Approach to vendor authentication
نویسندگان
چکیده
1 Background With the remarkable and ever increasing technology growth, we need various products and services from different vendors, such as: • Home appliances • Furniture • Mobile • Internet To deliver these products and provide services, representatives from concerned companies visit our place. We somehow need to ascertain if the person visiting is an authentic representative from the concerned vendor. In many countries, there are cases where an imposter visits as a company representative and indulge in theft or even murder of the persons at home. 2 Objective The main objective of the Vendor Authentication Technique is to prevent customers from being cheated by impostors visiting them as a customer support official of a certain organization. To examine the authenticity of the vendor representative the customer generally asks the vendor representative to produce an Office ID Proof and Government ID Proof. However, this procedure may not always be secure enough and the customer may 147
منابع مشابه
An optimization technique for vendor selection with quantity discounts using Genetic Algorithm
Vendor selection decisions are complicated by the fact that various conflicting multi-objective factors must be considered in the decision making process. The problem of vendor selection becomes still more compli-cated with the inclusion of incremental discount pricing schedule. Such hard combinatorial problems when solved using meta heuristics produce near optimal solutions. This paper propose...
متن کاملA parameter-tuned genetic algorithm for vendor managed inventory model for a case single-vendor single-retailer with multi-product and multi-constraint
This paper develops a single-vendor single-retailer supply chain for multi-product. The proposed model is based on Vendor Managed Inventory (VMI) approach and vendor uses the retailer's data for better decision making. Number of orders and available capital are the constraints of the model. In this system, shortages are backordered; therefore, the vendor’s warehouse capacity is another limitati...
متن کاملIntroducing the Time Value of Money in a Non-consignment Vendor Managed Inventory Model
Vendor managed inventory (VMI) is an integrated approach for buyer–vendor coordination, according to which the vendor (supplier or manufacturer) decides on the appropriate buyer’s (retailer’s) inventory levels. The time value of money has not traditionally been considered in evaluating VMI supply chain’s total inventory cost in any studies up to now. Therefore, in the present study a new model ...
متن کاملComparison and Supply Chain Optimization for Vendor-Buyer Coordination System
Here, we consider single vendor-buyer model with multi-product and multi-customer and multi-facility location-production-distribution problem. It is assumed that the players of the supply chain are coordinated by sharing information. Vendor manufactures produce different products at different plants with limited capacities and then distribute the products to the consumers according to determini...
متن کاملBeyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change
The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individual’s evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individuals’ intention to use biometrics is influenced by trus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014