Purpose: Money transfer through third-party mobile payment platforms has become common nowadays in western countries. While in developing countries, the adoption of mobile payment channels still at ...the infancy stage. The current study based on diffusion of innovation theory investigates the antecedents of intention to use mobile payment channels through trust's mediating role.
Methodology: The survey method was used to collect data from the 250 consumers using the mobile payments services of JazzCash and Easypaisa in Pakistan. Partial least square structural equation modeling (PLS-SEM) technique employed to test the collected data statistically.
Findings: Results found the significant impact of mobility, customization, and security on trust that intends to utilize mobile-payment channels.
Implications: The current study's findings provide guidelines to the administration of mobile payment systems to improve security features, mobility, and customization that wins customers' trust and is inclined to use mobile payment platform.
There is an increasing number of cyber-systems (e.g., systems for payment, transportation, voting, critical infrastructures) whose security depends intrinsically on human users. In this paper, we ...introduce a novel approach for the formal and automated analysis of security ceremonies. A security ceremony expands a security protocol to include human nodes alongside computer nodes, with communication links that comprise user interfaces, human-to-human communication and transfers of physical objects that carry data, and thus a ceremony’s security analysis should include, in particular, the mistakes that human users might make when participating actively in the ceremony. Our approach defines mutation rules that model possible behaviors of a human user, automatically generates mutations in the behavior of the other agents of the ceremony to match the human-induced mutations, and automatically propagates these mutations through the whole ceremony. This allows for the analysis of the original ceremony specification and its possible mutations, which may include the way in which the ceremony has actually been implemented or could be implemented. To automate our approach, we have developed the tool X-Men, which is a prototype that builds on top of Tamarin, one of the most common tools for the automatic unbounded verification of security protocols. As a proof of concept, we have applied our approach to three real-life case studies, uncovering a number of concrete vulnerabilities. Some of these vulnerabilities were so far unknown, whereas others had so far been discovered only by empirical observation of the actual ceremony execution or by directly formalizing alternative models of the ceremony by hand, but X-Men instead allowed us to find them automatically.
The development of measures in civil aviation protection against illegal acts is based on the analysis of incidents, which can be divided into four development stages. Before 9/11, civil aviation ...entities were mostly reactive; only new threats warranted a proactive approach to mitigating air threats. The present article’s aim was to analyse the development of methods for checking passengers and objects intended for air transport. The analysis of selected incidents, control processes, and the level of security achieved confirm that the implemented security methods and proactive approach to working with air traffic risks are a suitable compromise between passenger comfort, technological development of detection devices, and processes at the airport.
PurposeSecurity ceremonies still fail despite decades of efforts by researchers and practitioners. Attacks are often a cunning amalgam of exploits for technical systems and of forms of human ...behaviour. For example, this is the case with the recent news headline of a large-scale attack against Electrum Bitcoin wallets, which manages to spread a malicious update of the wallet app. The author therefore sets out to look at things through a different lens.Design/methodology/approachThe author makes the (metaphorical) hypothesis that humans arrived on Earth along with security ceremonies from a very far planet, the Cybersecurity planet. The author’s hypothesis continues, in that studying (by huge telescopes) the surface of Cybersecurity in combination with the logical projection on that surface of what happens on Earth is beneficial for us earthlings.FindingsThe author has spotted four cities so far on the remote planet. Democratic City features security ceremonies that allow humans to follow personal paths of practice and, for example, make errors or be driven by emotions. By contrast, security ceremonies in Dictatorial City compel to comply, hence humans here behave like programmed automata. Security ceremonies in Beautiful City are so beautiful that humans just love to follow them precisely. Invisible City has security ceremonies that are not perceivable, hence humans feel like they never encounter any. Incidentally, the words “democratic” and “dictatorial” are used without any political connotation.Originality/valueA key argument the author shall develop is that all cities but Democratic City address the human factor, albeit in different ways. In the light of these findings, the author will also discuss security ceremonies of our planet, such as WhatsApp Web login and flight boarding, and explore room for improving them based upon the current understanding of Cybersecurity.
