Abstract: Connected vehicles are equipped with wireless sensors
that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure
(V2I) communication. These vehicles will in the near future
provide road safety, improve transport efficiency, and reduce traffic
congestion. One of the challenges for connected vehicles is how
to ensure that information sent across the network is secure. If
security of the network is not guaranteed, several attacks can occur,
thereby compromising the robustness, reliability, and efficiency of
the network. This paper discusses existing security mechanisms and
unique properties of connected vehicles. The methodology employed
in this work is exploratory. The paper reviews existing security
solutions for connected vehicles. More concretely, it discusses
various cryptographic mechanisms available, and suggests areas
of improvement. The study proposes a combination of symmetric
key encryption and public key cryptography to improve security.
The study further proposes message aggregation as a technique to
overcome message redundancy. This paper offers a comprehensive
overview of connected vehicles technology, its applications, its
security mechanisms, open challenges, and potential areas of future
research.
Abstract: As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.
Abstract: Small and medium enterprises (SMEs) are regarded as the engine for economic development, notwithstanding their continuous financing conundrum. In the case of developing countries, access to finance is a reflection of the effectiveness of government policy. The widely accepted perspective to assess small businesses’ access to finance is that of economic view. The existing body of literature presents access to finance in three dimensions; they are accessibility, eligibility and affordability. Within this perspective, the role of socio-cultural has not explored. This study is aimed at investigating the existence of any socio-cultural factors within access to finance issue in Asian countries where governance is enriched by countries’ values and beliefs. The significance of this study is the instigation of supplementary dimension to assess access to finance that eventually contributes to the development of micro-finance policy. Indonesia and Thailand are selected as cases in point, where distinction is drawn on the level of cultural diversity and micro-finance policy in respective country. A questionnaire is used to collect information related to the three dimensions of access to finance as well as to explore alternative financing reasoning to elaborate the issue from the demand side. Questionnaires are distributed to 60 small business owners operating in Indonesia and the same number in Thailand. In order to present a complete understanding on the matter at hand, interviews with banks are conducted to capture the perspective as presented by the supply side. Research findings show that small business owners and banks in Indonesia and Thailand are in agreement that access to finance is not deemed as an issue. However, trust issue that exists mutually between financing users and providers leads small business owners in Indonesia to look for alternative financing other than banks. The findings contribute to the refinement of micro-financing policy in Indonesia and Thailand.
Abstract: Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.
Abstract: Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.
Abstract: Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.
Abstract: The importance and significance of this research is based upon the fundamental knowledge reported in the scientific literature that physical activity is inversely associated with obesity. In addition, it is recognized there is a global epidemic of sedentariness while at the same time it is known that morbidity and mortality are associated with physical inactivity and as a result of overweight or obesity. Hence this small study in school students is an important area of research in our community. An application submitted in 2005 for the inaugural Public Health Education Research Trust [PHERT] Post Graduate Research Scholarship scheme organized by the Public Health Association of Australia [PHAA] was awarded 3rd place within Australia. The author and title was: D. Hilton, Methods to increase physical activity in school aged children [literature review, a trial using pedometers and a policy paper]. Third place is a good result, however this did not secure funding for the project, as only first place received $5000 funding. Some years later within Australia, a program commenced called the Global Children's Challenge [GCC]. Given details of the 2005 award above were included an application submission prepared for Parkhill Primary School [PPS] which is located in Victoria, Australia was successful. As a result, an excited combined grade 3/ 4 class at the school [27 students] in 2012 became recipients of these free pedometers. Ambassadors for the program were Mrs Catherine Freeman [OAM], Olympic Gold Medalist – Sydney 2000 [400 meters], while another ambassador was Mr Colin Jackson [CBE] who is a Welsh former sprint and hurdling athlete. In terms of PPS and other schools involved in 2012, website details show that the event started on 19th Sep 2012 and students were to wear the pedometer every day for 50 days [at home and at school] aiming for the recommended 15,000 steps/day recording steps taken in a booklet provided. After the finish, an analysis of the average step count for this school showed that the average steps taken / day was 14, 003 [however only a small percentage of students returned the booklets and units] as unfortunately the dates for the program coincided with school holidays so some students either forgot or misplaced the units / booklets. Unfortunately funding for this program ceased in 2013, however the lasting impact of the trial on student’s knowledge and awareness remains and in fact becomes a good grounding for students in how to monitor basic daily physical activity using a method that is easy, fun, low cost and readily accessible.
