Abstract: Authenticity in advertising is the cornerstone of
modern marketing. Despite research advances related to the role of
authenticity in marketing, it remains unclear why customers respond to
authentic brand stories. The results show that different personality
traits will moderate the influence of different authenticity on the levels
of emotion. Whether indexically authentic or iconically authentic
advertisements were shown to extroverts, open people and agreeable
people, they will evoke more positive emotions. When neurotic people
and conscientious people see the iconically authentic advertising
rather than the indexically authentic advertising, they will produce
more negative emotions. In addition, the emotion evoked by
advertising had significant positive impact on brand attitude evoked by
advertising had significant negative impact on brand attitude. These
findings provide some managerial implications and directions for
further research.
Abstract: Honeys are produced by Apis mellifera and stingless
bees (Meliponini) in Ecuador. We studied honey produced in
beeswax combs by Apis mellifera, and honey produced in pots by
Geotrigona and Scaptotrigona bees. Chloroform extracts of honey
were obtained for fast NMR spectra. The 1D spectra were acquired at
298 K, with a 600 MHz NMR Bruker instrument, using a modified
double pulsed field gradient spin echoes (DPFGSE) sequence.
Signals of 1H NMR spectra were integrated and used as inputs for
PCA, PLS-DA analysis, and labelled sets of classes were successfully
identified, enhancing the separation between the three groups of
honey according to the entomological origin: A. mellifera,
Geotrigona and Scaptotrigona. This procedure is therefore
recommended for authenticity test of honey in Ecuador.
Abstract: Control of honey frauds is needed in Ecuador to
protect bee keepers and consumers because simple syrups and new
syrups with eucalyptus are sold as genuine honeys. Authenticity of
Ecuadorian commercial honeys was tested with a vortex emulsion
consisting on one volume of honey:water (1:1) dilution, and two
volumes of diethyl ether. This method allows a separation of phases
in one minute to discriminate genuine honeys that form three phase
and fake honeys that form two phases; 34 of the 42 honeys analyzed
from five provinces of Ecuador were genuine. This was confirmed
with 1H NMR spectra of honey dilutions in deuterated water with an
enhanced amino acid region with signals for proline, phenylalanine
and tyrosine. Classic quality indicators were also tested with this
method (sugars, HMF), indicators of fermentation (ethanol, acetic
acid), and residues of citric acid used in the syrup manufacture. One
of the honeys gave a false positive for genuine, being an admixture of
genuine honey with added syrup, evident for the high sucrose.
Sensory analysis was the final confirmation to recognize the honey
groups studied here, namely honey produced in combs by Apis
mellifera, fake honey, and honey produced in cerumen pots by
Geotrigona, Melipona, and Scaptotrigona. Chloroform extractions of
honey were also done to search lipophilic additives in NMR spectra.
This is a valuable contribution to protect honey consumers, and to
develop the beekeeping industry in Ecuador.
Abstract: Employer branding is considered as a useful tool for
addressing the global-local problem facing complex organisations
that have operations scattered across the globe and face challenges of
dealing with the local environment alongside. Despite being an
established field of study within the Western developed world, there
is little empirical evidence concerning the relevance of employer
branding to global companies that operate in the under-developed
economies. This paper fills this gap by gaining rich insight into the
implementation of employer branding programs in a foreign
multinational operating in Pakistan dealing with the global-local
problem. The study is qualitative in nature and employs semistructured
and focus group interviews with senior/middle managers
and local frontline employees to deeply examine the phenomenon in
case organisation. Findings suggest that authenticity is required in
employer brands to enable them to respond to the local needs thereby
leading to the resolution of the global-local problem. However, the
role of signaling theory is key to the development of authentic
employer brands as it stresses on the need to establish an efficient and
effective signaling environment where in signals travel in both
directions (from signal designers to receivers and backwards) and
facilitate firms with the global-local problem. The paper also
identifies future avenues of research for the employer branding field.
