the remaining...

  3. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    NASA Astrophysics Data System (ADS)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  4. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  5. Quantifying Security Threats and Their Impact

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper we illustrate this infrastructure by means of a sample example involving an e-commerce application.

  6. Mastering Mobile Security

    ERIC Educational Resources Information Center

    Panettieri, Joseph C.

    2007-01-01

    Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…

  7. 77 FR 72917 - Editorial Corrections to the Commerce Control List of the Export Administration Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-07

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 [Docket No. 120320200-2296-01] RIN 0694-AF62 Editorial Corrections to the Commerce Control List of the Export Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This final rule...

  8. Integrated Tourism E-Commerce Platform for Scenery Administration Bureau, Travel Agency and Tourist

    NASA Astrophysics Data System (ADS)

    Liang, Zhixue; Wang, Shui

    Collaboration among multiple travel agencies and with scenery administration bureaus is vital for small or medium sized travel companies to succeed in the fierce competition of the tourism industry; business processes such as regrouping individual travelers between different agencies prove to be difficult and unpleasant user experience; tourists want to be more informed and have more initiative. To address these issues, proposes an integrated tourism e-commerce platform for travel agencies and scenery administration bureaus as well as tourists to interact in a more smooth way; this platform is constructed upon J2EE framework, provides online collaboration & coordination for companies and information services (such as self-navigation using Google Map etc) for tourists. A running implementation of this platform has been put into real business for a small travel company.

  9. 77 FR 41670 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... Requirements'' above ``Reason for Control''. C. On page 665, in 0A986, correct the table under ``License...'' and ``Rwanda'' in UN Reason for Control. 2. In Category 1: A. On page 676, in 1A004, add ``(1)'' after...

  10. 77 FR 48429 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-14

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In the Federal Register published on July 26, 2012, on page 43711, in the third column, in instruction 3.C., ``5A003'' is corrected to read ``5A002''. [FR Doc. 2012-19955 Filed 8-13-12; 8...

  11. 76 FR 30538 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300 to 799, revised as of January 1, 2011, on page 802, in Supplement No. 1 to Part 774, in Category 6, in ECCN 6A005, the following...

  12. Electronic Commerce "in the dark"

    NASA Astrophysics Data System (ADS)

    Buzzi, Maria Claudia; Buzzi, Marina; Leporini, Barbara; Senette, Caterina

    The widespread diffusion of electronic commerce offers a great opportunity for blind people. We describe the results of an electronic survey carried out with 22 blind and 22 sighted users in order to understand the difficulties and obstacles they experience shopping on-line, and solicit their expectations and suggestions for making the interaction simpler and more satisfying. Results show that blind users shop on-line much less than their sighted counterparts, since they encounter more difficulties not only when making a purchase, but even in the navigation phase preceding the commercial transaction. Complex layouts and unstructured content can prevent an e-transaction from being successfully completed. Furthermore, security, privacy and trustiness, common concerns for all consumers, also impact on the fear of buying via Internet for the visually impaired. Poor usability leads to a potential loss of revenue for on-line companies and a lost opportunity to increase a blind person's independence. Providing simpler, more understandable UIs would benefit all users and fuel the expansion of electronic commerce.

  13. Research on intelligent recommendation algorithm of e-commerce based on association rules

    NASA Astrophysics Data System (ADS)

    Shen, Jiajie; Cheng, Xianyi

    2017-09-01

    As the commodities of e-commerce are more and more rich, more and more consumers are willing to choose online shopping, because of these rich varieties of commodity information, customers will often appear aesthetic fatigue. Therefore, we need a recommendation algorithm according to the recent behavior of customers including browsing and consuming to predicate and intelligently recommend goods which the customers need, thus to improve the satisfaction of customers and to increase the profit of e-commerce. This paper first discusses recommendation algorithm, then improves Apriori. Finally, using R language realizes a recommendation algorithm of commodities. The result shows that this algorithm provides a certain decision-making role for customers to buy commodities.

  14. A Framework for Global Electronic Commerce: An Executive Summary.

    ERIC Educational Resources Information Center

    Office of the Press Secretary of the White House

    1997-01-01

    An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…

  15. Investigating Business Schools' Intentions about Offering E-Commerce Education Using an Extended Theory of Planned Behavior

    ERIC Educational Resources Information Center

    Dodor, Jean Baptiste K.; Rana, Dharam S.

    2009-01-01

    This study investigates business schools' intentions about offering e-commerce education (ECE) using an extended theory of planned behavior (ETPB). The need for an adequate match between future supply and demand of e-commerce skills constitutes the main motivation for the study. The results show that most business schools consider ECE important…

  16. Customer-Specific Transaction Risk Management in E-Commerce

    NASA Astrophysics Data System (ADS)

    Ruch, Markus; Sackmann, Stefan

    Increasing potential for turnover in e-commerce is inextricably linked with an increase in risk. Online retailers (e-tailers), aiming for a company-wide value orientation should manage this risk. However, current approaches to risk management either use average retail prices elevated by an overall risk premium or restrict the payment methods offered to customers. Thus, they neglect customer-specific value and risk attributes and leave turnover potentials unconsidered. To close this gap, an innovative valuation model is proposed in this contribution that integrates customer-specific risk and potential turnover. The approach presented evaluates different payment methods using their risk-turnover characteristic, provides a risk-adjusted decision basis for selecting payment methods and allows e-tailers to derive automated risk management decisions per customer and transaction without reducing turnover potential.

  17. Modelling the B2C Marketplace: Evaluation of a Reputation Metric for e-Commerce

    NASA Astrophysics Data System (ADS)

    Gutowska, Anna; Sloane, Andrew

    This paper evaluates recently developed novel and comprehensive reputation metric designed for the distributed multi-agent reputation system for the Business-to-Consumer (B2C) E-commerce applications. To do that an agent-based simulation framework was implemented which models different types of behaviours in the marketplace. The trustworthiness of different types of providers is investigated to establish whether the simulation models behaviour of B2C e-Commerce systems as they are expected to behave in real life.

  18. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    PubMed

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  19. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    PubMed Central

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

  20. A Delve into the Deployment of eCommerce and Higher Educational Learning

    ERIC Educational Resources Information Center

    Djoleto, Wilhelmina

    2012-01-01

    Higher Educational Institutions (HEIs) and organisations have made significant investments in eCommerce/eBusiness in efforts to keep up with heightened technology penetration in organisational and institutional fabrics. These efforts have been incorporated in their strategic mission partly, to bolster their reputation. HEIs reputation depends much…

  1. 78 FR 37371 - Wassenaar Arrangement 2012 Plenary Agreements Implementation: Commerce Control List, Definitions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-20

    ...The Bureau of Industry and Security (BIS) maintains, as part of its Export Administration Regulations (EAR), the Commerce Control List (CCL), which identifies certain of the items subject to Department of Commerce jurisdiction. This final rule revises the CCL to implement changes made to the Wassenaar Arrangement's List of Dual-Use Goods and Technologies (Wassenaar List) maintained and agreed to by governments participating in the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (Wassenaar Arrangement, or WA) at the December 2012 WA Plenary Meeting (the Plenary). The Wassenaar Arrangement advocates implementation of effective export controls on strategic items with the objective of improving regional and international security and stability. This rule harmonizes the CCL with the changes made to the WA List at the Plenary by revising ECCNs controlled for national security reasons in each category of the CCL, except category 8, as well as amending the General Software Note, WA reporting requirements, and definitions section in the EAR. BIS is adding unilateral controls to the CCL for specific software and technology for aviation control systems, which the WA agreements removed from the WA List, i.e., EAR national security controls.

  2. People-to-People Lending: The Emerging E-Commerce Transformation of a Financial Market

    NASA Astrophysics Data System (ADS)

    Wang, Hui; Greiner, Martina; Aronson, Jay E.

    This paper provides an overview of the concept of people-to-people (P2P) lending, a relatively new e-commerce phenomenon that has the potential to radically change the structure of the loan segment of the financial industry. P2P lending creates a marketplace of individuals and a social fabric through which these individuals interact. It provides efficient information transfer, thus perhaps creating more perfect markets. P2P lending requires information systems support to make it function, and to provide a social network mechanism that may be crucial for its success. We discuss different P2P lending marketplace models, and how information systems support the creation and management of these new marketplaces, and how they support the individuals involved. We conclude by providing some important research questions and directions, and issues for which further investigation is called.

  3. American Digital Security and Commerce Act of 2014

    THOMAS, 113th Congress

    Sen. Walsh, John E. [D-MT

    2014-06-19

    Senate - 06/19/2014 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. 77 FR 45927 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-02

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... ``6A001.a.1 does not control''. 0 B. On page 807, in paragraph a.1.a.1.a, remove ``20'' and add ``20[deg... for Control''. 0 5. In 6D001, on page 831, remove ``CIV: * * *'' and add ``CIV: N/A'' in its place. 0...

  5. Race, Internet Usage, and E-Commerce. Working Paper 2002-01

    ERIC Educational Resources Information Center

    Ono, Hiroshi; Zavodny, Madeline

    2002-01-01

    The authors examine racial and ethnic differences in computer ownership and Internet usage using data from a survey conducted by the Nomura Research Institute in 2000. They focus on on-line shopping because few studies have examined racial and ethnic differences in e-commerce. The results indicate that blacks and Hispanics are less likely to own…

  6. E-commerce in healthcare: changing the traditional landscape.

    PubMed

    Aggarwal, A K; Travers, S

    2001-01-01

    The healthcare industry, with more than one trillion dollars in revenue, accounts for about one-seventh of the U.S. economy. A significant portion of this revenue is lost to escalating healthcare system costs. This article examines the shortcomings of the traditional healthcare delivery system in terms of information flow, communication standards, case collections, and IT spending. It makes the case that e-commerce has the ability to transact some healthcare business more efficiently and cost-effectively. With the Internet as a delivery platform, several models offer improvement over the status quo.

  7. Security Analysis of Yeh-Tsai Security Mechanism

    NASA Astrophysics Data System (ADS)

    Yum, Dae Hyun; Shin, Jong Hoon; Lee, Pil Joong

    Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack.

  8. DOD Security Cooperation: An Overview of Authorities and Issues

    DTIC Science & Technology

    2016-08-23

    Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic

  9. 75 FR 36511 - Revisions to the Export Administration Regulations Based Upon a Systematic Review of the Commerce...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 734, 738, 740, 742, 772, and... Based Upon a Systematic Review of the Commerce Control List: Additional Changes AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This rule amends the Export Administration...

  10. Measuring e-Commerce service quality from online customer review using sentiment analysis

    NASA Astrophysics Data System (ADS)

    Kencana Sari, Puspita; Alamsyah, Andry; Wibowo, Sulistyo

    2018-03-01

    The biggest e-Commerce challenge to understand their market is to chart their level of service quality according to customer perception. The opportunities to collect user perception through online user review is considered faster methodology than conducting direct sampling methodology. To understand the service quality level, sentiment analysis methodology is used to classify the reviews into positive and negative sentiment for five dimensions of electronic service quality (e-Servqual). As case study in this research, we use Tokopedia, one of the biggest e-Commerce service in Indonesia. We obtain the online review comments about Tokopedia service quality during several month observations. The Naïve Bayes classification methodology is applied for the reason of its high-level accuracy and support large data processing. The result revealed that personalization and reliability dimension required more attention because have high negative sentiment. Meanwhile, trust and web design dimension have high positive sentiments that means it has very good services. The responsiveness dimension have balance sentiment positive and negative.

  11. Design of Instant Messaging System of Multi-language E-commerce Platform

    NASA Astrophysics Data System (ADS)

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  12. Secure E-mailing Between Physicians and Patients

    PubMed Central

    Garrido, Terhilda; Meng, Di; Wang, Jian J.; Palen, Ted E.; Kanter, Michael H.

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization. PMID:24887522

  13. Toward Effective and Compelling Instruction for High School eCommerce Students: Results from a Small Field Study

    ERIC Educational Resources Information Center

    Luterbach, Kenneth J.; Rodriguez, Diane; Love, Lakecia

    2012-01-01

    This paper describes an instructional development effort to create effective and compelling instruction for eCommerce students. Results from a small field study inform the development project. Four high school students in an eCommerce course completed the standalone tutorial developed to teach them how to create a web page in the HyperText Markup…

  14. 75 FR 14335 - Revisions to the Export Administration Regulations To Enhance U.S. Homeland Security: Addition of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to ensure that...

  15. The Development of B2C E-Commerce in Greece: Current Situation and Future Potential.

    ERIC Educational Resources Information Center

    Kardaras, Dimitris; Papathanassiou, Eleutherios

    2000-01-01

    Reports on the results of a survey of 120 companies in Greece that evaluated the potential of business to customer (B2C) Internet applications and investigated how the Internet and e-commerce can offer new opportunities for businesses to improve their customers' satisfaction. Discusses electronic commerce problems and future technology. (Contains…

  16. Native American Business Participation in E-Commerce: An Assessment of Technical Assistance and Training Needs.

    ERIC Educational Resources Information Center

    Bregendahl, Corry; Flora, Cornelia

    A combined outreach and research initiative addressed the participation of Native American business owners in electronic commerce. E-commerce can provide many benefits to producers and consumers but does not ensure unmitigated economic success. It is only one part of a development process leading to achievement of tribes' broader social goals,…

  17. The Campus Executive's Role in Security and Liability Issues.

    ERIC Educational Resources Information Center

    Bromley, Max; Territo, Leonard

    1986-01-01

    Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)

  18. Value-added benefits of technology: e-procurement and e-commerce related to the health care industry.

    PubMed

    Smith, Alan D; Correa, Joseph

    2005-01-01

    To provide insights into the current supply chain for original equipment manufacturers (OEM) in the radiology diagnostic imaging equipment business. As is common in many manufacturing and service firms, the rationale of bridging suppliers of OEMs is the ability to leverage technology, software, and accessories pertaining to the various pieces of equipment. Several models of e-procurement and e-commerce related to the health care industry are presented. Although the radiology capital equipment market presents numerous idiosyncrasies that must be addressed to successfully implement an e-business strategy effectively, incredible opportunities exist all along the supply chain for e-business strategies to both eliminate costs and acquire strategic initiatives. Those firms that most successfully listen to their customers and address the barriers to efficiency (B2E) will help move the industry toward more effective utilization of the benefits e-business can create and also obtain first mover advantages. Although the efficiencies that e-business provides are extremely important in the radiology capital equipment market, the main value of e-business in this industry of high-priced and relatively infrequently purchased equipment may well be the value-added benefits the technology brings to its customers, as illustrated in the modeling process. The OEMs that eventually market their finished product directly to hospital and imaging centers via a direct sales force can best take advantage of the connectivity and accessibility of e-commerce.

