• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 6
  • 4
  • 4
  • 3
  • 2
  • Tagged with
  • 38
  • 13
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Security for Mobile Payment Transaction

Desta, Girmay January 2012 (has links)
The advancement of ICT in a variety of sectors helped in improving the time consuming and rigid service into fast and flexible service that is closer to the reach of individuals. For instance, mobile applications have evolved in different sectors such as healthcare patient support, geographic mapping and positioning, banking, e-commerce payment services and others. This study focuses on one of the most sensitive applications, which is mobile payment. Mobile payment system being one of the widely expanding mobile services, it has security concerns that prevented its wide acceptance. Some of the main security services given prior attention in mobile payment are issues of privacy, authentication and confidentiality. The research concentrates on the strong authentication of a mobile client to its server, securing the credit card* information and use of mobile card reader while making payments that enable customers to protect privacy of financial credentials. The strong authentication mechanism mainly follows the NIST standard publications namely, FIPS PUB 201 and FIPS 196; which are standards on Entity Authentication using public key cryptography and PKI credential storage Personal Identity Verification (PIV) card respectively. The proposed secure Credit Card Information (CCI) storage is in a secure element in order to prevent tampering of stored data. The secure element options are microSD, UICC, Smartcard (together with digital certificate and service ticket). During making payments, the payment information encrypted using a shared key is securely sent to payment server. A demo mobile application as proof of concept was implemented in a simulated lab (KTH SecLab), which has all the necessary infrastructure setup (servers, card reader) for testing the proposed solution. The paper was able to proof the concept of secure payment by enhancing the authentication, confidentiality and privacy of payment information. However, the demo for Strong Authentication did not completely succeed as expected due to unexpected bugs in the early version of card reader SDK.
22

Egna märkesvaror och e-handel inom dagligvarumarknaden : Förbättring eller försämring av konkurrensen när egna märkesvaror och e-handel tar marknadsandelar? / Own-brand goods and e-commerce in the grocery market : Is competition improving or deteriorating as own-brand goods and e-commerce gain market share?

Ödborn Jönsson, Jakob, Dahl, Edvin January 2023 (has links)
Den svenska dagligvarumarknaden kännetecknas av en oligopolmarknad med hög marknadskoncentration. Marknaden domineras av tre aktörer som tillsammans utgör 90% av dagligvarumarknaden. Detta medför att kritik riktats mot dagligvarumarknaden när priserna stigit med mer än 20% i jämförelse med den generella prisökningen på 10%. Vidare har det spekulerats om dagligvarumarknadens konkurrensförhållanden har försämrats under åren.  På senare år har nya förutsättningar tillkommit på dagligvarumarknaden i Sverige, där e- handelns utveckling och den ökade tillväxten av egna märkesvaror (EMV) är två nya komponenter på marknaden. Tidigare studier och prisundersökningar har fokuserat på att utvärdera hur konkurrensen ser ut på marknaden då tillväxten av e-handel har undersökts, men utan att specifikt fokusera på egna märkesvaror och dess inflytande på konkurrensen på dagligvarumarknaden.  Information från sekundärdata visar att de tre dominerande aktörerna aktivt arbetar med att erbjuda egna onlinetjänster samt köpa in sig i nya aktörers verksamhet. Den informationen tillsammans med resultaten från en egen prisundersökning visar att e-handeln inte nödvändigtvis bidrar till ett främjande av konkurrensen på dagligvarumarknaden. Däremot bidrar e-handeln till en ökad prismedvetenhet hos konsumenter vid jämförelse av aktörers/butikens prissättning. På så sätt kan konsumenter på ett smidigt sätt prisjämföra och avgöra vilken butik som är billigast.  Vidare visar prisundersökningen att egna märkesvaror (EMV) är billigare än de klassiska varumärkena, vilket ger konsumenterna ökat utbud till lägre priser. Trots att EMV visas vara det billigare alternativet, innebär detta ett främjande av en mer vertikalt integrerad marknad, som i sin tur skapar inträdeshinder för nya aktörer. På så sätt kan slutsatsen dras att EMV bidrar till en försämrad konkurrens på dagligvarumarknaden. / The Swedish grocery market is characterized by an oligopoly market with high market concentration. The market is dominated by three players who together make up 90% of the grocery market. This means that the grocery market has been criticized when prices have risen by more than 20% compared to the general price increase of 10%. Furthermore, it has been speculated that the competitive conditions of the grocery market have deteriorated over the years.  In recent years, new conditions have emerged in the grocery market in Sweden, where the development of e-commerce and the increased growth of own-brand products (EMV) are two new components of the market. Previous studies and price surveys have focused on evaluating competition in the market when examining the growth of e-commerce, but without specifically focusing on own-brand products and their influence on competition in the grocery market.  Information from the secondary data shows that the three dominant players are actively engaged in offering their own online services and buying into the activities of new players. This information together with the results from the price survey shows that e-commerce does not necessarily contribute to the promotion of competition in the grocery market. On the other hand, e-commerce contributes to increased price awareness among consumers when comparing the pricing of operators/shops. In this way, consumers can easily compare prices and determine which store is the cheapest.  Furthermore, the price survey shows that own-brand products (EMV) are cheaper than classic brands, giving consumers more choice at lower prices. Although EMV is shown to be the cheaper option, this implies the promotion of a more vertically integrated market, which in turn creates barriers to entry for new players. Thus, it can be concluded that EMV contributes to a deterioration of competition in the grocery market.
23