Abstract: Education is an absolute necessity for human’s life
that one must fulfill for the entire life. Without education it is
impossible for human to develop her/himself well. The education
process is an effort to maintain a good behavior within one’s life.
Good behavior will be absolutely achieved if it is taught to early-aged
children. This paper focuses on how the story telling method enables
teachers to make the students have the construction of good behavior
and obtain the goal of national education in Indonesia. The targeted
students would involve students in As-Solihin kindergarten,
Salafiyah-Syafi’iyah Mumbulsari, Jember, Indonesia.
Story is what early-aged children like most. Thus, it is a gorgeous
chance to make story telling activity as a method to invest Islamic
education values to children. This paper, however, also focuses on
some deliberately important aspects which of course teachers need to
consider including objectives and strategies of the method’s
implementation. The teachers will be in need of knowing each
student’s characteristic in the classroom so that it would enable them
to select appropriate stories that fit best to early aged students. The
selected stories are taken from Islamic stories that tell the life of
Prophet and heroes of Islam as well as well-known persons in Islam.
In addition, there will be a number of activities done in the classroom
after the delivery of the story is over on purpose of leading students
to have the fundamental foundation of how to build self-awareness in
order they could understand better about the importance of being a
well-behaved person.
After reviewing relevant theories, secondary research and
scholars’ opinion involved in all aspects of early-aged children
behavior, the author concludes that by leveraging trusted sources, a
proactive, co-operative and creative strategy, the teacher can
successfully build up children’s good behavior by instilling the
Islamic value toward early-aged children through story telling
method.
Abstract: Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.
Abstract: This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.
Abstract: This paper aims to link together the concepts of job
satisfaction, work engagement, trust, job meaningfulness and loyalty
to the organisation focusing on specific type of employment –
academic jobs. The research investigates the relationships between
job satisfaction, work engagement and loyalty as well as the impact
of trust and job meaningfulness on the work engagement and loyalty.
The survey was conducted in one of the largest Latvian higher
education institutions and the sample was drawn from academic staff
(n=326). Structured questionnaire with 44 reflective type questions
was developed to measure the constructs. Data was analysed using
SPSS and Smart-PLS software. Variance based structural equation
modelling (PLS-SEM) technique was used to test the model and to
predict the most important factors relevant to employee engagement
and loyalty. The first order model included two endogenous
constructs (loyalty and intention to stay and recommend to work in
this organisation, and employee engagement), as well as six
exogenous constructs (feeling of fair treatment and trust in
management; career growth opportunities; compensation, pay and
benefits; management; colleagues and teamwork; and finally job
meaningfulness). Job satisfaction was developed as second order
construct and both: first and second order models were designed for
data analysis. It was found that academics are more engaged than
satisfied with their work and main reason for that was found to be job
meaningfulness, which is significant predictor for work engagement,
but not for job satisfaction. Compensation is not significantly related
to work engagement, but only to job satisfaction. Trust was not
significantly related neither to engagement, nor to satisfaction,
however, it appeared to be significant predictor of loyalty and
intentions to stay with the University. Paper revealed academic jobs
as specific kind of employment where employees can be more
engaged than satisfied and highlighted the specific role of job
meaningfulness in the University settings.