  19. Security, safety, and related technology - the triangle of eHealth service provision.

    PubMed

    Savastano, Mario; Hovsto, Asbjorn; Pharow, Peter; Blobel, Bernd

    2008-01-01

    The developing of innovative solutions in the emerging eHealth market requires strong economic efforts which may be justified only in presence of particularly suitable boundary conditions. Among the factors retained of primary importance for the development of eHealth, a correct approach to id-management is unanimously considered fundamental. Three keywords in the id-management context appear particularly important: standardization, security and safety. Standardization may contribute to increase the size and duration of the eHealth market, while security and safety may encourage all the stakeholders to trust in a appropriate and safe management of all the very sensitive personal data involved in the eHealth applications. The aim of the present paper is analyzing some security and safety issues in eHealth from the particular prospective of the identity management and standardization. The paper highlights the mission of the EU funded "BioHealth" project whose mission is to increase the stakeholders' knowledge about existing and emerging standards in eHealth with particular reference to identity management.

  20. 15 CFR 19.4 - What notice will Commerce entities send to a debtor when collecting a Commerce debt?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the Commerce entity intends to garnish the debtor's private sector (i.e., non-Federal) wages (see § 19.... 3201(e); 31 U.S.C. 3720B, 31 CFR 285.13, and § 19.17(a) of this Part); (16) If applicable, the Commerce... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false What notice will Commerce entities...

  1. 15 CFR 19.4 - What notice will Commerce entities send to a debtor when collecting a Commerce debt?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the Commerce entity intends to garnish the debtor's private sector (i.e., non-Federal) wages (see § 19.... 3201(e); 31 U.S.C. 3720B, 31 CFR 285.13, and § 19.17(a) of this Part); (16) If applicable, the Commerce... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false What notice will Commerce entities...

  2. 15 CFR 19.4 - What notice will Commerce entities send to a debtor when collecting a Commerce debt?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the Commerce entity intends to garnish the debtor's private sector (i.e., non-Federal) wages (see § 19.... 3201(e); 31 U.S.C. 3720B, 31 CFR 285.13, and § 19.17(a) of this Part); (16) If applicable, the Commerce... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false What notice will Commerce entities...

  3. 15 CFR 19.4 - What notice will Commerce entities send to a debtor when collecting a Commerce debt?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... the Commerce entity intends to garnish the debtor's private sector (i.e., non-Federal) wages (see § 19.... 3201(e); 31 U.S.C. 3720B, 31 CFR 285.13, and § 19.17(a) of this Part); (16) If applicable, the Commerce... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false What notice will Commerce entities...

  4. 16 CFR 240.6 - Interstate commerce.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...(d) and 2(e) of the Act. (The commerce standard for sections 2 (d) and (e) is at least as inclusive... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Interstate commerce. 240.6 Section 240.6... ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.6 Interstate commerce. The term interstate...

  5. 16 CFR 240.6 - Interstate commerce.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...(d) and 2(e) of the Act. (The commerce standard for sections 2 (d) and (e) is at least as inclusive... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Interstate commerce. 240.6 Section 240.6... ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.6 Interstate commerce. The term interstate...

  6. 16 CFR 240.6 - Interstate commerce.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...(d) and 2(e) of the Act. (The commerce standard for sections 2 (d) and (e) is at least as inclusive... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Interstate commerce. 240.6 Section 240.6... ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.6 Interstate commerce. The term interstate...

  7. 16 CFR 240.6 - Interstate commerce.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...(d) and 2(e) of the Act. (The commerce standard for sections 2 (d) and (e) is at least as inclusive... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interstate commerce. 240.6 Section 240.6... ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.6 Interstate commerce. The term interstate...

  8. 16 CFR 240.6 - Interstate commerce.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...(d) and 2(e) of the Act. (The commerce standard for sections 2 (d) and (e) is at least as inclusive... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Interstate commerce. 240.6 Section 240.6... ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.6 Interstate commerce. The term interstate...

  9. 17 CFR 250.52 - Exemption of issue and sale of certain securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... business of the subsidiary company; and (2) The interest rates and maturity dates of any debt security... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of certain securities. 250.52 Section 250.52 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  10. Individual Differences in Learning Entrepreneurship and Their Implications for Web-Based Instruction in E-Business and E-Commerce.

    ERIC Educational Resources Information Center

    Foster, Jonathan; Lin, Angela

    2003-01-01

    Discusses results from a survey of graduates following a module in e-business and e-commerce at the University of Sheffield that suggest differences in prior knowledge and cultural background impact students' acquisition of domain knowledge and intellectual and information research skills. Considers implications for Web-based instruction.…

  11. US National Economic Security in a Global Market

    DTIC Science & Technology

    1990-01-01

    13 (D) the Secretary of Commerce , 14 ( E ) the Secretary of Treasury, 15 (F) the United States Trade Representative, 16 and _ 17 (G) the Director of...OTe F!LE COPY --- National Security Program 00 N US NATIONAL ECONOMIC SECURITY IN A GLOBAL MARKET :I . DTIC ELECTE JAN14 1991 m S E D HARVARD...importantly, will become 5 I I ,,!"C is merica _ _ _ _ 44% 5AlAN leact rustwrthv __ 29% ’,’EST (E7,1RM.’y ,a ]i,- :. . 8 %FFR ANC E - 5% BRITAIN Does Jaan

  12. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    DOT National Transportation Integrated Search

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  13. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  14. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  15. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  16. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  17. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  18. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-02-26

    climate change ;  ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and  increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen

  19. Quantifying Security Threats and Their Potential Impacts: A Case Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this infrastructure by means of an e-commerce application.

  20. From EDI to Internet Commerce: The BHP Steel Experience.

    ERIC Educational Resources Information Center

    Chan, Caroline; Swatman, Paula M. C.

    2000-01-01

    Discusses the issue of business-to-business electronic commerce implementation and the factors affecting it. Discusses electronic data interchange technology, describes the results of a case study of BHP Steel (Australia), and considers paradigm shifts in implementation issues related to electronic commerce that occur over time. (Author/LRW)

  1. 15 CFR 758.5 - Conformity of documents and unloading of items.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... disposition from BIS. (ii) Contact information. U.S. Department of Commerce, Bureau of Industry and Security... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION... documents. When a license is issued by BIS, the information entered on related export control documents (e.g...

  2. MAC layer security issues in wireless mesh networks

    NASA Astrophysics Data System (ADS)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  3. Transparent Proxy for Secure E-Mail

    NASA Astrophysics Data System (ADS)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  4. Managing Campus Security: Issues for Police Officers at Public Institutions.

    ERIC Educational Resources Information Center

    Dwyer, William O.; And Others

    1994-01-01

    To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)

  5. The Ministry of Commerce and Industry

    Science.gov Websites

    Commerce Minister Participates In The Celebration Of The World Intellectual Property Day Program Deputy Commerce Minister Participates In The Celebration Of The World Intellectual Property Day Program Hon the World Trade Organization at the e-Commerce Week Commerce Minister meets with the Director-General

  6. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    ERIC Educational Resources Information Center

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  7. Security and privacy issues with health care information technology.

    PubMed

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  8. 17 CFR 250.8 - Exemption of subsidiaries subject to jurisdiction of Interstate Commerce Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... subject to jurisdiction of Interstate Commerce Commission. 250.8 Section 250.8 Commodity and Securities... to jurisdiction of Interstate Commerce Commission. Any subsidiary company of a registered holding company, which subsidiary is subject to the jurisdiction of the Interstate Commerce Commission but is not...

  9. 17 CFR 250.8 - Exemption of subsidiaries subject to jurisdiction of Interstate Commerce Commission.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... subject to jurisdiction of Interstate Commerce Commission. 250.8 Section 250.8 Commodity and Securities... to jurisdiction of Interstate Commerce Commission. Any subsidiary company of a registered holding company, which subsidiary is subject to the jurisdiction of the Interstate Commerce Commission but is not...

  10. A nonlinear dynamic age-structured model of e-commerce in spain: Stability analysis of the equilibrium by delay and stochastic perturbations

    NASA Astrophysics Data System (ADS)

    Burgos, C.; Cortés, J.-C.; Shaikhet, L.; Villanueva, R.-J.

    2018-11-01

    First, we propose a deterministic age-structured epidemiological model to study the diffusion of e-commerce in Spain. Afterwards, we determine the parameters (death, birth and growth rates) of the underlying demographic model as well as the parameters (transmission of the use of e-commerce rates) of the proposed epidemiological model that best fit real data retrieved from the Spanish National Statistical Institute. Motivated by the two following facts: first the dynamics of acquiring the use of a new technology as e-commerce is mainly driven by the feedback after interacting with our peers (family, friends, mates, mass media, etc.), hence having a certain delay, and second the inherent uncertainty of sampled real data and the social complexity of the phenomena under analysis, we introduce aftereffect and stochastic perturbations in the initial deterministic model. This leads to a delayed stochastic model for e-commerce. We then investigate sufficient conditions in order to guarantee the stability in probability of the equilibrium point of the dynamic e-commerce delayed stochastic model. Our theoretical findings are numerically illustrated using real data.

  11. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bruce, Joseph R.; Fink, Glenn A.

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset andmore » test the output of the system.« less

  12. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto

  13. Electronic Commerce and Competitive Procurement

    DTIC Science & Technology

    1991-06-01

    electronic commerce techniques ( electronic Jata interchange (EDI). electronic mail ( E -mail), electronic bulletin boards and facsimile] to competitive ...The ability to conduct discussions and negotiations with offerors electronically by E -mail supports the competitive proposal solicitation method...software vendors understand the dimensions of the DoD electronic commerce market , they may through competitive forces provide EDI capability. If their

  14. Managing Business-to-Business Relationships throughout the E-Commerce Procurement Life Cycle.

    ERIC Educational Resources Information Center

    Archer, Norm; Yuan, Yufei

    2000-01-01

    Since the core of e-commerce is information and communications, support for managing customer relationships is available to those who know how to use it. Discusses how technology can be used to encourage and facilitate customer-business relationships. Shows through a customer relationship life cycle model how the management of related procurement…

  15. The Relationship between Retailers' Targeting and E-Commerce Strategies: An Empirical Analysis.

    ERIC Educational Resources Information Center

    Doherty, Neil F.; Ellis-Chadwick, Fiona E.

    2003-01-01

    This survey of senior marketing executives in the United Kingdom's largest retail organizations investigated the extent to which the adoption of e-commerce is influenced by the socio-demographic characteristics of their target customers. Results demonstrate that organizations are most likely to adopt the Internet if their typical customer is male,…

  16. 17 CFR 270.12d3-1 - Exemption of acquisitions of securities issued by persons engaged in securities related businesses.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...

  17. The research of network database security technology based on web service

    NASA Astrophysics Data System (ADS)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  18. Developing and Validating Personas in e-Commerce: A Heuristic Approach

    NASA Astrophysics Data System (ADS)

    Thoma, Volker; Williams, Bryn

    A multi-method persona development process in a large e-commerce business is described. Personas are fictional representations of customers that describe typical user attributes to facilitate a user-centered approach in interaction design. In the current project persona attributes were derived from various data sources, such as stakeholder interviews, user tests and interviews, data mining, customer surveys, and ethnographic (direct observation, diary studies) research. The heuristic approach of using these data sources conjointly allowed for an early validation of relevant persona dimensions.

  19. Portalen Handelsplats Wermland — Practical E-commerce for Värmland's Businesses and Municipalities

    NASA Astrophysics Data System (ADS)

    Peterson, Ulrika Obstfelder; Borg, Ulf

    Portalen Handelsplats Wermland (Portal Meetingpoint Wermland) offers a range of services designed by the Wermland Chamber of Commerce to permit the cost-effective exchange of electronic messages, including invoicing, ordering, certification and procurement. The portal meets the needs and expectations faced by businesses, both large and small, in the area of e-commerce. The portal also provides a way for businesses to share the cost of applications and equipment. As a result, they enjoy greater flexibility with their partners and more efficient internal procedures. Most importantly, the portal represents a local, impartial effort to strengthen Varmland's private sector and open up avenues that are beyond the financial means of individual businesses.

  20. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    PubMed Central

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps

  1. Addressing the Economic Security Issues Facing Same-Sex Couples.

    ERIC Educational Resources Information Center

    Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael

    1999-01-01

    Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)

  2. Health care data security: one size does not fit all.

    PubMed

    Krohn, R

    2001-11-01

    In the wake of the Internet, E-commerce, and particularly the Health Insurance Portability and Accountability Act, data security has risen to the top of health care information technology priorities. What is the correct mix of data security tools, policies, and technologies for the doctor, the hospital, the insurer, the vendor, and everyone else who does business in the health care industry?

  3. 15 CFR 19.20 - How do other Federal agencies use the offset process to collect debts from payments issued by a...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... action will be taken to collect a debt from a payment issued by a Commerce entity. (e) Review. A Commerce... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false How do other Federal agencies use the offset process to collect debts from payments issued by a Commerce entity? 19.20 Section 19.20 Commerce...

  4. 15 CFR 19.20 - How do other Federal agencies use the offset process to collect debts from payments issued by a...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... action will be taken to collect a debt from a payment issued by a Commerce entity. (e) Review. A Commerce... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false How do other Federal agencies use the offset process to collect debts from payments issued by a Commerce entity? 19.20 Section 19.20 Commerce...

  5. 15 CFR 19.20 - How do other Federal agencies use the offset process to collect debts from payments issued by a...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... action will be taken to collect a debt from a payment issued by a Commerce entity. (e) Review. A Commerce... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false How do other Federal agencies use the offset process to collect debts from payments issued by a Commerce entity? 19.20 Section 19.20 Commerce...

  6. 15 CFR 19.20 - How do other Federal agencies use the offset process to collect debts from payments issued by a...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... action will be taken to collect a debt from a payment issued by a Commerce entity. (e) Review. A Commerce... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false How do other Federal agencies use the offset process to collect debts from payments issued by a Commerce entity? 19.20 Section 19.20 Commerce...

  7. 15 CFR 19.20 - How do other Federal agencies use the offset process to collect debts from payments issued by a...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... action will be taken to collect a debt from a payment issued by a Commerce entity. (e) Review. A Commerce... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false How do other Federal agencies use the offset process to collect debts from payments issued by a Commerce entity? 19.20 Section 19.20 Commerce...

