WorldWideScience

Sample records for anonymous credit cards

  1. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  2. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  3. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  4. Credit Card Quiz.

    Science.gov (United States)

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  5. Dynamic Virtual Credit Card Numbers

    Science.gov (United States)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  6. Follow Up: Credit Card Caution

    Science.gov (United States)

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  7. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  8. War of the Credit Cards.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  9. Credit Cards. Bulletin No. 721. (Revised.)

    Science.gov (United States)

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  10. British and American attitudes toward credit cards.

    Science.gov (United States)

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  11. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  12. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  13. WHAT INFLUENCE CREDIT CARD DEBTS IN YOUNG CONSUMERS IN MALAYSIA

    OpenAIRE

    Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN

    2014-01-01

    This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...

  14. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    Science.gov (United States)

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  15. College Student Performance and Credit Card Usage.

    Science.gov (United States)

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  16. Overcoming credit card fraud in South Africa

    African Journals Online (AJOL)

    A credit card is a convenient method of payment, but it does carry risks. The enormous ... Identity theft and the exponential ... Unique Security Features of a Credit Card with the Aim of Identifying ..... technology in an attempt to try and curb the.

  17. Credit Card Selection Criteria: Singapore Perspective

    OpenAIRE

    Lydia L. Gan; Ramin Cooper Maysami

    2006-01-01

    This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...

  18. Mammography screening credit card and compliance.

    Science.gov (United States)

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  19. 12 CFR 226.12 - Special credit card provisions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  20. Analysis of Transaction Authorization for Credit Card Master Card Holders

    OpenAIRE

    Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom

    1998-01-01

    The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...

  1. Prefrontal system dysfunction and credit card debt.

    Science.gov (United States)

    Spinella, Marcello; Yang, Bijou; Lester, David

    2004-10-01

    Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction.

  2. College Student Credit Card Usage and Debt.

    Science.gov (United States)

    Rybka, Kathryn M.

    2001-01-01

    Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

  3. Correlates of credit card ownership in men and women.

    Science.gov (United States)

    Yang, Bijou; Lester, David

    2005-06-01

    In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.

  4. The Regulation of the Credit Card Market in Turkey

    OpenAIRE

    Ahmet Faruk Aysan; L. Yildiz

    2006-01-01

    The rapid growth in Turkish credit card market brought together new issues. Card holders and consumer unions complain about the high interest rates, economists complain about the default rates and banks complain about the amnesties. After all of these complaints coinciding with the accelerating suicide incidences due to credit card debts, regulation has been enacted in the credit card market in Turkey. In 2003, credit cards had been taken into the scope of the Consumer Protection Law. This wa...

  5. Unique in the shopping mall: On the reidentifiability of credit card metadata

    DEFF Research Database (Denmark)

    de Montjoye, Yves-Alexandre; Radaelli, Laura; Singh, Vivek Kumar

    2015-01-01

    . We study 3 months of credit card records for 1.1 million people and show that four spatiotemporal points are enough to uniquely reidentify 90% of individuals. We show that knowing the price of a transaction increases the risk of reidentification by 22%, on average. Finally, we show that even data...... sets that provide coarse information at any or all of the dimensions provide little anonymity and that women are more reidentifiable than men in credit card metadata....

  6. Neural fraud detection in credit card operations.

    Science.gov (United States)

    Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S

    1997-01-01

    This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.

  7. Credit card spending limit and personal finance: system dynamics approach

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2014-03-01

    Full Text Available Credit cards have become one of the major ways for conducting cashless transactions. However, they have a long term impact on the well being of their owner through the debt generated by credit card usage. Credit card issuers approve high credit limits to credit card owners, thereby influencing their credit burden. A system dynamics model has been used to model behavior of a credit card owner in different scenarios according to the size of a credit limit. Experiments with the model demonstrated that a higher credit limit approved on the credit card decreases the budget available for spending in the long run. This is a contribution toward the evaluation of action for credit limit control based on their consequences.

  8. Sex of respondent and credit attitudes as predictors of credit card use and debt payment.

    Science.gov (United States)

    McCall, Michael; Eckrich, Donald W

    2006-06-01

    Researchers have suggested there may be sex differences in attitudes towards credit card possession and use. Undergraduates, 41 men and 41 women, completed a survey regarding their attitudes towards credit, credit card use, and repayment. Analysis indicated sex played a significant moderating role between number of credit cards used and the importance of paying off monthly balances. Women possessed more credit cards than men and engaged in more frequent shopping. Number of credit cards increased with paying off of monthly balances. Data are discussed in terms of the importance of managing credit card debt in an increasingly cashless society.

  9. 25 CFR 11.422 - Unauthorized use of credit cards.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  10. 77 FR 37558 - Disclosure of Certain Credit Card Complaint Data

    Science.gov (United States)

    2012-06-22

    ... Certain Credit Card Complaint Data AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of... Bureau plans to exercise its discretion to publicly disclose certain credit card complaint data that do not include personally identifiable information. The Bureau receives credit card complaints from...

  11. 77 FR 75410 - Request for Information Regarding Credit Card Market

    Science.gov (United States)

    2012-12-20

    ... Regarding Credit Card Market AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice and request for information. SUMMARY: Section 502(a) of the Credit Card Accountability Responsibility and Disclosure Act of... review (Review) of the consumer credit card market, within the limits of its existing resources available...

  12. Credit Card Attitudes and Behaviors of College Students

    Science.gov (United States)

    Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

    2005-01-01

    At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

  13. Market structure and credit card pricing: what drives the interchange?

    OpenAIRE

    Zhu Wang

    2008-01-01

    This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...

  14. RENEWAL OF CRIMINAL LAW AGAINST ABUSE OF CREDIT CARDS

    Directory of Open Access Journals (Sweden)

    Eka Nugraha

    2015-07-01

    Full Text Available The use of credit cards for payment in lieu of cash since the introduction of the first credit card ever more widely known and used by people.   On the early introduction of this credit card, the wearer is limited to certain circles. However, a few decades later the credit card industry primarily enter the end of the Decade of the 1970s, has penetrated almost throughout all parts of the world, including Indonesia.   A credit card is issued by most commonly used by the public and apply the current International consists of a range of brands, among others, a very popular one is Visa and Master Card are each issued by the credit card company international and Master Card International.In practice many found the works in banking that may be subject to sanctions as set forth in the book of the law of criminal law (Criminal Code.

  15. Indian Kisan Credit Card Scheme: An Analytical Study

    Directory of Open Access Journals (Sweden)

    Dharmendra Mehta

    2016-03-01

    Full Text Available Kisan Credit Card (KCC has now been regarded as the only medium of short-term credit for agriculture. The Kisan Credit Card (KCC scheme was introduced by the Finance Minister in his budget speech in the year 1998-99. From the year 1998-99, the scheme was implemented by public sector commercial banks, RRBs (Regional Rural Banks and cooperative banks in the country. It has emerged as an innovative credit distribution system to meet the production credit requirements of the farmers in a timely and easy manner. The present paper is aimed to study role of Kisan Credit Card in the rural credit facilitation in India.

  16. Consumer Credit Card Use Intention and Influence Factors Analysis

    Directory of Open Access Journals (Sweden)

    Wang Yantao

    2017-01-01

    Full Text Available Credit card as a kind of advanced means of payment and the new way of consumer credit in the world widely, but in our country is faced with some problems, such as their per capita spending is low, open the card number is small, motionless bank card is a lot. In this paper, using the Logit model to analyze the Anshan city in Liaoning province consumer credit card usage. And combined with empirical analysis to provide banking management Suggestions and marketing countermeasures, including targeted to provide different kinds of credit card.

  17. Credit and Debit Card Usage and Cash Flow Management Control ...

    African Journals Online (AJOL)

    First Lady

    2012-10-27

    Oct 27, 2012 ... Simiyu, Justo Simiyu - Department of Business Management, Chuka. University College ... Key words: Debit cards, credit cards, commercial banks, Kenya. Introduction ..... saving at once convenience without proper planning.

  18. FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining

    Directory of Open Access Journals (Sweden)

    K. R. Seeja

    2014-01-01

    Full Text Available This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.

  19. FraudMiner: a novel credit card fraud detection model based on frequent itemset mining.

    Science.gov (United States)

    Seeja, K R; Zareapoor, Masoumeh

    2014-01-01

    This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.

  20. The cost of anchoring on credit-card minimum repayments

    OpenAIRE

    Stewart, Neil

    2009-01-01

    About three quarters of credit card accounts attract interest charges. In the US, credit card debt is $951.7 billion of a total of $2,539.7 billion of consumer credit. In the UK, credit card debt is £55.1 billion of £174.4 billion of consumer credit. The 2005 US Bankruptcy Abuse Prevention and Consumer Protection Act and the 2003 UK Treasury Select Committee's report require lenders to collect a minimum payment of at least the interest accrued each month. Thus people are protected from the ef...

  1. Predicting credit card behavior: a study in neuroeconomics.

    Science.gov (United States)

    Spinella, Marcello; Lester, David; Yang, Bijou

    2005-06-01

    In a sample of 139 community residents, credit card ownership was associated with age, sex, income, attitudes toward credit cards and toward money, and scores on a verbal measure of prefrontal cortical dysfunction, supporting a neuroeconomic approach to economic decision-making.

  2. Mobile Payment Technology and Competitiveness In the Credit Card Chain

    OpenAIRE

    Martins, Guilherme Silveira; FGV-EAESP; Martins, Michele Esteves; FGV-EAESP; Di Serio, Luiz Carlos; FGV-EAESP; Csillag, João Mário; FGV-EAESP; Santos, Camila Aparecida; Freeddom Tecnologia e Serviços S.A.

    2013-01-01

    This paper discusses the value creation sources of Mobile Payment concept into the Credit Card Chain. A case-study was developed based on the Transaction Cost Theory, Value Chain Analysis, RB V, Schumpeterian Innovation, and Strategic Network Theory. The results illustrate the technology potential to modify the configuration of Credit Card chain.

  3. Consumer susceptibility to credit card misuse and indebtedness

    OpenAIRE

    Awanis, Sandra; Cui, Charles Chi

    2014-01-01

    Purpose – Prior research suggests that payment mechanisms are imbued with cues that affect purchase evaluation and future spending behavior. Credit cards are distinguished from other payment mechanisms as they elicit greater willingness to spend, prompt weaker recollections of past credit expenses and overvaluation of available funds – a phenomena the authors call as “credit card effect.� Little is known about the individuals’ differential exposure to the credit card effect. The pur...

  4. Maxed out: The Relationship between Credit Card Debt, Credit Card Distress and Grade Point Averages for College Students

    Science.gov (United States)

    Smith, Temple Day

    2011-01-01

    Few students leave college with a plan for paying off their debt. Starting a career inundated with student loans and credit card debt burdens is a reality many college students face today. In the wake of graduation coming to terms with the consequences of credit card debt is stressful for many students. This dissertation observes the relationship…

  5. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  6. Materialism and credit card use by college students.

    Science.gov (United States)

    Pinto, M B; Parente, D H; Palmer, T S

    2000-04-01

    Much has been written in the popular press on credit card use and spending patterns of American college students. The proliferation of credit cards and their ease of acquisition ensure that students today have more opportunities for making more credit purchases than any other generation of college students. Little is known about the relationship between students' attitudes towards materialism and their use of credit cards. A study was conducted at three college campuses in the northeastern part of the United States where a total of 1,022 students were surveyed. Students' attitudes toward use of credit and their credit card balances were evaluated relative to their scores on Richins and Dawson's Materialism Scale (1992). Our findings suggest no significant difference between those individuals scoring high versus low on the Materialism Scale in terms of the number of credit cards owned and the average balance owed. Individuals high on materialism, however, significantly differed in terms of their uses for credit cards and their general attitude toward their use.

  7. Credit Card Risk Behavior on College Campuses: Evidence from Brazil

    Directory of Open Access Journals (Sweden)

    Wesley Mendes-da-Silva

    2012-07-01

    Full Text Available College students frequently show they have little skill when it comes to using a credit card in a responsible manner. This article deals with this issue in an emerging market and in a pioneering manner. University students (n = 769 in São Paulo, Brazil’s main financial center, replied to a questionnaire about their credit card use habits. Using Logit models, associations were discovered between personal characteristics and credit card use habits that involve financially risky behavior. The main results were: (a a larger number of credit cards increases the probability of risky behavior; (b students who alleged they knew what interest rates the card administrators were charging were less inclined to engage in risky behavior. The results are of interest to the financial industry, to university managers and to policy makers. This article points to the advisability, indeed necessity, of providing students with information about the use of financial products (notably credit cards bearing in mind the high interest rates which their users are charged. The findings regarding student behavior in the use of credit cards in emerging economies are both significant and relevant. Furthermore, financial literature, while recognizing the importance of the topic, has not significantly examined the phenomenon in emerging economies.

  8. An Analysis of the Credit Card Program Using Process Innovation

    National Research Council Canada - National Science Library

    Braney, Ronald

    1999-01-01

    .... This goes a long way toward improving and streamlining the contracting process. One of the key reform initiatives in streamlining the process is the implementation of the Government-wide credit card program...

  9. A credit card verifier structure using diffraction and spectroscopy concepts

    Science.gov (United States)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2008-04-01

    We propose and experimentally demonstrate an angle-multiplexing based optical structure for verifying a credit card. Our key idea comes from the fact that the fine detail of the embossed hologram stamped on the credit card is hard to duplicate and therefore its key color features can be used for distinguishing between the real and counterfeit ones. As the embossed hologram is a diffractive optical element, we choose to shine one at a time a number of broadband lightsources, each at different incident angle, on the embossed hologram of the credit card in such a way that different color spectra per incident angle beam is diffracted and separated in space. In this way, the number of pixels of each color plane is investigated. Then we apply a feed forward back propagation neural network configuration to separate the counterfeit credit card from the real one. Our experimental demonstration using two off-the-shelf broadband white light emitting diodes, one digital camera, a 3-layer neural network, and a notebook computer can identify all 69 counterfeit credit cards from eight real credit cards.

  10. 41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.

    Science.gov (United States)

    2010-07-01

    .... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...

  11. Changes in alcohol consumption patterns following the introduction of credit cards in Ontario liquor stores.

    Science.gov (United States)

    Macdonald, S A; Wells, S L; Giesbrecht, N; West, P M

    1999-05-01

    In 1994, regulatory changes were introduced in Ontario, Canada, permitting the purchase of alcoholic beverages with credit cards at government-operated liquor stores. Two objectives of this study were: (1) to compare the characteristics of credit card shoppers with non credit card shoppers at liquor stores, and (2) to assess whether changes occurred in alcohol consumption patterns among shoppers following the introduction of credit cards. Random digit dialing was used to interview 2,039 telephone participants prior to the introduction of credit cards (Time 1); 1,401 of these subjects were contacted 1 year later (Time 2). Independent sample t tests were used to compare credit card shoppers with shoppers not using credit cards, and paired t tests were performed to assess whether drinking behaviors changed from Time 1 to Time 2. The credit card shoppers were more likely than the non credit card shoppers to be highly educated (p Credit card shoppers drank an average of 6.3 drinks over the previous week compared with 4.0 drinks among non credit card shoppers (p credit card shoppers dropped from 6.7 drinks at Time 1 to 6.3 at Time 2 (NS), credit card shoppers reported drinking significantly more often after credit cards were introduced (p credit cards may not present public health problems since significant increases in alcohol consumption among credit card shoppers were not found.

  12. 31 CFR 598.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS KINGPIN SANCTIONS REGULATIONS Interpretations § 598.409 Credit extended and cards issued by U.S... existing credit agreements, including, but not limited to, charge cards, debit cards, or other credit...

  13. Precautionary Borrowing and the Credit Card Debt Puzzle

    DEFF Research Database (Denmark)

    Druedahl, Jeppe; Jørgensen, Casper Nordal

    2015-01-01

    This paper addresses the credit card debt puzzle using a generalization of the buffer-stock consumption model with long-term revolving debt contracts. Closely resembling actual US credit card law, we assume that card issuers can always deny their cardholders access to new debt, but that they cannot...... to simultaneously hold positive gross debt and positive gross assets even though the interest rate on the debt is much higher than the return rate on the assets. Including a risk of being excluded from new borrowing which is positively correlated with unemployment, we are able to simultaneously explain...

  14. An Investigation into Credit Card Debt among College Students

    Science.gov (United States)

    Williams, Dylan; Waterwall, Brian; Giardelli, Tiffany

    2008-01-01

    It is no surprise that the amount of credit card debt and outstanding loan balances of college students is increasing every year. College students are heavily targeted by credit companies through the use of e-mail, campus booths, and standard mail. The reason for these solicitations is because of the soaring expense levels of college students and…

  15. Identity and privacy. Unique in the shopping mall: on the reidentifiability of credit card metadata.

    Science.gov (United States)

    de Montjoye, Yves-Alexandre; Radaelli, Laura; Singh, Vivek Kumar; Pentland, Alex Sandy

    2015-01-30

    Large-scale data sets of human behavior have the potential to fundamentally transform the way we fight diseases, design cities, or perform research. Metadata, however, contain sensitive information. Understanding the privacy of these data sets is key to their broad use and, ultimately, their impact. We study 3 months of credit card records for 1.1 million people and show that four spatiotemporal points are enough to uniquely reidentify 90% of individuals. We show that knowing the price of a transaction increases the risk of reidentification by 22%, on average. Finally, we show that even data sets that provide coarse information at any or all of the dimensions provide little anonymity and that women are more reidentifiable than men in credit card metadata. Copyright © 2015, American Association for the Advancement of Science.

  16. 31 CFR 536.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS TRAFFICKING SANCTIONS REGULATIONS Interpretations § 536.409 Credit extended and cards issued by U... any existing credit agreements, including, but not limited to, charge cards, debit cards, or other...

  17. 49 CFR 375.221 - May I use a charge or credit card plan for payments?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false May I use a charge or credit card plan for... card plan for payments? (a) You may provide in your tariff for the acceptance of charge or credit cards for the payment of freight charges. Accepting charge or credit card payments is different than...

  18. 31 CFR 593.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... LIBERIAN REGIME OF CHARLES TAYLOR SANCTIONS REGULATIONS Interpretations § 593.409 Credit extended and cards..., including, but not limited to, charge cards, debit cards, or other credit facilities issued by a U.S...

  19. 12 CFR 226.5a - Credit and charge card applications and solicitations.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Credit and charge card applications and... required under this section on or with a solicitation or an application to open a credit or charge card... offer by the card issuer to open a credit or charge card account that does not require the consumer to...

  20. 31 CFR 546.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 546.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  1. 31 CFR 541.408 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... ZIMBABWE SANCTIONS REGULATIONS Interpretations § 541.408 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  2. 31 CFR 548.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 548.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  3. 31 CFR 588.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... BALKANS STABILIZATION REGULATIONS Interpretations § 588.409 Credit extended and cards issued by U.S... not limited to, charge cards, debit cards, or other credit facilities issued by a U.S. financial...

  4. 31 CFR 594.410 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... TERRORISM SANCTIONS REGULATIONS Interpretations § 594.410 Credit extended and cards issued by U.S. financial... agreements, including, but not limited to, charge cards, debit cards, or other credit facilities issued by a...

  5. 31 CFR 542.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 542.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  6. 31 CFR 543.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U...'IVOIRE SANCTIONS REGULATIONS Interpretations § 543.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  7. 31 CFR 547.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... DEMOCRATIC REPUBLIC OF THE CONGO SANCTIONS REGULATIONS Interpretations § 547.409 Credit extended and cards..., including, but not limited to, charge cards, debit cards, or other credit facilities issued by a U.S...

  8. BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

    Directory of Open Access Journals (Sweden)

    V. Dheepa

    2012-07-01

    Full Text Available Along with the great increase of internet and e-commerce, the use of credit card is an unavoidable one. Due to the increase of credit card usage, the frauds associated with this have also increased. There are a lot of approaches used to detect the frauds. In this paper, behavior based classification approach using Support Vector Machines are employed and efficient feature extraction method also adopted. If any discrepancies occur in the behaviors transaction pattern then it is predicted as suspicious and taken for further consideration to find the frauds. Generally credit card fraud detection problem suffers from a large amount of data, which is rectified by the proposed method. Achieving finest accuracy, high fraud catching rate and low false alarms are the main tasks of this approach.