Abstract: With the advancement of knowledge about the utility
and impact of sustainability, its feasibility has been explored into
different walks of life. Scientists, however; have established their
knowledge in four areas viz environmental, economic, social and
cultural, popularly termed as four pillars of sustainability. Aspects of
environmental and economic sustainability have been rigorously
researched and practiced and huge volume of strong evidence of
effectiveness has been founded for these two sub-areas. For the social
and cultural aspects of sustainability, dependable evidence of
effectiveness is still to be instituted as the researchers and
practitioners are developing and experimenting methods across the
globe. Therefore, the present research aimed to identify globally used
practices of social and cultural sustainability and through evidence
synthesis assess their outcomes to determine the effectiveness of
those practices. A PICO format steered the methodology which
included all populations, popular sustainability practices including
walkability/cycle tracks, social/recreational spaces, privacy, health &
human services and barrier free built environment, comparators
included ‘Before’ and ‘After’, ‘With’ and ‘Without’, ‘More’ and
‘Less’ and outcomes included Social well-being, cultural coexistence,
quality of life, ethics and morality, social capital, sense of
place, education, health, recreation and leisure, and holistic
development. Search of literature included major electronic
databases, search websites, organizational resources, directory of
open access journals and subscribed journals. Grey literature,
however, was not included. Inclusion criteria filtered studies on the
basis of research designs such as total randomization, quasirandomization,
cluster randomization, observational or single studies
and certain types of analysis. Studies with combined outcomes were
considered but studies focusing only on environmental and/or
economic outcomes were rejected. Data extraction, critical appraisal
and evidence synthesis was carried out using customized tabulation,
reference manager and CASP tool. Partial meta-analysis was carried
out and calculation of pooled effects and forest plotting were done.
As many as 13 studies finally included for final synthesis explained
the impact of targeted practices on health, behavioural and social
dimensions. Objectivity in the measurement of health outcomes
facilitated quantitative synthesis of studies which highlighted the
impact of sustainability methods on physical activity, Body Mass
Index, perinatal outcomes and child health. Studies synthesized
qualitatively (and also quantitatively) showed outcomes such as
routines, family relations, citizenship, trust in relationships, social
inclusion, neighbourhood social capital, wellbeing, habitability and
family’s social processes. The synthesized evidence indicates slight
effectiveness and efficacy of social and cultural sustainability on the
targeted outcomes. Further synthesis revealed that such results of this
study are due weak research designs and disintegrated implementations. If architects and other practitioners deliver their
interventions in collaboration with research bodies and policy
makers, a stronger evidence-base in this area could be generated.
Abstract: Success means different things for different people.
For us, project managers, it becomes even harder to actually find a
definition. Many factors have to be included in the evaluation.
Moreover, literature is not very helpful, lacking consensus and
neutrality. Post-implementation reviews (PIR) can be an efficient tool
in evaluating how things worked on a certain project. Despite the
visible progress, PIR is not a very detailed subject yet and there is not
common understanding in this matter. This may be the reason that
some organizations include it in the projects’ lifecycle and some do
not. Through this paper, we point out the reasons why all project
managers should pay proper attention to this important step and to the
elements which can be assessed, beside the already famous triple
constraints: cost, budget and time. It is essential to take notice that PIR is not a checklist. It brings the
edge in eliminating subjectivity and judging projects based on actual
proof. Based on our experience, our success indicator model,
presented in this paper, contributes to the success of the project! In
the same time, it increases trust among customers who will perceive
success more objectively.
Abstract: The purpose of this study is analyzing the relationship
between trust and social capital of people with using Social Network
Analysis. In this study, two aspects of social capital will be focused:
Bonding, homophilous social capital (BoSC), and Bridging,
heterophilous social capital (BrSC). These two aspects diverge each
other regarding to the social theories. The other concept of the study
is Trust (Tr), namely interpersonal trust, willing to ascribe good
intentions to and have confidence in the words and actions of other
people. In this study, the sample group, 61 people, was selected from
a private firm from the defense industry. The relation between
BoSC/BrSC and Tr is shown by using Social Network Analysis
(SNA) and statistical analysis with Likert type-questionnaire. The
results of the analysis show the Cronbach’s alpha value is 0.756 and
social capital values (BoSC/BrSC) is not correlated with Tr values of
the people.
Abstract: Environmental concerns about the scarcity of marine
resources are critical driving forces for firms aiming to prepare their
supply chains for sustainability. Building on previous work, this
paper highlights the implementation of good practices geared towards
sustainable operations in the seafood department, which were
pursued in an exploratory retailer case. Outcomes of the adopted
environmentally and socially acceptable fish retailing strategies,
ranged from traceability, to self-certification and eco-labelling. The
consequences for business were, as follows: stronger collaboration
and trust across the chain of custody, improvement of sponsors’
image and of consumers’ loyalty and, progress in the Greenpeace
retailers’ evaluation ranking.