  8. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  9. Product competitiveness analysis for e-commerce platform of special agricultural products

    NASA Astrophysics Data System (ADS)

    Wan, Fucheng; Ma, Ning; Yang, Dongwei; Xiong, Zhangyuan

    2017-09-01

    On the basis of analyzing the influence factors of the product competitiveness of the e-commerce platform of the special agricultural products and the characteristics of the analytical methods for the competitiveness of the special agricultural products, the price, the sales volume, the postage included service, the store reputation, the popularity, etc. were selected in this paper as the dimensionality for analyzing the competitiveness of the agricultural products, and the principal component factor analysis was taken as the competitiveness analysis method. Specifically, the web crawler was adopted to capture the information of various special agricultural products in the e-commerce platform ---- chi.taobao.com. Then, the original data captured thereby were preprocessed and MYSQL database was adopted to establish the information library for the special agricultural products. Then, the principal component factor analysis method was adopted to establish the analysis model for the competitiveness of the special agricultural products, and SPSS was adopted in the principal component factor analysis process to obtain the competitiveness evaluation factor system (support degree factor, price factor, service factor and evaluation factor) of the special agricultural products. Then, the linear regression method was adopted to establish the competitiveness index equation of the special agricultural products for estimating the competitiveness of the special agricultural products.

  10. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  11. Understanding food security issues in remote Western Australian Indigenous communities.

    PubMed

    Pollard, Christina M; Nyaradi, Anett; Lester, Matthew; Sauer, Kay

    2014-08-01

    Food insecurity in remote Western Australian (WA) Indigenous communities. This study explored remote community store managers' views on issues related to improving food security in order to inform health policy. A census of all remote WA Indigenous community store managers was conducted in 2010. Telephone interviews sought managers' perceptions of community food insecurity, problems with their store, and potential policy options for improving the supply, accessibility, affordability and consumption of nutritious foods. Descriptive analyses were conducted using SPSS for Windows version 17.0. Managers stated that freight costs and irregular deliveries contributed to high prices and a limited range of foods. Poor store infrastructure, compromised cold chain logistics, and commonly occurring power outages affected food quality. Half of the managers said there was hunger in their community because people did not have enough money to buy food. The role of nutritionists beyond a clinical and educational role was not understood. Food security interventions in remote communities need to take into consideration issues such as freight costs, transport and low demand for nutritious foods. Store managers provide important local knowledge regarding the development and implementation of food security interventions. SO WHAT? Agencies acting to address the issue of food insecurity in remote WA Indigenous communities should heed the advice of community store managers that high food prices, poor quality and limited availability are mainly due to transport inefficiencies and freight costs. Improving healthy food affordability in communities where high unemployment and low household income abound is fundamental to improving food security, yet presents a significant challenge.

  12. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    PubMed

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  13. A multi-stage heuristic algorithm for matching problem in the modified miniload automated storage and retrieval system of e-commerce

    NASA Astrophysics Data System (ADS)

    Wang, Wenrui; Wu, Yaohua; Wu, Yingying

    2016-05-01

    E-commerce, as an emerging marketing mode, has attracted more and more attention and gradually changed the way of our life. However, the existing layout of distribution centers can't fulfill the storage and picking demands of e-commerce sufficiently. In this paper, a modified miniload automated storage/retrieval system is designed to fit these new characteristics of e-commerce in logistics. Meanwhile, a matching problem, concerning with the improvement of picking efficiency in new system, is studied in this paper. The problem is how to reduce the travelling distance of totes between aisles and picking stations. A multi-stage heuristic algorithm is proposed based on statement and model of this problem. The main idea of this algorithm is, with some heuristic strategies based on similarity coefficients, minimizing the transportations of items which can not arrive in the destination picking stations just through direct conveyors. The experimental results based on the cases generated by computers show that the average reduced rate of indirect transport times can reach 14.36% with the application of multi-stage heuristic algorithm. For the cases from a real e-commerce distribution center, the order processing time can be reduced from 11.20 h to 10.06 h with the help of the modified system and the proposed algorithm. In summary, this research proposed a modified system and a multi-stage heuristic algorithm that can reduce the travelling distance of totes effectively and improve the whole performance of e-commerce distribution center.

  14. 17 CFR 240.3a12-10 - Exemption of certain securities issued by the Resolution Funding Corporation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities issued by the Resolution Funding Corporation. 240.3a12-10 Section 240.3a12-10 Commodity and... Exemptions § 240.3a12-10 Exemption of certain securities issued by the Resolution Funding Corporation. Securities that are issued by the Resolution Funding Corporation pursuant to section 21B(f) of the Federal...

  15. 76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639; 39-2474; File No. S7-22-11] RIN 3235-AL16 Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies AGENCY: Securities and Exchange Commission. ACTION: Proposed rules. SUMMARY: We are...

  16. Designing Tools for Supporting User Decision-Making in e-Commerce

    NASA Astrophysics Data System (ADS)

    Sutcliffe, Alistair; Al-Qaed, Faisal

    The paper describes a set of tools designed to support a variety of user decision-making strategies. The tools are complemented by an online advisor so they can be adapted to different domains and users can be guided to adopt appropriate tools for different choices in e-commerce, e.g. purchasing high-value products, exploring product fit to users’ needs, or selecting products which satisfy requirements. The tools range from simple recommenders to decision support by interactive querying and comparison matrices. They were evaluated in a scenario-based experiment which varied the users’ task and motivation, with and without an advisor agent. The results show the tools and advisor were effective in supporting users and agreed with the predictions of ADM (adaptive decision making) theory, on which the design of the tools was based.

  17. GHX, Broadlane form latest e-commerce linkup.

    PubMed

    2002-08-01

    Broadlane agreed in June to connect its electronic commerce system to the supplier-owned site run by GHX. As a result, contract compliance could either improve or be more easily evaded, depending on hospitals' response to the wider choice of suppliers.

  18. Improving the quality of e-commerce web service: what is important for the request scheduling algorithm?

    NASA Astrophysics Data System (ADS)

    Suchacka, Grazyna

    2005-02-01

    The paper concerns a new research area that is Quality of Web Service (QoWS). The need for QoWS is motivated by a still growing number of Internet users, by a steady development and diversification of Web services, and especially by popularization of e-commerce applications. The goal of the paper is a critical analysis of the literature concerning scheduling algorithms for e-commerce Web servers. The paper characterizes factors affecting the load of the Web servers and discusses ways of improving their efficiency. Crucial QoWS requirements of the business Web server are identified: serving requests before their individual deadlines, supporting user session integrity, supporting different classes of users and minimizing a number of rejected requests. It is justified that meeting these requirements and implementing them in an admission control (AC) and scheduling algorithm for the business Web server is crucial to the functioning of e-commerce Web sites and revenue generated by them. The paper presents results of the literature analysis and discusses algorithms that implement these important QoWS requirements. The analysis showed that very few algorithms take into consideration the above mentioned factors and that there is a need for designing an algorithm implementing them.

  19. Earth Science Goes E-Commerce

    NASA Technical Reports Server (NTRS)

    2000-01-01

    Software packages commercially marketed by Agri ImaGIS allow customers to analyze farm fields. Agri ImaGIS provides satellite images of farmland and agricultural views to US clients. The company approached NASA-MSU TechLink for access to technology that would improve the company's capabilities to deliver satellite images over the Internet. TechLink found that software with the desired functions had already been developed through NASA's Remote Sensing Database Program. Agri ImaGIS formed a partnership with the University of Minnesota group that allows the company to further develop the software to meet its Internet commerce needs.

  20. How Standard Are the Standard Barriers to E-commerce Adoption? Empirical Evidence from Australia, Sweden and the USA

    NASA Astrophysics Data System (ADS)

    Macflregor, Robert; Vrazalic, Lejla; Carlsson, Sten; Pratt, Jean; Harris, Matthew

    Despite their size, small to medium enterprises (SMEs) are increasingly turning to global markets. This development has been enabled by the advent of electronic commerce technology. There are numerous definitions of e-comrnerce in the literature, however, fundamentally e-commerce can best be described as "the buying and selling of information, products, and services via computer networks" (Kalakota & Whinston, 997, p.3). Ecommerce has the potential to become a source of competitive advantage to the SME sector because it is a cost effective way of accessing customers and being 'wired to the global marketplace'.

  1. Smart Aerospace eCommerce: Using Intelligent Agents in a NASA Mission Services Ordering Application

    NASA Technical Reports Server (NTRS)

    Moleski, Walt; Luczak, Ed; Morris, Kim; Clayton, Bill; Scherf, Patricia; Obenschain, Arthur F. (Technical Monitor)

    2002-01-01

    This paper describes how intelligent agent technology was successfully prototyped and then deployed in a smart eCommerce application for NASA. An intelligent software agent called the Intelligent Service Validation Agent (ISVA) was added to an existing web-based ordering application to validate complex orders for spacecraft mission services. This integration of intelligent agent technology with conventional web technology satisfies an immediate NASA need to reduce manual order processing costs. The ISVA agent checks orders for completeness, consistency, and correctness, and notifies users of detected problems. ISVA uses NASA business rules and a knowledge base of NASA services, and is implemented using the Java Expert System Shell (Jess), a fast rule-based inference engine. The paper discusses the design of the agent and knowledge base, and the prototyping and deployment approach. It also discusses future directions and other applications, and discusses lessons-learned that may help other projects make their aerospace eCommerce applications smarter.

  2. Inter-organizational future proof EHR systems. A review of the security and privacy related issues.

    PubMed

    van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan

    2009-03-01

    Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.

  3. Positive Examples and Lessons Learned from Rural Small Business Adoption of E-Commerce Strategies

    ERIC Educational Resources Information Center

    Lamie, R. David; Barkley, David L.; Markley, Deborah M.

    2011-01-01

    Rural small businesses struggling against the current of competition from "big box" retailers, weak consumer demand, and on-line shopping options must find strategies that work. Many are finding that adoption of e-commerce strategies is a key to survival, even prosperity. This article highlights the lessons learned from a recent case study…

  4. eCX: A Secure Infrastructure for E-Course Delivery.

    ERIC Educational Resources Information Center

    Yau, Joe C. K; Hui, Lucas C. K.; Cheung, Bruce; Yiu, S. M.

    2003-01-01

    Presents a mechanism, the Secure e-Course eXchange (eCX) designed to protect learning material from unauthorized dissemination, and shows how this mechanism can be integrated in the operation model of online learning course providers. The design of eCX is flexible to fit two operating models, the Institutional Server Model and the Corporate Server…

  5. 17 CFR 230.488 - Effective date of registration statements relating to securities to be issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...

  6. Choices in International Conflict: With a Focus on Security Issues in Asia.

    ERIC Educational Resources Information Center

    Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James

    Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…

  7. Portfolio Purchasing Decision for Mobile Power Equipment of B2C E-Commerce Export Retailer Based on CVaR

    NASA Astrophysics Data System (ADS)

    Yanchun, Wan; Qiucen, Chen

    2017-11-01

    Purchasing is an important part of export e-commerce of B2C, which plays an important role on risk and cost control in supply management. From the perspective of risk control, the paper construct a CVaR model for portfolio purchase. We select a heavy sales mobile power equipment from a typical B2C e-commerce export retailer as study sample. This study optimizes the purchasing strategy of this type of mobile power equipment. The research has some reference for similar enterprises in purchasing portfolio decision.

  8. Space Commerce 1994 Forum: The 10th National Space Symposium. Proceedings report

    NASA Astrophysics Data System (ADS)

    Lipskin, Beth Ann; Patterson, Sara; Aragon, Larry; Brescia, David A.; Flannery, Jack; Mossey, Roberty; Regan, Christopher; Steeby, Kurt; Suhr, Stacy; Zimkas, Chuck

    1994-04-01

    The theme of the 10th National Space Symposium was 'New Windows of Opportunity'. These proceedings cover the following: Business Trends in High Tech Commercialization; How to Succeed in Space Technology Business -- Making Dollars and Sense; Obstacles and Opportunities to Success in Technology Commercialization NASA's Commercial Technology Mission -- a New Way of Doing Business: Policy and Practices; Field Center Practices; Practices in Action -- A New Way: Implementation and Business Opportunities; Space Commerce Review; Windows of Opportunity; the International Space Station; Space Support Forum; Spacelift Update; Competitive Launch Capabilities; Supporting Life on Planet Earth; National Security Space Issues; NASA in the Balance; Earth and Space Observations -- Did We Have Cousins on Mars?; NASA: A New Vision for Science; and Space Technology Hall of Fame.

  9. Space Commerce 1994 Forum: The 10th National Space Symposium. Proceedings report

    NASA Technical Reports Server (NTRS)

    Lipskin, Beth Ann (Editor); Patterson, Sara (Editor); Aragon, Larry (Editor); Brescia, David A. (Editor); Flannery, Jack (Editor); Mossey, Roberty (Editor); Regan, Christopher (Editor); Steeby, Kurt (Editor); Suhr, Stacy (Editor); Zimkas, Chuck (Editor)

    1994-01-01

    The theme of the 10th National Space Symposium was 'New Windows of Opportunity'. These proceedings cover the following: Business Trends in High Tech Commercialization; How to Succeed in Space Technology Business -- Making Dollars and Sense; Obstacles and Opportunities to Success in Technology Commercialization NASA's Commercial Technology Mission -- a New Way of Doing Business: Policy and Practices; Field Center Practices; Practices in Action -- A New Way: Implementation and Business Opportunities; Space Commerce Review; Windows of Opportunity; the International Space Station; Space Support Forum; Spacelift Update; Competitive Launch Capabilities; Supporting Life on Planet Earth; National Security Space Issues; NASA in the Balance; Earth and Space Observations -- Did We Have Cousins on Mars?; NASA: A New Vision for Science; and Space Technology Hall of Fame.

  10. WWREX: A case study in the development of Internet E-Commerce in the energy industry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yeich, K.; Horner, D.; Dunn, A.