  9. Looking at Debit and Credit Card Fraud

    Science.gov (United States)

    Porkess, Roger; Mason, Stephen

    2012-01-01

    This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)

  10. PathShuffle: Credit Mixing and Anonymous Payments for Ripple

    OpenAIRE

    Moreno-Sanchez Pedro; Ruffing Tim; Kate Aniket

    2017-01-01

    The I owe you (IOU) credit network Ripple is one of the most prominent alternatives in the burgeoning field of decentralized payment systems. Ripple’s path-based transactions set it apart from cryptocurrencies such as Bitcoin. Its pseudonymous nature, while still maintaining some regulatory capabilities, has motivated several financial institutions across the world to use Ripple for processing their daily transactions. Nevertheless, with its public ledger, a credit network such as Ripple is n...

  11. PathShuffle: Credit Mixing and Anonymous Payments for Ripple

    Directory of Open Access Journals (Sweden)

    Moreno-Sanchez Pedro

    2017-07-01

    Full Text Available The I owe you (IOU credit network Ripple is one of the most prominent alternatives in the burgeoning field of decentralized payment systems. Ripple’s path-based transactions set it apart from cryptocurrencies such as Bitcoin. Its pseudonymous nature, while still maintaining some regulatory capabilities, has motivated several financial institutions across the world to use Ripple for processing their daily transactions. Nevertheless, with its public ledger, a credit network such as Ripple is no different from a cryptocurrency in terms of weak privacy; recent demonstrative deanonymization attacks raise important concerns regarding the privacy of the Ripple users and their transactions. However, unlike for cryptocurrencies, there is no known privacy solution compatible with the existing credit networks such as Ripple.

  12. Credit-Card Bill Seeks to Protect Students but Could Limit Their Access to Credit

    Science.gov (United States)

    Field, Kelly

    2009-01-01

    Congress passed legislation last week that would shield students and other consumers from sudden spikes in interest rates and fees, but that could make it harder for young people to access credit to pay for college. The legislation would extend broad new consumer protections to all credit-card holders, offering special protections to college…

  13. Online credit card fraud prediction based on hierarchical temporal ...

    African Journals Online (AJOL)

    This understanding gave birth to the Hierarchical Temporal Memory (HTM) which holds a lot of promises in the area of time-series prediction and anomaly detection problems. This paper demonstrates the behaviour of an HTM model with respect to its learning and prediction of online credit card fraud. The model was ...

  14. Evolution of optically nondestructive and data-non-intrusive credit card verifiers

    Science.gov (United States)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2010-04-01

    Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.

  15. Dispute resolution: the use of arbitration in the credit card industry

    OpenAIRE

    Olivier André

    2009-01-01

    The fine print in most credit card agreements states that any dispute with a credit card issuer must be resolved through arbitration. The author lays out potential advantages and disadvantages for the consumer.

  16. Non-price competition in credit card markets through bundling and bank level benefits

    OpenAIRE

    Akin, Guzin Gulsun; Aysan, Ahmet Faruk; Kara, Gazi Ishak; Yildiran, Levent

    2008-01-01

    The attempts to explain the high and sticky credit card rates have given rise to a vast literature on credit card markets. This paper endeavors to explain the rates in the Turkish market using measures of non-price competition. In this market, issuers compete monopolistically by differentiating their credit card products. The fact that credit cards and all other banking services are perceived as a bundle by consumers allows banks to deploy also bank level characteristics to differentiate thei...

  17. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  18. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  19. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Science.gov (United States)

    2010-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  20. 31 CFR 587.408 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... Credit extended and cards issued by U.S. financial institutions. Section 587.201 on dealing in property... institutions from performing under any existing credit agreements, including, but not limited to, charge cards...

  1. 31 CFR 544.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... agreements, including, but not limited to, charge cards, debit cards, or other credit facilities issued by a... OF MASS DESTRUCTION PROLIFERATORS SANCTIONS REGULATIONS Interpretations § 544.409 Credit extended and...

  2. Credit Cards: What You Don't Know Can Cost You!

    Science.gov (United States)

    Detweiler, Gerri

    1993-01-01

    The role of credit cards in personal finance has increased dramatically over the past two decades. Complex interest computation methods and additional fees often boost the price of credit card loans and help make credit cards the most profitable type of consumer loan for many lenders. (Author/JOW)

  3. Credit cues and impression management: a preliminary attempt to explain the credit card effect.

    Science.gov (United States)

    McCall, Michael; Trombetta, Jessica; Gipe, Aimee

    2004-08-01

    Prior research had suggested that individuals would estimate higher product values and even tip more in the presence of credit cues. In the absence of a clear theoretical interpretation of this credit card effect we propose that this tendency is an impression management strategy such that credit cue exposure influences perceptions of the self and focuses attention on individual wealth. Thus, in the presence of others, credit cues serve to enhance images of the self. Preliminary data in support of this alternative theoretical perspective are presented.

  4. Compulsive buying and credit card misuse among credit card holders: the roles of self-esteem, materialism, impulsive buying and budget constraint

    OpenAIRE

    Omar, Nor Asiah; Rahim, Ruzita Abdul; Wel, Che Aniza Che; Alam, Syed Shah

    2014-01-01

    Purpose: This study aims to examine the factors that influence credit card misuse among working adults in Klang Valley, Malaysia. The relationship among self-esteem, materialism, impulsive buying, budget constraint, compulsive buying and credit card misuse are explored in this study. Design/methodology/approach: A total of 186 questionnaires was collected via convenience sampling from credit card users of working adults in Malaysia. A structural equation model that assesses the relationship b...

  5. Credit card fraud detection using neural network and geolocation

    Science.gov (United States)

    Gulati, Aman; Dubey, Prakash; MdFuzail, C.; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.

  6. Loss given default models incorporating macroeconomic variables for credit cards

    OpenAIRE

    Crook, J.; Bellotti, T.

    2012-01-01

    Based on UK data for major retail credit cards, we build several models of Loss Given Default based on account level data, including Tobit, a decision tree model, a Beta and fractional logit transformation. We find that Ordinary Least Squares models with macroeconomic variables perform best for forecasting Loss Given Default at the account and portfolio levels on independent hold-out data sets. The inclusion of macroeconomic conditions in the model is important, since it provides a means to m...

  7. Early clinical experience with CardioCard - a credit card-sized electronic patient record.

    Science.gov (United States)

    Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan

    2006-08-19

    CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: 70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.

  8. A Cognitive Analysis of Credit Card Acquisition and College Student Financial Development.

    Science.gov (United States)

    Kidwell, Blair; Turrisi, Robert

    2000-01-01

    Examines cognitions relevant to credit card decision making in college-aged participants (N=304). Assesses measures of beliefs, attitudes, and behavioral alternatives toward acquiring a credit card. Identifies a multivariate model predicting college student financial development of the attitudes and behavioral tendencies of acquiring a new card.…

  9. Compulsive buying and credit card misuse among credit card holders: The roles of self-esteem, materialism, impulsive buying and budget constraint

    Directory of Open Access Journals (Sweden)

    Nor Asiah Omar

    2014-02-01

    Full Text Available Purpose: This study aims to examine the factors that influence credit card misuse among working adults in Klang Valley, Malaysia. The relationship among self-esteem, materialism, impulsive buying, budget constraint, compulsive buying and credit card misuse are explored in this study. Design/methodology/approach: A total of 186 questionnaires was collected via convenience sampling from credit card users of working adults in Malaysia. A structural equation model that assesses the relationship between the proposed variables is tested using AMOS 20. Findings: The findings reveal that budget constraints, impulsive buying and materialism have a statistically significant influence on compulsive buying. In terms of credit card misuse, it is influenced negatively by self-esteem while positively by compulsive buying. Originality/value: Despite vast research on compulsive buying and credit card misuse, very few studies have examined it in the non-Western context.

  10. Financial Literacy and Credit Card Behaviors: A Cross-Sectional Analysis by Age

    Directory of Open Access Journals (Sweden)

    Sam Allgood

    2013-07-01

    Full Text Available In this study, we use a measure of financial literacy that includes both a test score of actual financial literacy and a self-rating of perceived financial literacy to investigate how financial literacy affects five credit card behaviors: (1 always paying a credit card balance in full; (2 carrying over a credit card balance and being charged interest; (3 making only a minimum payment on a credit card balance; (4 being charged a fee for a late payment; and (5 being charged a fee for exceeding a credit limit. Probit analysis was used to assess each behavior with a large nationally representative sample of U.S. adults (N = 28,146 divided into groups to reflect the five major decades in the adult life cycle (18–29; 30–39; 40–49; 50–59; and 60–69 and older. Perceived financial literacy was found to be a stronger predictor of less costly practices in credit card use than actual financial literacy for the five credit card behaviors and across each of the five age groups. The study also shows that the combination of the subjective assessment with the objective assessment of financial literacy provides a more comprehensive analysis of how financial literacy affects each credit card behavior. This combined approach to assessment produced the largest estimates of the effects of financial literacy on credit card behavior. The findings hold across the five credit card behaviors and the five age groups.

  11. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  12. SEARCHING THE FACTORS HAVING CREDIT CARD: A SURVEY STUDY IN ERZURUM

    Directory of Open Access Journals (Sweden)

    ERKAN OKTAY

    2013-06-01

    Full Text Available In this study, the factors related with having credit card in Erzurum have been searched by a logit model. There are demographic, social, cultural, and economic variables in the model. The final model is statistically significant. According to the model, job, average household income per month, payment method at shopping, usefulness of credit card and increasing the shopping tendency are statistically significant on having credit card.

  13. In Our Best Interest: Women, Financial Literacy, and Credit Card Behavior

    Directory of Open Access Journals (Sweden)

    Gary R. Mottola

    2013-07-01

    Full Text Available Data from the FINRA Foundation National Financial Capability Study revealed that women with low levels of financial literacy were more likely to engage in costly credit card behaviors—like incurring late and over-the-limit fees—than men with low financial literacy. There were, however, no differences in behavior between men and women with high financial literacy. Further, women and low financial literacy respondents reported paying higher interest rates on their credit cards. These findings suggest that increasing financial literacy may help reduce some gender-based differences in credit card behavior and lower credit card interest rates for both men and women.

  14. DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    FRANCISCA NONYELUM OGWUELEKA

    2011-06-01

    Full Text Available Data mining is popularly used to combat frauds because of its effectiveness. It is a well-defined procedure that takes data as input and produces models or patterns as output. Neural network, a data mining technique was used in this study. The design of the neural network (NN architecture for the credit card detection system was based on unsupervised method, which was applied to the transactions data to generate four clusters of low, high, risky and high-risk clusters. The self-organizing map neural network (SOMNN technique was used for solving the problem of carrying out optimal classification of each transaction into its associated group, since a prior output is unknown. The receiver-operating curve (ROC for credit card fraud (CCF detection watch detected over 95% of fraud cases without causing false alarms unlike other statistical models and the two-stage clusters. This shows that the performance of CCF detection watch is in agreement with other detection software, but performs better.

  15. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.

  16. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  17. Credit Card Usage and Debt among College and University Students. ERIC Digest.

    Science.gov (United States)

    Holub, Tamara

    Since the late 1990s, lawmakers, college officials, consumer advocacy groups, and higher education practitioners have become increasingly concerned about the rising use of credit cards among college students. Some recent studies have provided information about credit card use among college students. These studies include: (1) a study conducted by…

  18. Consumer Finance: College Students and Credit Cards. Report to Congressional Requesters.

    Science.gov (United States)

    D'Agostino, Davi M.

    In response to a request from the House of Representatives, employees of the General Accounting Office conducted structured interviews with about 100 officials at 12 universities and colleges around the United States about several issues related to college students and credit cards. They also reviewed three studies of credit card use by college…

  19. Factors Affecting the Behavior of University Community to Use Credit Card

    Directory of Open Access Journals (Sweden)

    Maya Sari

    2011-12-01

    Full Text Available This study was aimed to gain insights and tested the factors that influence credit cards usage in university community of UPI through Theory of Planned Behavior model approach. Using Path Analysis to explain the direct and indirect influence of attitude, subjective norm and behavioral control to intention and behavior of credit card usage. The results showed all respondents have a positive attitude towards credit cards usage, with high influence of subjective norm, high behavior control, high intention to use credit cards and all respondents used credit cards wisely. There was positive and significant effect either simultaneously or partially between behavioral attitudes, subjective norms, and behavior control toward the intention to use credit card. The partial test results showed behavioral attitude has the greatest influence on the intention to use credit card. There was a positive and significant influence both simultaneously and partially between behavioral attitudes, subjective norms, and behavioral control on default-risk debt behavior. The partial results showed that attitude gives the greatest influence on default debt risk behavior. The result also proved there was a positive and significant influence of the intention to use credit card on default debt risk behavior.

  20. Credit Cards on Campus: Academic Inquiry, Objective Empiricism, or Advocacy Research?

    Science.gov (United States)

    Manning, Robert D.; Kirshak, Ray

    2005-01-01

    Professors John M. Barron and Michael E. Staten's article in Vol. 34, No. 3 of this journal, "Usage of Credit Cards Received through College Student-Marketing Programs," purports to "provide benchmark measures of college student credit card usage." Based on empirical analyses of proprietary industry data, they conclude that "There is no…

  1. Usage of Credit Cards Received through College Student-Marketing Programs

    Science.gov (United States)

    Barron, John M.; Staten, Michael E.

    2004-01-01

    This article provides benchmark measures of college student credit card usage by utilizing a pooled sample of over 300,000 recently opened credit card accounts. The analysis compares behavior over 12 months of account history for three groups of accounts: those opened by young adults through college student marketing programs; those opened through…

  2. Relationships between College Students' Credit Card Debt, Undesirable Academic Behaviors and Cognitions, and Academic Performance

    Science.gov (United States)

    Hogan, Eileen A.; Bryant, Sarah K.; Overymyer-Day, Leslie E.

    2013-01-01

    The acquisition of credit card debt by college students has long been a topic of concern. This study explores relationships among debt, undesirable academic behaviors and cognitions, and academic performance, through surveys of 338 students in a public university, replicating two past measures of credit card debt and creating new measures of…

  3. Credit Card Solicitation Policies in Higher Education: Does "Protecting" Our Students Make a Difference?

    Science.gov (United States)

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd S.

    2001-01-01

    Reports on a study that investigated the effect of a university's solicitation policy on students' acquisition and usage of credit cards. Attempts by universities to limit access to and use of credit cards appear to be ineffective. Suggests alternative policies be constructed around teaching students sound money management skills. (Author/JDM)

  4. Determinants affecting consumer adoption of contactless credit card: an empirical study.

    Science.gov (United States)

    Wang, Yu-Min

    2008-12-01

    The contactless credit card is one of the most promising technological innovations in the field of electronic payments. It provides consumers with greater control of payments, convenience, and transaction speed. However, contactless credit cards have yet to gain significant rates of adoption in the marketplace. Thus, effort must be made to identify factors affecting consumer adoption of contactless credit cards. Based on the technology acceptance model, innovation diffusion theory, and the relevant literature, seven variables (perceived usefulness, perceived ease of use, compatibility, perceived risk, trust, consumer involvement, availability of infrastructure) are proposed to help predict consumer adoption of contactless credit cards. Data collected from 312 respondents in Taiwan is tested against the proposed prediction model using the logistic regression approach. The results and implications of our study contribute to an expanded understanding of the factors that affect consumer adoption of contactless credit cards.

  5. Variables Influencing Credit Card Balances of Students at a Midwestern University

    Science.gov (United States)

    Mattson, Lucretia; Sahlhoff, Kathleen; Blackstone, Judith; Peden, Blaine; Nahm, Abraham Y.

    2004-01-01

    This research used a Web-based survey of students at a Midwest regional university to measure the extent of credit card use by first-year students and seniors. The results indicate that the variables influencing credit card use and the carrying of a balance from one month to the next include the number of cards held by the student, the student's…

  6. 26 CFR 301.6103(k)(9)-1 - Disclosure of returns and return information relating to payment of tax by credit card and debit...

    Science.gov (United States)

    2010-04-01

    ... relating to payment of tax by credit card and debit card. 301.6103(k)(9)-1 Section 301.6103(k)(9)-1... Disclosure of returns and return information relating to payment of tax by credit card and debit card... processing credit card and debit card transactions to effectuate payment of tax as authorized by § 301.6311-2...

  7. Attitudes of Consumers Towards Islamic and Conventional Credit Cards in Indonesia

    Directory of Open Access Journals (Sweden)

    Sylva Alif Rusmita

    2017-07-01

    Full Text Available This study aims to analyze the attitudes of consumers towards Islamic and conventional credit cards. Using online questionnaire survey data from 51 respondents in Surabaya, East Java, the study revealed that most consumers possessed credit cards because of their convenience factor, relationship with their existing bank, and card salesmen. Therefore, the sale is the most powerful way to invite the community to have an Islamic credit card. Many customers do not care whether their credit cards are Islamic based or not, as long as the salesman promoted cards to them and the cards are able to meet their personal needs, especially for sales and purchase transactions online, they will utilize the cards. The large number of Muslims in Surabaya should be a share of the lucrative market for Islamic credit cards. Therefore, the education about the Islamic manner of consumption and the dangers of usury should be promoted in Surabaya.DOI: 10.15408/etk.v16i2.5519

  8. Rule extraction from minimal neural networks for credit card screening.

    Science.gov (United States)

    Setiono, Rudy; Baesens, Bart; Mues, Christophe

    2011-08-01

    While feedforward neural networks have been widely accepted as effective tools for solving classification problems, the issue of finding the best network architecture remains unresolved, particularly so in real-world problem settings. We address this issue in the context of credit card screening, where it is important to not only find a neural network with good predictive performance but also one that facilitates a clear explanation of how it produces its predictions. We show that minimal neural networks with as few as one hidden unit provide good predictive accuracy, while having the added advantage of making it easier to generate concise and comprehensible classification rules for the user. To further reduce model size, a novel approach is suggested in which network connections from the input units to this hidden unit are removed by a very straightaway pruning procedure. In terms of predictive accuracy, both the minimized neural networks and the rule sets generated from them are shown to compare favorably with other neural network based classifiers. The rules generated from the minimized neural networks are concise and thus easier to validate in a real-life setting.

  9. Self-control and credit-card use among college students.

    Science.gov (United States)

    Mansfield, Phylis M; Pinto, Mary Beth; Parente, Diane H

    2003-06-01

    This study assessed the relationship between self-control and credit-card use with a convenience sample of 165 traditional-age college students of whom 69 (42%) were women. Students' self-control was measured on Grasmick, et al.'s Self-control Scale, which has six subscales, one of which is Impulsivity. Comparisons were made between those students who paid their cards off each month, called convenience users, and those who carried a monthly balance forward on scores on total self-control and impulsivity, and number of credit cards possessed. A significant difference in self-control scores was found between these two groups and also for mean impulsivity scores. Significantly fewer credit cards were possessed by students who paid their cards off each month than by those who carried a monthly balance.

  10. Student Credit Card Debt in the 21st Century: Options for Financial Aid Administrators.

    Science.gov (United States)

    Oleson, Mark

    2001-01-01

    Provides multiple workable solutions financial aid offices can offer students throughout their college experience to deal with debt: preventive solutions for avoiding problems with credit card debt, holistic solutions for other related problems, and remedial solutions for existing problems. (EV)

  11. CARDHOLDERS' ATTITUDE AND BANK CREDIT CARD USAGE IN MALAYSIA: AN EXPLORATORY STUDY

    Directory of Open Access Journals (Sweden)

    Aizzat Mohd. Nasurdin

    2002-01-01

    Full Text Available The study is aimed at validating attributes that influence the differences in attitudes among active and inactive cardholders. By focusing on relevant attributes that have been identified, it is believed that credit card issuing banks can position themselves effectively via their marketing strategies to activate their existing cardholders' usage rate as well as to attract new active cardholders. Thirteen important attributes were used to measure credit cardholders' attitude. These attributes include acceptance level, credit limit, interest-free repayment period, annual fee, application approval period, ancillary functions, handling of cardholders' complaints, issuing bank image, gift/bonus to new applicants, card design, leaflet to describe the card,and advertising by the issuing bank. Acceptance level, credit limit, interest free repayment period, ancillary functions, handling of cardholders' complaints, bank image, and bank advertising were found to be the most important attributes that influenced cardholders' attitudes in distinguishing active from inactive cardholders. Based on the results of the study, several suggestions are forwarded to credit card issuing banks as a step to stimulate credit cardholders' usage level. Among these are to work closer with various retailers to promote the credit card payment mode, to provide adequate credit limit to cardholders, to extend interest free repayment period from 20 days to 30 days, to implement strategic alliances with firms involved in travelling, entertainment, insurance, and telecommunications and, to advertise more so as to create a brand name for the issuing bank.