The Unintended Consequences of Industry Mandates: How EMV is Changing the U.S. Payments Landscape

Thrasher, Jessica January 2018 (has links)
The 2015 mandate of Europay MasterCard and Visa (EMV) “chip card” technology in the U.S. left the payments market primed for the adoption of alternative technologies. The goal of this study is to determine the factors that contribute to the adoption of new, alternative payment technologies by integrating the Technology Acceptance Model (TAM) and Switching Cost Theory and operationalizing both theories in a consumer context. Through a survey of 210 chip card and mobile payment users, this study finds the TAM dimensions of self-efficacy, perceived usefulness, and social influence are key determinants of a user’s propensity to use a new technology in a mandated consumer context and introduces switching costs as an important antecedent to a consumer’s likelihood to use an alternative payment technology. More generally, this work integrates those theories to gain insight into how industry mandates influence user behavior with regards to consumer acceptance of alternative technologies. / Business Administration/Interdisciplinary
24

Kontaktlösa betalningar med smarta telefoner / Contactless payments with smartphones

Kornberg Valentine, Philip, Alkuheli, Zaid January 2021 (has links)
Företaget Hajenterprise vill göra en forskning inom kommunikation för att hantera kontaktlösa betalningar för att kunna ta betalt kontaktlöst med hjälp av mobilen. Idag används bankkort för att betala för de flesta saker. Nya betalningssätt har rört sig mot kontaktlösa köp med hjälp av smarta telefoner och NFC-teknologier. Smarta telefoner har börjat användas mer och mer i kontaktlösa köp mot point of sale (POS) terminaler. Skulle det då gå att kunna ta bort POS-terminaler och använda smarta telefoner som POS-terminaler? För att besvara detta behövdes tester utföras för att se ifall en smart telefon skulle kunna läsa ett bankkort och behandla bankkortets information. Bankkort kunde läsas av de smarta telefonerna men informationen från bankkortet kunde inte användas av den smarta telefonen för att genomföra en betalning. Detta var eftersom beroende på telefon, öppnades Samsung, Google eller Apple pay. En smart telefon kunde alltså ta emot information från ett bankkort men telefonen kunde inte använda den information för att utföra en betalning på en terminal. Utöver forskningen av olika betalningssätt, skapades en applikation där betalning skulle kunna utföras från en mobil till en annan mobil. Detta skulle ske med hjälp av Near Field Communication (NFC) och blockchain, eftersom Hajenterprise vill ha en prototyp-applikation som skulle kunna betala och ta betalt över NFC mot deras blockchain. JavaScript användes för att skapa en react native applikation som kunde fungera på både Android och iOS. Detta lade grunden så att Hajenterprise kunde använda sitt blockchain-api för mobila betalningar. / The company Hajenterprise wanted to research the area of contactless payments to see if it’s possible to Pay contactless with a mobile phone. Today bank cards are used to pay for most things. New payment methods have moved toward contactless purchases using smart phones and NFC-technologies. Smart phones have begun to be used more and more in contactless purchases at point of sale (POS) terminals. The possibility to remove POS-terminals and use smartphones instead as POS-terminals could make it easier and faster to pay. To test this, several tests were needed to see if a smartphone could read a bank card and process the card's information. Bank cards could be read by the smartphone but the information from the bank card could not be used by the smartphone to make a payment. This was because depending on the phone, Samsung, Google or Apple Pay was opened. Thus, a smart phone could receive information from a card but the phone could not use that information to make a payment at a terminal. In addition, an application was created where one could make payments from one mobile to another mobile. This would be done using Near Field Communication (NFC) and blockchain, as Hajenterprise wanted a prototype-application that could pay and charge over NFC against their blockchain. JavaScript was used to create a react native application that could work on both Android and iOS. This laid the foundation for Hajenterprise to use its blockchain API for mobile payments.