    Even more so than the World Wide Web, the utility industry is undergoing a massive deregulation that is turning it into a Wild West environment that has fostered fierce competition, new technology and new services in the energy marketplace. It has become increasingly complex for consumers, suppliers and utilities to buy and sell energy at the best prices. With the help of the Internet, Per-Se Technologies and North American Power have developed the World Wide Retail Energy eXchange (WWREX): a real-time, Web-based electronic commerce application that matches suppliers of electricity and natural gas with potential customers online. This service ismore » the first online application to facilitate the buying and selling of energy via the Internet. Designed to take advantage of the deregulated utilities marketplace, REX benefits multiple market players. With REX, business energy consumers can buy energy at the best price, from multiple suppliers and with significant time and cost reductions. Suppliers can instantly access new customer bases and close efficient, bulk transactions without the traditional sales and marketing costs associated with selling to a diverse set of consumers. The challenges and solutions of this project illustrate the technologies and techniques in creating a viable E-Commerce application. The resulting system provides effective electronic commerce and solves a critical business need at a relatively low cost.« less

  11. EpiBasket: how e-commerce tools can improve epidemiological preparedness

    PubMed Central

    Xing, Weijia; Hejblum, Gilles; Valleron, Alain-Jacques

    2013-01-01

    Background Should an emerging infectious disease outbreak or an environmental disaster occur, the collection of epidemiological data must start as soon as possible after the event's onset. Questionnaires are usually built de novo for each event, resulting in substantially delayed epidemiological responses that are detrimental to the understanding and control of the event considered. Moreover, the public health and/or academic institution databases constructed with responses to different questionnaires are usually difficult to merge, impairing necessary collaborations. We aimed to show that e-commerce concepts and software tools can be readily adapted to enable rapid collection of data after an infectious disease outbreak or environmental disaster. Here, the ‘customers’ are the epidemiologists, who fill their shopping ‘baskets’ with standardised questions. Methods For each epidemiological field, a catalogue of questions is constituted by identifying the relevant variables based on a review of the published literature on similar circumstances. Each question is tagged with information on its source papers. Epidemiologists can then tailor their own questionnaires by choosing appropriate questions from this catalogue. The software immediately provides them with ready-to-use forms and online questionnaires. All databases constituted by the different EpiBasket users are interoperable, because the corresponding questionnaires are derived from the same corpus of questions. Results A proof-of-concept prototype was developed for Knowledge, Attitudes and Practice (KAP) surveys, which is one of the fields of the epidemiological investigation frequently explored during, or after, an outbreak or environmental disaster. The catalogue of questions was initiated from a review of the KAP studies conducted during or after the 2003 severe acute respiratory syndrome epidemic. Conclusion Rapid collection of standardised data after an outbreak or environmental disaster can be

  12. EpiBasket: how e-commerce tools can improve epidemiological preparedness.

    PubMed

    Xing, Weijia; Hejblum, Gilles; Valleron, Alain-Jacques

    2013-10-31

    Should an emerging infectious disease outbreak or an environmental disaster occur, the collection of epidemiological data must start as soon as possible after the event's onset. Questionnaires are usually built de novo for each event, resulting in substantially delayed epidemiological responses that are detrimental to the understanding and control of the event considered. Moreover, the public health and/or academic institution databases constructed with responses to different questionnaires are usually difficult to merge, impairing necessary collaborations. We aimed to show that e-commerce concepts and software tools can be readily adapted to enable rapid collection of data after an infectious disease outbreak or environmental disaster. Here, the 'customers' are the epidemiologists, who fill their shopping 'baskets' with standardised questions. For each epidemiological field, a catalogue of questions is constituted by identifying the relevant variables based on a review of the published literature on similar circumstances. Each question is tagged with information on its source papers. Epidemiologists can then tailor their own questionnaires by choosing appropriate questions from this catalogue. The software immediately provides them with ready-to-use forms and online questionnaires. All databases constituted by the different EpiBasket users are interoperable, because the corresponding questionnaires are derived from the same corpus of questions. A proof-of-concept prototype was developed for Knowledge, Attitudes and Practice (KAP) surveys, which is one of the fields of the epidemiological investigation frequently explored during, or after, an outbreak or environmental disaster. The catalogue of questions was initiated from a review of the KAP studies conducted during or after the 2003 severe acute respiratory syndrome epidemic. Rapid collection of standardised data after an outbreak or environmental disaster can be facilitated by transposing the e-commerce paradigm

  13. Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Steinebach, Martin; Wohlmacher, Petra; Ackermann, Ralf

    2002-12-01

    Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulations recognition. In this paper, we show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-Commerce to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work we discuss, which methods can be used for establishing services in a fast convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.

  14. 15 CFR 19.21 - What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) of this section. (e) Request for hearing official. A Commerce entity will provide a hearing official... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce entity employee to collect a debt owed by the...

  15. 15 CFR 19.21 - What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) of this section. (e) Request for hearing official. A Commerce entity will provide a hearing official... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce entity employee to collect a debt owed by the...

  16. 15 CFR 19.21 - What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) of this section. (e) Request for hearing official. A Commerce entity will provide a hearing official... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce entity employee to collect a debt owed by the...

  17. 15 CFR 19.21 - What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) of this section. (e) Request for hearing official. A Commerce entity will provide a hearing official... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce entity employee to collect a debt owed by the...

  18. 15 CFR 19.21 - What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) of this section. (e) Request for hearing official. A Commerce entity will provide a hearing official... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false What does a Commerce entity do upon receipt of a request to offset the salary of a Commerce entity employee to collect a debt owed by the...

  19. A security scheme of SMS system

    NASA Astrophysics Data System (ADS)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  20. Exploring the e-cigarette e-commerce marketplace: Identifying Internet e-cigarette marketing characteristics and regulatory gaps.

    PubMed

    Mackey, Tim K; Miner, Angela; Cuomo, Raphael E

    2015-11-01

    The electronic cigarette (e-cigarette) market is maturing into a billion-dollar industry. Expansion includes new channels of access not sufficiently assessed, including Internet sales of e-cigarettes. This study identifies unique e-cigarette Internet vendor characteristics, including geographic location, promotional strategies, use of social networking, presence/absence of age verification, and consumer warning representation. We performed structured Internet search engine queries and used inclusion/exclusion criteria to identify e-cigarette vendors. We then conducted content analysis of characteristics of interest. Our examination yielded 57 e-cigarette Internet vendors including 54.4% (n=31) that sold exclusively online. The vast majority of websites (96.5%, n=55) were located in the U.S. Vendors used a variety of sales promotion strategies to market e-cigarettes including 70.2% (n=40) that used more than one social network service (SNS) and 42.1% (n=24) that used more than one promotional sales strategies. Most vendors (68.4%, n=39) displayed one or more health warnings on their website, but often displayed them in smaller font or in their terms and conditions. Additionally, 35.1% (n=20) of vendors did not have any detectable age verification process. E-cigarette Internet vendors are actively engaged in various promotional activities to increase the appeal and presence of their products online. In the absence of FDA regulations specific to the Internet, the e-cigarette e-commerce marketplace is likely to grow. This digital environment poses unique challenges requiring targeted policy-making including robust online age verification, monitoring of SNS marketing, and greater scrutiny of certain forms of marketing promotional practices. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  1. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...

  2. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...

  3. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...

  4. Accounting Issues: An Essay Series Part VI--Investments in Securities

    ERIC Educational Resources Information Center

    Laux, Judy

    2008-01-01

    The sixth in a series of theory-based essays, this article presents accounting for investments in debt and equity securities along with some related conceptual and measurement issues. Additional coverage is devoted to potential ethical dilemmas and both theoretical and empirical literature related to this asset. (Contains 1 footnote.)

  5. Application of the API/NPRA SVA methodology to transportation security issues.

    PubMed

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  6. Getting real about virtual commerce.

    PubMed

    Evans, P; Wurster, T S

    1999-01-01

    In its first generation, electronic commerce has been a landgrab. Space on the Internet was claimed by whoever got there first with enough resources to create a credible business. It took speed, a willingness to experiment, and a lot of cybersavvy. Companies that had performed brilliantly in traditional settings seemed hopelessly flat-footed on the Web. And despite their astronomical valuations, the new e-commerce stars have appeared to be just as confused. Many have yet to make a profit, and no one has any idea when they will. Now, the authors contend, we are entering the second generation of e-commerce, and it will be shaped more by strategy than by experimentation. The key players--branded-goods suppliers, physical retailers, electronic retailers, and pure navigators--will shift their attention from claiming territory to defending or capturing it. They will be forced to focus on strategies to achieve competitive advantage. Success will go to the businesses that get closest to consumers, the ones that help customers navigate their way through the Web. Indeed, the authors argue, navigation is the battlefield on which competitive advantage will be won or lost. There are three dimensions of navigation: Reach is about access and connection. Affiliation is about whose interests the business represents. And richness is the depth of the information that a business gives to or collects about its customers. Navigators and e-retailers have the natural advantage in reach and affiliation, while traditional product suppliers and retailers have the edge in richness. The authors offer practical advice to each player on competing in the second generation of e-commerce.

  7. Individual social security accounts: issues in assessing administrative feasibility and costs.

    PubMed

    Olsen, K A; Salisbury, D L

    1998-11-01

    Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more

  8. Commerce Lab: Mission analysis and payload integration study

    NASA Technical Reports Server (NTRS)

    1984-01-01

    The needs of an aggressive commercial microgravity program are identified, space missions are defined, and infrastructural issues are identified and analyzed. A commercial laboratory, commerce lab, is conceived to be one or more an array of carriers which would fly aboard the space shuttle and accommodate microgravity science experiment payloads. Commerce lab is seen as a logical transition between currently planned space shuttle missions and future microgravity missions centered around the space station.

  9. 32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Personnel Security Determination Authorities E Appendix E to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. E Appendix E to Part 154—Personnel...

  10. E-mail security. An overview of threats and safeguards.

    PubMed

    Stine, Kevin; Scholl, Matthew

    2010-04-01

    Not everyone in the organization needs to know how to secure the e-mail service, but anyone who handles patient information must understand e-mail's vulnerabilities and recognize when a system is secure enough to transmit sensitive information.

  11. An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles

    NASA Astrophysics Data System (ADS)

    Moriyama, Daisuke; Okamoto, Tatsuaki

    This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia, Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).

  12. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    PubMed

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  13. 13 CFR 107.1505 - Liquidity requirements for Licensees issuing Participating Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Liquidity requirements for Licensees issuing Participating Securities. 107.1505 Section 107.1505 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...

  14. A Buyer Behaviour Framework for the Development and Design of Software Agents in E-Commerce.

    ERIC Educational Resources Information Center

    Sproule, Susan; Archer, Norm

    2000-01-01

    Software agents are computer programs that run in the background and perform tasks autonomously as delegated by the user. This paper blends models from marketing research and findings from the field of decision support systems to build a framework for the design of software agents to support in e-commerce buying applications. (Contains 35…

  15. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions

    NASA Astrophysics Data System (ADS)

    Gupta, Ankur; Awasthi, Lalit K.

    Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.

  16. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  17. Agent-based services for B2B electronic commerce

    NASA Astrophysics Data System (ADS)

    Fong, Elizabeth; Ivezic, Nenad; Rhodes, Tom; Peng, Yun

    2000-12-01

    The potential of agent-based systems has not been realized yet, in part, because of the lack of understanding of how the agent technology supports industrial needs and emerging standards. The area of business-to-business electronic commerce (b2b e-commerce) is one of the most rapidly developing sectors of industry with huge impact on manufacturing practices. In this paper, we investigate the current state of agent technology and the feasibility of applying agent-based computing to b2b e-commerce in the circuit board manufacturing sector. We identify critical tasks and opportunities in the b2b e-commerce area where agent-based services can best be deployed. We describe an implemented agent-based prototype system to facilitate the bidding process for printed circuit board manufacturing and assembly. These activities are taking place within the Internet Commerce for Manufacturing (ICM) project, the NIST- sponsored project working with industry to create an environment where small manufacturers of mechanical and electronic components may participate competitively in virtual enterprises that manufacture printed circuit assemblies.

  18. The Relationship of Financial Incentives and Consumers' Willingness to Disclose Information to eCommerce Marketers

    ERIC Educational Resources Information Center

    Pourhosseini, Parissa

    2009-01-01

    In this study the problem examined was a lack of research based information on the degree to which incentives can be used to encourage consumers to volunteer private information. The purpose of this study was to determine if monetary incentives would be a beneficial means to increase consumers' involvement in eCommerce and thereby boost the growth…

  19. Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob

    2017-01-01

    While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.

  20. A Novel Discrete Differential Evolution Algorithm for the Vehicle Routing Problem in B2C E-Commerce

    NASA Astrophysics Data System (ADS)

    Xia, Chao; Sheng, Ying; Jiang, Zhong-Zhong; Tan, Chunqiao; Huang, Min; He, Yuanjian

    2015-12-01

    In this paper, a novel discrete differential evolution (DDE) algorithm is proposed to solve the vehicle routing problems (VRP) in B2C e-commerce, in which VRP is modeled by the incomplete graph based on the actual urban road system. First, a variant of classical VRP is described and a mathematical programming model for the variant is given. Second, the DDE is presented, where individuals are represented as the sequential encoding scheme, and a novel reparation operator is employed to repair the infeasible solutions. Furthermore, a FLOYD operator for dealing with the shortest route is embedded in the proposed DDE. Finally, an extensive computational study is carried out in comparison with the predatory search algorithm and genetic algorithm, and the results show that the proposed DDE is an effective algorithm for VRP in B2C e-commerce.

  1. 29 CFR 782.7 - Interstate commerce requirements of exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... interstate commerce). (Walling v. Craig, 53 F. Supp. 479 (D. Minn). See also Engbretson v. E. J. Albrecht Co... 29 Labor 3 2012-07-01 2012-07-01 false Interstate commerce requirements of exemption. 782.7... HOURS PROVISIONS FOR CERTAIN EMPLOYEES OF MOTOR CARRIERS § 782.7 Interstate commerce requirements of...

  2. 29 CFR 782.7 - Interstate commerce requirements of exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... interstate commerce). (Walling v. Craig, 53 F. Supp. 479 (D. Minn). See also Engbretson v. E. J. Albrecht Co... 29 Labor 3 2010-07-01 2010-07-01 false Interstate commerce requirements of exemption. 782.7... HOURS PROVISIONS FOR CERTAIN EMPLOYEES OF MOTOR CARRIERS § 782.7 Interstate commerce requirements of...

  3. Business model in marketplace industry using business model canvas approach: An e-commerce case study

    NASA Astrophysics Data System (ADS)

    Erlyana, Yana; Hartono, Henny

    2017-12-01

    The advancement of technology has huge impact on commerce world, especially in the marketplace that has shifted from brick-and-mortar to digital/online marketplace. Grasping the opportunity, ABC joined venture with DEF to create a new online venture namely XYZ Online Shop - an e-commerce website that has large segmentations. The objective of this research is to analyze the business model conducted by XYZ Online Shop by utilizing Business Model Canvas Framework and SWOT analysis. The results obtained from the research are that the business model conducted by XYZ Online Shop excels in customer relationship block and still needs to improve key partner and key activities blocks. Business Model Canvas along with SWOT analysis describes how XYZ Online Shop creates, delivers, and captures value based on its internal and external environments.