  12. An investigation into credit card information disclosure through point of sale purchases

    CSIR Research Space (South Africa)

    Von Solms, S

    2015-08-01

    Full Text Available The use of debit and credit cards has become indispensable to consumers worldwide. This cashless method of payment offers flexibility and convenience. It eliminates the safety risk of carrying large cash amounts in person and cards can be cancelled...

  13. Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

    Science.gov (United States)

    Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman

    The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).

  14. Credit Card Usage among Older Adults: Assessing Financial Literacy and Pressures

    Science.gov (United States)

    St. Pierre, Eileen; Shreffler, Karina

    2013-01-01

    The research reported here assessed the financial literacy of older adults living in rural communities, current use of and attitudes towards debt, and debt pressures. Those surveyed exhibit low credit card usage and responsible payment practices. Most never use credit to pay medical expenses. Respondents display a financial literacy level similar…

  15. Buy It Now and Pay for It Later: An Experimental Study of Student Credit Card Use

    Science.gov (United States)

    Fagerstrom, Asle; Hantula, Donald A.

    2013-01-01

    Credit card debt is of increasing concern among college students, but reasons for it are not well understood. In a simulated shopping experiment based on a hyperbolic discounted utility model, 21 participants could either save money for a new model of their favorite mobile phone brand and get it in the future or buy the product on credit and get…

  16. Comment on McCall, Trombetta, and Gipe's 2004 proposed impression management explanation for the credit card effect.

    Science.gov (United States)

    Spangenberg, Eric R

    2005-08-01

    There is a dearth of empirically supported theoretical explanation since its introduction; Feinberg's 1986 credit card effect showed greater product valuations and donation intentions by experimental participants when asked to make such estimates in the presence of credit card stimuli. This comment on McCall, Trombetta, and Gipe (2004) notes potential flaws and adjudged over-interpretation of results in their attempt to replicate successfully and derive theoretical explanation for the credit card effect.

  17. An Application of Robust Method in Multiple Linear Regression Model toward Credit Card Debt

    Science.gov (United States)

    Amira Azmi, Nur; Saifullah Rusiman, Mohd; Khalid, Kamil; Roslan, Rozaini; Sufahani, Suliadi; Mohamad, Mahathir; Salleh, Rohayu Mohd; Hamzah, Nur Shamsidah Amir

    2018-04-01

    Credit card is a convenient alternative replaced cash or cheque, and it is essential component for electronic and internet commerce. In this study, the researchers attempt to determine the relationship and significance variables between credit card debt and demographic variables such as age, household income, education level, years with current employer, years at current address, debt to income ratio and other debt. The provided data covers 850 customers information. There are three methods that applied to the credit card debt data which are multiple linear regression (MLR) models, MLR models with least quartile difference (LQD) method and MLR models with mean absolute deviation method. After comparing among three methods, it is found that MLR model with LQD method became the best model with the lowest value of mean square error (MSE). According to the final model, it shows that the years with current employer, years at current address, household income in thousands and debt to income ratio are positively associated with the amount of credit debt. Meanwhile variables for age, level of education and other debt are negatively associated with amount of credit debt. This study may serve as a reference for the bank company by using robust methods, so that they could better understand their options and choice that is best aligned with their goals for inference regarding to the credit card debt.

  18. The Relationship between Credit Card Use Behavior and Household Well-Being during the Great Recession: Implications for the Ethics of Credit Use

    Science.gov (United States)

    Hunter, Jennifer L.; Heath, Claudia J.

    2017-01-01

    This article uses a random digit dial probability sample (N = 328) to examine the relationship between credit card use behaviors and household well-being during a period of severe economic recession: The Great Recession. The ability to measure the role of credit card use during a period of recession provides unique insights to the study of credit…

  19. CLUB FORMATION MECHANISM FOR TRANSPORT-COMMUNITY CREDIT CARDS

    Science.gov (United States)

    Ding, Yue; Kobayashi, Kiyoshi; Nishida, Junji; Yoshida, Mamoru

    In this paper, the roles of transport-community cards jointly issued by a public transport firm and retails are investigated as a means to vitalize an obsolescence shopping center located in a middle of a city. When both the price of goods supplied by the retails and the transport fares affect the consumers' behavior, there exist pecuniary externality between the behaviors of the retails and transport firms. The introduction of a transport-community cards system enables to integrate a basket of goods and transport service into a single commodity; thus, the pecuniary externality can be internalized by price coordination. In addition, the paper clarifies theoretically that the transport firm initiatively decides the price of the transportation service and the retails transfer their incomes to the transport firm so that they are induced to jointly issue the transport-community cards.

  20. The Learning Credit Card: A Tool for Managing Personal Development

    Science.gov (United States)

    Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas

    2008-01-01

    This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…

  1. The identification of credit card encoders by hierarchical cluster analysis of the jitters of magnetic stripes.

    Science.gov (United States)

    Leung, S C; Fung, W K; Wong, K H

    1999-01-01

    The relative bit density variation graphs of 207 specimen credit cards processed by 12 encoding machines were examined first visually, and then classified by means of hierarchical cluster analysis. Twenty-nine credit cards being treated as 'questioned' samples were tested by way of cluster analysis against 'controls' derived from known encoders. It was found that hierarchical cluster analysis provided a high accuracy of identification with all 29 'questioned' samples classified correctly. On the other hand, although visual comparison of jitter graphs was less discriminating, it was nevertheless capable of giving a reasonably accurate result.

  2. Credit Card Misuse, Money Attitudes, and Compulsive Buying Behaviors: A Comparison of Internal and External Locus of Control (LOC) Consumers

    Science.gov (United States)

    Watson, Stevie

    2009-01-01

    This study examined attitudinal and behavioral differences between internal and external locus of control (LOC) consumers on credit card misuse, the importance of money, and compulsive buying. Using multiple analysis of variance and separate analyses of variance, internal LOC consumers were found to have lower scores on credit card misuse and…

  3. 41 CFR 101-26.4901-149 - Standard Form 149, U.S. Government National Credit Card.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Standard Form 149, U.S. Government National Credit Card. 101-26.4901-149 Section 101-26.4901-149 Public Contracts and Property... 149, U.S. Government National Credit Card. Note: The form illustrated in § 101-26.4901-149 is filed as...

  4. A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis

    Science.gov (United States)

    Tsai, Chieh-Yuan

    Credit card is one of the most popular e-payment approaches in current online e-commerce. To consolidate valuable customers, card issuers invest a lot of money to maintain good relationship with their customers. Although several efforts have been done in studying card usage motivation, few researches emphasize on credit card usage behavior analysis when time periods change from t to t+1. To address this issue, an integrated data mining approach is proposed in this paper. First, the customer profile and their transaction data at time period t are retrieved from databases. Second, a LabelSOM neural network groups customers into segments and identify critical characteristics for each group. Third, a fuzzy decision tree algorithm is used to construct usage behavior rules of interesting customer groups. Finally, these rules are used to analysis the behavior changes between time periods t and t+1. An implementation case using a practical credit card database provided by a commercial bank in Taiwan is illustrated to show the benefits of the proposed framework.

  5. Effect of Personal Financial Knowledge on College Students' Credit Card Behavior

    Science.gov (United States)

    Robb, Cliff A.; Sharpe, Deanna L.

    2009-01-01

    Analysis of survey data collected from 6,520 students at a large Midwestern University affirmed that financial knowledge is a significant factor in the credit card decisions of college students but not entirely in expected ways. Results of a double hurdle analysis indicated that students with relatively higher levels of financial knowledge were…

  6. Community-based asthma care: trial of a "credit card" asthma self-management plan.

    Science.gov (United States)

    D'Souza, W; Crane, J; Burgess, C; Te Karu, H; Fox, C; Harper, M; Robson, B; Howden-Chapman, P; Crossland, L; Woodman, K

    1994-07-01

    Although asthma self-management plans are widely recommended as essential in the long-term treatment of adult asthma, there have been few studies examining their use. Our objective was to assess the effect of a "credit card" adult asthma self-management plan in a community experiencing major health problems from asthma, by means of a before and after intervention trial of the efficacy of the "credit card" plan, when introduced through community-based asthma clinics. The participants were 69 Maori people with asthma. The "credit card" plan consisted of written guidelines for the self-management of asthma, based on self-assessment of asthma severity, printed on a plastic card. On one side, management guidelines were based on the interpretation of peak expiratory flow rate (PEFR) recordings, whilst the reverse side was based on symptoms. The outcome measures used were before and after comparison of markers of asthma morbidity and requirement for acute medical treatment; and a structured questionnaire assessing the acceptability and use of the credit card plan. Following the introduction of the plan, the mean PEFR increased from 347 to 389 l.min-1, the percentage of nights woken fell from 30.4 to 16.9%, and the number of days "out of action" fell from 3.8 to 1.7%. The requirements for acute medical treatment also fell during the intervention period. Most participants commented favourably on the content and usefulness of the plan. In the situation of worsening asthma, 28% of subjects found the peak flow side of the card most helpful, 7% the symptoms side, and 48% found both sides equally helpful.(ABSTRACT TRUNCATED AT 250 WORDS)

  7. Evaluation of "credit card" libraries for inhibition of HIV-1 gp41 fusogenic core formation.

    Science.gov (United States)

    Xu, Yang; Lu, Hong; Kennedy, Jack P; Yan, Xuxia; McAllister, Laura A; Yamamoto, Noboru; Moss, Jason A; Boldt, Grant E; Jiang, Shibo; Janda, Kim D

    2006-01-01

    Protein-protein interactions are of critical importance in biological systems, and small molecule modulators of such protein recognition and intervention processes are of particular interest. To investigate this area of research, we have synthesized small-molecule libraries that can disrupt a number of biologically relevant protein-protein interactions. These library members are designed upon planar motif, appended with a variety of chemical functions, which we have termed "credit-card" structures. From two of our "credit-card" libraries, a series of molecules were uncovered which act as inhibitors against the HIV-1 gp41 fusogenic 6-helix bundle core formation, viral antigen p24 formation, and cell-cell fusion at low micromolar concentrations. From the high-throughput screening assays we utilized, a selective index (SI) value of 4.2 was uncovered for compound 2261, which bodes well for future structure activity investigations and the design of more potent gp41 inhibitors.

  8. Approach to recognition of flexible form for credit card expiration date recognition as example

    Science.gov (United States)

    Sheshkus, Alexander; Nikolaev, Dmitry P.; Ingacheva, Anastasia; Skoryukina, Natalya

    2015-12-01

    In this paper we consider a task of finding information fields within document with flexible form for credit card expiration date field as example. We discuss main difficulties and suggest possible solutions. In our case this task is to be solved on mobile devices therefore computational complexity has to be as low as possible. In this paper we provide results of the analysis of suggested algorithm. Error distribution of the recognition system shows that suggested algorithm solves the task with required accuracy.

  9. Are information disclosure mandates effective? Evidence from the credit card market

    OpenAIRE

    Elizondo, Alan; Seira, Enrique

    2014-01-01

    Consumer protection in financial markets in the form of information disclosure is high on governments agendas, despite the fact that the empirical evidence on its effectiveness is scarce. To measure the impact of Truth-in-Lending-Act-type disclosures on default and indebtedness, as well as of debiasing warning messages and social comparison information, we implement a randomized control trial in the credit card market for a large population of indebted cardholders. We find that providing sali...

  10. Developing an early alert system for metastatic spinal cord compression (MSCC): Red Flag credit cards.

    Science.gov (United States)

    Turnpenney, Jackie; Greenhalgh, Sue; Richards, Lena; Crabtree, Annamaria; Selfe, James

    2015-01-01

    To produce a user-friendly list of metastatic spinal cord compression (MSCC) Red Flags for non-specialist 'generalist' front-line clinicians working in primary-care settings. The issue of identifying MSCC early to prevent serious long-term disability was a key theme identified by the Task and Finish Group at Greater Manchester and Cheshire Cancer Network (GMCCN) in 2009. It was this group who initially brokered and then coordinated the current development as part of their strategic approach to improving care for MSCC patients. A consensus-building approach that considered the essential minimum data requirements to raise the index of suspicion suggestive of MSCC was adopted. This followed a model of cross-boundary working to facilitate the mutual sharing of expertise across a variety of relevant clinical specialisms. A guideline aimed at helping clinicians to identify the early signs and symptoms of MSCC was produced in the form of a credit card. This credit card includes key statements about MSCC, signposting to key sources of additional information and a user-friendly list of Red Flags which has been developed into an eight-item Red Flag mnemonic. To date, an excess of 120,000 cards have been printed by a variety of organisations and the distribution of the cards is ongoing across the United Kingdom and the Republic of Ireland.

  11. The Criminal Offense of Credit/Debit Card Fraud and the Implementation of Its Sanction on Indonesian Criminal Law

    Directory of Open Access Journals (Sweden)

    Antonius Maria Laot Kian

    2015-04-01

    Full Text Available The aims of the study are to determine the legal arrangements and the application of criminal sanctions against the crime of credit/debit card fraud in Indonesia. The type of study was a normative research by classifying the provisions relevant to the crime of credit/debit card fraud is based on Law No. 11 Year 2008 concerning Information and Electronic Transactions; otherwise it is used also Convention on Cyber crime 2001. Analysis of legal materials made through a law (statue approach to create an ius constituendum regarding the application of criminal sanctions against crime credit/debit card fraud. The results of the research indicated that the legal arrangements and criminal sanctions against the crime of credit/debit card fraud in Indonesia is still relatively minimal. First, not integrated article that directly regulates computer related fraud. Second, not arranged in the form of criminal sanctions for actions that are restitution culprit.

  12. Credit Card Blues: The Middle Class and the Hidden Costs of Easy Credit.

    Science.gov (United States)

    Hodson, Randy; Dwyer, Rachel; Neilson, Lisa

    2014-01-01

    In an era of increased access to credit, it becomes increasingly important to understand the consequences of taking on unsecured consumer debt. We argue that credit can have both positive and negative consequences resulting from its ability to smooth life transitions and difficulties but that this occurs simultaneously with increased financial risks and stress resulting from carrying unsecured debt. We find that those in the middle of the income distribution suffer the greatest disruptions to mental health from carrying debt. Affluent borrowers are relatively unmoved by debt, suggesting the use of short-term debt as a convenience strategy for the financially well-heeled. The least advantaged borrowers are also suffer emotionally less from debt, possibly because securing spendable funds for necessities remains their most pressing concern. The onset of the Great Recession, however, produced increased emotional distress for all classes.

  13. Credit card debt, stress and key health risk behaviors among college students.

    Science.gov (United States)

    Nelson, Melissa C; Lust, Katherine; Story, Mary; Ehlinger, Ed

    2008-01-01

    To examine cross-sectional associations between credit card debt, stress, and health risk behaviors among college students, focusing particularly on weight-related behaviors. Random-sample, mailed survey. Undergraduate and graduate students (n = 3206) attending a large public university. Self-reported health indicators (e.g., weight, height, physical activity, diet, weight control, stress, credit card debt). More than 23% of students reported credit card debt > or = $1000. Using Poisson regression to predict relative risks (RR) of health behaviors, debt of at least $1000 was associated with nearly every risk indicator tested, including overweight/obesity, insufficient physical activity, excess television viewing, infrequent breakfast consumption, fast food consumption, unhealthy weight control, body dissatisfaction, binge drinking, substance use, and violence. For example, adjusted RR [ARR] ranged from 1.09 (95% Confidence interval [CI]: 1.02-1.17) for insufficient vigorous activity to 2.17 (CI: 0.68-2.82) for using drugs other than marijuana in the past 30 days. Poor stress management was also a robust indicator of health risk. University student lifestyles may be characterized by a variety of coexisting risk factors. These findings indicate that both debt and stress were associated with wide-ranging adverse health indicators. Intervention strategies targeting at-risk student populations need to be tailored to work within the context of the many challenges of college life, which may serve as barriers to healthy lifestyles. Increased health promotion efforts targeting stress, financial management, and weight-related health behaviors may be needed to enhance wellness among young adults.

  14. Using multi-state markov models to identify credit card risk

    Directory of Open Access Journals (Sweden)

    Daniel Evangelista Régis

    2016-06-01

    Full Text Available Abstract The main interest of this work is to analyze the application of multi-state Markov models to evaluate credit card risk by investigating the characteristics of different state transitions in client-institution relationships over time, thereby generating score models for various purposes. We also used logistic regression models to compare the results with those obtained using multi-state Markov models. The models were applied to an actual database of a Brazilian financial institution. In this application, multi-state Markov models performed better than logistic regression models in predicting default risk, and logistic regression models performed better in predicting cancellation risk.

  15. Plastic Clashes: Competition among Closed and Open Systems in the Credit Card Industry.

    OpenAIRE

    Fabio M. Manenti; Ernesto Somma

    2002-01-01

    This paper analyses market competition between two different types of credit card platforms: not-for-profit associations and proprietary systems. The main focus is on the role of the interchange fee set by not-for-profit platforms. We show that when the interchange fee is set so as to maximise the sum of issuers' and acquirers' profits, the equilibrium values of platforms' profits, of the sum of the fees charged by each platform and their market shares are independent of the competitive condi...

  16. Internet cigarette vendor compliance with credit card payment and shipping bans.

    Science.gov (United States)

    Williams, Rebecca S; Ribisl, Kurt M

    2014-02-01

    Most Internet cigarette sales have violated taxation and youth access laws, leading to landmark 2005 agreements with credit card companies, PayPal, and private shippers (United Parcel Service, Federal Express, DHL) to cease participation in these transactions. Despite their promise at the time, loopholes allowed for check payment and U.S. Postal Service (USPS) shipping. This study assessed actual vendor compliance with the payment and shipping bans using a purchase survey. In late 2007 and early 2008, an adult buyer attempted to order cigarettes from the 97 most popular Internet cigarette vendors (ICVs) using banned payment and shipping methods. When banned payment or shipping methods were unavailable, purchases were attempted with alternate methods (e.g., checks, e-checks, USPS). Twenty-seven of 100 orders were placed with (banned) credit cards; 23 were successfully received. Seventy-one orders were placed with checks (60 successfully received). Four orders were delivered using banned shippers; 79 of 83 successfully received orders were delivered by the USPS. About a quarter of ICVs violated the payment ban, others adapted by accepting checks. Most vendors complied with the shipping ban, perhaps because USPS was an easy substitute shipping option. Better enforcement of the bans is needed; the 2009 Prevent All Cigarette Trafficking Act closed the USPS loophole by making cigarettes nonmailable material; evaluation of enforcement efforts and adaptations by vendors are needed. These sorts of bans are a promising approach to controlling the sale of restricted goods online.

  17. Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy.

    Science.gov (United States)

    Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca

    2017-09-14

    Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.

  18. Do Community Characteristics Relate to Young Adult College Students' Credit Card Debt? The Hypothesized Role of Collective Institutional Efficacy.

    Science.gov (United States)

    Friedline, Terri; West, Stacia; Rosell, Nehemiah; Serido, Joyce; Shim, Soyeon

    2017-03-01

    This study examines the extent of emergent, outstanding credit card debt among young adult college students and investigates whether any associations existed between this credit card debt and the characteristics of the communities in which these students grew up or lived. Using data (N = 748) from a longitudinal survey and merging community characteristics measured at the zip code level, we confirmed that a community's unemployment rate, average total debt, average credit score, and number of bank branch offices were associated with a young adult college student's acquisition and accumulation of credit card debt. For example, a community's higher unemployment rate and lower number of bank branches were associated with a young adult college student's greater accumulated debt. Community characteristics had the strongest associations with credit card debt, especially after controlling for individual characteristics (i.e., a young adult college student's race and financial independence) and familial characteristics (i.e., their parents' income and parents' discussions of financial matters while growing up at home). The findings may help to understand the unique roles that communities play in shaping children and young adults' financial capability, and how communities can be better capacitated to support the financial goals of their residents. © Society for Community Research and Action 2017.

