Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Understanding Organizational Barriers Influencing Local Electronic Government Adoption and Implementation: The Electronic Government Implementation Framework
Nurdin,Nurdin; Stockdale,Rosemary; Scheepers,Helana;
Journal of theoretical and applied electronic commerce research , 2011, DOI: 10.4067/S0718-18762011000300003
Abstract: researches in electronic government have indicated a number of organizational barriers that hinder the adoption and implementation of electronic government. this paper proposes a research framework for analysing how organizational barriers influence the adoption and implementation of e-government at local levels. the framework is constructed based on four organizational dimensions; adaptability, involvement, mission, and bureaucracy drawn from organizational theories and e-government literature. we found that organizational barriers which are identified in major e-government literature link to the dimensions of organizational culture and effectiveness. our conclusion is that the framework is relevant to understand organizational barriers influencing adoption and implementation of local e-government. the limitation of this study is that the framework has been developed based on the application of a theoretical lens on the e-government literature. it is now necessary to test this model in different contexts.
A Framework for Implementation of Adaptive Autonomy for Intelligent Electronic Devices  [PDF]
A. Fereidunian,H. Lesani,C. Lucas,M. Lehtonen
Journal of Applied Sciences , 2008,
Abstract: This research letter introduces a novel framework for the implementation of Adaptive Autonomy for Intelligent Electronic Devices (IEDs). The study aims at achieving an optimum function allocation between IEDs and humans in automation systems. The function allocation should be adapted to the changes in environmental conditions, thus referring to as Adaptive Autonomy (AA). Performance Shaping Factors (PSFs) concept is utilized to represent the environmental conditions. Moreover, Experts Judgment method is used, to tackle the complex issue of human reliability assessment. The framework is implemented to the power distribution automation system of the Greater Tehran Electricity Distribution Company (GTEDC) and the obtained results are discussed then. Furthermore, the trends of the IED autonomy levels are investigated versus the situation criticality and the automation stages. Apart from introducing a novel implementation framework for IEDs AA, this letter discusses on the application-oriented issues, due to the context-based nature of the Human-Automation Interaction (HAI). The developmental relevance of this study is significant, as it is performed in a Metropolitan area of an Asian/Middle Eastern developing country, thus generalize-able to the similar applications to a reasonable extend.
An Evidence Management Framework in Electronic Commerce Transaction

Liu Song,

现代图书情报技术 , 2008,
Abstract: From relevant international standards,an evidence management conceptual framework is generalized in this paper for disputes resolution in electronic commerce transaction.The basic flow and generic models of evidence management in the framework are classified according to Trusted Third Party(TTP)involved and cryptography.The framework can define the generation,record,transfer and verification of evidence about the occurrence of an e-commerce event,and the retrieval of this evidence if disputes arise later on.
Design and Implementation of Transaction Framework for Web Services Composition