25

Jämförande analys av kontaktlösa betalningar med bankkort och smarttelefon ur ett säkerhetsperspektiv / Comparative analysis of contactless payment with cards and smartphones from a security perspective

Holmberg Tvingstedt, Tove January 2022 (has links)
Att betala med kort är idag standardiserat, men något som också är väldigt vanligt är att betala kontaktlöst. Detta kan göras både med ett kontaktlöst kort eller med en smarttelefon. Teknologin som möjliggör detta är närfältskommunikation. Examensarbetet undersöker hur säkerheten i dessa betalningsmetoder är uppbyggd, vad det finns för säkerhetsproblem samt hur användningen kan se ut i framtiden. Den primära frågeställningen var att undersöka om det är lika säkert eller till och med säkrare att använda en smarttelefon för kontaktlösa betalningar jämfört med ett kontaktlöst kort. För att undersöka detta, gjordes en omfattande litteraturstudie och en enkätundersökning. Resultatet av examensarbetet visade på att det fanns olika typer av hot och sårbarheter som exempelvis avlyssning, modifikation och korruption av data, reläattacker, skadlig applikation och programvara, svag autentisering och manipulation av applikationer. Det fanns även flertalet aspekter som påverkade hur väl dessa hot kunde utföras, bland annat tokenisering, kryptering men även det korta avståndet som krävs och social ingenjörskonst. Det upptäcktes även att attackytan skiljde sig mellan metoderna. Smarttelefonen hade flertalet hot och sårbarheter som ofta baseras på att det finns ett användargränssnitt, att enheten har ett annat användningsområde, och exempelvis skadlig programvara och ”rootade” enheter. När en enhet är ”rootad” betyder det att användaren får en annan typ av åtkomstkontroll. Enkätundersökningen visade att ungefär hälften av deltagarna kan tänka sig använda smarttelefonen i framtiden för att utföra kontaktlösa betalningar. / To pay with a card is standardized today, but something that is also very common is to pay contactless. This is possible to do with a contactless card or with a smartphone. The technology that makes this possible is Near Field Communication. This thesis examines how the security in these payment methods is structured, which security issues exists but also how the use may look in the future. The thesis also includes to investigate if it is as safe or even safer to use a smartphone for contactless payments compared to a contactless card. To investigate this, an extensive literature study and a questionnaire survey was conducted. The results of the thesis showed that there were different types of threats and vulnerabilities such as eavesdropping, data modification, data corruption, relay-attacks but also malicious application and software, weak authentication, and manipulation of applications. However, there were also several aspects that affected how well these threats could be carried out, including tokenization, encryption but also the short distance required and social engineering. It was also discovered that the attack surface differed between the two methods. The smartphone had several threats and vulnerabilities many of them existed since there is a user interface, and that the device is used in other ways. For example, malware and “rooted” devices, when a device is “rooted” it means that the user gets another type of access control for the device. The survey showed that about half of the participants may be willing to use a smartphone in the future to make contactless payments.
26