  19. Consumer credit card use: the roles of creditor disclosure and anticipated emotion.

    Science.gov (United States)

    Wiener, Richard L; Holtje, Michael; Winter, Ryan J; Cantone, Jason A; Gross, Karen; Block-Lieb, Susan

    2007-03-01

    In response to federal legislative reform aimed, in part, at reducing consumer bankruptcy filings, the authors conducted 2 experiments examining the role of affect in purchasing behavior. In Experiment 1, they examined consumer debtors, and in Experiment 2, they examined nondebtors. In both experiments, they investigated purchasing decisions made during a simulated online shopping trip, with some participants receiving standard disclosures of interest rates and money owed and with other participants receiving information under the new enhanced disclosure regulations. Results demonstrated support for the influence of anticipated affect in credit card use among both debtors and nondebtors and indicated that anticipated emotion may moderate the impact of the enhanced disclosure regulations. ((c) 2007 APA, all rights reserved).

  20. Effective Practices of Financial Education for College Students: Students' Perceptions of Credit Card Use and Financial Responsibility

    Science.gov (United States)

    Anderson, Carla; Card, Karen

    2015-01-01

    The purpose of this quasi-experimental nonequivalent control group study was to determine the influence that a financial education intervention administered in First Year Experience courses had on students' perceptions of their financial behavior such as compulsive spending and credit card use. This study utilized the five-point Likert-type…

  1. Trial of a "credit card" asthma self-management plan in a high-risk group of patients with asthma.

    Science.gov (United States)

    D'Souza, W; Burgess, C; Ayson, M; Crane, J; Pearce, N; Beasley, R

    1996-05-01

    The "credit card" asthma self-management plan provides the adult asthmatic patient with simple guidelines for the self-management of asthma, which are based on the self-assessment of peak expiratory flow rate recordings and symptoms. The study was a trial of the clinical efficacy of the credit card plan in a high-risk group of asthmatic patients. In this "before-and-after" trial, patients discharged from the emergency department of Wellington Hospital, after treatment for severe asthma were invited to attend a series of hospital outpatient clinics at which the credit card plan was introduced. Questionnaires were used to compare markers of asthma morbidity, requirement for emergency medical care, and medication use during the 6-month period before and after intervention with the credit card plan. Of the 30 patients with asthma who attended the first outpatient clinic, 26 (17 women and 9 men) completed the program. In these 26 participants, there was a reduction in both morbidity and requirement for acute medical services: specifically, the proportion waking with asthma more than once a week decreased from 65% to 23% (p = 0.005) and the proportion visiting the emergency department for treatment of severe asthma decreased from 58% to 15% (p = 0.004). The patients attending the clinics commented favorably on the plan, in particular on its usefulness as an educational tool for monitoring and treating their asthma. Although the interpretation of this study is limited by the lack of a randomized control group, the findings are consistent with other evidence that the credit card asthma self-management plan can be an effective and acceptable system for improving asthma care in a high-risk group of adult patients with asthma.

  2. Juridical Perspective Of Credit Card Misuse Under Criminal Law A Comparative Study

    Directory of Open Access Journals (Sweden)

    Eka Nugraha

    2015-08-01

    Full Text Available The development of the national economy shows the direction that increasingly integrated with the regional and international economy that can support both a negative and positive impacts. Meanwhile the development of national economy continues to move quickly to the increasingly complex challenges therefore necessary adjustments in economic policies including the banking sector which is expected to be able to improve and strengthen the national economy. Bank as a means that ease people with all benefit is also not released from the weakness. The type of this research is normative for making criminal legislation as an object of study while the approach used tends juridical as a point of reference the theories of law and the rules of law in view of the problem. The outcomes of the research indicate that the efforts should be made to address the misuse of credit cards in the enforcement of the Indonesians criminal law is to formulate the rules of criminal law with a comprehensive pattern of expansion of legal subjects the offender is to enter the legal entity recht persoon as the parties may be subject to liability and formulate formulation of criminal in order to reach the entire modus operandi is being or may develop in the future. Besides the expansion of sanctions should be accompanied by sanction renewal that oriented to the cumulative punishment is retaliation deterrence and development.

  3. Playing the Smart Card.

    Science.gov (United States)

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  4. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  5. Response to Comment on "Unique in the shopping mall: On the reidentifiability of credit card metadata".

    Science.gov (United States)

    de Montjoye, Yves-Alexandre; Pentland, Alex Sandy

    2016-03-18

    Sánchez et al.'s textbook k-anonymization example does not prove, or even suggest, that location and other big-data data sets can be anonymized and of general use. The synthetic data set that they "successfully anonymize" bears no resemblance to modern high-dimensional data sets on which their methods fail. Moving forward, deidentification should not be considered a useful basis for policy. Copyright © 2016, American Association for the Advancement of Science.

  6. A credit-card library approach for disrupting protein-protein interactions.

    Science.gov (United States)

    Xu, Yang; Shi, Jin; Yamamoto, Noboru; Moss, Jason A; Vogt, Peter K; Janda, Kim D

    2006-04-15

    Protein-protein interfaces are prominent in many therapeutically important targets. Using small organic molecules to disrupt protein-protein interactions is a current challenge in chemical biology. An important example of protein-protein interactions is provided by the Myc protein, which is frequently deregulated in human cancers. Myc belongs to the family of basic helix-loop-helix leucine zipper (bHLH-ZIP) transcription factors. It is biologically active only as heterodimer with the bHLH-ZIP protein Max. Herein, we report a new strategy for the disruption of protein-protein interactions that has been corroborated through the design and synthesis of a small parallel library composed of 'credit-card' compounds. These compounds are derived from a planar, aromatic scaffold and functionalized with four points of diversity. From a 285 membered library, several hits were obtained that disrupted the c-Myc-Max interaction and cellular functions of c-Myc. The IC50 values determined for this small focused library for the disruption of Myc-Max dimerization are quite potent, especially since small molecule antagonists of protein-protein interactions are notoriously difficult to find. Furthermore, several of the compounds were active at the cellular level as shown by their biological effects on Myc action in chicken embryo fibroblast assays. In light of our findings, this approach is considered a valuable addition to the armamentarium of new molecules being developed to interact with protein-protein interfaces. Finally, this strategy for disrupting protein-protein interactions should prove applicable to other families of proteins.

  7. Comment on "Unique in the shopping mall: On the reidentifiability of credit card metadata".

    Science.gov (United States)

    Sánchez, David; Martínez, Sergio; Domingo-Ferrer, Josep

    2016-03-18

    De Montjoye et al. (Reports, 30 January 2015, p. 536) claimed that most individuals can be reidentified from a deidentified transaction database and that anonymization mechanisms are not effective against reidentification. We demonstrate that anonymization can be performed by techniques well established in the literature. Copyright © 2016, American Association for the Advancement of Science.

  8. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  9. Fraud Detection in Credit Card Transactions; Using Parallel Processing of Anomalies in Big Data

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Taghva

    2016-10-01

    Full Text Available In parallel to the increasing use of electronic cards, especially in the banking industry, the volume of transactions using these cards has grown rapidly. Moreover, the financial nature of these cards has led to the desirability of fraud in this area. The present study with Map Reduce approach and parallel processing, applied the Kohonen neural network model to detect abnormalities in bank card transactions. For this purpose, firstly it was proposed to classify all transactions into the fraudulent and legal which showed better performance compared with other methods. In the next step, we transformed the Kohonen model into the form of parallel task which demonstrated appropriate performance in terms of time; as expected to be well implemented in transactions with Big Data assumptions.

  10. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  11. Enhanced rearrangement technique for secure data transmission: case study credit card process

    Science.gov (United States)

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  12. A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus

    Science.gov (United States)

    Blackwell, Clive

    We illustrate the design of an intelligent agent to aid a merchant to limit fraudulent payment card purchases over the Internet. This is important because increasing fraud may limit the rise of e-commerce, and difficult because of the uncertainty in identifying and authenticating people remotely. The agent can advise the merchant what actions to take to reduce risk without complete knowledge of the circumstances. It can also negotiate flexibly to conclude transactions successfully that would otherwise be rejected. We use the Event Calculus to model the transaction system including the participants and their actions. The idea has applications in other distributed systems where incomplete knowledge of a system may be exploited by adversaries to their advantage.

  13. A smart card based student card system

    OpenAIRE

    2009-01-01

    M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...

  14. Consumer Perceptions of Mobile and Traditional Point-of-Sale Credit/Debit Card Systems in the United States: A Survey

    OpenAIRE

    Saxena, Nitish; Sloan, John. J.; Godbole, Manasvee; Yu, Jun; Cai, Jacinta; Goergescu, Michael; Harper, Olive Nick; Schwebel, David, C.

    2016-01-01

    In recent years, rapidly emerging technology has introduced mobile Point-Of-Sale (MPOS) systems to the North American market. These systems allow merchants to process transactions conveniently and quickly using mobile phones or tablets rather than “traditional” point-of-sale (TPOS) credit card-processing systems. However, the long-term success of these new payment systems relies on consumers perceiving the device to be secure, accurate, and free from criminal activity. We present a case vs. c...

  15. Effectiveness of state and federal government agreements with major credit card and shipping companies to block illegal Internet cigarette sales.

    Science.gov (United States)

    Ribisl, Kurt M; Williams, Rebecca S; Gizlice, Ziya; Herring, Amy H

    2011-02-14

    Most Internet vendors offer tax-free cigarettes making them cheaper than those sold at stores. This undermines the impact that higher prices have upon reducing consumption. Most Internet tobacco sales have violated taxation and youth access laws, which led to landmark voluntary agreements in 2005 with the major credit card companies and major private shippers to ban payment transactions and shipments for all Internet cigarette sales. To assess whether these bans increased the rate of Internet Cigarette Vendors (ICVs) ceasing online sales, decreased the proportion of vendors offering banned payment and shipping options, and decreased consumer traffic to the most popular ICVs. Websites in a longitudinal study of ICVs were visited in 2003 (n = 338), 2004 (n = 775), 2005 (n = 664), 2006 (n = 762), and 2007 (n = 497) to assess whether they were in business and monitor their advertised sales practices. The number of unique monthly visitors to the 50 most popular ICVs at baseline was examined for the period one year before and two years after the bans to determine whether the bans altered traffic. Following the bans, the rate of ICVs ceasing online sales year to year increased, but due to an influx of new vendors, there was a net increase in ICVs. The proportion of vendors accepting banned payment options dropped from 99.2% to 37.4% after the bans, and the proportion offering banned shipping options dropped from 32.2% to 5.6%, but there was a corresponding increase in vendors offering non-banned payment options (e.g., personal checks) and shipping options (e.g., US Postal Service). Following the bans, there was a 3.5 fold decline in traffic to the most popular ICV websites. This promising approach to controlling the sale of restricted goods online has implications for regulating other products such as alcohol, firearms, quack cures, and medicines sold without a prescription.

  16. 從法律觀點談信用卡系統之成本與效益 ― 以澳洲信用卡制度改革為例 The Cost and Efficiency of Credit Card Schemes ― A Comparative Study on the Australian Regulatory Reform for Credit Card

    Directory of Open Access Journals (Sweden)

    林育廷 Yu-Ting Lin

    2006-06-01

    Full Text Available 隨信用卡使用之廣泛與普及,有關競爭法問題也漸受重視。本文擬就其中與成本定價相關之二大議題進行討論,其一為交換費用(Interchange fees)之制訂與衍生相關競爭法議題,其二為禁止特約商店額外收取信用卡使用費(no surcharge rule)之適法性討論,及其分別對經濟體付款制度之影響。 本文主要以澳洲政府近年來有關信用卡支付系統之改革為主要範本,旁及美國、歐盟等檢討現況,並進一步再就相關問題提出個人分析與評論。交換費用之聯合制訂有其必要性,由廠商分別締約反有礙信用卡作業效率,且對市場競爭無益。但於此前提下,適度管制則有其必要。相關計算應有客觀且公正之計算標準,以避免對發卡機構與信用卡組織過度補償(over-compensate)。同時,相關資訊與定價基準應做適當揭露。就禁止特約商店額外收費之限制而言,此一定價限制可能對消費者付款工具之選擇造成錯誤之價格誘因,除有礙付款市場之有效競爭,造成高成本付款工具之普遍使用,影響付款機制之運作效益外,並形成非信用卡使用者對信用卡使用者之不當補貼,並進而造成零售價格之提高,影響社會整體 利益。 This paper first outlines the Australian recently adopted regulatory framework for credit card scheme, highlighting the growing concerns over the possible anti-competitive effects of the setting of interchange fees and the “no-surcharge rule”.The rate of the interchange fees applied to the credit card use nowadays raises the concerns of overcompensating the financial institution as well as the credit card schemes and also, the “no-surcharge rule” restricted the competition and suppressed price signals that guide the efficient allocation of resources. In my opinion, the interchange fee should be decided at a cost-based benchmark

  17. Effectiveness of state and federal government agreements with major credit card and shipping companies to block illegal Internet cigarette sales.

    Directory of Open Access Journals (Sweden)

    Kurt M Ribisl

    2011-02-01

    Full Text Available Most Internet vendors offer tax-free cigarettes making them cheaper than those sold at stores. This undermines the impact that higher prices have upon reducing consumption. Most Internet tobacco sales have violated taxation and youth access laws, which led to landmark voluntary agreements in 2005 with the major credit card companies and major private shippers to ban payment transactions and shipments for all Internet cigarette sales.To assess whether these bans increased the rate of Internet Cigarette Vendors (ICVs ceasing online sales, decreased the proportion of vendors offering banned payment and shipping options, and decreased consumer traffic to the most popular ICVs.Websites in a longitudinal study of ICVs were visited in 2003 (n = 338, 2004 (n = 775, 2005 (n = 664, 2006 (n = 762, and 2007 (n = 497 to assess whether they were in business and monitor their advertised sales practices. The number of unique monthly visitors to the 50 most popular ICVs at baseline was examined for the period one year before and two years after the bans to determine whether the bans altered traffic.Following the bans, the rate of ICVs ceasing online sales year to year increased, but due to an influx of new vendors, there was a net increase in ICVs. The proportion of vendors accepting banned payment options dropped from 99.2% to 37.4% after the bans, and the proportion offering banned shipping options dropped from 32.2% to 5.6%, but there was a corresponding increase in vendors offering non-banned payment options (e.g., personal checks and shipping options (e.g., US Postal Service. Following the bans, there was a 3.5 fold decline in traffic to the most popular ICV websites.This promising approach to controlling the sale of restricted goods online has implications for regulating other products such as alcohol, firearms, quack cures, and medicines sold without a prescription.

  18. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2002-01-01

    Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  19. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2001-01-01

    Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  20. Türkiye’de Kredi Kartı Kullanımını Etkileyen Faktörleri Belirlemeye Yönelik Bir Model Çalışması(A Model Study Based on Setting The Factors Affecting The Credit Card Usage in Turkey

    Directory of Open Access Journals (Sweden)

    Nevin UZGÖREN

    2007-01-01

    Full Text Available The usage of credit cards as a mean for payment and consumer credits is consistently increasing worldwide and Turkey.In this study, analyzing the factors that affect the expenditures by credit cards is aimed and multiple regression analysis is applied. The model which is gained through this analysis has shaved appropriate results for economic and statistical expectations. It has been realized that, the crisis in November 2000 and February 2001 in Turkey had an important role in the decrease of credit card usage giro. On the other hand, it has been concluded that the gross national product per capita, the number of pos machines and credit cards and the inflation rate increased the card usage giro.

  1. The Effects of the Activation of Money and Credit Card vs. that of Activation of Spirituality - Which One Prompts Pro-Social Behaviours?

    Science.gov (United States)

    Wierzbicki, Jakub; Zawadzka, Anna Maria

    Pro-social behaviours may be prompted or inhibited depending on the situation. Numerous experiments show that, when exposed to the idea of money, people are less willing to help, devote their time or share their resources with others (Vohs et al. Science, 314, 1154-1156, 2006, Current Directions in Psychological Science, 17(3), 208-212, 2008). Conversely, when exposed to the idea of spirituality, they often cheat less and are more willing to help others (Mazar and Ariely Journal of Marketing Research, 45, 633-644, 2008; Randolph-Seng and Nielsen The International Journal for the Psychology of Religion, 17(4), 303-315, 2007). The aim of this article is to present the results of two experiments in which we activated thoughts about money, i.e. both cash and credit cards, and thoughts about spirituality in order to find out in what way these two kinds of activation may influence pro-social behaviours. In experiment 1, participants, when reminded of money, offered lower donations to others whereas those reminded of spirituality offered higher donations. In experiment 2, those participants reminded of money offered to devote less time to help others whereas those reminded of spirituality offered to devote more time to help others.

  2. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  3. Imaging standards for smart cards

    Science.gov (United States)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  4. 12 CFR 561.12 - Consumer credit.

    Science.gov (United States)

    2010-01-01

    ...; loans in the nature of overdraft protection; and credit extended in connection with credit cards. ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Consumer credit. 561.12 Section 561.12 Banks... AFFECTING ALL SAVINGS ASSOCIATIONS § 561.12 Consumer credit. The term consumer credit means credit extended...

  5. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  6. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  7. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  8. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  9. Anonymity and Software Agents: An Interdiscplinary Challenge

    NARCIS (Netherlands)

    Brazier, F.M.; Oskamp, A.; Prins, J.M.; Schellekens, M.H.M.; Wijngaards, N.J.E.

    2004-01-01

    Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are

  10. Anonymity and Software Agents: An Interdisciplinary Challenge

    NARCIS (Netherlands)

    Oskamp, A.; Brazier, F.M.; Prins, J.E.J.; Schellekens, M.H.M.; Wijngaards, N.J.E.

    2004-01-01

    Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are

  11. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  12. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  13. Proxies for Anonymous Routing

    National Research Council Canada - National Science Library

    Reed, Michael G; Syverson, Paul F; Goldschlag, David M

    1996-01-01

    ...), and file transfers (FTP) have been implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis...

  14. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  15. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  16. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  17. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  18. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  19. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  20. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  1. Desafios e oportunidades no setor de cartões de crédito: proposição de estratégias para o mercado popular Challenges and opportunities for credit cards: strategies for low-income markets

    Directory of Open Access Journals (Sweden)

    Renata Giovinazzo Spers

    2008-12-01

    Full Text Available O mercado de baixa renda no Brasil apresenta grandes oportunidades para empresas do setor de cartões de crédito com foco em serviços de qualidade, mas por valores compatíveis à renda e necessidades específicas desse segmento. O objetivo central do trabalho é analisar os aspectos críticos e oportunidades para os cartões de crédito no mercado de baixa renda, com a proposição de uma abordagem para aumentar a penetração do produto neste segmento. Para tanto, foram identificadas oito variáveis a partir da literatura e realizadas pesquisa qualitativa com análise documental e entrevistas em profundidade com especialistas do setor de cartões. Os resultados da pesquisa mostram que as empresas devem adotar estratégias para ganhar vantagem competitiva com preços mais baixos, reduzindo custos ao reduzir serviços não relevantes para o segmento. É recomendável que a empresa utilize a mesma marca oferecida às classes A e B e aposte em tecnologia e distribuição aliadas às redes de varejo, para uma maior penetração dos cartões.The low-income market in Brazil presents great opportunities for companies including the credit card sector. Bottom-of-the-pyramid customers look for quality which is, however, compatible with their budgets and needs. For this purpose an analysis was made of the critical aspects and opportunities in question. Literature disclosed eight factors that were analyzed in a qualitative survey and with in depth interviews. Variables relevant to business profitability in general were also presented. Results disclosed the possibility of competitive pricing advantages by offering simpler services and lower cost products. Brands offered to higher income brackets should be adapted with technologies for simplification and more attractive pricing. Partnerships should then be made with retail store networks to increase the use of credit cards.

