The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new approach to user identity currently being explored within the SuperIdentity project and outlines the specific role that biometric measurements can contribute towards a modelling process. The SuperIdentity project aims to define a novel holistic model wherein the proven strengths of relationships between facets of identity are mapped. These facets are drawn from both real...
Data aggregation is an efficient way to prolong the lifetime of wireless sensor networks (WSNs) by reducing communication traffic. However, sensor nodes are usually deployed in harsh or hostile environments. They are easy to be malfunctioning or become compromised nodes, which makes the sensor data unreliable and affects the accuracy of data aggregation. This paper proposes a secure data aggregation...
Intruder detection method by using time variant Multiple Input Multiple Output (MIMO) channels was proposed (MIMO sensor). It was verified that the antenna height and element spacing suitable for the MIMO sensor by the measurement. It was also shown that 2 × 2 MIMO sensor obtains the higher detection performance compared to 1 × 4 SIMO sensor. However, we conducted only the measurement when considering...
For existing defects of the events correlation analysis framework on the analysis ability or the scope of applications, this paper proposed a framework of audit events correlation analysis based on the influence net. The framework analyses the key events in audit data using influence net model, and proposes the algorithm of mining periodicity weighted temporal association rules to mine the correlation...
Cyber security issues, due to a lack of trust in social networking sites (SNS), are being addressed by many researchers and practitioners. Despite the diversity of security and privacy vulnerabilities, SNS have acquired and are still acquiring great popularity. Cybercrimes exploiting flaws in information technology and the imprudent trust of users, in who they add as contacts, are alarming and can...
The literature study indicates that the number of empirical studies on the relationship between work values and job performance of employees are very low, and the results are not complimentary. Although many scholars provide a considerable amount of research regarding the relationship between the work values of an employee and his job performance, few studies take the influence an enterprise environment...
A large amount of research effort is focused on developing methods for correlating network intrusion alerts, so as to better understand a network's current security state. The accuracy of traditional static methods of correlation is however limited in large-scale complex systems, where the degree of human insight and validation necessary is higher, and dynamic attack behaviours are likely. Many recent...
Online dating is one domain, which would benefit from the application of computational trust. One of the problems with the application of traditional computational trust models, as identified in our previous work, is authenticity of information provided by parties which helps other users ascertain whether they want to go on dates. In this position paper, we suggest a solution: a concordance based...
We propose a zero-intelligence agent-based model of the E-Mini S&P 500 futures market, which allows for a close examination of the market microstructure. Several classes of agents are characterized by their order speed and order placement within the limit order book. These agents' orders populate the simulated market in a way consistent with real world participation rates. By modeling separate...
Various types of personal information are accessible through the Web, and they can be accessed in number of ways. Linking of the personal information obtained with other personal information can lead to a serious violation of privacy. To address this problem, we developed a method that matches the information individuals place in a profile to the information they post on social media sites. It uses...
Modern smart phones have provided users countless opportunities to access, process and store data in various ways and formats. Inevitably, the user himself has started storing personal data too in the mobile phone. Drawing results from a study we realized, in a sample of 7172 students in 17 Universities of 10 Eastern and Southern Europe countries, we are initially providing useful insight into the...
Quite a few of existing literatures focused on research the inner impact of capital structure on Institutional Investors' Stockholding directly. In this paper, we have made an empirical research on this topic based on Chinese listed tourism companies' data during 2005–2009. The results indicated: (1) institutional investors were willing to hold listed tourism companies' shares with lower asset-liability...
Abstract-Consumer trust has been more and more recognized as an important factor for a successful e-commerce vendor. Based on the previous research, this paper developed an extended model for analyzing the main attributes of trust of the users in China. A survey regarding the trust of e-commerce users is conducted to empirically test the model. The result shows the perceived reputation and size; the...
With the popularity of Internet Consumption, students who are high-connected with internet turn into the main source of consumption online, so they have already become an important part of segment market that cannot be overlooked, coming along the online sales activities. For this reason, getting a better understanding of the characteristics of college students' online shopping behaviors, as well...
In this article, a Multi-Regression Model is established to analyze the interrelations among those influencing factors related to the capital adequacy ratio (CAR) of banks based on some cross section data of 17 commercial banks in China from 2000–2006. It is found that the CAR is in positive correlation with bank capital and profit, assets income ability, historical influence and securities market...
Nowadays the problem of controlling shareholders infringing minority shareholders' benefit has become the core to the company development. In order to prove the interest conflicts between the two and provide some helpful suggestions for minority shareholders protection, this paper has selected 82 listed family companies of China as the sample. And, by using the indirect method to establish a regression...
Modern portfolio theory dates back to a seminal 1952 paper by H. Markowitz and has been very influential both in academic finance and among practitioners in the financial industry. Given a set of assets, the theory can be used to compute the amount to be invested in each asset in order to construct an optimally diversified portfolio. One of the parameters required in this calculation is the covariance...
The mission of independent directors is mitigating conflictions between majority and minority shareholders. This paper selects listed companies punished by CSRC or received qualified audit opinions from 2002 to 2004 as our target sample, empirically tests behavior and economic consequence of adjustment of independent directors. Empirical evidence shows that listed companies will increase independent...
This article uses an empirical analysis to investigate the performance before and after the implementation of equity incentives with the paired-samples T test .In this paper, 25 listed companies which began to implement equity-based incentives in 2006 and 2007 are taken as the sample. And the corporate performances are divided into two stages by share splitting reform. The findings indicate that there...
As the undergraduate are the prosperous consumers in future, their consumption behaviours are important for the success of the online retailers. Recently the B2C and C2C of e-commerce has brought great benefits to the consumer and merchant. According to the theory of reasoned action(TRA) developed by Martin Fishbein and the theory of planned behavior (TPB) proposed by Icek Ajzen, a widely survey are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.