  4. The Predicting Model of E-commerce Site Based on the Ideas of Curve Fitting

    NASA Astrophysics Data System (ADS)

    Tao, Zhang; Li, Zhang; Dingjun, Chen

    On the basis of the idea of the second multiplication curve fitting, the number and scale of Chinese E-commerce site is analyzed. A preventing increase model is introduced in this paper, and the model parameters are solved by the software of Matlab. The validity of the preventing increase model is confirmed though the numerical experiment. The experimental results show that the precision of preventing increase model is ideal.

  5. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... transportation systems to ensure freedom of movement for people and commerce. To achieve this mission, TSA is... security screening and identity verification of individuals, including identification media and identifying... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  6. 15 CFR 19.7 - When will Commerce entities compromise a Commerce debt?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false When will Commerce entities compromise a Commerce debt? 19.7 Section 19.7 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.7 When will Commerce entities compromise...

  7. 15 CFR 19.7 - When will Commerce entities compromise a Commerce debt?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false When will Commerce entities compromise a Commerce debt? 19.7 Section 19.7 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.7 When will Commerce entities compromise...

  8. 15 CFR 19.7 - When will Commerce entities compromise a Commerce debt?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false When will Commerce entities compromise a Commerce debt? 19.7 Section 19.7 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.7 When will Commerce entities compromise...

  9. 15 CFR 19.7 - When will Commerce entities compromise a Commerce debt?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false When will Commerce entities compromise a Commerce debt? 19.7 Section 19.7 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.7 When will Commerce entities compromise...

  10. 15 CFR 19.7 - When will Commerce entities compromise a Commerce debt?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false When will Commerce entities compromise a Commerce debt? 19.7 Section 19.7 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.7 When will Commerce entities compromise...

  11. Interior view, office of the Secretary of Commerce United ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Interior view, office of the Secretary of Commerce - United States Department of Commerce, Bounded by Fourteenth, Fifteenth, and E streets and Constitution Avenue, Washington, District of Columbia, DC

  12. A Fast lattice-based polynomial digital signature system for m-commerce

    NASA Astrophysics Data System (ADS)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  13. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    ERIC Educational Resources Information Center

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  14. Secure e-mailing between physicians and patients: transformational change in ambulatory care.

    PubMed

    Garrido, Terhilda; Meng, Di; Wang, Jian J; Palen, Ted E; Kanter, Michael H

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization.

  15. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...

  16. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...

  17. A guide to Social Security money's worth issues.

    PubMed

    Leimer, D R

    1995-01-01

    This article discusses some of the major issues associated with the question of whether workers receive their money's worth from the Social Security program. An effort is made to keep the discussion as nontechnical as possible, with explanations provided for many of the technical terms and concepts found in the money's worth literature. Major assumptions, key analytical methods, and money's worth measures used in the literature are also discussed. Finally, the key findings of money's worth studies are summarized, with some cautions concerning the limitations and appropriate usage of money's worth analyses.

  18. Successful practices in the use of secure e-mail.

    PubMed

    Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt

    2014-01-01

    Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 "super user" physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients.

  19. Swiss Community Pharmacies' on the Web and Pharmacists' Experiences with E-commerce: Longitudinal study and Internet-based questionnaire survey

    PubMed Central

    Bruppacher, Rudolf; Ruppanner, Hans; Hersberger, Kurt E

    2004-01-01

    Background There are multiple ways in which community pharmacies can present themselves on the Internet, e.g., as a platform for drug information or as an advertising platform for their services. Objective To estimate the number of Swiss community pharmacies on the Internet over the period of 32 months (2000-2003), to describe their current e-commerce services, and to explore the experiences and plans these pharmacies have with regard to their Internet presence. Methods A longitudinal study was performed to determine the number of Swiss German pharmacies on the Internet by conducting Internet searches in 2000, 2001, and 2003. In April 2002, a cross-sectional Internet-based survey was administered to explore the pharmacies' experiences and plans regarding their Web sites. Results As of April 2003, 373 (44%) of 852 community pharmacies from the German speaking part of Switzerland were on the Internet. One hundred eighty four listed an e-mail address and were asked to complete a questionnaire. Of the 107 pharmacies answering the survey questions (58% response rate): 46% had been on the Internet for 1 to 2 years; 33% of the Web sites are part of a pharmacy group's Web portal; 31% of the pharmacies plan to expand their Internet appearance in the future; 74% provide e-commerce services, with 81% of those pharmacies filling five or less orders per month; and 12% plan on expanding their e-commerce services in the future. Conclusions The number of community pharmacies offering Internet services steadily increased over 32 months. Given the importance of the Internet as a tool for information, communication, and advertising for pharmacy products and services, it can be expected that the increase will continue. Pharmacy-group portals are important promoters of pharmacies on the Internet. For many community pharmacies, Internet portals that provide an Internet presence for the pharmacies and provide regularly-updated content (e.g., health news, tips, drug information) seem to

  20. Swiss community pharmacies' on the Web and pharmacists' experiences with E-commerce: longitudinal study and Internet-based questionnaire survey.

    PubMed

    Zehnder, Simon; Bruppacher, Rudolf; Ruppanner, Hans; Hersberger, Kurt E

    2004-03-03

    There are multiple ways in which community pharmacies can present themselves on the Internet, e.g., as a platform for drug information or as an advertising platform for their services. To estimate the number of Swiss community pharmacies on the Internet over the period of 32 months (2000-2003), to describe their current e-commerce services, and to explore the experiences and plans these pharmacies have with regard to their Internet presence. A longitudinal study was performed to determine the number of Swiss German pharmacies on the Internet by conducting Internet searches in 2000, 2001, and 2003. In April 2002, a cross-sectional Internet-based survey was administered to explore the pharmacies' experiences and plans regarding their Web sites. As of April 2003, 373 (44%) of 852 community pharmacies from the German speaking part of Switzerland were on the Internet. One hundred eighty four listed an e-mail address and were asked to complete a questionnaire. Of the 107 pharmacies answering the survey questions (58% response rate): 46% had been on the Internet for 1 to 2 years; 33% of the Web sites are part of a pharmacy group's Web portal; 31% of the pharmacies plan to expand their Internet appearance in the future; 74% provide e-commerce services, with 81% of those pharmacies filling five or less orders per month; and 12% plan on expanding their e-commerce services in the future. The number of community pharmacies offering Internet services steadily increased over 32 months. Given the importance of the Internet as a tool for information, communication, and advertising for pharmacy products and services, it can be expected that the increase will continue. Pharmacy-group portals are important promoters of pharmacies on the Internet. For many community pharmacies, Internet portals that provide an Internet presence for the pharmacies and provide regularly-updated content (e.g., health news, tips, drug information) seem to be the most effective solutions. Even though 40

  1. Live chat alternative security protocol

    NASA Astrophysics Data System (ADS)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  2. Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress

    DTIC Science & Technology

    2009-07-13

    Process Safety, American Institute of Chemical Engineers , before the Senate Committee on Environment and Public Works, June 21, 2006, S.Hrg. 109-1044. See...example, Testimony by Dennis C. Hendershot, Staff Consultant, Center for Chemical Process Safety, American Institute of Chemical Engineers , before...CRS Report for Congress Prepared for Members and Committees of Congress Chemical Facility Security: Reauthorization, Policy Issues, and

  3. A decision technology system for health care electronic commerce.

    PubMed

    Forgionne, G A; Gangopadhyay, A; Klein, J A; Eckhardt, R

    1999-08-01

    Mounting costs have escalated the pressure on health care providers and payers to improve decision making and control expenses. Transactions to form the needed decision data will routinely flow, often electronically, between the affected parties. Conventional health care information systems facilitate flow, process transactions, and generate useful decision information. Typically, such support is offered through a series of stand-alone systems that lose much useful decision knowledge and wisdom during health care electronic commerce (e-commerce). Integrating the stand-alone functions can enhance the quality and efficiency of the segmented support, create synergistic effects, and augment decision-making performance and value for both providers and payers. This article presents an information system that can provide complete and integrated support for e-commerce-based health care decision making. The article describes health care e-commerce, presents the system, examines the system's potential use and benefits, and draws implications for health care management and practice.

  4. The Supreme Court, the commerce clause, and natural resources

    NASA Astrophysics Data System (ADS)

    Matthews, Olen Paul

    1988-07-01

    The Supreme Court's interpretation of the commerce clause controls the balance of power between state and federal governments in the United States. An understanding of the relationship between the different government levels is essential for resource managers concerned with resource and environmental issues. This study examines selected Supreme Court decisions between 1976 and 1988 to answer three questions raised by the commerce clause: (1) Is the regulated item an article of commerce? (2) Do state laws burden interstate commerce? (3) Is federal commerce regulation limited? The balance of power among the justices and the commerce clause theories affecting the federal role in resource management are also examined. Since ratification of the Constitution, the Supreme Court has continuously increased federal power, but states have power to act independently as long as contradictory federal laws do not exist and state law does not impermissively affect commerce. If Congress regulates an individual's use of resources, their power is unquestioned. Future Court decisions will not significantly reduce the federal role in resource management even if the Court's membership changes. Even the supporters of states' rights on the Court realize increased federal power is a necessary part of the country's evolution. The purpose of the commerce clause is to create a national economic unit with free location principles. The Court supports this purpose today and will in the future.

  5. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    PubMed

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Successful Practices in the Use of Secure E-mail

    PubMed Central

    Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt

    2014-01-01

    Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 “super user” physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients. PMID:24937149

  7. E-Commerce May Help Colleges Cut Costs and Paperwork.

    ERIC Educational Resources Information Center

    Olsen, Florence

    2000-01-01

    Describes the increasing trend of incorporating electronic commerce methods to purchasing systems at colleges and universities. Provides examples from the University of Pennsylvania, Harvard University (Massachusetts), California State University at Fullerton, and the University of California at Los Angeles. (DB)

  8. Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress

    DTIC Science & Technology

    2010-11-15

    American Institute of Chemical Engineers , before the Senate Committee on Environment and Public Works, June 21, 2006, S.Hrg. 109-1044. See also...American Institute of Chemical Engineers , before the Senate Committee on Environment and Public Works, June 21, 2006, S.Hrg. 109-1044. 57 The DHS...CRS Report for Congress Prepared for Members and Committees of Congress Chemical Facility Security: Reauthorization, Policy Issues, and

  9. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  10. User-Interface Design Characteristics of Fortune 500 B2C E-Commerce Sites and Industry Differences

    ERIC Educational Resources Information Center

    Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.

    2006-01-01

    This study examined the user-interface design characteristics of 107 Fortune 500 B2C e-commerce Web sites and industry differences. Data were collected from corporate homepages, B2C product/service pages, B2C interactive shopping pages, as well as customer satisfaction of 321 online shoppers. The findings indicate that (a) to attract online…

  11. Implantable electronics: emerging design issues and an ultra light-weight security solution.

    PubMed

    Narasimhan, Seetharam; Wang, Xinmu; Bhunia, Swarup

    2010-01-01

    Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.

  12. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    PubMed

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  13. 17 CFR 239.25 - Form S-4, for the registration of securities issued in business combination transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-4, for the registration of securities issued in business combination transactions. 239.25 Section 239.25 Commodity and... business combination transactions. This form may be used for registration under the Securities Act of 1933...

  14. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...

  15. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...

  16. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...

  17. A Flexible Electronic Commerce Recommendation System

    NASA Astrophysics Data System (ADS)

    Gong, Songjie

    Recommendation systems have become very popular in E-commerce websites. Many of the largest commerce websites are already using recommender technologies to help their customers find products to purchase. An electronic commerce recommendation system learns from a customer and recommends products that the customer will find most valuable from among the available products. But most recommendation methods are hard-wired into the system and they support only fixed recommendations. This paper presented a framework of flexible electronic commerce recommendation system. The framework is composed by user model interface, recommendation engine, recommendation strategy model, recommendation technology group, user interest model and database interface. In the recommender strategy model, the method can be collaborative filtering, content-based filtering, mining associate rules method, knowledge-based filtering method or the mixed method. The system mapped the implementation and demand through strategy model, and the whole system would be design as standard parts to adapt to the change of the recommendation strategy.

  18. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...

  19. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...

  20. Energy effects associated with e-commerce: a case-study concerning online sales of personal computers in The Netherlands.

    PubMed

    Reijnders, L; Hoogeveen, M J

    2001-07-01

    The introduction of e-commerce is changing purchase and distribution patterns dramatically. One of the observed effects is that logistics become more efficient as products are directly shipped from a manufacturer or wholesaler to an end-user. Another effect is that market transparency increases, which has a downward pressure on prices of many products sold via the Internet. This article addresses the energy implications of e-commerce at the micro level. This is done by quantifying the transport related energy savings in the case of a Dutch online computer reseller and by assessing the extra energy expenditure associated with increased buying power of online buyers. It is found that energy use per article sold by the online computer reseller is lower. However, taking into account indirect effects such as increased consumer buying power, there are scenarios that lead to an overall increase in energy use.

  1. Impacts of a 25% Renewable Electricity Standard as Proposed in the American Clean Energy and Security Act Discussion Draft

    EIA Publications

    2009-01-01

    This report responds to requests from Chairman Edward Markey, for an analysis of a 25% federal renewable electricity standard (RES). The RES proposal analyzed in this report is included in the discussion draft of broader legislation, the American Clean Energy and Security Act (ACESA) of 2009, issued on the Energy and Commerce Committee website at the end of March 2009.

  2. 17 CFR 239.23 - Form N-14, for the registration of securities issued in business combination transactions by...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... registration of securities issued in business combination transactions by investment companies and business development companies. 239.23 Section 239.23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... companies and business development companies. This form shall be used by a registered investment company or...

  3. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  4. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  5. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  6. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  7. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  8. 15 CFR 19.14 - How will Commerce entities report Commerce debts to credit bureaus?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false How will Commerce entities report Commerce debts to credit bureaus? 19.14 Section 19.14 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.14 How will Commerce entities...

  9. 15 CFR 19.14 - How will Commerce entities report Commerce debts to credit bureaus?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false How will Commerce entities report Commerce debts to credit bureaus? 19.14 Section 19.14 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.14 How will Commerce entities...

  10. 15 CFR 19.14 - How will Commerce entities report Commerce debts to credit bureaus?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false How will Commerce entities report Commerce debts to credit bureaus? 19.14 Section 19.14 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.14 How will Commerce entities...