  2. Health smart cards: merging technology and medical information.

    Science.gov (United States)

    Ward, Sherry R

    2003-01-01

    Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.

  3. Citizen empowerment using healthcare and welfare cards.

    Science.gov (United States)

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  4. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  5. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  6. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  7. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    Science.gov (United States)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  8. Developing efficient blinded attribute certificates on smart cards via pairings

    NARCIS (Netherlands)

    Batina, L.; Hoepman, J.H.; Jacobs, B.; Mostowski, W.; Vullers, P.

    2010-01-01

    This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified

  9. Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study

    OpenAIRE

    Adel I. Al-Alawi; Mohammed A. Al-Amer

    2006-01-01

    SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...

  10. Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...

  11. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  12. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  13. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  14. Smart Card

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.

  15. BHI Purchase Card System user's guide

    International Nuclear Information System (INIS)

    Mehden, P. von der.

    1996-04-01

    The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor

  16. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  17. Smart Cards and Card Operating Systems

    NARCIS (Netherlands)

    Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.

    The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system

  18. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  19. Information Sharing and Credit Rationing : Evidence from the Introduction of a Public Credit Registry

    NARCIS (Netherlands)

    Cheng, X.; Degryse, H.A.

    2010-01-01

    We provide the first evidence on how the introduction of information sharing via a public credit registry affects banks’ lending decisions. We employ a unique dataset containing detailed information on credit card applications and decisions from one of the leading banks in China. While we do not

  20. CREDIT SYSTEM AND CREDIT GUARANTEE PROGRAMS

    OpenAIRE

    Turgay GECER

    2012-01-01

    Credit system is an integrated architecture consisted of financial information, credit rating, credit risk management, receivables and credit insurance systems, credit derivative markets and credit guarantee programs. The main purpose of the credit system is to provide the functioning of all credit channels and to make it easy to access of credit sources demanded by all of real and legal persons in any economic system. Credit guarantee program, the one of prominent elements of the credit syst...

  1. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  2. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  3. International images: business cards.

    Science.gov (United States)

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  4. Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry

    Science.gov (United States)

    Willey, Lorrie; White, Barbara Jo

    2013-01-01

    Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…

  5. Pricing of payment cards, competition, and efficiency : A possible guide for SEPA

    NARCIS (Netherlands)

    Bolt, Wilko; Schmiedel, Heiko

    2013-01-01

    This paper analyzes equilibrium pricing of payment cards and welfare consequences of payment card competition. In particular, we model competition between debit and credit cards. The paper argues that optimal consumer and merchant fees must take safety, income uncertainty, default risk, and the

  6. New Optical Card for Sneaker’s Network in Place of Electronic Clinical Record

    Science.gov (United States)

    Goto, Kenya; Satsukawa, Takatoshi; Chiba, Seisho; Ohmori, Takaaki

    2006-02-01

    In order to solve problems in electronic medical records, a new optical card of the digital versatile disk (DVD) type with higher capacity and lower cost than conventional compact disc recording (CD-R)-type cards has been developed, which is thinner, stronger and wearable like a credit card.

  7. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  8. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  9. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  10. 12 CFR 227.26 - Unfair charging of security deposits and fees for the issuance or availability of credit to...

    Science.gov (United States)

    2010-01-01

    ... consumer credit card accounts. (a) Limitation for first year. During the first year, a bank must not charge... billing cycle, the bank must not charge to a consumer credit card account security deposits and fees for... for the issuance or availability of credit permitted by paragraph (a) of this section must be charged...

  11. The Effects of Credit Status on College Attainment and College Completion

    OpenAIRE

    Gicheva, Dora; Ionescu, Felicia; Simpson, Nicole B.

    2012-01-01

    College students now use various forms of unsecured credit such as private student loans and credit cards to finance college. Access to these credit lines and the interest rates charged on these loans can vary significantly across credit scores. In this paper, we analyze if credit status, as measured by self-reported characteristics of an individual's credit standing, affects college investment. Using data from the Survey of Consumer Finances, we study a sample of young high school graduates ...

  12. Introduction of card payment system in a merchant company

    OpenAIRE

    Štrukelj, Anja

    2015-01-01

    The thesis is about PCI DSS, which stands for Payment Card Industry Data Security Standard. PCI DSS represents a uniőed approach to the protection of sensitive card data and to prevention of abuses in the payment card industry. Implementation of the standard in the company provides a higher level of security, it maintains conődence, protection against abuse and consequently protection against őnancial losses and loss of reputation. When paying with credit cards, the őrst lin...

  13. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  14. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  15. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  16. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  17. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  18. Print a Bed Bug Card - (Single Cards)

    Science.gov (United States)

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  19. CMS Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...

  20. CERNET Interface Card

    CERN Multimedia

    1978-01-01

    Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.

  1. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  2. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  3. Unraveling a Card Trick

    Science.gov (United States)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  4. Atheists, agnostics and Alcoholics Anonymous.

    Science.gov (United States)

    Tonigan, J Scott; Miller, W R; Schermer, Carol

    2002-09-01

    In spite of the strong emphasis in AA on spiritual beliefs and practices, findings are mixed about the importance of such beliefs in predicting AA affiliation. This study of the Project MATCH outpatient (N = 952) and aftercare (N = 774) samples tested three hypotheses about the role of client God belief and subsequent AA attendance and benefit, taking into account that some individuals may, in fact, deny the existence of a God. Longitudinal analyses were conducted (N = 1,526) investigating client God beliefs, AA attendance, patterns of AA attendance and alcohol use. Assessments were conducted at intake and in 3-month intervals using the Form 90, Religious Behaviors and Background, and the Alcoholics Anonymous Inventory. 12-Step treatment was significantly more likely to promote pre-post shifts in client God beliefs, and atheist and agnostic clients attended AA significantly less often throughout follow-up relative to clients self-labeled as spiritual and religious. AA attendance, however, was significantly associated with increased abstinence and reductions in drinking intensity regardless of God belief. Finally, no differences in percent days abstinence and drinking intensity were found between atheist and agnostic versus spiritual and religious clients, but clients unsure about their God belief reported significantly higher drinking frequency relative to the other groups. God belief appears to be relatively unimportant in deriving AA-related benefit, but atheist and agnostic clients are less likely to initiate and sustain AA attendance relative to spiritual and religious clients. This apparent reticence to affiliate with AA ought to be clinically recognized when encouraging AA participation.

  5. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  6. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  7. Data card system for filmless radiography

    International Nuclear Information System (INIS)

    Siedband, M.P.

    1987-01-01

    Data cards using the sample principles as music compact discs can store 4 MB of digital data. This is sufficient for 4 uncompressed radiographic images or 16 images with 4:1 average compression. Radiograph memory screens (stimulable phosphors) can be scanned at 1023 lines to provide the input signals. A filmless radiographic x-ray system is described which uses digital data cards of the size of common credit cards. These can be used in the same way as films are now used: placed in patient folders, copied, mailed, seen on view boxes, etc. The techniques of data acquisition, processing, compression, storage and display are described. The advantages of the system are explained in terms of economies, elimination of film (chemicals and processing), and compatibility with other data transmission methods. Suggestions are made for standardization of data storage and control so that this method may be used for other medical imaging applications, such as CT and ultrasound

  8. The Development and Structure of Consumer Credit in Japan

    Science.gov (United States)

    1989-06-01

    customers . The president of Fuji Bank admitted recently that fear of bad debts had kept banks from vigorously exploiting the consumer market. He called...a lower income, working class shopper to a younger, credit-using customer . In early 1988, Marui had issued 9.6 million credit cards. 16 Its annual...the young consumer . In 1986, 83 percent of sales were to customers in their twenties.’ 7 With nearly 70 percent of its sales made on credit, interest

  9. Computer Data Punch Cards

    CERN Multimedia

    Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.

  10. Laminated dosimetric card

    International Nuclear Information System (INIS)

    Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.

    1975-01-01

    A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)

  11. Loyalty program of payment cards, solution based on DWH

    OpenAIRE

    Jersák, Pavel

    2010-01-01

    This diploma thesis is covering topics of customer's loyalty, loyalty programs in banking and mainly topic is loyalty programs of payment cards in banking industry. First theoretical parts is guiding us though concept of customer's loyalty in banking industry and is describing specifics of this loyalty compared to loyalty to sales businesses. Further, this thesis is trying to show opportunities to be used to support customer's loyalty in bank with participation of credit and debit cards. In t...

  12. [Anonymous birth and neonaticide in Tyrol].

    Science.gov (United States)

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  13. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  14. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  15. High-Risk Health and Credit Behavior among 18- to 25-Year-Old College Students

    Science.gov (United States)

    Adams, Troy; Moore, Monique

    2007-01-01

    The number of students accumulating credit card debt--and the amount of debt itself--on college campuses is increasing. If high-risk credit and health behavior are associated, health behavior interventions might apply to high-risk credit behavior. Objective: The authors' purpose was to examine these possible associations. Participants and Methods:…

  16. THE BASIS OF THE MARKET REGULATION OF PAYMENT CARDS

    Directory of Open Access Journals (Sweden)

    Khetagurov G. V.

    2017-06-01

    Full Text Available The article is devoted to basics and the regulation problems of the modern payment cards market. In particular, it addresses the key participants in a payment system, which include the Central Bank, credit organizations, settlement and clearing centers. The paper explores the basic functions of the participants. The author analyzes approaches of card payment systems to development and implementation monitoring of standards and regulations relative to the technology: hardware and software, communication channels, etc. The article contains analysis of information exchange in the framework of payment cards market and specific features of the design and development of a payment infrastructure. It discusses the economic model of the payment cards market, which is based on commission payments. The paper describes the key fees. At the final stage of the study, the author examines the role of different global regulators in the payment card market, conducts an analysis of the foundations of the Russian legislation regulating this market.

  17. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  18. Anonymity in P2P Systems

    Science.gov (United States)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  19. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  20. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  1. PURCHASE CARDS. Continued Control Weaknesses Leave Two Navy Units Vulnerable to Fraud and Abuse

    National Research Council Canada - National Science Library

    2002-01-01

    .... Key improvements included reductions in the number of cardholders, an increase in the number of approving officials, an overall decrease in the aggregate monthly credit limits, and a decrease in purchase card usage...

  2. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  3. Markets: Gift Cards

    OpenAIRE

    Jennifer Pate Offenberg

    2007-01-01

    The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...

  4. The costs of paying: Private and social costs of cash and card systems

    OpenAIRE

    Bergman, Mats; Guibourg, Gabriela; Segendorf, Björn

    2007-01-01

    Despite the central role of payments in theoretical and policy oriented economics, there is surprisingly little known about the costs of different payment instruments. We estimate social and private costs of cash, debit and credit card payments in Sweden in 2002. The combined social cost of providing these payment services is approximately 0.4 per cent of GDP. Debit and credit cards are socially less costly than cash for payments above EURO 8 and EURO 18, respectively. Corresponding threshold...

  5. MODELING CREDIT RISK THROUGH CREDIT SCORING

    OpenAIRE

    Adrian Cantemir CALIN; Oana Cristina POPOVICI

    2014-01-01

    Credit risk governs all financial transactions and it is defined as the risk of suffering a loss due to certain shifts in the credit quality of a counterpart. Credit risk literature gravitates around two main modeling approaches: the structural approach and the reduced form approach. In addition to these perspectives, credit risk assessment has been conducted through a series of techniques such as credit scoring models, which form the traditional approach. This paper examines the evolution of...

  6. The Future of Smart Cards.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  7. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  8. An acuity cards cookbook.

    Science.gov (United States)

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  9. A House of Cards.

    Science.gov (United States)

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  10. Designing minimum data sets of health smart card system

    Directory of Open Access Journals (Sweden)

    Mohtaram Nematollahi

    2014-10-01

    Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment

  11. Method card design dimensions

    DEFF Research Database (Denmark)

    Wölfel, Christiane; Merritt, T.

    2013-01-01

    There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....

  12. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  13. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  14. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  15. REPLACEMENT OF FRENCH CARDS

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...

  16. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  17. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Hong Lai

    2012-01-01

    Full Text Available We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary attack together with various known attacks.

  18. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  19. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  20. Fieldale-Collinsville Middle School: Banishing Anonymity

    Science.gov (United States)

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  1. Botnet detection and prevention in anonymous networks

    NARCIS (Netherlands)

    Kuhnert, Katharina; Steinberger, Jessica; Baier, Harald

    Botnets are a major threat to the Internet landscape and have been responsible for large scale distributed attacks on online services. To make take down measures more difficult, Botnet operators started to incorporate anonymous networks into their software to protect their users and their Botnets.

  2. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  3. ATM Card Cloning and Ethical Considerations.

    Science.gov (United States)

    Kaur, Paramjit; Krishan, Kewal; Sharma, Suresh K; Kanchan, Tanuj

    2018-05-01

    With the advent of modern technology, the way society handles and performs monetary transactions has changed tremendously. The world is moving swiftly towards the digital arena. The use of Automated Teller Machine (ATM) cards (credit and debit) has led to a "cash-less society" and has fostered digital payments and purchases. In addition to this, the trust and reliance of the society upon these small pieces of plastic, having numbers engraved upon them, has increased immensely over the last two decades. In the past few years, the number of ATM fraud cases has increased exponentially. With the money of the people shifting towards the digital platform, ATM skimming has become a problem that has eventually led to a global outcry. The present review discusses the serious repercussions of ATM card cloning and the associated privacy, ethical and legal concerns. The preventive measures which need to be taken and adopted by the government authorities to mitigate the problem have also been discussed.

  4. Credit Management System

    Data.gov (United States)

    US Agency for International Development — Credit Management System. Outsourced Internet-based application. CMS stores and processes data related to USAID credit programs. The system provides information...

  5. 76 FR 76628 - Disclosure of Certain Credit Card Complaint Data

    Science.gov (United States)

    2011-12-08

    ... complaint. At the end of this process, the issuer reports to Consumer Response how it has addressed the... Proceedings (``OAEP'') discloses every month in its Air Travel Consumer Report.\\11\\ Unlike NHTSA, OAEP does... the OEAP began publishing the Air Travel Consumer Report.\\13\\ Outside reviewers have also publicized...

  6. Graduation Credit Cards--Immediate Buy in, Immediate Payoff

    Science.gov (United States)

    Eichorn, Robert; Garza, Ruth; Jones, Karre; Sobers, Marie

    2010-01-01

    New Directions Alternative Education Center, Prince William County Public School's (PWCS) alternative high school, serves approximately 1000 students on a rolling-enrollment basis each year. The 2009-2010 school year marks the sixth year of operation for the center. The school program continues to develop and grow in exciting and "new…

  7. An Analysis of the Credit Card Program Using Process Innovation

    National Research Council Canada - National Science Library

    Braney, Ronald

    1999-01-01

    .... The implementation of the Federal Acquisition Streamlining Act has placed more emphasis on allowing contracting officers to apply sound business judgment instead of blindly following detailed regulations and procedures...

  8. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  9. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

    KAUST Repository

    Li, Lun; Liu, Jiqiang; Cheng, Lichen; Qiu, Shuo; Wang, Wei; Zhang, Xiangliang; Zhang, Zonghua

    2018-01-01

    (i.e., users) to generate the signatures and to send announcements anonymously in the nonfully trusted environment. On the other hand, with Blockchain, CreditCoin motivates users with incentives to share traffic information. In addition, transactions

  10. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  11. Yahtzee: an anonymized group level matching procedure.

    Science.gov (United States)

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  12. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  13. Credit: A Teaching Unit.

    Science.gov (United States)

    Clanton, Brandolyn; And Others

    Intended for teachers of secondary school students, five lessons on consumer credit are presented. In the first lesson students identify and evaluate sources of credit, compare some of the costs and benefits of credit, and learn to apply criteria used in evaluating applications for credit. In the second lesson, students learn about two basic types…

  14. Refundable Tax Credits

    OpenAIRE

    Congressional Budget Office

    2013-01-01

    In 1975, the first refundable tax credit—the earned income tax credit (EITC)—took effect. Since then, the number and cost of refundable tax credits—credits that can result in net payments from the government—have grown considerably. Those credits will cost $149 billion in 2013, CBO estimates, mostly for the EITC and the child tax credit.

  15. NCA & Credit Guarantees

    African Journals Online (AJOL)

    stooppn

    purposes of the National Credit Act; what the definition of a credit guarantee set out ...... Scholtz et al National Credit Act in para 8.2.4; Scott et al Law of Commerce ..... Eitelberg E "Autonomy of Documentary Credit Undertakings in South African.

  16. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  17. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  18. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  19. Research on the SIM card implementing functions of transport card

    Science.gov (United States)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  20. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  1. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  2. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  3. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  4. Rural Credit in Vietnam

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Tarp, Finn

    This paper uses a survey of 932 rural households to uncover how the rural credit market operates in four provinces of Vietnam. Households obtain credit through formal and informal lenders, but formal loans are almost entirely for production and asset accumulation. Interest rates fell from 1997...... to 2002, reflecting increased market integration; but the determinants of formal and informal credit demand are distinct. Credit rationing depends on education and credit history, but we find no evidence of a bias against women. Regional differences are striking, and a ‘one size fits all’ approach...... to credit policy is clearly inappropriate....

  5. NCDC Punched Card Reference Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...

  6. Suicidal behavior among members of Gamblers Anonymous.

    Science.gov (United States)

    Frank, M L; Lester, D; Wexler, A

    1991-09-01

    A national sample of 500 members of Gamblers Anonymous was surveyed by mail in order to gather information on suicidal history. One hundred sixty two usable surveys were returned representing 32.4% of the original sample. Compulsive gamblers who had a history of suicidal preoccupation began gambling at an earlier age than nonsuicidal gamblers and were more likely to have stolen to support their gambling. They also tended to have addicted relatives and children more than nonsuicidal gamblers did. The data suggest that those gamblers who had been suicidal tend to be more serious gamblers than nonsuicidal respondents.

  7. Towards Predicting Efficient and Anonymous Tor Circuits

    OpenAIRE

    Barton, Armon; Imani, Mohsen; Ming, Jiang; Wright, Matthew

    2018-01-01

    The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing. To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path. If the path is predicted to be fast, then the client builds a circuit using those relays. We implemented PredicTor in the Tor source code and show through live Tor experiments and Sh...

  8. CARDS MARKET – A RESISTANT MARKET TO CRISIS

    Directory of Open Access Journals (Sweden)

    Tudose Geanina - Gabriela

    2012-07-01

    Full Text Available At the same time with the development of market and consumer behavior of Romanians, the growth rate of cards market accelerated. Of course, infrastructure and acceptance network were very important, they are the factors that allowed the widespread use of cards. Currently, any natural person or legal entity is engaged in commercial relationships involving financial transactions, the electronic payments having an important role, representing virtually future transactions, both nationally and across borders. The financial institutions have made a more rapid segmentation of the portfolio of cards and began to focus increasingly on services and benefits situated behind the payment instruments. Meanwhile, cardholders were becoming more educated and sophisticated, knowing what to ask of cards. More, many financial institutions have adapted so that network to accept chip cards. On the Romanian market, the chip cards will increase which are much more effective in terms of security transactions, as well as for co-branded cards, that offers the possibility of the loyalty of the customers. They will try to get as many benefits from different types of cards, but at the same time, they will focus on niche products, business cards, cards for shopping or for payment of public services. The scientific paper aims to capture aspects that emphasize the fact that the permanent market monitoring and the continuous adaptation of it will become necessary for the next period. The current client is more demanding, more educated and less tolerant in the relation to the suppliers of any kind and especially with those of financial services. The tendency to use co-branded cards for everyday payments will increase as merchants and issuing banks will attach more and more benefits on these cards, which will ultimately increase trading volumes on the card to merchants. The bank clients benefited of the cutting - edge technologies, of dual cards functionality - debit and credit.

  9. Smart Icon Cards

    Science.gov (United States)

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  10. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay

    OpenAIRE

    Biryukov, Alex; Pustogarov, Ivan

    2015-01-01

    In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved service. Both shares and tickets when sent over Tor circuits are anonymous. The analysis of the crypto-currencies market prices shows that th...

