Michael Roland, Josef Langer and Rene Mayrhofer
The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and…
Abstract
Purpose
The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and debugging. Today, it is difficult for developers to get access to a near field communication (NFC)-secure element in current smartphones. Moreover, the security constraints of smartcards make in-circuit emulation and debugging of applications impractical. Therefore, an environment that emulates a secure element brings significant advantages for developers.
Design/methodology/approach
The authors' approach to such an environment is the emulation of Java Card applets on top of non-Java Card virtual machines (e.g. Android Dalvik VM), as this would facilitate the use of existing debugging tools. As the operation principle of the Java Card VM is based on persistent memory technology, the VM and applications running on top of it have a significantly different life cycle compared to other Java VMs. The authors evaluate these differences and their impact on Java VM-based Java Card emulation. They compare possible strategies to overcome the problems caused by these differences, propose a possible solution and create a prototypical implementation to verify the practical feasibility of such an emulation environment.
Findings
While the authors found that the Java Card inbuilt persistent memory management is not available on other Java VMs, they present a strategy to model this persistence mechanism on other VMs to build a complete Java Card run-time environment on top of a non-Java Card VM. Their analysis of the performance degradation in a prototypical implementation caused by additional effort put into maintaining persistent application state revealed that the implementation of such an emulation environment is practically feasible.
Originality/value
This paper addresses the problem of emulating a complete Java Card run-time environment on top of non-Java Card virtual machines which could open and significantly ease the development of NFC secure element applications.
Details
Keywords
In the tourism industry the rapidly increasing environmental dynamism and the intensity of competition call for constant improvements in Services' quality and pricing. Of the…
Abstract
In the tourism industry the rapidly increasing environmental dynamism and the intensity of competition call for constant improvements in Services' quality and pricing. Of the various elements in the tourism Performance bundle, the environment is an important starting point for examining the possibility of strengthening competitive position. Relative weightings of individual environmental pollutants regarding their importance to travel decisions are needed as a basis for decisions about effective countermeasures. An analysis of tourism, traffic and environmental developments, as well as an attempt to evaluate the relative weightings of various environmental impacts, gave the following working hypothesis: Of the various environmental pollutants which are relevant to the tourism industry in the Austrian Alpine region, traffic pollution constitutes the most important problem. The problem was examined with an emphasis on Tyrol, but the results should be largely transferable to the neighbouring areas in South Tyrol, Switzerland and Bavaria. The working hypothesis on the one hand refers to tourism as an industry effected by environmental pollutants, which are caused by both tourism and nontourism production and consumption activities. The pollutants act as impairments on the holiday experience. On the other hand it refers to tourism as a problem causer, with external effects on the non‐tourism and tourism industry. Traffic pollution has a comparatively large influence here too. This tourism‐related causer/effected‐combination for environmental pollution is relevant at both the local and the global level in different. Locally the directly effective aesthetic pollution stands out the most, for instance in the form of noise or damage to the countryside. Globally it's the “big” environmental problems (among other things the hypothesis on global warming), where, of the environmental pollution caused by tourism, traffic pollution makes a dominant contribution. The developed working hypotheses and assumptions about the relative weightings of different tourism‐related environmental pollutants are, due to inadequate data, based on rough estimates. To support them, the working hypotheses need, above all, an improved supply of data specific to the problem, to be collected scientifically with, among other things, more social and scientific research into the subjective problem perceptions of tourists and their reactions in the holiday decision process.
Details
Keywords
lm allgemeinen wirtschaftlichen Sprachgebrauch versteht man unter Innovation die Markteinführung von neuen Produktionsprozessen und/oderProdukten bzw. Dienst ‐leistungen. Wrde man…
Abstract
lm allgemeinen wirtschaftlichen Sprachgebrauch versteht man unter Innovation die Markteinführung von neuen Produktionsprozessen und/oderProdukten bzw. Dienst ‐leistungen. Wrde man sich diesem Sprachgebrauch anschliessen, so würden alle institutionell‐organisatorischen, rechtlichen oder sozialen Neuerungen aus dieser Betrachtung herausfallen, obwohl feststeht, dass auch von diesen Neuerungen bedeutende Einflsse auf die Wettbewerbsfähigkeit von Betrieben, Sektoren, bzw. ganzen Volkswirtschaften ausgehen können, sei es durch die Neuerung selbst oder dadurch, dass sie die Voraussetzung fr die Nutzung von Produkt‐, Dienst‐leistungs‐ und Prozessinnovationen schaffen können. Ein Beispiel im Tourismusbereich wäre der verstärkte Einsatz von EDV und der dadurch bedingte Durchbruch des globalen Verteilungs‐ /Verbuchungs‐/Reservie‐rungssystemes. Sicherlich sind daher auch sozialrechtliche bzw. institutionell organisatorische Neuerungen als Innovation aufzufassen. Gerade auf diesem Gebiet scheint es in der österreichischen Landschaft der erstarrten, z.T. oft noch mittelalterlich anmutenden Normen, Institutionen und Gesetze einigen Aufholbedarf gegenüber dem Ausland zu geben.