  11. 15 CFR 19.14 - How will Commerce entities report Commerce debts to credit bureaus?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false How will Commerce entities report Commerce debts to credit bureaus? 19.14 Section 19.14 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.14 How will Commerce entities...

  12. 15 CFR 19.14 - How will Commerce entities report Commerce debts to credit bureaus?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false How will Commerce entities report Commerce debts to credit bureaus? 19.14 Section 19.14 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.14 How will Commerce entities...

  13. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...

  14. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  15. Creating E-Commerce Start-Ups with Information Systems Students: Lessons Learned from New Venture Successes and Failures

    ERIC Educational Resources Information Center

    Abrahams, Alan

    2010-01-01

    In this paper, we review a variety of e-commerce startups created by senior information systems students, under the author's guidance, over a number of years at multiple universities. We compare the characteristics of the start-ups and comment on various factors which appear to have contributed to their success or failure. Our recommendations are…

  16. Addressing security issues related to virtual institute distributed activities

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  17. 76 FR 47527 - Retrospective Regulatory Review Under E.O. 13563

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-05

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Chapter VII [Docket No. 110711380... Security, Commerce. ACTION: Notice of inquiry. SUMMARY: The Bureau of Industry and Security (BIS... of portions of the Export Administration Regulations, Chemical Weapons Convention Regulations...

  18. Sustainable and ICT-Enabled Development in Developing Areas: An E-Heritage E-Commerce Service for Handicraft Marketing

    NASA Astrophysics Data System (ADS)

    Muhammad, Tufail; Kim, Kwan Myung

    2018-04-01

    Human-induced threats serve as potential hazards to cultural heritage assets, especially in developing areas where the local community, in general, is a deprived class. Sustainable tourism development is acknowledged as an economic activity to ensure careful management of assets along with local community empowerment and participation. As such, ICT-enabled development is applied in rural development projects to promote sustainable rural livelihood, but success is still limited due to a lack of community involvement and sharing in the economic gains of tourism. With this perspective in mind, the present study focuses on emerging marketing models (e-commerce) that can provide new business ventures for local communities by identifying critical online marketing elements driven by local residents.

  19. Study on Influencing Factor Analysis and Application of Consumer Mobile Commerce Acceptance

    NASA Astrophysics Data System (ADS)

    Li, Gaoguang; Lv, Tingjie

    Mobile commerce (MC) refers to e-commerce activities carried out using a mobile device such as a phone or PDA. With new technology, MC will be rapidly growing in the near future. At the present time, what factors making consumer accept MC and what MC applications are acceptable by consumers are two of hot issues both for MC providers and f or MC researchers. This study presents a proposed MC acceptance model that integrates perceived playfulness, perceived risk and cost into the TAM to study which factors affect consumer MC acceptance. The proposed model includes five variables, namely perceived risk, cost, perceived usefulness, perceived playfulness, perceived ease of use, perceived playfulness. Then, using analytic hierarchy process (AHP) to calculate weight of criteria involved in proposed model. Finally, the study utilizes fuzzy comprehensive evaluation method to evaluate MC applications accepted possibility, and then a MC application is empirically tested using data collected from a survey of MC consumers.

  20. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

    NASA Astrophysics Data System (ADS)

    Bhadauria, Rohit; Sanyal, Sugata

    2012-06-01

    Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow multi-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centers may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it.

  1. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of Customs security area. For purposes of this section, the term “Customs security area” means the Federal...

  2. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...

  3. 15 CFR 325.5 - Issuing the certificate.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Issuing the certificate. 325.5 Section 325.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS EXPORT TRADE CERTIFICATES...

  4. Software Development Life Cycle Security Issues

    NASA Astrophysics Data System (ADS)

    Kaur, Daljit; Kaur, Parminder

    2011-12-01

    Security is now-a-days one of the major problems because of many reasons. Security is now-a-days one of the major problems because of many reasons. The main cause is that software can't withstand security attacks because of vulnerabilities in it which are caused by defective specifications design and implementation. We have conducted a survey asking software developers, project managers and other people in software development about their security awareness and implementation in Software Development Life Cycle (SDLC). The survey was open to participation for three weeks and this paper explains the survey results.

  5. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7 Section 758.7 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY,...

  6. On the Supply Chain Management Supported by E-Commerce Service Platform for Agreement based Circulation of Fruits and Vegetables

    NASA Astrophysics Data System (ADS)

    Bao, Liwei; Huang, Yuchi; Ma, Zengjun; Zhang, Jie; Lv, Qingchu

    According to analysis of the supply chain process of agricultural products, the IT application requirements of the market entities participating in the agreement based circulation of fruits and vegetables have been discussed. The strategy of supply chain management basing on E-commerce service platform for fruits and vegetables has been proposed in this paper. The architecture and function composing of the service platform have been designed and implemented. The platform is constructed on a set of application service modules User can choose some of the application service modules and define them according to the business process. The application service modules chosen and defined by user are integrated as an application service package and applied as management information system of business process. With the E-commerce service platform, the supply chain management for agreement based circulation of agricultural products of vegetables and fruits can be implemented.

  7. Radiological protection, safety and security issues in the industrial and medical applications of radiation sources

    NASA Astrophysics Data System (ADS)

    Vaz, Pedro

    2015-11-01

    The use of radiation sources, namely radioactive sealed or unsealed sources and particle accelerators and beams is ubiquitous in the industrial and medical applications of ionizing radiation. Besides radiological protection of the workers, members of the public and patients in routine situations, the use of radiation sources involves several aspects associated to the mitigation of radiological or nuclear accidents and associated emergency situations. On the other hand, during the last decade security issues became burning issues due to the potential malevolent uses of radioactive sources for the perpetration of terrorist acts using RDD (Radiological Dispersal Devices), RED (Radiation Exposure Devices) or IND (Improvised Nuclear Devices). A stringent set of international legally and non-legally binding instruments, regulations, conventions and treaties regulate nowadays the use of radioactive sources. In this paper, a review of the radiological protection issues associated to the use of radiation sources in the industrial and medical applications of ionizing radiation is performed. The associated radiation safety issues and the prevention and mitigation of incidents and accidents are discussed. A comprehensive discussion of the security issues associated to the global use of radiation sources for the aforementioned applications and the inherent radiation detection requirements will be presented. Scientific, technical, legal, ethical, socio-economic issues are put forward and discussed.

  8. Symptom validity issues in the psychological consultative examination for social security disability.

    PubMed

    Chafetz, Michael D

    2010-08-01

    This article is about Social Security Administration (SSA) policy with regard to the Psychological Consultative Examination (PCE) for Social Security Disability, particularly with respect to validation of the responses and findings. First, the nature of the consultation and the importance of understanding the boundaries and ethics of the psychologist's role are described. Issues particular to working with low-functioning claimants usually form a large part of these examinations. The psychologist must understand various forms of non-credible behavior during the PCE, and how malingering might be considered among other non-credible presentations. Issues pertaining to symptom validity testing in low-functioning claimants are further explored. SSA policy with respect to symptom validity testing is carefully examined, with an attempt to answer specific concerns and show how psychological science can be of assistance, particularly with evidence-based practice. Additionally, the nature and importance of techniques to avoid the mislabeling of claimants as malingerers are examined. SSA requires the use of accepted diagnostic techniques with which to establish impairment, and this article describes the implementation of that requirement, particularly with respect to validating the findings.

  9. Factors Affecting Business-to-Business Electronic Commerce Success: An Empirical Investigation

    ERIC Educational Resources Information Center

    Chen, Chun-I Philip

    2010-01-01

    It is generally believed that Business to Business (B2B) e-commerce has a great impact on business performance improvement. Considerable research also shows that another dependent variable, B2B e-commerce success, can be a good overall measure of B2B systems. This paper investigated and examined the impact of several factors, which are either…

  10. Behavioral analysis of use personal service e-balance Indonesian social security

    NASA Astrophysics Data System (ADS)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  11. Close view of the attic story of the Commerce Department ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Close view of the attic story of the Commerce Department building to show the decorative owls, eagles, fruit swags and ribbon festoons - United States Department of Commerce, Bounded by Fourteenth, Fifteenth, and E streets and Constitution Avenue, Washington, District of Columbia, DC

  12. 15 CFR 19.15 - How will Commerce entities refer Commerce debts to private collection agencies?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false How will Commerce entities refer Commerce debts to private collection agencies? 19.15 Section 19.15 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.15 How will...

  13. 15 CFR 19.15 - How will Commerce entities refer Commerce debts to private collection agencies?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false How will Commerce entities refer Commerce debts to private collection agencies? 19.15 Section 19.15 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.15 How will...

  14. 15 CFR 19.15 - How will Commerce entities refer Commerce debts to private collection agencies?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false How will Commerce entities refer Commerce debts to private collection agencies? 19.15 Section 19.15 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.15 How will...

  15. 15 CFR 19.15 - How will Commerce entities refer Commerce debts to private collection agencies?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false How will Commerce entities refer Commerce debts to private collection agencies? 19.15 Section 19.15 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.15 How will...

  16. 15 CFR 19.15 - How will Commerce entities refer Commerce debts to private collection agencies?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false How will Commerce entities refer Commerce debts to private collection agencies? 19.15 Section 19.15 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.15 How will...

  17. 77 FR 20536 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... Markets Trends, Division of Corporation Finance, at (202) 551-3860, U.S. Securities and Exchange... exchange trading due to individual business needs of certain users. Those users should retain the ability... Corporation Finance issued a no-action letter that addressed the availability of these interim exemptions to...

  18. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  19. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  20. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  1. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  2. Role of Electronic-Commerce in the Growth of Tunisian Economy

    DTIC Science & Technology

    2002-09-01

    Social Indicators. (From: Tunisian National Statistical Institute June 2002 & Tunisia –Key Economic and Social Indicators January 2000...in their article “ B2B E-commerce headed for trillions” March 7, 2002 reported more ambitious projections than Forrester’s [2]. EMarketer found that...worldwide Business-to-Business ( B2B ) e-commerce will total $823.4 billion by the end of 2002, and the growth will continue to nearly $2.4 trillion

  3. One-Day Conference on School Safety & Security and Fair Dismissals Issues (Dayton, Ohio, June 24, 1999).

    ERIC Educational Resources Information Center

    Education Law Association, Dayton, OH.

    This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…

  4. 17 CFR 250.47 - Exemption of public utility subsidiaries as to certain securities issued to the Rural...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Electrification Administration. (a) Exemption. Any public utility company which is a subsidiary company of a... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of public utility subsidiaries as to certain securities issued to the Rural Electrification Administration. 250.47 Section 250.47...

  5. Banana MaMADS transcription factors are necessary for fruit ripening and molecular tools to promote shelf-life and food security

    USDA-ARS?s Scientific Manuscript database

    Genetic solutions to postharvest crop loss can reduce cost and energy inputs while increasing food security, especially for banana (Musa acuminata), which is a significant component of worldwide food commerce. We have functionally characterized two banana E class (SEPALLATA3 [SEP3]) MADS box genes, ...

  6. The U.S. Army War College Guide to National Security Issues. Volume 2: National Security Policy and Strategy

    DTIC Science & Technology

    2010-07-01

    Guns, and Money”: Transnational Threats and U.S. National Security ………………………………………………………………………………………...207 Paul Rexton Kan 16. Ethical ...Issues in War: An Overview …………………………………………………………215 Martin L. Cook III. Strategic Issues and Considerations 17. Ethics and War in Comparative...values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general. This might

  7. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... constitute a substantial portion of collateral if the aggregate principal amount, par value, or book value of...

  8. Network Security Issues

    DTIC Science & Technology

    1989-01-01

    access. 8 An example of a Trojan Horse was one that affected many Macintosh users in 1987. The program called "Sexy Ladies " deleted files as the...be malicious, just the disruption and freezing of the system would be enough to send a panic throughout the financial world. Gold prices would soar...Protection Products," Computers and Security, Apr 88, p. 159. 15 Neil Rubenking, " Antivirus Programs Fight Data Loss," PC Magazine (First Look), 28 Jun

  9. E-Mail and Ethical Issues

    ERIC Educational Resources Information Center

    Bradley, Loretta J.; Hendricks, Bret

    2009-01-01

    The proliferation of the use of e-mail and texting has created some ethical dilemmas for family counselors. Although e-mail can expand and encourage communication, it is not problem free and, in fact, can pose problems. There are issues with privacy, confidentiality, and maintaining an appropriate professional relationship. Family counselors…

  10. 37 CFR 1.18 - Patent post allowance (including issue) fees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... entity $1,190.00 (d) Publication fee $300.00. (e) For filing an application for patent term adjustment... (including issue) fees. 1.18 Section 1.18 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL RULES OF PRACTICE IN PATENT CASES General Provisions Fees...

  11. 15 CFR 19.16 - When will Commerce entities refer Commerce debts to the Department of Justice?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false When will Commerce entities refer Commerce debts to the Department of Justice? 19.16 Section 19.16 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.16 When will...

  12. 15 CFR 19.16 - When will Commerce entities refer Commerce debts to the Department of Justice?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false When will Commerce entities refer Commerce debts to the Department of Justice? 19.16 Section 19.16 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.16 When will...

  13. 15 CFR 19.16 - When will Commerce entities refer Commerce debts to the Department of Justice?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false When will Commerce entities refer Commerce debts to the Department of Justice? 19.16 Section 19.16 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.16 When will...

  14. 15 CFR 19.16 - When will Commerce entities refer Commerce debts to the Department of Justice?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false When will Commerce entities refer Commerce debts to the Department of Justice? 19.16 Section 19.16 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.16 When will...

  15. 15 CFR 19.16 - When will Commerce entities refer Commerce debts to the Department of Justice?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false When will Commerce entities refer Commerce debts to the Department of Justice? 19.16 Section 19.16 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.16 When will...

  16. Spreading dynamics of an e-commerce preferential information model on scale-free networks

    NASA Astrophysics Data System (ADS)

    Wan, Chen; Li, Tao; Guan, Zhi-Hong; Wang, Yuanmei; Liu, Xiongding

    2017-02-01

    In order to study the influence of the preferential degree and the heterogeneity of underlying networks on the spread of preferential e-commerce information, we propose a novel susceptible-infected-beneficial model based on scale-free networks. The spreading dynamics of the preferential information are analyzed in detail using the mean-field theory. We determine the basic reproductive number and equilibria. The theoretical analysis indicates that the basic reproductive number depends mainly on the preferential degree and the topology of the underlying networks. We prove the global stability of the information-elimination equilibrium. The permanence of preferential information and the global attractivity of the information-prevailing equilibrium are also studied in detail. Some numerical simulations are presented to verify the theoretical results.