  11. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  12. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  13. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  14. Credit Union Headquarters

    Data.gov (United States)

    Department of Homeland Security — The National Credit Union Administration (NCUA) is the independent federal agency that charters and supervises federal credit unions. NCUA, backed of the full faith...

  15. A study of smart card for radiation exposure history of patient.

    Science.gov (United States)

    Rehani, Madan M; Kushi, Joseph F

    2013-04-01

    The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.

  16. Credit Market Information Feedback

    OpenAIRE

    Balasubramanyan, Lakshmi; Craig, Ben R.; Thomson, James B.; Zaman, Saeed

    2015-01-01

    We examine how a combination of credit market and asset quality information can jointly be used in assessing bank franchise value. We find that expectations of future credit demand and future asset quality explain contemporaneous bank franchise value, indicative of the feedback in credit market information and its consequent impact on bank franchise value.

  17. Boundedly rational credit cycles

    OpenAIRE

    Sáez, María

    1996-01-01

    We propose an evolutionary model of a credit market. We show that the economy exhibits credit cycles. The model predicts dynamics which are consistent with some evidence about the Great Depression. Real shocks trigger episodes of credit--crunch which are observed in the process of adjustment towards the post shock equilibrium.

  18. Modernization of credit relations

    Directory of Open Access Journals (Sweden)

    S.V. Volosovich

    2015-03-01

    Full Text Available Nowadays it is essential to modernize credit relations in the conditions of global economy transformations. This is due to the influence of integration processes on credit relations and transformation of the risks inherent in the credit field. The purpose of this article is to develop measures that help to improve the efficiency of interaction of credit relations’ participants. Modernization of credit relations is based on the interaction of its main and indirect subjects who belong to the subsystems of loans granting, deposits attraction and provision of related services. Its goal is to pass from extensive to intensive model of interaction between the subjects of credit relations. Components of the credit relations modernization are the following: institutional modernization, which is based on the interaction of credit relations’ subjects, and ensures the development of competition in all credit market’s segments, the creation of its corresponding infrastructure, qualitative change in the approaches of regulation and supervision; technological modernization, which involves the formation of joint products on the credit market and the formation of an integrated informational and analytical system. In the result of the credit relations’ modernization it is expected to achieve synergies between the subjects of credit relations, that will lead to changes in the business architecture of the financial market.

  19. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  20. PROSEDUR PERMOHONAN SHAR-E CARD PADABANK MUAMALAT

    Directory of Open Access Journals (Sweden)

    Aprilianti Aprilianti

    2015-11-01

    Full Text Available After the economic crisis that followed the liquidation of some national private banks in 1997 gave rise to alternative thinking and measures to develop banking activity based on Islamic principles. Islamic principles reflected in the pattern of bamk operating in accordance with Islamic principles, especially regarding the procedures for bermuamalah in Islam. Shar-E Card is one type of credit card services by a bank Muamalat where the balance is outstanding amounts dengam mudaraba principle that no restriction for banks to use the funds raised, bamk shall memberitahukam to the owner of the funds of the ratios and procedures for the provision of benefits and or the calculation of benefit sharing as well as risks that may arise from the storage of funds. Keywords: Shar-E Card, Bank Muamalat

  1. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  2. Port Card Module

    International Nuclear Information System (INIS)

    Utes, M.

    1994-01-01

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards

  3. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

    KAUST Repository

    Li, Lun

    2018-01-23

    The vehicular announcement network is one of the most promising utilities in the communications of smart vehicles and in the smart transportation systems. In general, there are two major issues in building an effective vehicular announcement network. First, it is difficult to forward reliable announcements without revealing users\\' identities. Second, users usually lack the motivation to forward announcements. In this paper, we endeavor to resolve these two issues through proposing an effective announcement network called CreditCoin, a novel privacy-preserving incentive announcement network based on Blockchain via an efficient anonymous vehicular announcement aggregation protocol. On the one hand, CreditCoin allows nondeterministic different signers (i.e., users) to generate the signatures and to send announcements anonymously in the nonfully trusted environment. On the other hand, with Blockchain, CreditCoin motivates users with incentives to share traffic information. In addition, transactions and account information in CreditCoin are tamper-resistant. CreditCoin also achieves conditional privacy since Trace manager in CreditCoin traces malicious users\\' identities in anonymous announcements with related transactions. CreditCoin thus is able to motivate users to forward announcements anonymously and reliably. Extensive experimental results show that CreditCoin is efficient and practical in simulations of smart transportation.

  4. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  5. Japanese Tarot Cards

    Directory of Open Access Journals (Sweden)

    Laura Miller

    2017-04-01

    Full Text Available This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced with images from the world of Japanese art, history, and popular culture. These substitutions either gloss over the gaps between Western and Japanese world views or meld them into a new form, allowing the tarot entry into a different or hybrid metaphysical culture. Attention to tarot cards is important because of their great economic and cultural impact in contemporary Japan. A widespread love of tarot in Japan provides insight into domains of pleasure, spiritual exploration, and fandom.

  6. Japanese Tarot Cards

    OpenAIRE

    Laura Miller

    2017-01-01

    This essay looks at selected images from tarot decks designed in Japan. Tarot decks reflect a deliberate adaptation process across both cultural and temporal borders, with visual components created and customized for a Japanese viewer. My aim is to consider the nature of these changes in imagery and to focus attention on an under-analyzed and mostly female-gendered domain. In particular, I look at the way the medieval European people and elements originally found on the cards are replaced wit...

  7. TPG: Unireso travel cards soon to be available for purchase at CERN

    CERN Multimedia

    2013-01-01

    In the framework of a partnership between CERN and the TPG, all active and retired members of the CERN personnel will be able to purchase Unireso travel cards from the CERN Hostel - Building 39 (Meyrin site) from 1 February 2013. At the same time, the CERN Staff Association will stop selling cards to its members.   How to order a travel card From 1 February onwards, travel cards can be ordered* directly from the reception of the CERN Hostel (Building 39) between the hours of 7.30 a.m. and 1.00 p.m. Mondays to Fridays: → a digital photograph will be taken when you order your card, → the card must be paid for, by credit card (EuroMaster, Visa or American Express) or in cash (Swiss francs only), when the order is placed. *Please note that cards ordered at CERN will not be valid until at least 8 working days after purchase. No reimbursement will be possible once the order has been placed. Prices Travel cards will be on sale at the following prices (including 8% VAT): Regi...

  8. RANCANG BANGUN APLIKASI SMART CARD INTERFACE

    OpenAIRE

    I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda

    2012-01-01

    Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...

  9. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  10. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  11. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  12. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  13. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    Science.gov (United States)

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  14. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    Science.gov (United States)

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  15. Credit risk transfer

    OpenAIRE

    Bank for International Settlements

    2003-01-01

    Executive summary Techniques for transferring credit risk, such as financial guarantees and credit insurance, have been a long-standing feature of financial markets. In the past few years, however, the range of credit risk transfer (CRT) instruments and the circumstances in which they are used have widened considerably. A number of factors have contributed to this growth, including: greater focus by banks and other financial institutions on risk management; a more rigorous approach to risk/re...

  16. Modern bank's credit risk

    Directory of Open Access Journals (Sweden)

    Šabović Šerif

    2015-01-01

    Full Text Available Credit risk is the most important risk banks have to face with. It occurs due to an obligation created because of debtors' capital and interest rate nonpayment. Debtors obligations non-fulfilment may lead to great losses and insolvency in bank's business. Credit risk is the crucial reason of bank's insolvency. Over 80% of bank's balance sheet is exposed to credit risk.

  17. A Soft Intelligent Risk Evaluation Model for Credit Scoring Classification

    Directory of Open Access Journals (Sweden)

    Mehdi Khashei

    2015-09-01

    Full Text Available Risk management is one of the most important branches of business and finance. Classification models are the most popular and widely used analytical group of data mining approaches that can greatly help financial decision makers and managers to tackle credit risk problems. However, the literature clearly indicates that, despite proposing numerous classification models, credit scoring is often a difficult task. On the other hand, there is no universal credit-scoring model in the literature that can be accurately and explanatorily used in all circumstances. Therefore, the research for improving the efficiency of credit-scoring models has never stopped. In this paper, a hybrid soft intelligent classification model is proposed for credit-scoring problems. In the proposed model, the unique advantages of the soft computing techniques are used in order to modify the performance of the traditional artificial neural networks in credit scoring. Empirical results of Australian credit card data classifications indicate that the proposed hybrid model outperforms its components, and also other classification models presented for credit scoring. Therefore, the proposed model can be considered as an appropriate alternative tool for binary decision making in business and finance, especially in high uncertainty conditions.

  18. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  19. Investigation into Plastic Cards

    Directory of Open Access Journals (Sweden)

    Neringa Stašelytė

    2015-03-01

    Full Text Available The article examines the strength of laminating plastic cards at different lamination temperatures. For investigation purposes, two types of plastic substrate and films have been used. Laminate strength has been tested (CMYK to establish the impact of colours on the strength of laminate. The paper compares inks supplied by two different producers. The colour characteristics of CIE L*a*b* space before and after the lamination process have been found. According to lamination strength and characteristics of the colours, the most suitable inks, temperature and films have been chosen.

  20. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  1. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  2. Probabilities in the Card Game of Three Cards

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...

  3. Dual Credit Report

    Science.gov (United States)

    Light, Noreen

    2016-01-01

    In 2015, legislation to improve access to dual-credit programs and to reduce disparities in access and completion--particularly for low income and underrepresented students--was enacted. The new law focused on expanding access to College in the High School but acknowledged issues in other dual-credit programs and reinforced the notion that cost…

  4. Credit Risk Research

    DEFF Research Database (Denmark)

    Zamore, Stephen; Ohene Djan, Kwame; Alon, Ilan

    2018-01-01

    This article provides a comprehensive review of scholarly research on credit risk measurement during the last 57 years applying bibliometric citation analysis and elaborates an agenda for future research. The bibliography is compiled using the Institute for Scientific Information (ISI) Web...... of Science (WOS) database and includes all articles with citations over the period 1960–2016. Specifically, the review is carried out using 1695 articles across 72 countries published in 442 journals by 2928 authors. The findings suggest that credit risk research is multifaceted and can be classified...... into six streams: (1) defaultable security pricing, (2) default intensity modeling, (3) comparative analysis of credit models, (4) comparative analysis of credit markets, (5) credit default swap (CDS) pricing, and (6) loan loss provisions. The article contributes through synthesizing and identifying...

  5. Are anonymous evaluations a better assessment of faculty teaching performance? A comparative analysis of open and anonymous evaluation processes.

    Science.gov (United States)

    Afonso, Nelia M; Cardozo, Lavoisier J; Mascarenhas, Oswald A J; Aranha, Anil N F; Shah, Chirag

    2005-01-01

    We compared teaching performance of medical school faculty using anonymous evaluations and open evaluations (in which the evaluator was not anonymous) and examined barriers to open evaluation. Residents and medical students evaluated faculty using an open evaluation instrument in which their identity was indicated in the evaluation. Following this, they completed anonymous evaluation on the same faculty members. Aggregate outcomes using the two evaluation systems were compared. Outcomes by group of evaluators (residents and students) were analyzed. Trainees were also asked to rate the barriers to the open evaluation process. A statistically significant difference between the open and anonymous evaluations was noted across all items, with faculty receiving lower scores on the anonymous evaluations. The mean score for all the items on the open evaluations was 4.45 +/- 0.65, compared to mean score of 4.07 +/- 0.80 on the anonymous evaluations. There was also a statistically significant difference between open and anonymous evaluations in five clinical teaching domains that were evaluated individually. Residents perceived that the three most common barriers to optimal evaluation were an apprehension of possible encounters with the same attending physician in the future, destruction of working relationships with the attending, and a feeling of frustration with the evaluation system. The evaluation of faculty teaching performance is complex. Most academic medical centers use the open evaluation format. This study supports the case for the use of the anonymous evaluation method as a more accurate reflection of teaching performance.

  6. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  7. It's All in the Cards.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  8. Smart Cards and remote entrusting

    Science.gov (United States)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  9. MANAGEMENT OF CREDIT LOSSES

    Directory of Open Access Journals (Sweden)

    Natalya P. Anoshkina

    2018-06-01

    Full Text Available The paper is devoted to the problem of credit loss management topical for modern Russian science and banking practice. The bank’s lending activity is an integral and the most profitable sphere of banking activity. Banks need to take credit risks inherent in their core business and minimize their impact through the establishment of advanced risk management systems. The study, reflected in the present paper, has been conducted in order to determine approaches to the organization of credit loss management in banking. Analysis of the system of management of credit risks and credit losses has shown that they have different scope, object and purpose. In this connection, there is an objective necessity to create a special subsystem for the management of credit losses in banks. On the basis of common bank approaches to credit risk management, the paper develops models of credit loss management: a multi-level management model in the area of ‘operational-tactical-strategic management’ and a functional management model in the area of ‘technology-execution-control’. These models are important for the modern theory and practice of banking, as they allow the bank to manage credit losses on the entire time horizon of the management process, thus opening a wide range of opportunities for the creation and implementation of large-scale programs, as well as specific techniques. This study allows drawing a conclusion about the need to consider control credit losses as a strictly regulated multi-level process, in which each division is assigned with specific objectives, tasks, functions, formally enshrined in the relevant lists, job descriptions and other legal documents.

  10. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  11. Fictional Marriage Proposal of Anonymous Astrakhan Khan

    Directory of Open Access Journals (Sweden)

    Roman Hautala

    2017-03-01

    Full Text Available The following text is reproduced from a handwritten copy of the letter made by the Italian humanist Gian Vincenzo Pinelli (1535–1601 and contained in one codex of Ambrosiana Library in Milan (R 104 sup., fol. 194r [see the description of the codex in: 3, no. 341. p. 125]. This codex (588 folios contains Italian and Latin texts of the 16th century of extremely diverse content, which does not allow to determe neither the name of the author of the reproduced letter, nor the date of its writing. Nevertheless, a reference to the name of “Luther” in the letter suggests that it must have been written in the 16th century and an indication of the main purpose of the letter – matchmaking to anonymous queen – makes it possible to put forward quite a bold (but, for now, unproven hypothesis that this letter might be addressed to approximates of the Polish Queen Bona Sforza and the widow of King Sigismund I the Old starting with the April 1, 1548. Following this hypothesis, the alleged author of the letter could be the ruler of Astrakhan Yamgurchi or the Crimean khan Sahib Giray. However, this assumption remains only a hypothesis, and the author of this article hopes that future researchers will be able to identify both the author of the letter and its recipients. Be that as it may, this letter is of undoubtedly fictitious character since it does not indicate the name of its author and the date of writing and obviously differs from official form of the Tatar rulers’ letters. Undoubtedly, this letter refers to the literary genre of fictional letters of the rulers, which became extremely popular in Europe since the second half of the 15th century. As an illustration of this genre, the author of this article presents a “letter” of the Turkish sultan to the Tatars and their “response” from the fictional collection of “Letters of the Great Turk” [1, fol. 18r] of Laudivius Hierosolymitanus, which was a relatively widespread in Europe in the

  12. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  13. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  14. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....

  15. Credit Risk Modeling

    DEFF Research Database (Denmark)

    Lando, David

    Credit risk is today one of the most intensely studied topics in quantitative finance. This book provides an introduction and overview for readers who seek an up-to-date reference to the central problems of the field and to the tools currently used to analyze them. The book is aimed at researchers...... and students in finance, at quantitative analysts in banks and other financial institutions, and at regulators interested in the modeling aspects of credit risk. David Lando considers the two broad approaches to credit risk analysis: that based on classical option pricing models on the one hand...

  16. Credit risk management in banks

    OpenAIRE

    Pětníková, Tereza

    2014-01-01

    The subject of this diploma thesis is managing credit risk in banks, as the most significant risk faced by banks. The aim of this work is to define the basic techniques, tools and methods that are used by banks to manage credit risk. The first part of this work focuses on defining these procedures and describes the entire process of credit risk management, from the definition of credit risk, describing credit strategy and policy, organizational structure, defining the most used credit risk mi...

  17. Credit derivatives in emerging markets

    OpenAIRE

    Romain Rancière

    2002-01-01

    Credit Derivatives are securities that offer protection against credit or default risk of bonds or loans. The credit derivatives emerging market has grown rapidly and credit derivatives are widely used. This paper describes the emerging credit derivatives market structure. The current market activity is analyzed through elementary pricing dynamics and the study of the term structure of default risk. Focusing on the performance of credit derivatives in stress situation, including legal and mar...

  18. Digitizing Olin Eggen's Card Database

    Science.gov (United States)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  19. Public Service? Tax Credits?

    Science.gov (United States)

    Shanker, Albert

    1982-01-01

    Acknowledges the good work of private schools but resists the provision of further direct or indirect government aid to these schools. Argues that tax credits will adversely affect public education and American society. (Author/WD)

  20. Burnup credit in Spain

    International Nuclear Information System (INIS)

    Conde, J.M.; Recio, M.

    2001-01-01

    The status of development of burnup credit for criticality safety analyses in Spain is described in this paper. Ongoing activities in the country in this field, both national and international, are resumed. Burnup credit is currently being applied to wet storage of PWR fuel, and credit to integral burnable absorbers is given for BWR fuel storage. It is envisaged to apply burnup credit techniques to the new generation of transport casks now in the design phase. The analysis methodologies submitted for the analyses of PWR and BWR fuel wet storage are outlined. Analytical activities in the country are described, as well as international collaborations in this field. Perspectives for future research and development of new applications are finally resumed. (author)

  1. The c-cards game

    DEFF Research Database (Denmark)

    Valente, Andrea

    2005-01-01

    C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....

  2. Using a transactor/revolver scorecard to make credit and pricing decisions

    OpenAIRE

    So, M.C.; Thomas, L.C.; Seow, H-V; Mues, C.

    2014-01-01

    In consumer lending the traditional approach is to develop a credit scorecard which ranks borrowers according to their risk of defaulting. Bads have a high risk of default and Goods have a low risk. To maximise the profitability of credit card customers, a second classification between revolvers and transactors becomes important. Building a transactor/revolver scorecard together with a Good/Bad scorecard over the revolvers, gives rise to a risk decision system whose ranking of risk is compara...

  3. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  4. Property-Based Anonymous Attestation in Trusted Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhen-Hu Ning

    2014-01-01

    Full Text Available In the remote attestation on Trusted Computer (TC computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers.

  5. The Smart Card concept applied to access control

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  6. From EuCARD to EuCARD-2

    CERN Multimedia

    Chaudron, M

    2013-01-01

    The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2.   EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...

  7. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  8. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  9. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.

  10. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  11. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Human Resources Division; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: ­ a recent passport photo (with NAME and first name on the back) ­ the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.

  12. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2001-01-01

    Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  13. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  14. [Smart cards in health services].

    Science.gov (United States)

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.

  15. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    Science.gov (United States)

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  16. OPENING HOURS FOR CARDS OFFICE

    CERN Multimedia

    Human Resources Division

    2001-01-01

    Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.

  17. Card counting in continuous time

    OpenAIRE

    Andersson, Patrik

    2012-01-01

    We consider the problem of finding an optimal betting strategy for a house-banked casino card game that is played for several coups before reshuffling. The sampling without replacement makes it possible to take advantage of the changes in the expected value as the deck is depleted, making large bets when the game is advantageous. Using such a strategy, which is easy to implement, is known as card counting. We consider the case of a large number of decks, making an approximat...

  18. Play the European card

    International Nuclear Information System (INIS)

    Majewski, O.