Klaus Weiermair and Brigitte Mäser
This article shows first the problems of treating tourism as a product and analyses then the literature about information behavior of tourists, when they are making their decision…
Abstract
This article shows first the problems of treating tourism as a product and analyses then the literature about information behavior of tourists, when they are making their decision for holidays. Empirical tests are dealing with data from eleven winter sport resorts, which were originally designed for purposes of service quality. However the results show that there are differences in information behavior due to personal and tourist status, due to the source of information and also whether tourist value the importance of skiing high or less.
Details
Keywords
Historically, libraries have always included special features in their catalogs to meet local needs. This trend has changed over the years as cataloging standards have been…
Abstract
Historically, libraries have always included special features in their catalogs to meet local needs. This trend has changed over the years as cataloging standards have been developed and accepted. The sheer volume of materials and the rising costs of operations have also curtailed the customizing of local records. However, the desirability of enhancing local records has been readdressed at Carnegie Mellon University. It has undertaken an experimental project to enhance catalog records for new books that meet defined criteria: for example, the books contain “citable” references in the table of contents; chapter titles, while not separately citable, do contain additional useful information; and exhibition catalogs cover 25 or fewer artists. The criteria for and process of enhancing records are discussed, and sample screen displays are illustrated.
Dkfm. and Paul Bernecker
Die Überbrückung der Spannung zwischen Bedürfnissen und ihrer Befriedigung ist Aufgabe der Wirtschaft. Diese ihre Funktion ist nur dann erfüllbar, wenn die Wirtschaft bestrebt…
Abstract
Die Überbrückung der Spannung zwischen Bedürfnissen und ihrer Befriedigung ist Aufgabe der Wirtschaft. Diese ihre Funktion ist nur dann erfüllbar, wenn die Wirtschaft bestrebt ist, diese Bedürfnisse zu erkennen, sie in ihren Motiven zu analysieren, sie zu steigern oder neue zu erwecken. Hiezu bedient sie sich der Werbung im weitesten Sinne, der Konsumforschung, der Untersuchung der Marktgegebenheilen, der Soziologie, der Betriebswirtschaft und der Technik.
Peter Jones and Martin George Wynn
This paper aims to review some of the academic literature on the circular economy, natural capital and resilience by tourism and hospitality scholars and to examine how a number…
Abstract
Purpose
This paper aims to review some of the academic literature on the circular economy, natural capital and resilience by tourism and hospitality scholars and to examine how a number of companies and industry bodies within the tourism and hospitality industry have used these concepts in their business operations and development plans.
Design/methodology/approach
The paper outlines the importance of sustainability to the tourism and hospitality industry and provides definitions of the concepts of the circular economy, natural capital and resilience. The paper reviews some of the academic literature on these concepts, explores how a number of companies and industry bodies within the tourism and hospitality industry have used them in their business and planning operations and identifies a number of future directions for academic research and managerial contributions.
Findings
The concepts illuminate a range of sustainability challenges and opportunities, and some companies use these concepts in their sustainability strategies and development planning. The current depth of theoretical understanding does not lend itself to management strategies, but one fruitful avenue is to explore how information systems can be better deployed to support these concepts and sustainability management in general.
Originality/value
The paper provides an accessible exploratory review of how academics and companies are focussing on the concepts of the circular economy, natural capital and resilience in the tourism and hospitality industry. As such, it will be of interest to academics, students and practitioners interested in the hospitality industry.
Details
Keywords
Michael Hölzl, Endalkachew Asnake, Rene Mayrhofer and Michael Roland
The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile…
Abstract
Purpose
The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever.
Design/methodology/approach
A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications.
Findings
To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time.
Originality/value
By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.