The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electronic commerce has been grown rapidly in the last decade with the support of the Internet. Consequently, it requires retailers to improve their ability to fulfill the needs of their customers to gain satisfaction. Due to the close connection with the customer satisfaction, service quality is considered as a critical factor for the success of the service providers. This study tried to assess the...
Web systems evolved in the last years starting from static websites to Web applications, up to Ajax-based Rich Internet Applications (RIAs). Reverse Engineering techniques followed the same evolution, too. The authors and many other WSE contributors proposed a lot of innovative and effective ideas providing important advances in the reverse engineering field. In this paper, we will show the historical...
E-commerce transactions, in addition to the exchange of goods and services for payment, often entail an indirect transaction, where personal data are exchanged for better services or lower prices. This paper analyses buyer's and seller's privacy-related strategic choices in e-commerce transactions through game theory. We demonstrate how game theory can explain why buyers mistrust internet privacy...
Online price comparison agents (shopbots) allow consumers to instantaneously receive price and other information from many online retailers. Contrary to conventional wisdom, our empirical study of the book and computer hardware categories reveals that consumers are visiting more online retailer web sites after using shopbots. This finding suggests that after searching for an item through a shopbot...
The Reliability Information Analysis Center (RIAC), under contract to the Defense Technical Information Center (DTIC), is developing and implementing a Web-Accessible Repository of Physics-based Models (WARP) database and website to centrally organize and make available information and data on physics-based models. In addition to providing access to available Physics-of-Failure (PoF) model information...
Security for conducting businesses online is vital and critical. Phishing is a security attack that seeks to trick people into revealing sensitive information about themselves and their Internet accounts. Countries around the world are working to reduce the impact of Phishing. In this paper, research was conducted to introduce and analyze a high level (a country-based) anti-phishing countermeasure...
To take advantage of the Internet - vast but complicated information resources, Recommendation systems help users find out information they need by providing them personalized suggestions. This research area is receiving more and more attention from researchers and used in some famous websites like EBay, Amazon, etc. In this paper, we proposed a Recommendation System for Vietnamese electronic newspaper...
E-governments are increasingly becoming a familiar fixture. Nations across the world are realizing the importance of e-government, the main objective of most e-government is to better serve citizens. However, citizen's likelihood to use e-government is low. Lack of trust has been recognized as one of the most barriers to citizen for engaging in e-government, involving the trust in the internet and...
In this paper, with the combination of the latest research achievement of reputation calculation model, we improve the existing reputation calculation model in E-shopping Web sites. The improved model is applied to effective and accurate calculate seller's reputation status in E-shopping websites. Experiments show that compared with the original reputation calculation model, the improved model is...
After a brief analysis to the information spreading mode under internet-based micro-blog platform, it quickly classifies and audits the related mirco-blog content in the spreading process in this paper. Then, by analyzing the sender's mood tendency to some specific topics in the content of micro-blog message, it proposes a content audit model under the micro-blog service platform. Furthermore, by...
As knowledge and rules are hided in e-commerce data, how to mine them is not achieved well in the present e-commerce. IEC (Intelligent E-commerce) is proposed as the next period e-commerce and main feature is to mine e-commerce knowledge and rules from e-commerce data. An Extended K-Means algorithm is proposed to analyze customers' consumptions in the IEC and results indicate that the performance...
This study integrates Technology Acceptance Model (TAM) and flow theory to explore the relationship among online consumers' internal and external perceptive factors, and intention to return. This study examines the online consumers from Taiwan's biggest B to C website, and questionnaire-based empirical study is used to collect data. There are 1254 valid surveys and structure equation model (SEM) is...
Web log files store data related to the use of a website. Analyzing these data in detail is therefore crucial for improving the user browsing experience. However, usually Web log data are stored in flat files in different formats which hinders their analysis, thus obliging to use specific Web log analysis tools. In this context, approaches for structuring Web log data to better analyze them are highly...
In the mode of c2c e-commerce, because of the increased degree of information asymmetry and frequent occurrence of internet fraud, the credit problem has ever been the biggest obstacle in the c2c e-commerce development. Taking Taobao as an example, through analyzing the personal credit evaluation system , this essay think what does Taobao do on personal credit method, reward points gradients setup...
Analysis the positive and negative sentiments about each topic of the product are very useful to the customers and manufacturers. In this paper we propose a new topic sentiment mixture model which we call Semi-supervised Co-LDA model to obtain the positive and negative opinions from the reviews about each product. The Semi-supervised Co-LDA can model the topic and sentiment of the product reviews...
The E-commerce website credibility has become a deciding factor in network marketing. The website credibility is a sense of trust and its intensity towards the E-commerce website is produced by the customer. According to the factors affecting the customer's assessment of the E-commerce website credibility, the evaluation indicator framework is divided into three level indicators, respectively: the...
This pilot study examined the antecedents of consumers' intention to purchase from apparel retail websites, including website attractiveness, consumer-website identification, and website trustworthiness. A structural equation model was used to test hypotheses that were derived from social identity theory and previous research concerning online consumer behavior. The results of this study indicated...
With the explosive growth of data available on the World Wide Web, the sheer volume of traffic is kept on the enterprise's Web site. Discovery and analysis of useful information from the World Wide Web becomes a practical necessary. Web Log Mining is the application of Data Mining techniques to discover Client behavior patterns from Web data in order to understand and serve the needs of Web. In the...
This paper presents a method of related subject of Tibetan web integrating content evaluation and link analysis. The analysis of related subject of Tibetan web is the most important part of the special Tibetan Search. It guide web crawler download pages accurate and efficient. The content evaluation of this method extends the VSM based on keyword, it consider that the keywords in the page have different...
We propose a formal model of web security based on an abstraction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We identify three distinct threat models that can be used to analyze web applications, ranging from a web attacker who controls malicious web sites and clients, to stronger attackers who can control the network and/or leverage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.