    1999-01-01

    Dr. Otto Majewski, Chief Executive Officer of the Bayernwerk AG utility, in his capacity as Chairman of the European Nuclear Council pointed out at ENC 98 in Nice that national energy policies constituted a major danger to the use of nuclear power. At the same time, he indicated ways and means by which to evade that danger. The decisions taken in Sweden and in the Federal Republic of Germany to opt out of the use of nuclear power show that national energy policies can seriously jeopardize the use of nuclear power. Bayernwerk CEO Dr. Majewski urged nuclear power plant operators to counteract these tendencies by playing the European card. Nuclear power anyway was a classical topic of European cooperation which, in the past, had resulted in higher safety standards and in the development of the EPR. It should also be attempted, by working on European institutions, to strengthen the use of nuclear power, even on a national level. He invoked economic arguments against nuclear opponents, especially the preservation of competitiveness by means of lower electricity prices, and arguments of climate protection. (orig.) [de

  19. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  20. CREDIT Performance Indicator Framework

    DEFF Research Database (Denmark)

    Frandsen, Anne Kathrine; Bertelsen, Niels Haldor; Haugbølle, Kim

    2010-01-01

    During the past two years the Nordic Baltic research project CREDIT (Construction and Real Estate – Developing Indicators for Transparency) has worked with the aim to improve transparency of value creation in building and real estate. One of the central deliverables of the CREDIT project was a fr......During the past two years the Nordic Baltic research project CREDIT (Construction and Real Estate – Developing Indicators for Transparency) has worked with the aim to improve transparency of value creation in building and real estate. One of the central deliverables of the CREDIT project...... was a framework of indicators relevant in building and real estate and applicable in the Nordic and Baltic countries as well as a proposal for a set of key indicators. The study resulting in CREDIT Performance Indicator Framework has been based on 28 case studies of evaluation practises in the building and real...... estate sector each addressing three interlinked levels: building/ projects level, company or enterprise level and benchmarking system level. Additionally it has been based on dialogue with researchers and professional organisation, international research and standardisation work and national building...

  1. Latinos in the Credit Economy

    OpenAIRE

    Ralph, Lisa M.

    2010-01-01

    Access to consumer credit as a means of building wealth is one of the least examined forms of social inequality. The recent economic crisis in the United States has brought attention to the significance of consumer credit in our nation's economy; however, less understood are the specific obstacles and barriers that prevent low-income individuals from reaching the "American Dream." In an exploratory manner, this study compared credit access, credit literacy, and credit experience of low-income...

  2. Credit derivatives and risk management

    OpenAIRE

    Michael S. Gibson

    2007-01-01

    The striking growth of credit derivatives suggests that market participants find them to be useful tools for risk management. I illustrate the value of credit derivatives with three examples. A commercial bank can use credit derivatives to manage the risk of its loan portfolio. An investment bank can use credit derivatives to manage the risks it incurs when underwriting securities. An investor, such as an insurance company, asset manager, or hedge fund, can use credit derivatives to align its...

  3. Models of Credit Risk Measurement

    OpenAIRE

    Hagiu Alina

    2011-01-01

    Credit risk is defined as that risk of financial loss caused by failure by the counterparty. According to statistics, for financial institutions, credit risk is much important than market risk, reduced diversification of the credit risk is the main cause of bank failures. Just recently, the banking industry began to measure credit risk in the context of a portfolio along with the development of risk management started with models value at risk (VAR). Once measured, credit risk can be diversif...

  4. Credit. 1991-92 NCCE/AT&T Projects. Consumer Education Programs.

    Science.gov (United States)

    Eastern Michigan Univ., Ypsilanti. National Inst. for Consumer Education.

    Summaries are provided of 37 projects that address the credit education and information needs of consumers. The projects are supported by AT&T Universal Card Services Corp. through a fund managed by the National Coalition for Consumer Education. Each summary provides a project description, grant recipient, and address/telephone number. The…

  5. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  6. The Effects of Perceived Anonymity on Altruistic Punishment

    Directory of Open Access Journals (Sweden)

    Jared Piazza

    2008-07-01

    Full Text Available Previous studies investigating altruistic punishment have confounded the effects of two independent variables: information transmission (or breach of privacy and personal identification (or breach of anonymity. Here we report findings from a brief study in which participants were asked to respond to a social norm violation (i.e., an anonymous actor had behaved selfishly in an economic game by deciding whether to sacrifice their own endowment to punish this person. A third of the participants were told that their economic decisions would be made known to another player but could not be identified (privacy breach condition, whereas another third were informed that their decision as well as their names would be made known (anonymity breach condition. (The decisions of control participants were completely anonymous and private. Participants also justified their economic decisions and reported their emotional experiences. The results were participants punished most in the privacy and anonymity breach conditions and least in the control condition. These findings have implications for existing evolutionary accounts of altruistic punishment.

  7. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  8. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  9. Hoarding and community in Star Wars Card Trader

    Directory of Open Access Journals (Sweden)

    Jeremy Groskopf

    2016-09-01

    Full Text Available Transitioning collectibles from the physical to the digital sphere changes the culture of collecting by increasing the accessibility of trading partners and adding digital limitations on personal interaction. In this analysis, I examine the collecting game Star Wars Card Trader (2015 and its culture of mass hoarding—the collecting of vast quantities of a single, valueless digital object—through which players reintroduce elements of personality, camaraderie, and nonrivalrous collecting into a system designed primarily for anonymous profitable acquisition. Via an analysis of player behaviors both within the game itself and in online venues, I argue that mass hoarding—a user invention—acts as the central community-building behavior in this digital realm. Mass hoarding is thus a clear indication that even in the digital realm, human personalities and relationships are vital to the construction of collecting as a pastime that is more complex than an investment opportunity.

  10. Recommendations for Alternative Credit.

    Science.gov (United States)

    Lenderman, Ed; And Others

    Following a review of the mathematics topics taught in accounting, electronics, auto, food and clothing, and metals courses at Linn-Benton Community College, Albany, Oregon, recommendations were made to grant one semester of mathematics credit for completing a two-year sequence of these courses. The other required semester of mathematics should be…

  11. Earned Income Tax Credit

    NARCIS (Netherlands)

    F.M. van Oers; R.A. de Mooij (Ruud)

    1998-01-01

    textabstractIn recent policy discussions in the Netherlands, the Earned Income Tax Credit (EITC) has been put forward as an effective instrument to reduce the unemployment rate among low-skilled workers. Using the MIMIC model, this article shows that a targeted EITC at low incomes indeed seems

  12. Waiting for tax credits

    International Nuclear Information System (INIS)

    Sheinkopf, K.

    1992-01-01

    This article examines the effect of tax credits and related legislation under consideration by Congress on the economics of the renewable energy industry. The topics discussed in the article include conflicting industry opinion on financial incentives, the effectiveness of current incentives, and alternative approaches. The article also includes a sidebar on tax incentives offered by state programs

  13. Using anonymized reflection to teach ethics: a pilot study.

    Science.gov (United States)

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  14. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  15. Enabling genomic-phenomic association discovery without sacrificing anonymity.

    Directory of Open Access Journals (Sweden)

    Raymond D Heatherly

    Full Text Available Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data.

  16. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  17. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  18. Passive microfluidic array card and reader

    Science.gov (United States)

    Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  19. Java Card for PayTv Application

    OpenAIRE

    Dutta, Pallab

    2013-01-01

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...

  20. Effectiveness of monetary and macroprudential shocks on consumer credit growth and volatility in Turkey

    Directory of Open Access Journals (Sweden)

    Meltem Gulenay Chadwick

    2018-06-01

    Full Text Available This paper proposes a panel VAR model to uncover the effect of monetary policy and macroprudential tightening probability on general purpose loans, housing loans, vehicle loans, credit cards and their respective volatilities in Turkey. To conduct our analysis, first, we compare a number of stochastic volatility models using our loan and credit card series in a formal Bayesian model comparison exercise, in order to determine the best volatility model for our series. Second we disclose the latent probability of macroprudential tightening from the binary information of policy episodes, using an instrumental variable probit model estimated by conditional maximum likelihood with heteroscedasticity robust standard errors. Lastly we estimate the dynamic impact of monetary policy and macroprudential measures using a panel VAR, incorporating the latent probability of tightening episodes, credit growth, industrial production growth, loan rates, inflation and credit growth volatilities into the endogenous system of equations. We conclude that macroprudential tightening is effective in dampening credit growth, credit growth volatility and reducing consumer price inflation. Besides, this effect is more prominent when macroprudential tools are administered in coordination with monetary policy. Keywords: Consumer loans, Monetary policy, Macroprudential policy, Stochastic volatility models, Credit growth volatility, IV probit model, Panel VAR model, JEL classification: C54, E44, E52

  1. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  2. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  3. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2000-01-01

    Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  4. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR DIVISION

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  5. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  6. Reminder: Swiss and French cards

    CERN Multimedia

    2012-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of personnel concerned that they are obliged to: • hold a valid Swiss  Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; • return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken towards the member of personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide. Users and Unpaid Associates must contact the Users Office HR Department Tel.: 729...

  7. Swiss and French cards - Reminder

    CERN Multimedia

    HR Department

    2011-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of the personnel concerned that they are obliged to: hold a valid Swiss Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken with respect to the member of the personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide: https://cern.ch/admin-eguide/cartes/proc_cartes_home.asp Users and Unpaid Associates must ...

  8. CO2 credit or energy credit in emission trading?

    International Nuclear Information System (INIS)

    Hu, E.

    2002-01-01

    Emission trading is a good concept and approach to tackle global warming. However, what ''currency'' or ''credit'' should be used in the trading has remained a debatable topic. This paper proposed an ''Energy Credit'' concept as an alternative to the ''CO 2 credit'' that is currently in place. From the thermodynamic point of view, the global warming problem is an ''energy balance'' problem. The energy credit concept is thought to be more thermodynamically correct and tackles the core of the global warming problem more directly. The Energy credit concept proposed can be defined as: the credit to offset the extra energy trapped/absorbed in the earth (and its atmosphere) due to the extra anthropogenic emission (or other activities) by a country or company. A couple of examples are given in the paper to demonstrate the concept of the Energy credit and its advantages over the CO 2 credit concept. (author)

  9. Introduction of Credit Derivatives and Valuation of Credit Default Swap

    OpenAIRE

    Han, Lu

    2006-01-01

    The credit derivative market was established at the beginning of the 1990s since the emergence of credit derivatives fits the rapid development of the whole derivatives market. However, compare to other derivative market, this market is still small and incomplete. As with other derivatives, credit derivatives can be used to either take more risk or hedge it, hence various credit derivatives instruments are accepted and widely used by market participants such as banks, insurance companies, etc...

  10. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    Science.gov (United States)

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  11. Calibration of TOB+ Thermometer's Cards

    CERN Document Server

    Banitt, Daniel

    2014-01-01

    Motivation - Under the new upgrade of the CMS detector the working temperature of the trackers had been reduced to -27 Celsius degrees. Though the thermal sensors themselves (Murata and Fenwal thermistors) are effective at these temperatures, the max1542 PLC (programmable logic controller) cards, interpreting the resistance of the thermal sensors into DC counts usable by the DCS (detector control system), are not designed for these temperatures in which the counts exceed their saturation and therefor had to be replaced. In my project I was in charge of handling the emplacement and calibration of the new PLC cards to the TOB (tracker outer barrel) control system.

  12. Consumer Handbook to Credit Protection Laws.

    Science.gov (United States)

    Board of Governors of the Federal Reserve System, Washington, DC.

    The five sections of this consumer handbook are The Cost of Credit, Applying for Credit, Credit Histories and Records, Correcting Credit Mistakes, and Complaining about Credit. Each section discusses relevant legislation: Truth in Lending, the Equal Credit Opportunity Act, and the Fair Credit Reporting Act. Topics discussed in section I include…

  13. Development Of The Drexler Optical-Card Reader/Writer System

    Science.gov (United States)

    Pierce, Gerald A.

    1988-06-01

    An optical-card reader/writer optical and electronic breadboard system, developed by SRI International under contract to Drexler Technology, is described. The optical card, which is the same size as a credit card, can contain more than 2 megabytes of digital user data, which may also include preformatted tracking information and preformatted data. The data layout on the card is similar to that on a floppy disk, with each track containing a header and clocking information. The design of this optical reader/writer system for optical cards is explained. Design of the optical card system entails a number of unique issues: To accommodate both laser-recorded and mass-duplicated information, the system must be compatible with preencoded information, which implies a larger-than-normal spot size (5 gm) and a detection system that can read both types of optical patterns. Cost-reduction considerations led to selection of a birefringent protection layer, which dictated a nonstandard optical system. The non-polarization-sensitive optics use an off-axis approach to detection. An LED illumination system makes it possible to read multiple tracks.

  14. NCDC Punched Card Inventory - 1950s

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...

  15. One-Card Programs Boast Endless Options.

    Science.gov (United States)

    Pearcey, Kevin

    2003-01-01

    Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)

  16. Dynamic Diversification in Corporate Credit

    DEFF Research Database (Denmark)

    Christoffersen, Peter; Jacobs, Kris; Jin, Xisong

    We characterize diversification in corporate credit using a new class of dynamic copula models which can capture dynamic dependence and asymmetry in large samples of firms. We also document important differences between credit spread and equity return dependence dynamics. Modeling a decade...... the crisis and remain high as well. The most important shocks to credit dependence occur in August of 2007 and in August of 2011, but interestingly these dates are not associated with significant changes to median credit spreads....

  17. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  18. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  19. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  20. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  1. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  2. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  3. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  4. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  5. The Efficacy of Non-Anonymous Measures of Bullying

    Science.gov (United States)

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  6. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel; Zhao, Keliang; Papadias, Dimitris; Kalnis, Panos

    2010-01-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  7. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  8. Forming Circle Formations of Anonymous Mobile Agents With Order Preservation

    NARCIS (Netherlands)

    Wang, Chen; Xie, Guangming; Cao, Ming

    2013-01-01

    We propose distributed control laws for a group of anonymous mobile agents to form desired circle formations when the agents move in the one-dimensional space of a circle. The agents are modeled by kinematic points. They share the common knowledge of the orientation of the circle, but are oblivious

  9. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    Science.gov (United States)

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  10. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  11. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  12. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  13. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  14. Main components of business cards design

    Directory of Open Access Journals (Sweden)

    Ю. В. Романенкова

    2003-03-01

    Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated

  15. Are carbon credits effective?

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    Is it possible to reduce greenhouse gas emissions by assigning a value to CO 2 ? That's the concept behind carbon credits. Their advantage: they set targets but let companies decide how to meet them. Of all the processes that can be used to reduce air pollution, the cap and trade system is the best way to meet global targets on a national or continental scale. The system's efficiency is based on setting a ceiling for emissions: this is the cap. The emissions quotas are negotiable goods that can be traded on a market: this is the 'trade'. No company can exceed its quotas, but it can choose how to meet them: decreasing its emissions by changing its production processes, buying carbon credits sold by companies that have exceeded their targets, or using clean development mechanisms. For a carbon credit system to function correctly on an economic level, it's essential to meet one condition: don't allocate too many emissions quotas to the companies involved. If they receive too many quotas, it's not hard for them to meet their objectives without changing their production processes. The supply of carbon credits currently exceeds demand. The price per ton of CO 2 is collapsing, and companies that have exceeded their targets are not rewarded for their efforts. Efficient though it may be, the cap and trade system cannot be the only way to fight CO 2 emissions. In Europe, it presently covers 40% of the CO 2 emissions by targeting utilities and industries that consume the most fossil fuels. But it cannot be extended to some sectors where pollution is diffuse. In transportation, for example, it's not possible to impose such a requirement. For that sector, as well as for the building sector, a suitable system of taxes might be effective and incentive

  16. The African Credit Trap

    OpenAIRE

    Svetlana Andrianova; Badi H. Baltagi; Panicos O. Demetriades; David Fielding

    2010-01-01

    We put forward a plausible explanation of African financial underdevelopment in the form of a bad credit market equilibrium. Utilising an appropriately modified IO model of banking, we show that the root of the problem could be unchecked moral hazard (strategic loan defaults) or adverse selection (a lack of good projects). We provide empirical evidence from a large panel of African banks which suggests that loan defaults are a major factor inhibiting bank lending when the quality of regulatio...

  17. Credit scoring methods

    Czech Academy of Sciences Publication Activity Database

    Vojtek, Martin; Kočenda, Evžen

    2006-01-01

    Roč. 56, 3-4 (2006), s. 152-167 ISSN 0015-1920 R&D Projects: GA ČR GA402/05/0931 Institutional research plan: CEZ:AV0Z70850503 Keywords : banking sector * credit scoring * discrimination analysis Subject RIV: AH - Economics Impact factor: 0.190, year: 2006 http://journal.fsv.cuni.cz/storage/1050_s_152_167.pdf

  18. Intertemporal consumption and credit constraints

    DEFF Research Database (Denmark)

    Leth-Petersen, Søren

    2010-01-01

    There is continuing controversy over the importance of credit constraints. This paper investigates whether total household expenditure and debt is affected by an exogenous increase in access to credit provided by a credit market reform that enabled Danish house owners to use housing equity...

  19. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  20. Palmistry, tarot cards, and psychotherapy.

    Science.gov (United States)

    Pejic, Nicholas G

    2008-01-01

    The author summarizes his experience with palm and Tarot card readers in New Orleans. The history, practice, and psychodynamics of palmistry and Tarot are explored. It's postulated that these practices are forms of archaic psychotherapy, which employ supportive treatment and placebo. These tactics are used to elicit hope for its clients.

  1. Towards an open sound card

    DEFF Research Database (Denmark)

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    The architecture of a sound card can, in simple terms, be described as an electronic board containing a digital bus interface hardware, and analog-to-digital (A/D) and digital-to-analog (D/A) converters; then, a soundcard driver software on a personal computer's (PC) operating system (OS) can con...

  2. Comparing Candidate Hospital Report Cards

    Energy Technology Data Exchange (ETDEWEB)

    Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.

    1997-12-31

    We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.

  3. Engineering software development with HyperCard

    Science.gov (United States)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  4. Helping Students Design HyperCard Stacks.

    Science.gov (United States)

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  5. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  6. Credit-proofing fundamentals for a solid credit policy

    Energy Technology Data Exchange (ETDEWEB)

    Lydiatt, I. [KeySpan Energy Canada, Calgary, AB (Canada)

    2003-07-01

    This Power Point presentation presented the basics of a credit policy with reference to corporate objectives, governance, credit definitions, subjective/objective elements, quantification of full risk, management, monitoring, reporting and gate-keeping processes. Options for a credit policy were described as being approval authority grids, confidentiality issues, credit scoring, corporate risk levels, follow-up collection calling, and procedures on unapproved exposures. Recommendations for setting risk and credit limits were also presented with a note emphasizing that in the past 6 months credit evaluation processes have had to deal with the media risk, a new risk that has not been seen before. This risk can be addressed by careful monitoring of stock prices. The paper also presented recommendations for what to look for as indicators and how to deal with risk in volatile price periods. Credit tools for volatile times were described. 1 tab.

  7. Credit-proofing fundamentals for a solid credit policy

    International Nuclear Information System (INIS)

    Lydiatt, I.

    2003-01-01

    This Power Point presentation presented the basics of a credit policy with reference to corporate objectives, governance, credit definitions, subjective/objective elements, quantification of full risk, management, monitoring, reporting and gate-keeping processes. Options for a credit policy were described as being approval authority grids, confidentiality issues, credit scoring, corporate risk levels, follow-up collection calling, and procedures on unapproved exposures. Recommendations for setting risk and credit limits were also presented with a note emphasizing that in the past 6 months credit evaluation processes have had to deal with the media risk, a new risk that has not been seen before. This risk can be addressed by careful monitoring of stock prices. The paper also presented recommendations for what to look for as indicators and how to deal with risk in volatile price periods. Credit tools for volatile times were described. 1 tab

  8. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  9. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  10. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  11. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  12. Value of credit bureau reports

    Directory of Open Access Journals (Sweden)

    Brković Milan

    2017-01-01

    Full Text Available An efficient system of credit information sharing contributes to solving the problem of information asymmetry on the credit and financial markets in general. The consequences of the global economic and financial crisis revealed an increasing demand for reliable information and data which could close the existing gap in their insufficiency, misuse or inadequate analytical value for the economic and financial policy makers. In that sense, more attention is directed to the usefulness of credit information sharing and the practical value of information and data contained in credit bureau reports for the purposes of achieving the overall economic policy goals. The fulfillment of that role depends mostly on the credit information sharing system and its characteristics, participants, and procedures. A credit bureau report in the best possible manner reflects all advantages and disadvantages of the established credit information exchange system in terms of its analytical value for the purposes of efficient macroeconomic and macrofinancial policies.