Rozhodování o optimální výši příspěvku krajů na provoz Zdravotnické záchranné služby / Deciding on the optimal financial contribution of the regions for Medical Rescue Services operations

Stibalová, Alice January 2016 (has links)
The principal goal of this thesis is the effort to create a decision model whereby the responsible Emergency Medical Service workers could set the amount of the required operating contribution. The operating contribution from the founder of the contributory organization is a very important item in creating the financial budget of the contributory organization. In the thesis the alternatives which may significantly influence the incomes of the contributory organization will be set by the decider. Since the founder determines the amount of the operating contribution which will be offered to the contributory organization, this data will not be worked with as a possible alternative. Furthermore the circumstances which may occur and which the organization must take into account will be determined.
27

Systémy platebních karet / Payment card systems

Flégl, Jan January 2011 (has links)
The work is about payment card systems. We’d like to describe infrastructure of credit cards, ATMs, POS terminals , focusing on the EMV standard. In theoretical part we will be introduced with the history and development of credit cards, ATMs and POS terminals. Then we focus on a detailed description of payments terminals and possibilities of payment via the Internet. The most extensive theoretical part deals width EMV standard. In practical part we will make our own program, which authenticates the user based on his credit card and it will allow the user to login in the system. Source codes of this application can be found on enclosed CD.
28

Charakterisierung der Modenverwirbelungskammer der TU Dresden und Untersuchung von Verfahren zur Bestimmung der unabhängigen Rührerstellungen

