Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li
In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.
{"title":"Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems","authors":"Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li","doi":"10.1145/3440943.3444716","DOIUrl":"https://doi.org/10.1145/3440943.3444716","url":null,"abstract":"In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"s3-29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
1The retail industry is changing as the latest concepts of retail stores came out. (Diallo et al., 2015), and the sort of retail store also become more extensively diversified (Shi et al., 2018). This diversification is a result of demand heterogeneity from diverse consumer groups (González-Benito et al., 2007).The selection of retail channels is one of the important decisions which consumers make when they purchase a product or service. How to select a retail channel involves the information searching of the product, evaluation of alternatives, and making a purchasing decision regarding the product (Ansari, Mela, & Neslin, 2008). Therefore, consumers will have complex purchasing behavior when selecting retail channels in order to consider the availability of various retail channels. Consumers may finish all purchase-related activities with one stop shopping or through multiple retail channels. This study makes analysis based on push-pull-mooring theory. People can understand the crucial factors which customers change their intentions in the retail industry from the perspective of push, pull, and mooring theory. This study is analyzed through spss 22 and smart PLS3.0, then it comes out the result of analysis that the payment risk will affect the intention conversion positively, costs conversion will influence intention conversion negatively, and Corporate Social Responsibility will also effect intention conversion negatively.
随着最新零售店概念的出现,零售业正在发生变化。(Diallo et al., 2015),零售商店的种类也变得更加多样化(Shi et al., 2018)。这种多样化是来自不同消费群体的需求异质性的结果(González-Benito等人,2007)。零售渠道的选择是消费者在购买产品或服务时做出的重要决策之一。如何选择零售渠道涉及产品的信息搜索,替代品的评估,并作出关于产品的购买决策(安萨里,梅拉,& Neslin, 2008)。因此,消费者在选择零售渠道时会考虑到各种零售渠道的可用性,从而产生复杂的购买行为。消费者可以通过一站式购物或多种零售渠道完成所有与购买相关的活动。本研究基于推拉系泊理论进行分析。人们可以从推、拉、系泊理论的角度来理解零售业中顾客改变意图的关键因素。本研究通过spss 22和smart PLS3.0进行分析,得出支付风险对意向转化有正向影响,成本转化对意向转化有负向影响,企业社会责任对意向转化有负向影响的分析结果。
{"title":"Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework","authors":"Chia-Wen Tsai, K. Chung","doi":"10.1145/3440943.3444349","DOIUrl":"https://doi.org/10.1145/3440943.3444349","url":null,"abstract":"1The retail industry is changing as the latest concepts of retail stores came out. (Diallo et al., 2015), and the sort of retail store also become more extensively diversified (Shi et al., 2018). This diversification is a result of demand heterogeneity from diverse consumer groups (González-Benito et al., 2007).The selection of retail channels is one of the important decisions which consumers make when they purchase a product or service. How to select a retail channel involves the information searching of the product, evaluation of alternatives, and making a purchasing decision regarding the product (Ansari, Mela, & Neslin, 2008). Therefore, consumers will have complex purchasing behavior when selecting retail channels in order to consider the availability of various retail channels. Consumers may finish all purchase-related activities with one stop shopping or through multiple retail channels. This study makes analysis based on push-pull-mooring theory. People can understand the crucial factors which customers change their intentions in the retail industry from the perspective of push, pull, and mooring theory. This study is analyzed through spss 22 and smart PLS3.0, then it comes out the result of analysis that the payment risk will affect the intention conversion positively, costs conversion will influence intention conversion negatively, and Corporate Social Responsibility will also effect intention conversion negatively.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","authors":"","doi":"10.1145/3440943","DOIUrl":"https://doi.org/10.1145/3440943","url":null,"abstract":"","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, various decentralized web services have emerged. Note, however, that websites that can be connected using decentralized web services are difficult to access through the use of general search engines. In this paper, ZeroNet, one of the decentralized web services, is analyzed to verify the information generated when used. The analyzed information is used in the digital forensic method to show an example of how to apply the method by presenting a scenario.
