The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of the mobile Internet market has caused various changes in the mobile business. The purpose of this study is to construct mobile-user behavior models which are effective to plan business strategies in the mobile Internet market. We analyzed mobile Internet-access behavior based on the original survey data collected from mobile Internet users. This paper showed the results in the...
Although e-commerce is widely used, there are many superiorities of e-commerce which have not given full play. This paper point out the feasibilities of e-commerce applications of the avant-garde silk stockings, and give some corresponding countermeasures and suggestions on how to arrange the production, marketing and online promotion.
Phishing is the criminal activity of enticing people into visiting websites that impersonate the real thing, to dupe them into revealing passwords and other credentials to carry out financial fraud. This less suspected and high profile attack lays a deceit trap to the unwitting and gullible customers to part with their sensitive credentials to unauthorized entities. The inherent suave and subtle vulnerabilities...
The purpose of this study is to provide a direction on developing effective web site marketing strategy for China hotels by evaluating, analyzing and comparing the web sites between China hotels and U.S. hotels. In the article, the web site marketing attributes were identified and categorized into four groups “information”, “communication”, “distribution” and “transaction” based on the ICDT model...
E-Commerce has been plagued with problems since its inception and this paper examines one of these problems: The lack of user trust in E-commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefitted honest Internet users, but has enabled criminals to increase their effectiveness...
Hotels are increasingly taking advantages of the Internet as a marketing tool to provide direct contact with customers. This study evaluated the hotel's Web sites in Taiwan from a marketing perspective. Content analysis was used to analyze and compare the marketing practice on Internet. Using data envelopment analysis, this article analysis the impact of Internet marketing on hotel performance. The...
Content delivery is the key factor in development and application of the tourism Web sites. This paper employs the Rachman and Buchanan's research method to study the content delivery of the top three famous tourism Web sites in Chinese mainland, the result shows that their content delivery exist some default and insufficiency. Some improving ways also discussed for these tourism Web sites.
Ensuring public security is an important issue for every government, and effective public security depends on the efficiency of criminal justice processes and procedures. The procedures of the criminal justice may be viewed as the upper-, middle-, and down-stream sections of a supply chain. Like their business counterparts, most law enforcement agencies have to deal with logistics, information flow,...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
The use of the Internet and the World Wide Web is growing very fast because this information technology facilitates new approaches to promote companies and to sell products and services. This paper examines the use of the Internet in large Croatian companies. Companies with Internet access and the contents of their Web sites are analyzed. The main goal is to identify to what extent Croatian firms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.