The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Perceived risk becomes more and more important in e-commerce when we explain the consumer's behaviors. Based on studying element and source of perceived risk that affected risk perceived during consumer's online shopping, this article firstly included conception of perceived risk in online purchasing, perceived risk types, the performances and source, and then analyzed the relationships between trust...
In a faceless business transaction such as in e-commerce, trust plays a major influence on a customer's decision making behavior. Trust on e-commerce is very much dependent on the information obtained from the vendors' websites. From our own personal experiences with e-commerce websites, it is not unusual to find some essential information missing. In this paper, we present to the readers our findings...
Website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which involves information sharing. However, the awareness about privacy concerns and security threats have caused to non-sharing behavior among the Internet Users. This situation have caused...
The insufficiency of consumer's trust is one of bottlenecks to China online shopping, and now most Web sites resort to the renowned third party or trust displaying mechanism to promoting consumer's trust. However, whether the two kinds of trust promotion strategies above have the same effect? And whether their own attributes and assurance contents have the significant influence on consumer's trust?...
The wide spread and relatively easy use of internet and other technologies enables E-commerce to grow exponentially due to reduction of costs, increase efficiencies and improve customer service. E-commerce is a part of human communication and social system, though technical aspects of E-commerce systems are important, there are also social variables which should come to consideration, so any E-commerce...
Trust in the context of business-to-consumer (B2C) electronic commerce (EC) is complex and a multidimensional construct. It is affected by many internal and external factors. These factors might change overtime. Therefore trust value becomes dynamic and creates a big challenge. Although, many researchers studied the effect of different factors on consumerspsila trust, the trust literature lacks clear...
In this paper we propose to study the evolution of legal statements that can be found in Web sites. Legal statements are an important part of each Web site because they can be seen as a contract between the owner of the site and its users. For example, a sitepsilas privacy policy explains what kind of data is collected from users by the operator and how it is processed. Operators use terms of use...
The uses of the World Wide Web on the Internet for commerce and information access continue to expand. The e-commerce business has proven to be a promising channel of choice for consumers as it is gradually transforming into a mainstream business activity. However, lack of trust has been identified as a major obstacle to the adoption of online shopping. Empirical study of online trust is constrained...
The Internet is now a prime vehicle for business, community, and personal interactions. The privacy of individuals sensitive information has become a major concern of consumers who use the Web to purchase goods or obtain services in Web-based computing environments. In this paper, we analyze the risks pertaining to various Web sites in Korea, and propose the dynamic Web site verification system (DWVS)...
Identity Management plays a crucial role in many application contexts, including e-Governments, e-Commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, have introduced new problems, especially concerning interoperability and privacy. We focus here on two fundamental issues...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.