FANG Bing-Wu,LIU Li,ZHANG Chen-Shu,

计算机系统应用 , 2010,
Abstract: Web Services Composition(WSC) is becoming an important approach to EAI and its reliability needs to be guaranteed by introducing the transaction mechanism. WSC transactions differ from traditional transactions in that they execute over long periods and cross multiple loosely-coupled organizations, so traditional transaction processing mechanism is inappropriate for them. This paper summarizes the characteristics of WSC transaction and presents its multilayer framework, and then analyses the coordination procedure of WSC transaction in the framework, and finally gives its coordination protocol and designs a prototype system for WSC transaction.
TSET: Token based Secure Electronic Transaction  [PDF]
Rajdeep Borgohain,Moirangthem Tiken Singh,Chandrakant Sakharwade,Sugata Sanyal
Computer Science , 2012,
Abstract: Security and trust are the most important factors in online transaction, this paper introduces TSET a Token based Secure Electronic Transaction which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants can be known by customers before being involved in the transaction. Moreover, we also propose a grading mechanism so that quality of service in the transactions improves.
Role of Multiple Encryption in Secure Electronic Transaction  [PDF]
Himanshu Gupta,Vinod Kumar Sharma
International Journal of Network Security & Its Applications , 2011,
Abstract: Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication.The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.
Recovery Algorithm for Transaction Framework in Wireless Mobile Environment
Miraclin Joyce Pamila J.C,,Thanushkodi K
International Journal on Computer Science and Engineering , 2010,
Abstract: Data processing capability and data storage capacity of mobile handheld devices facilitate transaction processing. Normally mobile internet transactions enable multiple users to involve in on-line transaction processing independent of their physical location. The mobile network is prone to frequent failures due to its constrainedbandwidth available and mobility of mobile hosts. Users execute transaction with a web portal from a mobile device and the disconnection will make the transaction to fail completely or redo all the steps after reconnection to get back into the consistent state. Thus present mobile computing environment poses a new challenging problem in designing new recovery schemes for mobile transactions. So a recovery algorithm is proposed that ensures stable state recovery when mobile device gets reconnected after the disruption in execution of the transaction. The proposed framework ensures failure recovery algorithms that recover the stable application state with dependency preservation between transactions and with reduced recovery cost.
International Journal of Engineering Science and Technology , 2012,
Abstract: This paper tries to find out consumer perception on service delivery in banks since the implementation of electronic banking. It also brings out the problems of electronic banking in Nigeria. Three research objectives guided the study and primary data were collected through interviews and questionnaires. Data were analysed descriptively. Results show that though many banks have adopted information technology (IT) facilities for electronic banking yet their service delivery were not quite efficient. This resulted in long consumer queues in banks and difficulties in banking transactions. Some problems with e banking center on unreliable facilities required for e banking, epileptic power supplies, incompetent IT staff etc. Some of the recommendations centre on improvements in the area of banking staff and internet facilities so that the laudable objectives of e banking will be realized in the Nigerian society.
Design and Implementation of a Generic Energy-Harvesting Framework Applied to the Evaluation of a Large-Scale Electronic Shelf-Labeling Wireless Sensor Network  [cached]
De Mil Pieter,Jooris Bart,Tytgat Lieven,Catteeuw Ruben
EURASIP Journal on Wireless Communications and Networking , 2010,
Abstract: Most wireless sensor networks (WSNs) consist of battery-powered nodes and are limited to hundreds of nodes. Battery replacement is a very costly operation and a key factor in limiting successful large-scale deployments. The recent advances in both energy harvesters and low-power communication systems hold promise for deploying large-scale wireless green-powered sensor networks (WGSNs). This will enable new applications and will eliminate environmentally unfriendly battery disposal. This paper explores the use of energy harvesters to scavenge power for nodes in a WSN. The design and implementation of a generic energy-harvesting framework, suited for a WSN simulator as well as a real-life testbed, are proposed. These frameworks are used to evaluate whether a carrier sense multiple access with collision avoidance scheme is sufficiently reliable for use in emerging large-scale energy harvesting electronic shelf label (EHESL) systems (i.e., 12000 labels in a star topology). Both the simulator and testbed experiments yielded an average success rate up to 92%, with an arrival rate of 40 transceive cycles per second. We have demonstrated that our generic energy-harvesting framework is useful for WGSN research because the simulator allowed us to verify the achieved results on the real-life testbed and vice versa.
Implementation of Authentication and Transaction Security based on Kerberos
Prof R.P. Arora,Ms. Garima Verma
International Journal of Innovative Technology and Creative Engineering , 2011,
Abstract: Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. Kerberos was created by MIT as a solution to network security problems. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of their communications to assure privacy and data integrity as they go about their business. In this paper we tried to implement authentication and transaction security in a Network using Kerberos. This project is embedded with Authentication Server application and used to derive a 64 bit key from user’s password. This key is used by authentication server, to encrypt ticket granting ticket + session key. The key generated by authentication server will be used by the client at the time of transaction through the transaction server to authenticate that transaction client is valid or not
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.