Abstract: The purposes of this research are to make comparisons in
respect of the behaviors on the use of the services of metered taxi
classified by the demographic factor and to study the influence of the
recognition on service quality having the effect on usage behaviors of
metered taxi services of consumers in Bangkok Metropolitan Areas. The
samples used in this research were 400 metered taxi service users in
Bangkok Metropolitan Areas and questionnaire was used as the tool for
collecting the data. Analysis statistics are mean and multiple regression
analysis. Results of the research revealed that the consumers recognize the
overall quality of services in each aspect include tangible aspects of the
service, responses to customers, assurance on the confidence,
understanding and knowing of customers which is rated at the moderate
level except the aspect of the assurance on the confidence and
trustworthiness which are rated at a high level. For the result of
hypothetical test, it is found that the quality in providing the services on
the aspect of the assurance given to the customers has the effect on the
usage behaviors of metered taxi services and the aspect of the frequency
on the use of the services per month which in this connection. Such
variable can forecast at one point nine percent (1.9%). In addition, quality
in providing the services and the aspect of the responses to customers
have the effect on the behaviors on the use of metered taxi services on the
aspect of the expenses on the use of services per month which in this
connection, such variable can forecast at two point one percent (2.1%).
Abstract: The aim of this study was to determine the factor
structure and psychometric properties (i.e., reliability and convergent
validity) of the Employee Trust Scale, a newly created instrument by
the researchers. The Employee Trust Scale initially contained 82
items to measure employees’ trust toward their supervisors. A sample
of 818 (343 females, 449 males) employees were selected randomly
from public and private organization sectors in Kota Kinabalu,
Sabah, Malaysia. Their ages ranged from 19 to 67 years old with a
mean of 34.55 years old. Their average tenure with their current
employer was 11.2 years (s.d. = 7.5 years). The respondents were
asked to complete the Employee Trust Scale, as well as a managerial
trust questionnaire from Mishra. The exploratory factor analysis on
employees’ trust toward their supervisor’s extracted three factors,
labeled ‘trustworthiness’ (32 items), ‘position status’ (11 items) and
‘relationship’ (6 items) which accounted for 62.49% of the total
variance. Trustworthiness factors were re-categorized into three sub
factors: competency (11 items), benevolence (8 items) and integrity
(13 items). All factors and sub factors of the scales demonstrated
clear reliability with internal consistency of Cronbach’s Alpha above
.85. The convergent validity of the Scale was supported by an
expected pattern of correlations (positive and significant correlation)
between the score of all factors and sub factors of the scale and the
score on the managerial trust questionnaire, which measured the same
construct. The convergent validity of Employee Trust Scale was
further supported by the significant and positive inter-correlation
between the factors and sub factors of the scale. The results suggest
that the Employee Trust Scale is a reliable and valid measure.
However, further studies need to be carried out in other groups of
sample as to further validate the Scale.
Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.
Abstract: This paper focuses on how judiciaries in post-conflict societies can gain legitimacy through reformation. Legitimacy plays a pivotal role in shaping people’s behavior to submit to the law and verifies the rightfulness of an organ for taking binding decisions. Among various dynamics, judicial independence, access to justice and behavioral changes of the judicial officials broadly contribute to legitimation of judiciary in general, and the courts in particular. Increasing independence of judiciary through reform limits, inter alia, government interference in judicial issues and protects basic rights of the citizens. Judicial independence does not only matter in institutional terms, individual independence also influences the impartiality and integrity of judges, which can be increased through education and better administration of justice. Finally, access to justice as an intertwined concept both at the legal and moral spectrum of judicial reform avails justice to the citizens and increases the level of public trust and confidence. Efficient legal decisions on fostering such elements through holistic reform create a rule of law atmosphere. Citizens neither accept an illegitimate judiciary nor do they trust its decisions. Lack of such tolerance and confidence deters the rule of law and thus, undermines the democratic development of a society.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.