implications and possible countermeasures”,
Computers & Security, Vol. 28, Issue 7, pp 615-627,
Elsevier.
Hancke, F., Mayes, K., Mar 2013, “A Practical Generic
Relay Attack on Contactless Transactions by Using
NFC Mobile Phones” In: IJRFIDSC. 2, 1-4.
Haselsteiner, E., Breitfuß, K., 2006,“Security in Near
Field Communication (NFC) – Strengths and
weaknesses”, Proceedings of Workshop on RFID
Security (RFIDSec).
He, Z.L., Wong, P.K., 15 2004, “Exploration vs.
Exploitation: An empirical test of the ambidexterity
hypothesis”. Organization Science.
Honig, Z., 05 2013 “Samsung releases TecTiles 2 NFC
tags for Galaxy S 4, available for $15 today”.
ISO/IEC 14443-3:2011 A&B,
<http://www.iso.org/iso/catalogue_detail.htm?csnumb
er=50942>.
ISO/IEC 7816-4:2013,
<http://www.iso.org/iso/iso_catalogue/catalogue_tc/ca
talogue_detail.htm?csnumber=54550>.
Issovits, W., Hutter, M., 2011, “Weaknesses of the
ISO/IEC 14443 Protocol Regarding Relay Attacks”,
IEEE International Conference on RFID-Technologies
and Applications.
JIS-X 6319-4
http://www.proxmark.org/files/Documents/13.56%20
MHz%20-%20Felica/JIS.X.6319-4.Sony.Felica.pdf
Juels, A., Syverson, P., Bailey, D., 2005, “High-power
proxies for enhancing RFID privacy and utility”, G.
Danezis and D. Martin, editors, in: “Privacy
Enhancing Technologies (PET)”, 2005.
Juels, A., Weis, S., 2005a, “Authenticating pervasive
devices with human protocols”, Advances in
Cryptology – CRYPTO, pages 293–308. Springer-
Verlag, Lecture Notes in Computer Science, Volume
3621.
Juels, A., Weis, S, 2005b, “Defining strong privacy for
RFID”, Manuscript.
Lee, E., 2012, DEFCON 20, “NFC Hacking: The Easy
Way”, ref. NFC proxy, p. 20, http://korben.info/wp-
content/uploads/defcon/SpeakerPresentations/Lee/DE
FCON-20-Lee-NFC-Hacking.pdf”.
Levitt, B., March, J.G., 14 1988, “Organizational
learning”. Annual Review of Sociology.
Li, Y., Deng, R.H., Bertino, E., 2014, “RFID Security and
Privacy”, Elisa Bertino and Ravi Sandhu (Eds.), in:
Synthesis Lectures on Security, Privacy and Trust,
Morgan & Claypool Publishers.
Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.,
2008, “
NFC Devices: Security and Privacy”, IEEE
The Third International Conference on Availability,
Reliability and Security, IEEE DOI
10.1109/ARES.2008.105.
March, J.G., 1991, “Exploration and exploitation in
organizational learning”. Organization Science.
Marzo, F., Castelfranchi, C., 2013, “Trust as individual
asset in a network: a cognitive analysis”. In:
Spagnoletti, P. (ed.) Organization Change and
Information Systems, LNISO vol. 2. Springer,
Heidelberg.
Mayes, K.E., Markantonakis, K., Hancke, F., 05 2009,
“Elsevier Information Security Technical Report”,
Vol.14, Issue 2, pp 87-95.
McHugh, S., Yarmey, K., 08 2012, “Near Field
Communication: Introduction and Implications”,
Weinberg Memorial Library, University of Scranton ,
Scranton, Pennsylvania , USA
Momani, M.H., Hudaib, A.AZ., 2014, “Comparative
Analysis of Open-SSL Vulnerabilities & Heartbleed
Exploit Detection”, IJCSS, Volume (8): Issue (4).
Mulliner, C., 2009, “Vulnerability Analysis and Attacks on
NFC-enabled Mobile Phones”, IEEE International
Conference on Availability, Reliability and Security,
IEEE DOI 10.1109/ARES.2009.46.
Murdoch, S., Anderson R., 01 2010, “Verified by Visa and
MasterCard SecureCode: or, How Not to Design
Authentication”. Financial Cryptography and Data
Security, pp. 42-45.
Nai-Wai, L., Li, Y., 2012, “Radio Frequency
Identification System Security”, Volume 8, Cryptology
and Information Security, IOS Press.
NFC Forum, 12 2013, “NFC and Contactless
Technologies”, <http://nfc-forum.org/what-is-
nfc/about-the- technology>, 2013
Ok, K., Aydin, M.N., Coskun, V., Ozdenizci, B., 2011,
“Exploring Underlying Values of NFC Applications”,
3rd International Conference on Information and
Financial Engineering IPEDR vol.12, IACSIT Press,
Singapore.
Ozdenizci, B., Aydin, M. N., Coskun, V., Ok, K., 2010,
“NFC Research Framework: A Literature Review And
FutureResearch Directions”, Proc. 14th IBIMA,
Istanbul, Turkey, 2010, pp. 2672-2685.
Patidar, P., Bhardwaj, A., 2011, “Network Security
through SSL in Cloud Computing Environment”,
IJCSIT, Vol. 2 (6) , 2011, pp. 2800-2803.
Paya, C., 05 2014, “HCE vs embedded secure element:
relay attacks (part V)”, Random Oracle,
<https://randomoracle.wordpress.com/2014/05/01/hce-
vs-embedded-secure-element-relay-attacks-part-v/>,
2014.
Pettigrew, A.M., 1987, “Context and action in the
transformation of the firm”. Journal of Management
Studies.
Pettigrew, A.M., 2001, Woodman, R.W., Cameron, K.S.
“Studying organizational change and development:
Challenges for future research”. Academy of
Management Journal.
PCI DSS, 2006-2015,
https://www.pcisecuritystandards.org/security_standar
ds/
Roland, M, Langer, J., Scharinger, J., 10 2012 “Practical
Attack Scenarios on Secure Element-enabled Mobile
Devices”, IEEE 4th International Workshop with
Focus on Near Field Communication, 2012. IEEE DOI
10.1109/NFC.
OrganisationalAspectsandAnatomyofanAttackonNFC/HCEMobilePaymentSystems
699