  17. Attribute based encryption for secure sharing of E-health data

    NASA Astrophysics Data System (ADS)

    Charanya, R.; Nithya, S.; Manikandan, N.

    2017-11-01

    Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.

  18. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  19. 29 CFR 779.12 - Commerce.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 3 2012-07-01 2012-07-01 false Commerce. 779.12 Section 779.12 Labor Regulations Relating... OR SERVICES General Some Basic Definitions § 779.12 Commerce. Commerce as used in the Act includes interstate and foreign commerce. It is defined in section 3(b) of the Act to mean “trade, commerce...

  20. 29 CFR 779.12 - Commerce.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 3 2014-07-01 2014-07-01 false Commerce. 779.12 Section 779.12 Labor Regulations Relating... OR SERVICES General Some Basic Definitions § 779.12 Commerce. Commerce as used in the Act includes interstate and foreign commerce. It is defined in section 3(b) of the Act to mean “trade, commerce...

  1. 29 CFR 779.12 - Commerce.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Commerce. 779.12 Section 779.12 Labor Regulations Relating... OR SERVICES General Some Basic Definitions § 779.12 Commerce. Commerce as used in the Act includes interstate and foreign commerce. It is defined in section 3(b) of the Act to mean “trade, commerce...

  2. 29 CFR 779.12 - Commerce.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 3 2013-07-01 2013-07-01 false Commerce. 779.12 Section 779.12 Labor Regulations Relating... OR SERVICES General Some Basic Definitions § 779.12 Commerce. Commerce as used in the Act includes interstate and foreign commerce. It is defined in section 3(b) of the Act to mean “trade, commerce...

  3. 29 CFR 779.12 - Commerce.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Commerce. 779.12 Section 779.12 Labor Regulations Relating... OR SERVICES General Some Basic Definitions § 779.12 Commerce. Commerce as used in the Act includes interstate and foreign commerce. It is defined in section 3(b) of the Act to mean “trade, commerce...

  4. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  5. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    NASA Astrophysics Data System (ADS)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  6. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1976-09-20

    commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air

  7. Enabling Integrated Decision Making for Electronic-Commerce by Modelling an Enterprise's Sharable Knowledge.

    ERIC Educational Resources Information Center

    Kim, Henry M.

    2000-01-01

    An enterprise model, a computational model of knowledge about an enterprise, is a useful tool for integrated decision-making by e-commerce suppliers and customers. Sharable knowledge, once represented in an enterprise model, can be integrated by the modeled enterprise's e-commerce partners. Presents background on enterprise modeling, followed by…

  8. Managing marine mollusc diseases in the context of regional and international commerce: policy issues and emerging concerns.

    PubMed

    Carnegie, Ryan B; Arzul, Isabelle; Bushek, David

    2016-03-05

    Marine mollusc production contributes to food and economic security worldwide and provides valuable ecological services, yet diseases threaten these industries and wild populations. Although the infrastructure for mollusc aquaculture health management is well characterized, its foundations are not without flaws. Use of notifiable pathogen lists can leave blind spots with regard to detection of unlisted and emerging pathogens. Increased reliance on molecular tools has come without similar attention to diagnostic validation, raising questions about assay performance, and has been accompanied by a reduced emphasis on microscopic diagnostic expertise that could weaken pathogen detection capabilities. Persistent questions concerning pathogen biology and ecology promote regulatory paralysis that impedes trade and which could weaken biosecurity by driving commerce to surreptitious channels. Solutions that might be pursued to improve shellfish aquaculture health management include the establishment of more broad-based surveillance programmes, wider training and use of general methods like histopathology to ensure alertness to emerging diseases, an increased focus on assay assessment and validation as fundamental to assay development, investment in basic research, and application of risk analyses to improve regulation. A continual sharpening of diagnostic tools and approaches and deepening of scientific knowledge is necessary to manage diseases and promote sustainable molluscan shellfish industries. © 2016 The Author(s).

  9. Managing marine mollusc diseases in the context of regional and international commerce: policy issues and emerging concerns

    PubMed Central

    Carnegie, Ryan B.; Arzul, Isabelle; Bushek, David

    2016-01-01

    Marine mollusc production contributes to food and economic security worldwide and provides valuable ecological services, yet diseases threaten these industries and wild populations. Although the infrastructure for mollusc aquaculture health management is well characterized, its foundations are not without flaws. Use of notifiable pathogen lists can leave blind spots with regard to detection of unlisted and emerging pathogens. Increased reliance on molecular tools has come without similar attention to diagnostic validation, raising questions about assay performance, and has been accompanied by a reduced emphasis on microscopic diagnostic expertise that could weaken pathogen detection capabilities. Persistent questions concerning pathogen biology and ecology promote regulatory paralysis that impedes trade and which could weaken biosecurity by driving commerce to surreptitious channels. Solutions that might be pursued to improve shellfish aquaculture health management include the establishment of more broad-based surveillance programmes, wider training and use of general methods like histopathology to ensure alertness to emerging diseases, an increased focus on assay assessment and validation as fundamental to assay development, investment in basic research, and application of risk analyses to improve regulation. A continual sharpening of diagnostic tools and approaches and deepening of scientific knowledge is necessary to manage diseases and promote sustainable molluscan shellfish industries. PMID:26880834

  10. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking... with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a) General. E-SIGN makes it easier to conduct E-commerce. With some exceptions, E-SIGN permits the use and...

  11. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking... with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a) General. E-SIGN makes it easier to conduct E-commerce. With some exceptions, E-SIGN permits the use and...

  12. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking... with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a) General. E-SIGN makes it easier to conduct E-commerce. With some exceptions, E-SIGN permits the use and...

  13. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking... with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a) General. E-SIGN makes it easier to conduct E-commerce. With some exceptions, E-SIGN permits the use and...

  14. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking... with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a) General. E-SIGN makes it easier to conduct E-commerce. With some exceptions, E-SIGN permits the use and...

  15. 75 FR 57904 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... Office, --Update of NIST Computer Security Division, and --Information Security and Privacy Advisory... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet...

  16. 7 CFR 1220.103 - Commerce.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Commerce. 1220.103 Section 1220.103 Agriculture... CONSUMER INFORMATION Soybean Promotion and Research Order Definitions § 1220.103 Commerce. The term commerce means interstate, foreign, or intrastate commerce. ...

  17. 7 CFR 1220.103 - Commerce.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Commerce. 1220.103 Section 1220.103 Agriculture... CONSUMER INFORMATION Soybean Promotion and Research Order Definitions § 1220.103 Commerce. The term commerce means interstate, foreign, or intrastate commerce. ...

  18. 7 CFR 1220.103 - Commerce.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Commerce. 1220.103 Section 1220.103 Agriculture... CONSUMER INFORMATION Soybean Promotion and Research Order Definitions § 1220.103 Commerce. The term commerce means interstate, foreign, or intrastate commerce. ...

  19. 7 CFR 1220.103 - Commerce.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Commerce. 1220.103 Section 1220.103 Agriculture... CONSUMER INFORMATION Soybean Promotion and Research Order Definitions § 1220.103 Commerce. The term commerce means interstate, foreign, or intrastate commerce. ...

  20. 7 CFR 1220.103 - Commerce.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Commerce. 1220.103 Section 1220.103 Agriculture... CONSUMER INFORMATION Soybean Promotion and Research Order Definitions § 1220.103 Commerce. The term commerce means interstate, foreign, or intrastate commerce. ...

  1. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  2. Developing Online Trust in Electronic Commerce: A Generational Cohort Study in Puerto Rico

    ERIC Educational Resources Information Center

    Lopez Rivera, Ibrahim

    2016-01-01

    Developing online trust is crucial for e-commerce vendors in order to attract consumers and develop long-term relationships with existing ones. We intended to investigate if consumers from different generational cohorts differ on how they develop online trust when utilizing e-commerce websites. Through the analysis of empirical data collected from…

  3. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    NASA Astrophysics Data System (ADS)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  4. 15 CFR 19.8 - When will Commerce entities suspend or terminate debt collection on a Commerce debt?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false When will Commerce entities suspend or terminate debt collection on a Commerce debt? 19.8 Section 19.8 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.8 When will...

  5. 15 CFR 19.11 - How will Commerce entities use tax refund offset to collect a Commerce debt?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false How will Commerce entities use tax refund offset to collect a Commerce debt? 19.11 Section 19.11 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.11 How will...

  6. 15 CFR 19.11 - How will Commerce entities use tax refund offset to collect a Commerce debt?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false How will Commerce entities use tax refund offset to collect a Commerce debt? 19.11 Section 19.11 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.11 How will...

  7. 15 CFR 19.8 - When will Commerce entities suspend or terminate debt collection on a Commerce debt?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false When will Commerce entities suspend or terminate debt collection on a Commerce debt? 19.8 Section 19.8 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.8 When will...

  8. 15 CFR 19.11 - How will Commerce entities use tax refund offset to collect a Commerce debt?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false How will Commerce entities use tax refund offset to collect a Commerce debt? 19.11 Section 19.11 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.11 How will...

  9. 15 CFR 19.8 - When will Commerce entities suspend or terminate debt collection on a Commerce debt?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false When will Commerce entities suspend or terminate debt collection on a Commerce debt? 19.8 Section 19.8 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.8 When will...

  10. 15 CFR 19.8 - When will Commerce entities suspend or terminate debt collection on a Commerce debt?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false When will Commerce entities suspend or terminate debt collection on a Commerce debt? 19.8 Section 19.8 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.8 When will...

  11. 15 CFR 19.11 - How will Commerce entities use tax refund offset to collect a Commerce debt?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false How will Commerce entities use tax refund offset to collect a Commerce debt? 19.11 Section 19.11 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.11 How will...

  12. 15 CFR 19.8 - When will Commerce entities suspend or terminate debt collection on a Commerce debt?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false When will Commerce entities suspend or terminate debt collection on a Commerce debt? 19.8 Section 19.8 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.8 When will...

  13. 15 CFR 19.11 - How will Commerce entities use tax refund offset to collect a Commerce debt?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false How will Commerce entities use tax refund offset to collect a Commerce debt? 19.11 Section 19.11 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.11 How will...

  14. Application of laser-wakefield-based x-ray source to global food security issues

    NASA Astrophysics Data System (ADS)

    Kieffer, J. C.; Fourmaux, S.; Hallin, E.; Arnison, P.; Brereton, N.; Pitre, F.; Dixon, M.; Tran, N.

    2017-05-01

    We present the development of a high throughput phase contrast screening system based on LWFA Xray sources for plant imaging. We upgraded the INRS laser-betatron beam line and we illustrate its imaging potential through the innovative development of new tools for addressing issues relevant to global food security. This initiative, led by the Global Institute of Food Security (GIFS) at the U of Saskatchewan, aims to elucidate that part of the function that maps environmental inputs onto specific plant phenotypes. The prospect of correlating phenotypic expression with adaptation to environmental stresses will provide researchers with a new tool to assess breeding programs for crops meant to thrive under the climate extremes.

  15. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    PubMed

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  16. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  17. Security Deposits

    DTIC Science & Technology

    1987-04-01

    security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now

  18. 29 CFR 401.1 - Commerce.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 2 2014-07-01 2014-07-01 false Commerce. 401.1 Section 401.1 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.1 Commerce. Commerce means trade, traffic, commerce, transportation...

  19. 29 CFR 401.1 - Commerce.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Commerce. 401.1 Section 401.1 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.1 Commerce. Commerce means trade, traffic, commerce, transportation...

  20. 29 CFR 401.1 - Commerce.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 2 2013-07-01 2013-07-01 false Commerce. 401.1 Section 401.1 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.1 Commerce. Commerce means trade, traffic, commerce, transportation...

  1. 29 CFR 401.1 - Commerce.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 2 2012-07-01 2012-07-01 false Commerce. 401.1 Section 401.1 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.1 Commerce. Commerce means trade, traffic, commerce, transportation...

  2. 29 CFR 401.1 - Commerce.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 2 2011-07-01 2011-07-01 false Commerce. 401.1 Section 401.1 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.1 Commerce. Commerce means trade, traffic, commerce, transportation...

  3. 78 FR 33019 - Proposed Amendment of Class E Airspace; Commerce, TX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-03

    ... accommodate new Standard Instrument Approach Procedures (SIAPs) at Commerce Municipal Airport (AAF). The FAA is taking this action to enhance the safety and management of Instrument Flight Rules (IFR... airport to provide adequate controlled airspace for the safety and management of IFR operations at the...

  4. 12 CFR 559.12 - How may a subsidiary of a savings association issue securities?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false How may a subsidiary of a savings association issue securities? 559.12 Section 559.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SUBORDINATE ORGANIZATIONS Regulations Applicable to All Savings Associations § 559.12 How...

  5. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simmhan, Yogesh; Kumbhare, Alok; Cao, Baohua

    2011-07-09

    Power utilities globally are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid software platforms and applications, such as elastic resources and shared services. However, the security and privacy concerns inherent in an information rich Smart Grid environment are further exacerbated by their deployment on Clouds. Here, we present an analysis of security and privacy issues in a Smart Grids software architecture operating on different Cloud environments, in the form of a taxonomy. We use the Los Angeles Smart Gridmore » Project that is underway in the largest U.S. municipal utility to drive this analysis that will benefit both Cloud practitioners targeting Smart Grid applications, and Cloud researchers investigating security and privacy.« less

  6. Electronic Commerce in Tourism in China: B2B or B2C?

    NASA Astrophysics Data System (ADS)

    Li, Hongxiu; Suomi, Reima

    E-commerce has significantly changed the distribution channels of travel products in the world including China. Online channels are growing important in travel service distribution. In China tourism industry has been developed rapidly with the economic development, more and more international travel service providers are trying to expand their Chinese market through the Internet. This paper sheds lights on the e-commerce development models in China for international travel service providers. It explores the current e-tourism in China from the three different participants in the value chain in tourism industry - consumer, travel agent and travel service provider. The paper also identifies the barriers in B2C arena in international outbound travel market, and discusses the possible approaches for international travel service providers to develop their e-commerce in the huge Chinese market. The results in this study reveal that international travel service providers should focus on B2B model to expand their electronic market in China. B2C development in tourism largely depends on the change of Chinese customers' behavior and the change of international tourism regulations. The findings of the study are expected to assist international travel service providers to understand current e-tourism in China and to support their planning for future e-commerce development in China.

  7. 15 CFR 19.9 - When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial Management Service for collection? 19.9 Section 19.9 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To...

  8. 15 CFR 19.9 - When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial Management Service for collection? 19.9 Section 19.9 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To...