Abstract: From an organizational perspective, leaders are a
variation of the same talent pool in that they all score a larger than
average value on the bell curve that maps leadership behaviors and
characteristics, namely competence, vision, communication,
confidence, cultural sensibility, stewardship, empowerment,
authenticity, reinforcement, and creativity. The question that remains
unanswered and essentially unresolved is how to explain the irony
that leaders are so much alike yet their organizations diverge so
noticeably in their ability to innovate. Leadership intersects with
innovation at the point where human interactions get exceedingly
complex and where certain paradoxical forces cohabit: conflict with
conciliation, sovereignty with interdependence, and imagination with
realism. Rather than accepting that leadership is without context, we
argue that leaders are specialists of their domain and that those
effective at leading for innovation are distinct within the broader pool
of leaders. Keeping in view the extensive literature on leadership and
innovation, we carried out a quantitative study with data collected
over a five-year period involving 240 participants from across five
dissimilar companies based in the United States. We found that while
innovation and leadership are, in general, strongly interrelated (r =
.89, p = 0.0), there are five qualities that set leaders apart on
innovation. These qualities include a large radius of trust, a restless
curiosity with a low need for acceptance, an honest sense of self and
other, a sense for knowledge and creativity as the yin and yang of
innovation, and an ability to use multiple senses in the engagement
with followers. When these particular behaviors and characteristics
are present in leaders, organizations out-innovate their rivals by a
margin of 29.3 per cent to gain an unassailable edge in a business
environment that is regularly disruptive. A strategic outcome of this
study is a psychometric scale named iLeadership, proposed with the
underlying evidence, limitations, and potential for leadership and
innovation in organizations.c
Abstract: With increase in the unauthorized users access, it is required to increase the security in the Near Field Communication (NFC). In the paper we propose a user behavior based enhanced protocol entitled ‘User Behavior based Enhanced Protocol (UBEP)’ to increase the security in NFC enabled devices. The UBEP works on the history of interaction of a user with system.The propose protocol considers four different factors (touch, time and distance & angle) of user behavior to know the authenticity or authorization of the users. These factors can be same for a user during interaction with the system. The UBEP uses two phase user verification system to authenticate a user. Firstly the acquisition phase is used to acquire and store the user interaction with NFC device and the same information is used in future to detect the authenticity of the user. The second phase (recognition) uses analysis of current and previous scenario of user interaction and digital signature verification system to finally authenticate user. The analysis of user based input makes a NFC transaction more advance and secure. This security is very tactical because it is completely depends on usage of the device.
Abstract: Because of the great advance in multimedia
technology, digital multimedia is vulnerable to malicious
manipulations. In this paper, a public key self-recovery block-based
video authentication technique is proposed which can not only
precisely localize the alteration detection but also recover the missing
data with high reliability. In the proposed block-based technique,
multiple description coding MDC is used to generate two codes (two
descriptions) for each block. Although one block code (one
description) is enough to rebuild the altered block, the altered block
is rebuilt with better quality by the two block descriptions. So using
MDC increases the ratability of recovering data. A block signature is
computed using a cryptographic hash function and a doubly linked
chain is utilized to embed the block signature copies and the block
descriptions into the LSBs of distant blocks and the block itself. The
doubly linked chain scheme gives the proposed technique the
capability to thwart vector quantization attacks. In our proposed
technique , anyone can check the authenticity of a given video using
the public key. The experimental results show that the proposed
technique is reliable for detecting, localizing and recovering the
alterations.
Abstract: The public sector holds large amounts of data of
various areas such as social affairs, economy, or tourism. Various
initiatives such as Open Government Data or the EU Directive on
public sector information aim to make these data available for public
and private service providers. Requirements for the provision of
public sector data are defined by legal and organizational
frameworks. Surprisingly, the defined requirements hardly cover
security aspects such as integrity or authenticity.
In this paper we discuss the importance of these missing
requirements and present a concept to assure the integrity and
authenticity of provided data based on electronic signatures. We
show that our concept is perfectly suitable for the provisioning of
unaltered data. We also show that our concept can also be extended
to data that needs to be anonymized before provisioning by
incorporating redactable signatures. Our proposed concept enhances
trust and reliability of provided public sector data.
Abstract: Nowadays, the importance of energy saving is clearance to everyone. By attention to increasing price of fuels and also the problems of environment pollutions, there are the most efforts for using fuels littler and more optimum in everywhere. This essay studies optimizing of gas consumption in gas-burner space heaters. In oven of each gas-burner space heaters there is two snags to prevent the hot air (the result of combustion of natural gas) to go out of oven of the gas-burner space heaters directly without delivering its heat to the space of favorite environment like a room. These snags cause a excess circulating that helps hot air deliver its heat to the space of favorite environment. It means the exhaust air temperature will be decreased then when there are no snags. This is the aim of this essay to use maximum potential energy of the natural gas to make heat. In this study, by the help of a finite volume software (FLUENT) consumption of the gas-burner space heaters is simulated and optimized. At the end of this writing, by comparing the results of software and experimental results, it will be proved the authenticity of this method.
Abstract: Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.