The article considers perspectives and institutions for innovative nuclear energy subsector – a small and medium-sized nuclear power plants (SNP). The features of the technologies, prospective sites ...for their introduction, topics for priority research work, as well as mechanisms for the creation of a new sub-sector of nuclear energy are briefly discussed. The advantages and opportunities of such approach to the energy supply of autonomous and isolated consumers located primarily in remote areas and in the Arctic are indicated. Special attention is paid to the problems of technological and operational safety, economic efficiency, and personnel training. The methodological framework provides a brief integrated description of the possibilities provided by dual-use technologies in solving national economic issues; a list of priority research areas to clarify assessments of the financial and economic efficiency of the SNP subsystem within the Russian nuclear energy industry; as well as proposals for personnel training to ensure a trouble-free and efficient Program implementation process.
Private security has developed significantly throughout the world in the past few decades. Technical security has also flourished, bringing new technologies of surveillance and control that became ...the landmarks of our security everyday life. Various systems of video surveillance, alarm systems, and access control systems have overwhelmed private households, commercial objects as well as almost every public building. The security science, sociology, and philosophy scholars have already accepted and widely used the new term of banopticon, coined by the French scholar Didier Bigo. In actual fact, this term is intended to explain that contemporary technical private security has become a symbol of a new powerful surveillance and control mechanism that functions in a way of keeping the people who have not authorization to enter to a certain secured place out of that place. In some wider scientific contexts, the term banopticon has been different from the terms panopticon and synopticon, used tremendously by scientific scholars for some other aspects of surveillance and control. The term banopticon is interesting because it has been widely associated with the growth and development of private security, especially technical private security. Within this paper, we’ll analyze the meaning and importance of this term in the contemporary private security debates as well as in the contemporary Macedonian private security context. The paper will also point to some human and ethical dilemmas of usage of the technical private security in securing certain persons, objects and places.
Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to ...cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.
LNG bunkering pontoons are presented to solve the fueling difficulty of LNG ships on inland waterways with a great variation of water height and channel width by seasonal change. First, the ...background of this concept was analyzed as well as the demand of LNG bunkering pontoons, and the involved idea of levels management. Then, from the safety barrier perspective, safety design principles were discussed, the safety principles and implement measures of LNG storage were provided, LNG tanks for the pontoon were analyzed in detail in terms of their types, design pressure, material selection and leakage protection principles. Also, the safety concerns of LNG supply and bunkering process were raised, and an improved handy bunkering arm & hose, lighter and more flexible than ever before, was introduced. Berthing and unberthing are related to the survival of the pontoon so that the key points of such design were highlighted. It is concluded that (1) based on the levels management, the pontoon equipped with IMO Type C tanks, with reasonable berthing/unberthing and safety designs adopted, is proved to be safe and reliable by practices; (2) by 2025, nearly 30 such improved LNG bunkering pontoons with a fueling capacity of 500 m3 each will be required on Yangtze and Pearl Rivers; and (3) the pontoon's safety and reliability has been verified by practices and its fourth generation has been developed. Keywords: LNG bunkering pontoon, Floating fueling station, LNG fuel, Storage, IMO type C tanks, Bunkering arm & hose, Technical security, Levels management
The contact glass-break detector is very often marked as very unreliable and these models are not very popular in a security application. The aim of this article is to find out the bottleneck of the ...glass-break detectors and try to improve their functionality and reliability. The main function is based on the vibration caused by the impact on the glass panel and these vibrations are detected by the detector. However, the biggest issue is the absorption of the vibration by the glass panels and the plastic windows itself. This article should show the vibration transfer difference between the inner and outer glass panels in the multi-chamber window. This experiment should be done according to the current standardization by the two accelerometers on each side of the window. The results should be used for the further improvement of the design and reliability of the contact glass-break detectors on the market. Keywords: Security; Technical Security; Alarm Detector; Glass-break Detector; Multi-chamber Window.