  9. 15 CFR 19.9 - When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial Management Service for collection? 19.9 Section 19.9 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To...

  10. 15 CFR 19.9 - When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial Management Service for collection? 19.9 Section 19.9 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To...

  11. 15 CFR 19.9 - When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false When will Commerce entities transfer a Commerce debt to the Treasury Department's Financial Management Service for collection? 19.9 Section 19.9 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To...

  12. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  13. The Potential Impact of E-Commerce on the Rural South: Will It Equalize or Deepen the Digital Divide? The Rural South: Preparing for the Challenges of the 21st Century, No. 14.

    ERIC Educational Resources Information Center

    Duncan, Beth; Culver, Virgil

    Buying and selling on the Internet, known as e-commerce, has become big business, and is still growing. E-commerce has two components, business to consumer retailing and business to business supply-chain operations. Participation is dependent on access to and adoption of advanced information technologies. Access to technology is influenced by…

  14. Stonework or Sandcastle? Asia’s Regional Security Forum.

    DTIC Science & Technology

    1995-07-01

    security without equal security for all," and "with the growing interdependence of states, the differences in economic and social systems, ideologies... social integration, and historical background . . . [W]e cannot directly apply a European model to the different security environment of the Asia...contentious issue of human rights, a prominent theme in CSCE, along with pressures from Western countries on social , political and environmental

  15. Security Issues on the Internet.

    ERIC Educational Resources Information Center

    Bar-Ilan, Judit

    1996-01-01

    Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)

  16. Making Our Buildings Safer: Security Management and Equipment Issues.

    ERIC Educational Resources Information Center

    Clark, James H.

    1997-01-01

    Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…

  17. 15 CFR 19.5 - How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce debt? 19.5 Section 19.5 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce...

  18. 15 CFR 19.5 - How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce debt? 19.5 Section 19.5 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce...

  19. 15 CFR 19.5 - How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce debt? 19.5 Section 19.5 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce...

  20. 15 CFR 19.5 - How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce debt? 19.5 Section 19.5 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce...

  1. 15 CFR 19.5 - How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false How will Commerce entities add interest, penalty charges, and administrative costs to a Commerce debt? 19.5 Section 19.5 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce...

  2. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. Peace and security in Northeast Asia: The nuclear issue and the Korean Peninsula

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kihl, Y.W.; Hayes, P.; Scalapino, R.A.

    1996-01-01

    Korean security was the focus of world-wide attention and concern in 1993--95 with North Korea's 'suspected' nuclear weapons program. Dubbed by some as the first post-Cold War nuclear crisis, it was triggered by the United Nations Security Council's move to impose economic sanctions on North Korea. Although the immediate crisis was defused diplomatically, the nuclear time bomb continues to tick on the Korean peninsula, and the issues remain under close international surveillance. This important book examines North Korea's nuclear controversy from a variety of perspectives, including nuclear reactor technology and technology transfer, economic sanctions and incentives, strategic calculus and confidence-buildingmore » measures, the major powers, and environmental challenges that a nuclear-free zone in Korea will present.« less

  4. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... nation's transportation systems to ensure freedom of movement for people and commerce. To achieve this.... Another routine use permits the release of information to the media when there exists a legitimate public... limited to, Social security number; pilot certificate information, including number and country of...

  5. 15 CFR 19.4 - What notice will Commerce entities send to a debtor when collecting a Commerce debt?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false What notice will Commerce entities send to a debtor when collecting a Commerce debt? 19.4 Section 19.4 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.4...

  6. 15 CFR 19.12 - How will Commerce entities offset a Federal employee's salary to collect a Commerce debt?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false How will Commerce entities offset a Federal employee's salary to collect a Commerce debt? 19.12 Section 19.12 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.12...

  7. 15 CFR 19.12 - How will Commerce entities offset a Federal employee's salary to collect a Commerce debt?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false How will Commerce entities offset a Federal employee's salary to collect a Commerce debt? 19.12 Section 19.12 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.12...

  8. 15 CFR 19.12 - How will Commerce entities offset a Federal employee's salary to collect a Commerce debt?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false How will Commerce entities offset a Federal employee's salary to collect a Commerce debt? 19.12 Section 19.12 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.12...

  9. 15 CFR 19.12 - How will Commerce entities offset a Federal employee's salary to collect a Commerce debt?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false How will Commerce entities offset a Federal employee's salary to collect a Commerce debt? 19.12 Section 19.12 Commerce and Foreign Trade Office of the Secretary of Commerce COMMERCE DEBT COLLECTION Procedures To Collect Commerce Debts § 19.12...

  10. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  11. Some Lessons for Higher Education from the Economics of Electronic Commerce.

    ERIC Educational Resources Information Center

    Avenell, Simon

    The arrival of the Internet has been seen to portend the rise of the virtual university, global competition, and the end of campus education. The emerging economics of electronic commerce (eCommerce) allows for a measured understanding of the implications of the new technologies for higher education and even how educational innovation should be…

  12. Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports

    NASA Astrophysics Data System (ADS)

    Auletta, Vincenzo; Blundo, Carlo; de Caro, Angelo; de Cristofaro, Emiliano; Persiano, Giuseppe; Visconti, Ivan

    The recent introduction of electronic passports (e-Passports) motivates the need of a thorough investigation on potential security and privacy issues. In this paper, we focus on the e-Passport implementation adopted in Italy. Leveraging previous attacks to e-Passports adopted in other countries, we analyze (in)security of Italian e-Passports and we investigate additional critical issues.

  13. The research on electronic commerce security payment system based on set protocol

    NASA Astrophysics Data System (ADS)

    Guo, Hongliang

    2012-04-01

    With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).

  14. Helping E-Commerce Consumers Make Good Purchase Decisions: A User Reviews-Based Approach

    NASA Astrophysics Data System (ADS)

    Zhang, Richong; Tran, Thomas T.

    Online product reviews provided by the consumers, who have previously purchased and used some particular products, form a rich source of information for other consumers who would like to study about these products in order to make their purchase decisions. Realizing this great need of consumers, several e-commerce web sites such as Amazon.com offer facilities for consumers to review products and exchange their purchase opinions. Unfortunately, reading through the massive amounts of product reviews available online from many e-communities, forums and newsgroups is not only a tedious task but also an impossible one. Indeed, nowadays consumers need an effective and reliable method to search through those huge sources of information and sort out the most appropriate and helpful product reviews. This paper proposes a model to discover the helpfulness of online product reviews. Product reviews can be analyzed and ranked by our scoring system and those reviews that may help consumers better than others will be found. In addition, we compare our model with a number of machine learning techniques. Our experimental results confirm that our approach is effective in ranking and classifying online product reviews.

  15. Security and privacy issues of personal health.

    PubMed

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  16. 17 CFR 230.416 - Securities to be issued as a result of stock splits, stock dividends and anti-dilution provisions...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...

  17. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    PubMed

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  18. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGES

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  19. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Adam D.

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  20. E-therapy: practical, ethical, and legal issues.

    PubMed

    Manhal-Baugus, M

    2001-10-01

    E-therapy is a term that has been coined to describe the process of interacting with a therapist online in ongoing conversations over time when the client and counselor are in separate or remote locations and utilize electronic means to communicate with each other. It is a relatively new modality of assisting individuals resolve life and relationship issues. E-therapy utilizes the power and convenience of the internet to allow simultaneous (synchronous) and time-delayed (asynchronous) communication between an individual and a professional. For the purposes of this paper, e-therapy is defined as a licensed mental health care professional providing mental health services via e-mail, video conferencing, virtual reality technology, chat technology, or any combination of these. It does not include self-help methods such as public bulletin boards or private listservs. E-therapy is not psychotherapy or psychological counseling per se since it does to presume to diagnose or treat mental or medical disorders. However, e-therapy is flexible enough to also address many difficulties which clients present to the online therapist. As in other types of therapy, such as bibliotherapy, occupational therapy, and rehabilitation therapy), e-therapy does assist a person in addressing specific concerns with specific skills. This article examines the following issues of e-therapy. First, the types of e-therapy and related services are described to provide a background for the article. Second, the ethical codes which have been adopted by three major professional organizations (American Counseling Association, National Board for Certified Counselors, and the International Society for Mental Health Online) pertaining to e-therapy are summarized for professional and consumer use. Finally, the practical, ethical, and legal issues of e-therapy services are discussed fully.

  1. Study on store-space assignment based on logistic AGV in e-commerce goods to person picking pattern

    NASA Astrophysics Data System (ADS)

    Xu, Lijuan; Zhu, Jie

    2017-10-01

    This paper studied on the store-space assignment based on logistic AGV in E-commerce goods to person picking pattern, and established the store-space assignment model based on the lowest picking cost, and design for store-space assignment algorithm after the cluster analysis based on similarity coefficient. And then through the example analysis, compared the picking cost between store-space assignment algorithm this paper design and according to item number and storage according to ABC classification allocation, and verified the effectiveness of the design of the store-space assignment algorithm.

  2. Security Issues for Mobile Medical Imaging: A Primer.

    PubMed

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  3. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    ERIC Educational Resources Information Center

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  4. Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Semantic-Enabled Marketplaces

    NASA Astrophysics Data System (ADS)

    Ragone, Azzurra; di Noia, Tommaso; di Sciascio, Eugenio; Donini, Francesco M.

    We present a semantic-based approach to multi-issue bilateral negotiation for e-commerce. We use Description Logics to model advertisements, and relations among issues as axioms in a TBox. We then introduce a logic-based alternating-offers protocol, able to handle conflicting information, that merges non-standard reasoning services in Description Logics with utility thoery to find the most suitable agreements. We illustrate and motivate the theoretical framework, the logical language, and the negotiation protocol.

  5. 29 CFR 779.22 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 3 2013-07-01 2013-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.22 Section 779.22 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR... Definitions § 779.22 Enterprise engaged in commerce or in the production of goods for commerce. The portions...

  6. 29 CFR 779.22 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 3 2012-07-01 2012-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.22 Section 779.22 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR... Definitions § 779.22 Enterprise engaged in commerce or in the production of goods for commerce. The portions...

  7. 29 CFR 779.237 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 3 2014-07-01 2014-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.237 Section 779.237 Labor Regulations Relating to Labor (Continued) WAGE AND... commerce or in the production of goods for commerce. Under section 3(s) the “enterprise” to be covered must...

  8. 29 CFR 779.237 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 3 2013-07-01 2013-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.237 Section 779.237 Labor Regulations Relating to Labor (Continued) WAGE AND... commerce or in the production of goods for commerce. Under section 3(s) the “enterprise” to be covered must...

  9. 29 CFR 779.22 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 3 2014-07-01 2014-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.22 Section 779.22 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR... Definitions § 779.22 Enterprise engaged in commerce or in the production of goods for commerce. The portions...

  10. 29 CFR 779.237 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.237 Section 779.237 Labor Regulations Relating to Labor (Continued) WAGE AND... commerce or in the production of goods for commerce. Under section 3(s) the “enterprise” to be covered must...

  11. 29 CFR 779.237 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 3 2012-07-01 2012-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.237 Section 779.237 Labor Regulations Relating to Labor (Continued) WAGE AND... commerce or in the production of goods for commerce. Under section 3(s) the “enterprise” to be covered must...

  12. 29 CFR 779.237 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.237 Section 779.237 Labor Regulations Relating to Labor (Continued) WAGE AND... commerce or in the production of goods for commerce. Under section 3(s) the “enterprise” to be covered must...

  13. 29 CFR 779.22 - Enterprise engaged in commerce or in the production of goods for commerce.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Enterprise engaged in commerce or in the production of goods for commerce. 779.22 Section 779.22 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR... Definitions § 779.22 Enterprise engaged in commerce or in the production of goods for commerce. The portions...

  14. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ...-01] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health... the National Cybersecurity Center of Excellence (NCCoE) in the Secure Exchange of Electronic Health... accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE will bring...

  15. Incidental memory and navigation in panoramic virtual reality for electronic commerce.

    PubMed

    Howes, A; Miles, G E; Payne, S J; Mitchell, C D; Davies, A J

    2001-01-01

    Recently much effort has been dedicated to designing and implementing World Wide Web sites for virtual shopping and e-commerce. Despite this effort, relatively little empirical work has been done to determine the effectiveness with which different site designs sell products. We report three experiments in which participants were asked to search for products in various experimental e-commerce sites. Across the experiments participants were asked to search in either QTVR (QuickTime Virtual Reality), hypertext, or pictorially rich hypertext environments; they were then tested for their ability to recall the products seen and to recognize product locations. The experiments demonstrated that when using QTVR (Experiments 1, 2, and 3) or pictorial environments (Experiment 2), participants retained more information about products that were incidental to their goals. In two of the experiments it was shown that participants navigated more efficiently when using a QTVR environment. The costs and benefits of using 3D virtual environments for on-line shops are discussed. Actual or potential applications of this research include support for the development of e-commerce design guidelines.

  16. Rising food costs & global food security: key issues & relevance for India.

    PubMed

    Gustafson, Daniel J

    2013-09-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers' incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  17. Rising food costs & global food security: Key issues & relevance for India

    PubMed Central

    Gustafson, Daniel J.

    2013-01-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers’ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all. PMID:24135190

  18. dLocAuth: a dynamic multifactor authentication scheme for mCommerce applications using independent location-based obfuscation

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.

    2012-06-01

    This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.

  19. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... for people and commerce. To achieve this mission, TSA is required to develop and adapt its security... compromised. Another routine use permits the release of information to the media when there exists a... result of the suspected or confirmed compromise there is a risk of harm to economic or property interests...

  20. Innovation and development of exhibition electronic-commerce based on the properties of electronic-commerce

    NASA Astrophysics Data System (ADS)

    Zhang, Jiankang

    2017-06-01

    There are two roadmaps of accomplishing exhibition electronic-commerce innovation and development. The first roadmap is that the exhibition organizers should seek mutual benefit cooperation with professional electronic-commerce platform of correspondent area with exhibition projects, thus help exhibitors realize their market object. The second roadmap is to promote innovation and development of electronic-commerce (Business-to-Customer) between both exhibitors and purchasers. Exhibition electronic-commerce must focus on innovative development in the following functions: market research and information service; advertising and business negotiation; online trading and online payment. With the aid of electronic-commerce, exhibition enterprise could have distinctive strengths such as transactions with virtualization, transparency, high efficiency and low cost, enhancing market link during enterprise research and development, promoting the efficiency of internal team collaboration and the individuation of external service, and optimizing resource allocation.