{"title":"A Study on the Digital Forensic Method for Decentralized Web Service","authors":"Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444736","DOIUrl":"https://doi.org/10.1145/3440943.3444736","url":null,"abstract":"In recent years, various decentralized web services have emerged. Note, however, that websites that can be connected using decentralized web services are difficult to access through the use of general search engines. In this paper, ZeroNet, one of the decentralized web services, is analyzed to verify the information generated when used. The analyzed information is used in the digital forensic method to show an example of how to apply the method by presenting a scenario.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan-Kai Hsieh, T. Kang, Tzer-Long Chen, Jhih-Chung Chang, M. Wang, Tzer-Shyong Chen, Yu-Fang Chung
With the coming of information age, the laboratory and the manufacture factory begins to import smart monitor system to enhance safety. The smart monitor system can save human costs. The information system can prevent unsafety event from happening. Smart Laboratory Administrator System was developed to cooperate with IoT (Internet of things) to prevent illegal invasion and achieve internal security. If unexpected events happen, it will work and switch on an alarm to prevent objects in the laboratory from being stolen. Hence, the Smart Laboratory Administrator System can save the human cost and enhance the security of laboratory.
{"title":"The Implementation of IoT-based Smart Laboratory Management System","authors":"Nan-Kai Hsieh, T. Kang, Tzer-Long Chen, Jhih-Chung Chang, M. Wang, Tzer-Shyong Chen, Yu-Fang Chung","doi":"10.1145/3440943.3442721","DOIUrl":"https://doi.org/10.1145/3440943.3442721","url":null,"abstract":"With the coming of information age, the laboratory and the manufacture factory begins to import smart monitor system to enhance safety. The smart monitor system can save human costs. The information system can prevent unsafety event from happening. Smart Laboratory Administrator System was developed to cooperate with IoT (Internet of things) to prevent illegal invasion and achieve internal security. If unexpected events happen, it will work and switch on an alarm to prevent objects in the laboratory from being stolen. Hence, the Smart Laboratory Administrator System can save the human cost and enhance the security of laboratory.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lie Yang, Shicheng Shao, Chien-Erh Weng, Yung-Cheng Yao
This paper proposes the development of real-time air quality monitor system based on unmanned aerial vehicle (UAV), which can effectively compensate for the lack of mobility and immediateness of air pollution monitoring operations. The system includes a detection sampling site and a ground receiving station, using wireless communication to performs data transmission and remote control. And the detection sampling terminal uses an unmanned aerial vehicle equipped with a microcontroller, volatile organic compounds, temperature and humidity sensing modules. The detection sampling terminal can detect air quality, and carries a gas sampling tank to collect air samples. The ground receiving station can remotely control the detection sampling terminal, display and record the received air data.
{"title":"The Development of UAV-based Air Quality Monitor System","authors":"Lie Yang, Shicheng Shao, Chien-Erh Weng, Yung-Cheng Yao","doi":"10.1145/3440943.3444350","DOIUrl":"https://doi.org/10.1145/3440943.3444350","url":null,"abstract":"This paper proposes the development of real-time air quality monitor system based on unmanned aerial vehicle (UAV), which can effectively compensate for the lack of mobility and immediateness of air pollution monitoring operations. The system includes a detection sampling site and a ground receiving station, using wireless communication to performs data transmission and remote control. And the detection sampling terminal uses an unmanned aerial vehicle equipped with a microcontroller, volatile organic compounds, temperature and humidity sensing modules. The detection sampling terminal can detect air quality, and carries a gas sampling tank to collect air samples. The ground receiving station can remotely control the detection sampling terminal, display and record the received air data.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121541201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.
{"title":"Fault Injection Method for Hardware-implemented AES without Artificial Triggering","authors":"HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1145/3440943.3444739","DOIUrl":"https://doi.org/10.1145/3440943.3444739","url":null,"abstract":"The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
1In today's Taiwanese society, all citizens must have national health insurance, which allows people across the country to not have to bear huge medical expenses when registering for medical treatment. An analysis of Taiwan's data over the past 10 years shows that a 1% increase in the previous period's CPI will result in a decrease of 3.2% to 4.4% in the next period of premium income. We also found that there is a considerable degree of positive correlation between the growth rate of premium income (both life insurance and property insurance) and the economic growth rate over the same period. The Baoxian industry has a great influence on our economic development. This research is analyzed through Smart PLS and SPSS. The results of the research show that the three components of this research show the complexity of the emotional boundary through the relationship-oriented service industry of the triangle of love transaction, which is reflected in the emotional structure. The research results show that the insurance industry will focus more on relationship marketing on the emotional side. In the insurance industry, the nature of customer sentiment towards companies is driven by commitment in the relationship-oriented service industry. This discovery can help insurance practitioners to reduce time and money losses in developing relationship marketing research.