Abstract: This paper is an overview of the structure of Radio
Frequency Identification (RFID) systems and radio frequency bands
used by RFID technology. It also presents a solution based on the
application of RFID for brand authentication, traceability and
tracking, by implementing a production management system and
extending its use to traders.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: A simple but effective digital watermarking scheme
utilizing a context adaptive variable length coding (CAVLC) method
is presented for wireless communication system. In the proposed
approach, the watermark bits are embedded in the final non-zero
quantized coefficient of each DCT block, thereby yielding a potential
reduction in the length of the coded block. As a result, the
watermarking scheme not only provides the means to check the
authenticity and integrity of the video stream, but also improves the
compression ratio and therefore reduces both the transmission time
and the storage space requirements of the coded video sequence. The
results confirm that the proposed scheme enables the detection of
malicious tampering attacks and reduces the size of the coded H.264
file. Therefore, the current study is feasible to apply in the video
applications of wireless communication such as 3G system
Abstract: A virtualized and virtual approach is presented on
academically preparing students to successfully engage at a strategic
perspective to understand those concerns and measures that are both
structured and not structured in the area of cyber security and
information assurance. The Master of Science in Cyber Security and
Information Assurance (MSCSIA) is a professional degree for those
who endeavor through technical and managerial measures to ensure
the security, confidentiality, integrity, authenticity, control,
availability and utility of the world-s computing and information
systems infrastructure. The National University Cyber Security and
Information Assurance program is offered as a Master-s degree. The
emphasis of the MSCSIA program uniquely includes hands-on
academic instruction using virtual computers. This past year, 2011,
the NU facility has become fully operational using system
architecture to provide a Virtual Education Laboratory (VEL)
accessible to both onsite and online students. The first student cohort
completed their MSCSIA training this past March 2, 2012 after
fulfilling 12 courses, for a total of 54 units of college credits. The
rapid pace scheduling of one course per month is immensely
challenging, perpetually changing, and virtually multifaceted. This
paper analyses these descriptive terms in consideration of those
globalization penetration breaches as present in today-s world of
cyber security. In addition, we present current NU practices to
mitigate risks.
Abstract: Information hiding for authenticating and verifying the content integrity of the multimedia has been exploited extensively in the last decade. We propose the idea of using genetic algorithm and non-deterministic dependence by involving the un-watermarkable coefficients for digital image authentication. Genetic algorithm is used to intelligently select coefficients for watermarking in a DCT based image authentication scheme, which implicitly watermark all the un-watermarkable coefficients also, in order to thwart different attacks. Experimental results show that such intelligent selection results in improvement of imperceptibility of the watermarked image, and implicit watermarking of all the coefficients improves security against attacks such as cover-up, vector quantization and transplantation.
Abstract: The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting.
Abstract: The mineral having chemical compositional formula MgAl2O4 is called “spinel". The ferrites crystallize in spinel structure are known as spinel-ferrites or ferro-spinels. The spinel structure has a fcc cage of oxygen ions and the metallic cations are distributed among tetrahedral (A) and octahedral (B) interstitial voids (sites). The X-ray diffraction (XRD) intensity of each Bragg plane is sensitive to the distribution of cations in the interstitial voids of the spinel lattice. This leads to the method of determination of distribution of cations in the spinel oxides through XRD intensity analysis. The computer program for XRD intensity analysis has been developed in C language and also tested for the real experimental situation by synthesizing the spinel ferrite materials Mg0.6Zn0.4AlxFe2- xO4 and characterized them by X-ray diffractometry. The compositions of Mg0.6Zn0.4AlxFe2-xO4(x = 0.0 to 0.6) ferrites have been prepared by ceramic method and powder X-ray diffraction patterns were recorded. Thus, the authenticity of the program is checked by comparing the theoretically calculated data using computer simulation with the experimental ones. Further, the deduced cation distributions were used to fit the magnetization data using Localized canting of spins approach to explain the “recovery" of collinear spin structure due to Al3+ - substitution in Mg-Zn ferrites which is the case if A-site magnetic dilution and non-collinear spin structure. Since the distribution of cations in the spinel ferrites plays a very important role with regard to their electrical and magnetic properties, it is essential to determine the cation distribution in spinel lattice.
Abstract: Digital watermarking in medical images can ensure
the authenticity and integrity of the image. This design paper reviews
some existing watermarking schemes and proposes a reversible
tamper detection and recovery watermarking scheme. Watermark
data from ROI (Region Of Interest) are stored in RONI (Region Of
Non Interest). The embedded watermark allows tampering detection
and tampered image recovery. The watermark is also reversible and
data compression technique was used to allow higher embedding
capacity.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: The Elliptic Curve Digital Signature Algorithm
(ECDSA) is the elliptic curve analogue of DSA, where it is a digital
signature scheme designed to provide a digital signature based on a
secret number known only to the signer and also on the actual
message being signed. These digital signatures are considered the
digital counterparts to handwritten signatures, and are the basis for
validating the authenticity of a connection. The security of these
schemes results from the infeasibility to compute the signature
without the private key. In this paper we introduce a proposed to
development the original ECDSA with more complexity.