The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current research indicates that a novelty, exciting and engaging shopping experience can positively affect consumer buying behavior. Identifying factors that influence the consumer behavior on use a virtual world for shopping will help retailers to create and maintain a presence in a virtual world, while positive impacting purchases and returns intentions. Therefore, the objectives of this study are...
With the spread of Internet application, the software products need update quickly to adapt the dynamic application environments and diverse business requirement. How to efficiently select the regression test cases based on existing test cases set directly affect the evolution quality of software products. Basic paths coverage is a popular structure-oriented test way in academia and industry. A method...
In the scope of this study we observe the disruptive technologies which appear in the learning material of the higher education more and more frequently from the end of the 20th century, and we also investigate what effects the disruptive technologies have on the educational environment and the methods in the higher education. This article shows a remarkably good example of CogInfoCom [5], [6] as...
Phishing website-based attacks remain pervasive, with high user susceptibility continuing to be a major factor. In this study we use cluster analysis coupled with an elaborate controlled experiment involving hundreds of participants to identify and examine high susceptibility user segments in terms of their perceptions, demographics, and phishing website traversal behavior. The results reveal three...
SMEs are the growth engine of a developing country's economy. It is actively contributing to GDP and employment. In consequence, SMEs financing support, ICT adoption promotion and SME's favorable evolution environment creation by policy makers, help reduce the digital divide in this era of the knowledge economy. High penetration and lower costs of Internet connectivity, Web technologies standardization,...
Using AS-level Internet topology maps to determine accurate AS-level paths is essential for network diagnosis, performance optimization, reliability improvement, resiliency enforcement and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance...
The Web has been around and maturing for 25 years. The popular websites of today have undergone vast changes during this period, with a few being there almost since the beginning and many new ones becoming popular over the years. This makes it worthwhile to take a look at how these sites have evolved and what they might tell us about the future of the Web. We therefore embarked on a longitudinal study...
Young users, particularly students, can accessvarious sources of information nowadays. However, theynormally lack of experiences to assess the information credibility. This study is aimed at exploring students' choices of informationsources, gathering their points of view about the informationcharacteristics and information verification approaches, andcomparing these perceptions/ intention to their...
This study explores the key issues on mobile shopping mall apps (MSMAs) adoption and used a theoretical framework based on the value-based adoption model (VAM) to analyze the perceived value relations to MSMAs adoption behavior toward MSMAs in Malaysia. The factors that significantly direct affect perceived value toward MSMAs are usefulness, enjoyment, technicality, and fees. While perceived value...
Internet and social media has attracted most users to earn extra income. Instagram originally used for visual storytelling, is now also used for a variety of things; such as to online shop. Instagram has convenience features like uploading photos and comments, that can make online seller can be successful in managing their business. But in the end, they realized that Instagram is not e-commerce that...
This research aims to reveal factors that drive online shops owned by student of university in Bandung which utilize Instagram for marketing efforts. This research uses three theories stated by Morissan (2010), Joseph (2011) and Strauss and Frost (2009) then synthesis those factors and uses 21 factors to analyze with Factor Analysis methodology. The samples of respondents are online shops owned by...
Today, E-Commerce has become the largest revenue generation industry, letting seller sell everything from a pen to plane to the customers across the globe. Over an E-commerce platform where user and vendor merely interact with each other, the trust is undeniably the most important factor for users to perform transactions online. But at the same time it can't be assessed directly using some pre-defined...
Social networking has become the main online platform not only to Generation Y cohorts, but also to other Internet user groups including Generation X and Baby Boomers. This not only affecting the way Internet users conducts their daily life; it also affects marketers (online and offline) in terms of their marketing practices. Especially to online marketers, this should be seen as a huge opportunity...
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
Caching is a hot research topic and poised to develop into a key technology for the upcoming 5G wireless networks. However, the successful implementation of caching techniques crucially depends on joint research developments in different scientific domains such as networking, information theory, machine learning, and wireless communications. Moreover, there are business barriers related to the complex...
In this paper we deal with the Internet Shopping Optimization Problem. An extended model that includes price sensitive discounts is considered. A set of algorithms to solve the Internet Shopping Optimization Problem with Price Sensitivity Discounts (ISOPwD) is introduced. The algorithms are designed to consider a different solution quality regarding computational time and results close to the optimum...
Network functionality is growing increasingly complex, making the commands addition of network device a steadily growing challenge. In order to improve the efficiency of adding new commands to developing or developed network devices, we propose an extensible command parsing method (ECPM). With this method, we design the extensible command parsing system consisting of business-logic module and command-matching...
With the rise of a series of We Media platforms like forum, Microblog, and We chat, humans' thinking ways, channels of receiving information as well as living habits have changed dramatically due to the influence of virtual society created by We Media. Therefore, traditional marketing model needs a radical change. Based on the basic marketing theory, this paper adopts content analysis for the first...
Online ordering meals is in recent years with the development of network technology, a new form of dining. Although the online ordering system has entered people's lives, but are not mature enough, still has great room for development. Therefore study how to marketing online ordering system is a very necessary research. In this article, from the marketing to analysis the online order meals system...
Electronic commerce is a relatively new phenomenon in Romania, dating back to the early 2000's. During its short history, however, it has grown rapidly, particularly due to the advantages entailed for businesses, government and consumers alike. Specific disadvantages such as security risks, risks of fraud, piracy, corruption, low internet penetration rates and a culture prone towards traditional commerce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.