  13. Circuit card failures and industry mitigation strategy

    Energy Technology Data Exchange (ETDEWEB)

    Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)

    2012-07-01

    In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)

  14. Signal processing for smart cards

    Science.gov (United States)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight

  15. Credit Rating and Competition

    OpenAIRE

    Nelson Camanho; Pragyan Deb; Zijun Liu

    2010-01-01

    In principle, credit rating agencies are supposed to be impartial observers that bridge the gap between private information of issuers and the information available to the wider pool of investors. However, since the 1970s, rating agencies have relied on an issuer-pay model, creating a conflict of interest the largest source of income for the rating agencies are the fees paid by the issuers the rating agencies are supposed to impartially rate. In this paper, we explore the trade-off between re...

  16. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  17. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  18. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  19. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  20. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  1. Quality of urban forest carbon credits

    Science.gov (United States)

    Neelam C. Poudyala; Jacek P. Siry; J.M. Bowker

    2011-01-01

    While the urban forest is considered an eligible source of carbon offset credits, little is known about its market potential and the quality aspects of the credits. As credit suppliers increase in number and credit buyers become more interested in purchasing carbon credits, it is unclear whether and how urban forest carbon credits can perform relative to the other...

  2. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  3. Taxonomy for and Analysis of Anonymous Communications Networks

    Science.gov (United States)

    2009-03-01

    degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of...a means of communication and information dissemination, concerns about Internet privacy and security are escalating. In 1980’s, Chaum began work...variety of different systems including the T9000 Transputer AFIT/DCS/ENG/09-08 - 123 - [Bar95] and a secure ecommerce system [HaC02]. Anonymity

  4. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  5. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  6. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  7. Informed Traders as Liquidity Providers: Anonymity, Liquidity and Price Formation

    OpenAIRE

    Barbara Rindi

    2008-01-01

    The tendency to introduce anonymity into financial markets apparently runs counter to the theory supporting transparency. This paper studies the impact of pre-trade transparency on liquidity in a market where risk-averse traders accommodate the liquidity demand of noise traders. When some risk-averse investors become informed, an adverse selection problem ensues for the others, making them reluctant to supply liquidity. Hence the disclosure of traders' identities improves liquidity by mitigat...

  8. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    attack is also similar to those that rely on misbehaving receivers and optimistic ACKs to bypass flow control protocol mechanisms [40]–[42]. In particular...thank the anonymous reviewers for their feedback and suggestions, Damon McCoy for discussions about misbehaving receivers and authenticated signals...ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR

  9. Sustainability Cards: Design for Longevity

    DEFF Research Database (Denmark)

    Hasling, Karen Marie; Ræbild, Ulla

    2017-01-01

    Product longevity is considered widely as a relevant strategic approach, amongst many, within the field of sustainability. Yet, how to design for increased product lifetime may not be so obvious for practitioners. The complexity of the surrounding issues can constitute a barrier for designers...... for designers and other stakeholders in the design process. The paper is based on a developmental project carried out in the Autumn 2017, within a larger research and collaboration project between raw fur manufacturer Kopenhagen Fur and Design School Kolding investigating sustainability perspectives. The paper...... describes the development of a deck of sustainability cards aiming for product longevity and presents the final deck. Furthermore, the paper contributes with insights on how designers may apply design cards in the design process and how this practice can further sustainable considerations and strategies...

  10. Review of sound card photogates

    International Nuclear Information System (INIS)

    Gingl, Zoltan; Mingesz, Robert; Mellar, Janos; Makra, Peter

    2011-01-01

    Photogates are probably the most commonly used electronic instruments to aid experiments in the field of mechanics. Although they are offered by many manufacturers, they can be too expensive to be widely used in all classrooms, in multiple experiments or even at home experimentation. Today all computers have a sound card - an interface for analogue signals. It is possible to make very simple yet highly accurate photogates for cents, while much more sophisticated solutions are also available at a still very low cost. In our paper we show several experimentally tested ways of implementing sound card photogates in detail, and we also provide full-featured, free, open-source photogate software as a much more efficient experimentation tool than the usually used sound recording programs. Further information is provided on a dedicated web page, www.noise.physx.u-szeged.hu/edudev.

  11. Credit scoring for individuals

    Directory of Open Access Journals (Sweden)

    Maria DIMITRIU

    2010-12-01

    Full Text Available Lending money to different borrowers is profitable, but risky. The profits come from the interest rate and the fees earned on the loans. Banks do not want to make loans to borrowers who cannot repay them. Even if the banks do not intend to make bad loans, over time, some of them can become bad. For instance, as a result of the recent financial crisis, the capability of many borrowers to repay their loans were affected, many of them being on default. That’s why is important for the bank to monitor the loans. The purpose of this paper is to focus on credit scoring main issues. As a consequence of this, we presented in this paper the scoring model of an important Romanian Bank. Based on this credit scoring model and taking into account the last lending requirements of the National Bank of Romania, we developed an assessment tool, in Excel, for retail loans which is presented in the case study.

  12. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  13. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  14. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  15. The influence of anonymous peers on prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Soowon Park

    Full Text Available Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged.The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns via an experimental approach. The effects of indirect peer influence (IP and direct peer influence (DP on college students' prosocial behavior were examined.A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP and confederates' prosocial behavior (DP were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior.Prosocial behavior of anonymous peers (confederates exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior.This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  16. Utility-preserving transaction data anonymization with low information loss.

    Science.gov (United States)

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  17. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  18. The influence of anonymous peers on prosocial behavior

    Science.gov (United States)

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  19. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    Science.gov (United States)

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  20. Valutazione economica dello studio CARDS

    Directory of Open Access Journals (Sweden)

    Simona de Portu

    2007-10-01

    Full Text Available Introduction: cardiovascular diseases (CVD are the major component of premature mortality, generate disability and are a relevant source of cost. The growing incidence of CVD is associated with lifestyle and other modifiable risk factors. Prevention and preclinical detection of CVD reduce morbidity and mortality. Type 2 diabetes is associated with a substantially increased risk of cardiovascular disease. Objective: the aim of the study was to evaluate the health economic consequence of medical therapy with atorvastatin for primary prevention of major cardiovascular events in patients with type 2 diabetes in Italy. Materials and method: in order to reach our objective we drew clinical information from the CARDS study. This economic evaluation was carried out conducting a cost/effectiveness analysis from the perspective of National Health Service (NHS. The analysis was applied to a time horizon in conformity with the observational period adopted in the CARDS study (3.9 years. An incremental cost/effectiveness ratio (ICER was calculated and is expressed as cost per life years gained (LYG. In order to test the robustness of the results, a one-way sensitivity analysis was performed. Results: the total cost of atorvastatin therapy over 3.9 years amounts to around 1.5 million of euros per 1,000 patients. The total cost of adding atorvastatin to standard care in people treated for primary prevention of major cardiovascular events in type 2 diabetes as those involved in the CARDS study would entail an additional cost of about 1,2 million of euros per 1,000 patients treated per 3.9 years, with an incremental cost/effectiveness ratio (ICER equivalent to 36,566 euros per patient per LYG. Discussion: the current study is the first economic evaluation of CARDS study to the Italian situation. The results of the current study show that hypolipemic therapy with atorvastatin 10 mg in diabetic individuals is to be considered cost effective.

  1. [Application of patient card technology to health care].

    Science.gov (United States)

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  2. Rh-flash acquisition card

    International Nuclear Information System (INIS)

    Bourrion, O.

    2003-01-01

    The rh-flash card main purpose is to convert and store the image of the analog data present at input into an output buffer, namely in a given timing window besides a stop signal (like a digital oscilloscope). It is conceived in VME format 1U wide with an additional connector. Novelty of this card is its ability to sample at a high frequency, due to flash coders, and this at a high repetition rate. To do that the card allows the storage of the data considered 'useful' and that is done by storing only the data exceeding a certain threshold. This can be useful for instance for viewing peaks in a spectrum, and obtaining their relative location. The goal is to stock and process the data sampled before and after the arrival of a stop signal (what entails a storage depth). A threshold is defined and any peak exceeding its level will really be stored in the output buffer which is readable through the VME bus. The peak values will be stored as well as m preceding and n subsequent values (both programmable). Obviously, if the threshold is zero the system of data processing is off and all data will be stored. The document is structured on six sections titled: 1. Description; 2. Specifications; 3. Explaining the design of channels; 4. Explaining the shared part of the design; 5. Addressing (→ user guide); 6. Software precautions. (author)

  3. Feocromocitoma cardíaco

    Directory of Open Access Journals (Sweden)

    Gustavo L. Knop

    2006-01-01

    Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.

  4. Permit trading and credit trading

    DEFF Research Database (Denmark)

    Boom, Jan-Tjeerd; R. Dijstra, Bouwe

    This paper compares emissions trading based on a cap on total emissions (permit trading) and on relative standards per unit of output (credit trading). Two types of market structure are considered: perfect competition and Cournot oligopoly. We find that output, abatement costs and the number...... of firms are higher under credit trading. Allowing trade between permit-trading and credit-trading sectors may increase in welfare. With perfect competition, permit trading always leads to higher welfare than credit trading. With imperfect competition, credit trading may outperform permit trading....... Environmental policy can lead to exit, but also to entry of firms. Entry and exit have a profound impact on the performance of the schemes, especially under imperfect competition. We find that it may be impossible to implement certain levels of total industry emissions. Under credit trading several levels...

  5. 76 FR 66872 - International Services Surveys: Amendments to the BE-150, Quarterly Survey of Cross-Border Credit...

    Science.gov (United States)

    2011-10-28

    ... Economic Analysis (BEA), U.S. Department of Commerce, would conduct the survey under the International... DEPARTMENT OF COMMERCE Bureau of Economic Analysis 15 CFR Part 801 [Docket No. 110817508-1529-01...-Border Credit, Debit, and Charge Card Transactions AGENCY: Bureau of Economic Analysis, Commerce. ACTION...

  6. Card Product Use and Perception of Marketing Communication by Card Issuers among Students

    Directory of Open Access Journals (Sweden)

    Đurđana Ozretić Došen

    2011-06-01

    Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.

  7. Concurrent credit portfolio losses.

    Science.gov (United States)

    Sicking, Joachim; Guhr, Thomas; Schäfer, Rudi

    2018-01-01

    We consider the problem of concurrent portfolio losses in two non-overlapping credit portfolios. In order to explore the full statistical dependence structure of such portfolio losses, we estimate their empirical pairwise copulas. Instead of a Gaussian dependence, we typically find a strong asymmetry in the copulas. Concurrent large portfolio losses are much more likely than small ones. Studying the dependences of these losses as a function of portfolio size, we moreover reveal that not only large portfolios of thousands of contracts, but also medium-sized and small ones with only a few dozens of contracts exhibit notable portfolio loss correlations. Anticipated idiosyncratic effects turn out to be negligible. These are troublesome insights not only for investors in structured fixed-income products, but particularly for the stability of the financial sector. JEL codes: C32, F34, G21, G32, H81.

  8. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  9. Value Chain Flexibility with RFID: A Case Study of the Octopus Card

    Directory of Open Access Journals (Sweden)

    Lam Tak Ming

    2011-02-01

    Full Text Available Octopus cards are an electronic payment system based on a wireless RFID technology developed in Hong Kong. Users simply hold their contactless smartcards over an electronic reader, and the payment is deducted from the card automatically. If users link their cards to their credit card to upload money, there is no cash transaction involved. Launched in 1997, Octopus cards are the world’s most widely accepted contactless RFID electronic payment system. The system generates value for customers, service providers, and societies.This article makes a theoretical and applied contribution to our understanding of strategic information systems. It adopts and modifies Porter’s value chain and develops value‐chain flexibility as a theoretical framework to analyze the Octopus card system. The fast and dramatic changes in customer needs, business competition, and technological innovation are creating an urgent need for flexibility throughout the whole value chain. By looking at order fulfillment as a process, the shop outlet—either online or offline—is only part of the entire flow from customer enquiry to customer receipt. It is clear that no single idea could significantly reduce customer lead time. Only a total effort from organizations to increase flexibility and eliminate bottlenecks can make the kind of difference needed to compete (Day, 1994; Blackburn, 1991; Yusuf, Sarhadi, & Gunasekran, 1999. Therefore, value chain flexibility must be broadly defined, and it should be applied in the service industry. In other words, organizations should be able to deal with the uncertainty along the value chain to meet customer demands. This framework analyzes how the Octopus card system creates value and, in doing so, identifies key implications for customers, service providers, and society

  10. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  11. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    Science.gov (United States)

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  12. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  13. Augmenting C-cards with music actions

    DEFF Research Database (Denmark)

    Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine

    2006-01-01

    The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....

  14. C-cards in Music Education

    DEFF Research Database (Denmark)

    Valente, Andrea; Lyon, Kirstin Catherine

    2005-01-01

    Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....

  15. Why do card issuers charge proportional fees?

    OpenAIRE

    Oz Shy; Zhu Wang

    2008-01-01

    This paper explains why payment card companies charge consumers and merchants fees which are proportional to the transaction values instead of charging a fixed per-transaction fee. Our theory shows that, even in the absence of any cost considerations, card companies earn much higher profit when they charge proportional fees. It is also shown that competition among merchants reduces card companies' gains from using proportional fees relative to a fixed per-transaction fee. Merchants are found ...

  16. Prepaid cards: vulnerable to money laundering?

    OpenAIRE

    Stanley J. Sienkiewicz

    2007-01-01

    This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...

  17. Falla cardíaca (primera parte)

    OpenAIRE

    Flórez Alarcón, Noel Alberto; Fundación Valle de Lili

    2006-01-01

    Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?

  18. Credit concession through credit scoring: Analysis and application proposal

    Directory of Open Access Journals (Sweden)

    Oriol Amat

    2017-01-01

    Full Text Available Purpose: The study herein develops and tests a credit scoring model which can help financial institutions in assessing credit requests.  Design/methodology/approach: The empirical study has the objective of answering two questions: (1 Which ratios better discriminate the companies based on their being solvent or insolvent? and (2 What is the relative importance of these ratios? To do this, several statistical techniques with a multifactorial focus have been used (Multivariate Analysis of Variance, Linear Discriminant Analysis, Logit and Probit Models. Several samples of companies have been used in order to obtain and to test the model.  Findings: Through the application of several statistical techniques, the credit scoring model has been proved to be effective in discriminating between good and bad creditors.  Research limitations:  This study focuses on manufacturing, commercial and services companies of all sizes in Spain; Therefore, the conclusions may differ for other geographical locations. Practical implications:  Because credit is one of the main drivers of growth, a solid credit scoring model can help financial institutions assessing to whom to grant credit and to whom not to grant credit. Social implications: Because of the growing importance of credit for our society and the fear of granting it due to the latest financial turmoil, a solid credit scoring model can strengthen the trust toward the financial institutions assessment’s.  Originality/value: There is already a stream of literature related to credit scoring. However, this paper focuses on Spanish firms and proves the results of our model based on real data. The application of the model to detect the probability of default in loans is original.

  19. De-anonymizing Genomic Databases Using Phenotypic Traits

    Directory of Open Access Journals (Sweden)

    Humbert Mathias

    2015-06-01

    Full Text Available People increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.

  20. Credit demand in Mozambican manufacturing

    DEFF Research Database (Denmark)

    Byiers, Bruce; Rand, John; Tarp, Finn

    2010-01-01

    This paper uses two industrial firm surveys to identify the key determinants of credit demand in Mozambican manufacturing. We construct five different measures of being credit constrained and estimate desired debt demand. Besides firm size and ownership structure, we find evidence that general...

  1. Tuition Tax Credits. Issuegram 19.

    Science.gov (United States)

    Augenblick, John; McGuire, Kent

    Approaches for using the federal income tax system to aid families of pupils attending private schools include: tax credits, tax deductions, tax deferrals, and education savings incentives. Tax credit structures can be made refundable and made sensitive to taxpayers' income levels, the level of education expenditures, and designated costs.…

  2. Toronto Smog Summit Report Card

    International Nuclear Information System (INIS)

    2001-01-01

    This 'report card' provides a summary of actions taken, and progress achieved by the federal government, the provincial government and the City of Toronto, respectively, in response to various previous commitments regarding air quality, sustainable transportation, climate and atmospheric research, investing in green infrastructure (federal government), environmental assessment regulations, transboundary air pollution, improved monitoring and reporting regulations. Ratings also cover efforts in imposing emissions caps on the electric industry, emissions reduction trading system, toll-free public air pollution hotline, regulation of ozone depleting substances (provincial government), public education campaign on smog reduction, energy efficiency initiatives, corporate smog alert response plan, and a number of other environmental issues (City of Toronto)

  3. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  4. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    Digital tools of research dissemination make scholarly publications accessible to the public at large through simple search engines. As a result, the users that we study, interview, and cite may be at risk of exposure to unwelcome types of scrutiny and scholars must grapple with challenges...... to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  5. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  6. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  7. Java Card: An analysis of the most successful smart card operating system

    NARCIS (Netherlands)

    de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter

    2005-01-01

    To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features

  8. Implementing the Payment Card Industry (PCI Data Security Standard (DSS

    Directory of Open Access Journals (Sweden)

    John O' Raw

    2011-08-01

    Full Text Available Underpinned by the rise in online criminality, the payment card industry (PCI data security standards (DSS were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP can be applied to meet the requirement of masking the primary account number (PAN. Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.

  9. 12 CFR 703.6 - Credit analysis.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Credit analysis. 703.6 Section 703.6 Banks and... ACTIVITIES § 703.6 Credit analysis. A Federal credit union must conduct and document a credit analysis on an... Federal Deposit Insurance Corporation. A Federal credit union must update this analysis at least annually...

  10. 7 CFR 4280.139 - Credit quality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Credit quality. 4280.139 Section 4280.139 Agriculture... Improvements Program Section B. Guaranteed Loans § 4280.139 Credit quality. The lender must determine credit quality and must address all of the elements of credit quality in a written credit analysis, including...

  11. The influence of sovereign credit ratings on corporate credit ratings.

    OpenAIRE

    Umutoni, Liliane

    2017-01-01

    Credit ratings have a key role in modern financial markets as they communicate crucial information on the creditworthiness of a debt issuer to investors and regulators. These credit ratings are mostly determined by three rating agencies, namely Standard & Poor’s, Moody’s and Fitch, even though, the credit rating industry counts a dozen of recognized rating agencies. Indeed, the three agencies have become the market leaders with a market share of 94.3% on the U.S market (Bloomberg, 2015) and 9...

  12. Wire Scanner Motion Control Card

    CERN Document Server

    Forde, S E

    2006-01-01

    Scientists require a certain beam quality produced by the accelerator rings at CERN. The discovery potential of LHC is given by the reachable luminosity at its interaction points. The luminosity is maximized by minimizing the beam size. Therefore an accurate beam size measurement is required for optimizing the luminosity. The wire scanner performs very accurate profile measurements, but as it can not be used at full intensity in the LHC ring, it is used for calibrating other profile monitors. As the current wire scanner system, which is used in the present CERN accelerators, has not been made for the required specification of the LHC, a new design of a wire scanner motion control card is part of the LHC wire scanner project. The main functions of this card are to control the wire scanner motion and to acquire the position of the wire. In case of further upgrades at a later stage, it is required to allow an easy update of the firmware, hence the programmable features of FPGAs will be used for this purpose. The...

  13. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  14. Smart Cards 101: Everything a Beginner Needs To Get Started.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  15. Real Communication through Interview and Conversation Cards

    Science.gov (United States)

    Bonin, Therese M.; Birckbichler, Diane W.

    1975-01-01

    A method for use in foreign language teaching which involves the use of conversation cards and interview cards is described. The method is intended to improve the ability of the student to communicate in the language and allow for greater individualization of instruction. (RM)

  16. Establishing a Successful Smart Card Program.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  17. Enhancing Students' Learning: Instant Feedback Cards

    Science.gov (United States)

    Mohrweis, Lawrence C.; Shinham, Kathe M.

    2015-01-01

    This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…

  18. Re-Designing Business Card Advertisements.

    Science.gov (United States)

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  19. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  20. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    OpenAIRE

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.