{"title":"Understand the public insurance purchase orientation through the triangle theory of love","authors":"Ying-Chi Chen, K. Chung","doi":"10.1145/3440943.3444348","DOIUrl":"https://doi.org/10.1145/3440943.3444348","url":null,"abstract":"1In today's Taiwanese society, all citizens must have national health insurance, which allows people across the country to not have to bear huge medical expenses when registering for medical treatment. An analysis of Taiwan's data over the past 10 years shows that a 1% increase in the previous period's CPI will result in a decrease of 3.2% to 4.4% in the next period of premium income. We also found that there is a considerable degree of positive correlation between the growth rate of premium income (both life insurance and property insurance) and the economic growth rate over the same period. The Baoxian industry has a great influence on our economic development. This research is analyzed through Smart PLS and SPSS. The results of the research show that the three components of this research show the complexity of the emotional boundary through the relationship-oriented service industry of the triangle of love transaction, which is reflected in the emotional structure. The research results show that the insurance industry will focus more on relationship marketing on the emotional side. In the insurance industry, the nature of customer sentiment towards companies is driven by commitment in the relationship-oriented service industry. This discovery can help insurance practitioners to reduce time and money losses in developing relationship marketing research.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae-Wook Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, I. You
Because of the phenomenal growth of internet connectivity and unceasing improvements over hardware and software technology, everything is connected without any boundaries creating the Internet of Things, which becomes part of cyberspace. As the volume of cyberspace is overgrowing, the attackers' capabilities and strategies to find new vulnerabilities are increasing too. In order to defend the attackers from stealing and poisoning critical information of cyberspace, it is crucial to implement Cyber Threat Intelligence (CTI). However, it is not a straightforward process to implement CTI for individuals and organizations because of the resource constraints such as time, capability, and cost. Hence, different stakeholders (individuals or organizations) can collaborate and create a CTI sharing platform to improve their security stances and other organizations. It is well-known that when connected devices are rapidly intensifying in IoT, the cyber threat to information will also rise. So, to own a reliable, scalable, and high-speed CTI sharing platform, the deployment model should be wisely studied. This research carefully analyzed different forms of CTI sharing deployment models: private cloud, public cloud, hybrid cloud, and on-premises. Finally, we suggest the hybrid cloud-based deployment model as a convenient solution for CTI sharing due to its desirable features such as scalability, security, reliability, and high speed.
{"title":"Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis","authors":"Jae-Wook Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, I. You","doi":"10.1145/3440943.3444737","DOIUrl":"https://doi.org/10.1145/3440943.3444737","url":null,"abstract":"Because of the phenomenal growth of internet connectivity and unceasing improvements over hardware and software technology, everything is connected without any boundaries creating the Internet of Things, which becomes part of cyberspace. As the volume of cyberspace is overgrowing, the attackers' capabilities and strategies to find new vulnerabilities are increasing too. In order to defend the attackers from stealing and poisoning critical information of cyberspace, it is crucial to implement Cyber Threat Intelligence (CTI). However, it is not a straightforward process to implement CTI for individuals and organizations because of the resource constraints such as time, capability, and cost. Hence, different stakeholders (individuals or organizations) can collaborate and create a CTI sharing platform to improve their security stances and other organizations. It is well-known that when connected devices are rapidly intensifying in IoT, the cyber threat to information will also rise. So, to own a reliable, scalable, and high-speed CTI sharing platform, the deployment model should be wisely studied. This research carefully analyzed different forms of CTI sharing deployment models: private cloud, public cloud, hybrid cloud, and on-premises. Finally, we suggest the hybrid cloud-based deployment model as a convenient solution for CTI sharing due to its desirable features such as scalability, security, reliability, and high speed.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu
1This article aspires to develop a model to explore consumer buying behaviors through Long Short-Term Memory (LSTM); from building a marketing system and integrating online and offline information, marketers can employ diverse approaches to execute their marketing strategies and attract more customers for improving the overall sales.
{"title":"Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory","authors":"Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu","doi":"10.1145/3440943.3444748","DOIUrl":"https://doi.org/10.1145/3440943.3444748","url":null,"abstract":"1This article aspires to develop a model to explore consumer buying behaviors through Long Short-Term Memory (LSTM); from building a marketing system and integrating online and offline information, marketers can employ diverse approaches to execute their marketing strategies and attract more customers for improving the overall sales.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127209689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}