Pfennig, Stephan 18 December 2014 (has links)
Die Elektromagnetische Verträglichkeit (EMV) betrachtet die Fähigkeit eines elektrischen Gerätes, in seiner elektromagnetischen Umgebung störungsfrei zu funktionieren, ohne diese dabei unzulässig zu stören. Zur Prüfung der Elektromagnetischen Verträglichkeit werden verschiedene Messumgebungen verwendet. Die Messung der strahlungsgebundenen Störfestigkeit und Störaussendung kann zum Beispiel in einer Modenverwirbelungskammer (MVK) erfolgen. Bei der Störfestigkeitsmessung wird der Prüfling einem externen Prüffeld ausgesetzt und untersucht, ob dieser die definierten Kriterien für einen störungsfreien Betrieb erfüllt. Für das Prüffeld muss vor der Messung nachgewiesen werden, dass die Anforderungen an dessen Homogenität eingehalten werden. Einen entscheidenden Einfluss auf die Homogenität des Prüffeldes hat der sogenannte Rührer. Bei einer MVK handelt es sich prinzipiell um einen Hohlraumresonator, in den ein mechanischer Rührer, d.h. ein elektrisch großer, drehbarer Streukörper integriert wird. Durch die Drehung des Rührers verändert sich die Feldverteilung in der MVK, was auch als Verwirbelung bezeichnet wird. Prinzipiell ergibt sich für jede Stellung des Rührers ein inhomogenes Feld mit lokalen Minima und Maxima. Ein Ziel bei der Verwendung von Modenverwirbelungskammern ist es, mit Hilfe geeigneter Verfahren Rührerstellungen zu finden, deren Feldverteilungen in Überlagerung ein möglichst homogenes Prüffeld erzeugen. Zum Lehrstuhl für Theoretische Elektrotechnik und Elektromagnetische Verträglichkeit der Technischen Universität Dresden gehört seit 2010 eine Modenverwirbelungskammer. Die Charakterisierung dieser MVK sowie eine weiterführende Untersuchung zur Wahl der Rührerstellungen bilden die Schwerpunkte der vorliegenden Arbeit. / In 2010 the Chair of Electromagnetic Theory and Compatibility of Technical University Dresden could extend its laboratories by a reverberation chamber with the dimensions 5.3 m, 3.7m and 3.0 m. Since then, a detailed characterisation of the chamber as well as further investigations have been the main emphasis of the authors research. The submitted doctoral thesis presents the obtained results. With the design, the fundamentals of operation and further characterisation of the reverberation chamber, given in Chapter 1 and 2, it aims to give an introduction and better understanding of reverberation chambers. On this basis, the authors research focused on methods for determining the independent stirrer positions in reverberations chambers. The results of the investigations are presented and summarised in chapter 3. One scope of Electromagnetic Compatibility are radiated immunity measurements. Besides the GTEM cell and the anechoic chamber the reverberation chamber gains in importance as an alternative measurement environment. A reverberation chamber is a shielded room with reflecting walls and one or more integrated mechanical stirrers. By rotating the stirrer the spatial boundary conditions for the electromagnetic field quantities are altered. The resulting change of the spatial field distribution depends on the location within the chamber and the geometry of the stirrer. Each stirrer position yields an inhomogeneous field distribution created by interfering waves. A general aim is to find a set of stirrer positions, whose superimposed field distributions create a more uniform test field. In practice, the given requirements for the homogeneity of the test field shall, with regards to an optimisation of measurement time, be realized with a minimum number of stirrer positions. In this context the term ’independent stirrer positions’ was established and describes stirrer positions, whose field distributions are linearly uncorrelated and therefore assumed to be practical for creating a more homogeneous test field using only a minimal number of stirrer positions. A general method for determining the number of independent stirrer positions in reverberation chambers is presented. The method uses a certain number of measurement positions in a defined test volume in order to characterize the spatial field distribution inside the chamber. Using the Pearson correlation coefficient the field distributions of the stirrer positions are tested for linear correlation and pairs of independent stirrer positions are determined. On this basis, cliques of pairwise independent stirrer positions are identified using appropriate algorithms. It is shown that the general method yields detailed information about the number and distribution of the independent stirrer positions and is therefore particularly suitable to evaluate other methods. Finally, the standard method according to IEC 61000-4-21 as well as selected alternative methods, that have been proposed in the past, are evaluated and compared based on the results of the general method.
29

Numerische Berechnung elektromagnetischer Felder - Erweiterung einer Hybridmethode aus Momentenmethode und Einheitlicher Geometrischer Beugungstheorie um die Verallgemeinerte Multipoltechnik

Balling, Stefan 30 October 2007 (has links) (PDF)
Drei numerische Feldberechnungsverfahren - die Momentenmehtode, die Einheitliche Geometrische Beugungstheorie und die Verallgemeinerte Multipoltechnik - werden schrittweise zu einer Erweiterten Hybridmethode (EHM) kombiniert. Dabei wird jeder einzelne Kombinationsschritt anschaulich anhand von Beispielen erläutert, die den Vorteil der EHM verdeutlichen: Mit diesem Verfahren lassen sich bestimmte Anordnungen äußerst effektiv analysieren.
30

Numerische Berechnung elektromagnetischer Felder - Erweiterung einer Hybridmethode aus Momentenmethode und Einheitlicher Geometrischer Beugungstheorie um die Verallgemeinerte Multipoltechnik

Balling, Stefan 16 May 2007 (has links)
Drei numerische Feldberechnungsverfahren - die Momentenmehtode, die Einheitliche Geometrische Beugungstheorie und die Verallgemeinerte Multipoltechnik - werden schrittweise zu einer Erweiterten Hybridmethode (EHM) kombiniert. Dabei wird jeder einzelne Kombinationsschritt anschaulich anhand von Beispielen erläutert, die den Vorteil der EHM verdeutlichen: Mit diesem Verfahren lassen sich bestimmte Anordnungen äußerst effektiv analysieren.

Page generated in 0.0548 seconds