The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Video based telehealth is emerging as an important technology for effective and efficient collaboration between providers and patients. The advantages of receiving care at source not only account for convenience and cost effectiveness but also enable faster access to care. It brings access, experience and efficiencies in the care process. While there are multiple models of telehealth, in this work,...
This paper focuses on developing the trust model for the proposed femto-cloud mobile network which has been designed to build an energy efficient network. The concept of data offloading to a cloud from a mobile device forms the backbone of the work. Trust is one of the most essential parameters in order to determine the quality of any computing system. A test case has been performed to verify the...
Trustworthy personal data access control at a semi-trusted or distrusted Cloud Service Provider (CSP) is a practical issue although cloud computing has widely developed. Many existing solutions suffer from high computation and communication costs, and are impractical to deploy in reality due to usability issue. With the rapid growth and popularity of mobile social networking, trust relationships in...
Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became...
Today Networks are protected using many firewalls and security software's. Several of them are not sufficient and effective. Many intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or their efficiency, but they do not address the security problems. A number of nodes may be selfish meaning that by not forwarding the packets to the target, thereby cutting...
Due to the unique characteristics of disruption-tolerant networks (DTNs), such as sporadic and unpredictable connectivity, routing protocols in DTNs are facing many challenges. Message propagation follows the manner of store-carry-and-forward and the existing opportunistic data forwards routings under the hypothesis that each individual node is ready to forward packets for others. This hypothesis...
Distributed nature of Mobile Adhoc NETwork (MANET) and dynamically varying topology lead to a number of security threats in MANET. Malicious behavior of the participating entity disrupts normal functioning of the network. Moreover one major problem with continuous participation of nodes in MANET is energy consumption which often leads to selfish behavior of participating entity. Here we propose a...
In service-oriented mobile social networks (S-MSN), many location-based services are developed to provide various applications to social participants. Services can in turn be composed with the help of these participants. However, the composite structure, the subjective interpretation of trust demand, and the opportunistic connectivity make service composition a challenging task in S-MSN. In this paper,...
This paper includes a prospective approach of developing a trust based QOS protocol (TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET. Genetic algorithm will help in maintaining Quality of Service(QOS) by selecting a fittest i.e. shortest route hence providing better performance. Intelligent optimization approaches or meta heuristic algorithms like, genetic algorithm(GA),...
Mobile social networks (MSNs) facilitate connections between mobile users and allow them to find other potential users who have similar interests through mobile devices, communicate with them, and benefit from their information. As MSNs are distributed public virtual social spaces, the available information may not be trustworthy to all. Therefore, mobile users are often at risk since they may not...
Considering that very few studies have actually addressed the aspect of trust with all the three categories of trustee i.e. the retail banks, the mobile telecommunication provider and the mobile telephone in one single study, this study attempts to address this gap. In addition the study also seeks to investigate the impact of mobile banking utilization on satisfaction and loyalty. Adopting a survey...
Allowing a mobile device to provide a service to the neighbouring peers carries non-negligible risks, of which confidentiality, privacy and selfishness are good examples. To discourage selfishness, two approaches are typically taken: i) in trade based systems, devices agree on a retribution for the execution of a task, ii) in trust based systems rogue devices are detected and announced by their peers...
Self-service technologies like mobile banking service can bring different experience and interest than traditional bank. Internet banking has been one of the most profitable businesses in e-commerce. Like internet banking, mobile banking has emerged rapidly in recent years in China. Although studies have been investigating the adoption of mobile banking, they focused more in the positive factors....
Pervasive social communications are instant social activities through communications based on mobile elements, e.g., via mobile ad hoc networks. Meanwhile, fashionable technology is becoming a trend in Human-Computer Interaction (HCI) design. It extends the traditional understanding of HCI by emphasizing aesthetic element. This paper investigates how to use fashionable technology in pervasive social...
Trust is a directional relationship between two parties; the trustor and trustee. To manage trust, a procedure for trust management is needed. Trust in Mobile Ad-Hoc Network (MANET) during emergency case involves probability since it is not absolutely certain how much the nodes can be trusted, because there is not enough information collected by the time the decision needs to be made, hence creates...
this paper empirically explores value co-creation capability including product supply capability and service integrated capability, and its impact on cooperation performance, with trust as mediator. With the data from China national petroleum Group, China mobile Group and China Telecom Group, the framework is tested. The results show that product supply capability is positively related to cooperation...
In this paper, we study the usability factors on two major mobile payment applications on two different service providers in Thailand. These two applications have a different unique selling point. One is a number one mobile phone service provider which is well known for excellent services and used to own by a formal prime minister. Another one is a famous bank which integrates technology into financial...
This paper discusses e-commerce adoption trends in the Iranian retail sector. Data were collected using questionnaire and interviews of 170 retailers and 73 customers selected in Tehran. Iran's retail sector lags behind in e-business adoption. Key e-commerce applications were in administration, accounting, management and control systems with barcode-driven systems and debit card swipe technologies...
With the advancement of information communication technology, mobile devices find its utility growing gradually for various business domains. Moreover, there has been considerable growth of business opportunities over social media provides a win-win situation for both business stakeholders and end users. Therefore, it is believed that further research on the usage of mobile services through social...
Security is a major concern while implementing Mobile Ad Hoc Networks (MANET) for communication in an adverse environment. The dynamism in network topology and the absence of centralized administration, MANET is susceptible to security attacks from malicious users. This paper introduces the concept of anonymity for an informant who identifies and discloses anonymously the malicious behavior of other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.