The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people's lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial...
Internet of ETC is a problem that current technology development and users needs to be solved urgently. Furthermore, the risk of Internet access to traditional industry is the main direction currently being explored and studied across all trades. This paper will propose a set of Internet service security system.
The Internet can be considered as the most important infrastructure for modern society and businesses. A loss of Internet connectivity has strong negative financial impacts for businesses and economies. Therefore, assessing Internet connectivity, in particular beyond their own premises and area of direct control, is of growing importance in the face of potential failures, accidents, and malicious...
Online shopping is an easy and comfortable way of shopping from a large range of products. There are innumerable advantages of online shopping. Customers can save a lot of time which they normally need to physically go to the retail shop and buy the products that customers want. We have set up a fully functional e-commerce website that has the capacity to be extended to a smarter model by incorporating...
This paper aims to study factors influencing trust and purchase intention on the Internet, develop model of trust and purchase intention by empirical data, and analyze path of antecedents influencing purchase intention. This study identifies the factors proposed in the existing social commerce constructs: recommendation and referrals, rating and reviews, forums and communities, together with three...
This paper examines the impact of privacy, security, and trust (PST) on the Technology Acceptance Model (TAM) and Task-Technology Fit (TTF) model for consumers of e-commerce. The findings of this pilot study were drawn by designing a structural equation model (SEM) on the impact of privacy, security, and trust (PST) on TAM and TTF models for consumers of e-commerce. The population for this pilot study...
To know and to control the data does not mean that we are in possession of the information. Thinking further, if we have information, even that doesn't mean that we have knowledge. Knowledge is power. That is why people insist and doesn't share it with others. What's more, we are trying to prevent it from getting into the wrong ears or hands. Nowadays data protection is considered to be well organized...
The purpose of this paper is to explore factors influencing e-commerce customers' awareness with respect to online shopping in Jordan. A questionnaire approach was employed in this research study, in order to obtain the most appropriate information for identifying the main factors concerning e-commerce in the context of the study. A self-administrated questionnaire was used as a method for obtaining...
Phishing website-based attacks remain pervasive, with high user susceptibility continuing to be a major factor. In this study we use cluster analysis coupled with an elaborate controlled experiment involving hundreds of participants to identify and examine high susceptibility user segments in terms of their perceptions, demographics, and phishing website traversal behavior. The results reveal three...
SMEs are the growth engine of a developing country's economy. It is actively contributing to GDP and employment. In consequence, SMEs financing support, ICT adoption promotion and SME's favorable evolution environment creation by policy makers, help reduce the digital divide in this era of the knowledge economy. High penetration and lower costs of Internet connectivity, Web technologies standardization,...
Today, E-Commerce has become the largest revenue generation industry, letting seller sell everything from a pen to plane to the customers across the globe. Over an E-commerce platform where user and vendor merely interact with each other, the trust is undeniably the most important factor for users to perform transactions online. But at the same time it can't be assessed directly using some pre-defined...
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
with the increasing popularity of network technology in China, the new mode of shopping, trading, payment through the Internet is developing rapidly. E-commerce with its low cost, high efficiency advantages, not only enjoyed by ordinary consumers, but also effectively promotes the small and medium enterprises to find business opportunities to win the market. It has become China's transformation of...
TCP is a connection-oriented protocol used for the transport of information across the Internet. The very nature of this powerful medium attracts cyber criminals who are continuously searching for new vulnerabilities within the TCP protocol to exploit for nefarious means. Reverse TCP attacks are a relatively new approach to exploit this connection process. The attacker is able to seize remote access...
Over the past 20 years web browsers have changed considerably from being a simple text display to now supporting complex multimedia applications. The client can now enjoy chatting, playing games and Internet banking. All these applications have something in common, they can be run on multiple platforms and in some cases they will run offline. With the introduction of HTML5 this evolution will continue,...
Network security and defense plays important roles in network management system. The traditional network security monitoring systems usually employ lots of agents to collected data and then perform abnormal detection based on measurement of those data. This kind of framework needs lots of agents and usually occupies many bandwidths. Focus on this problem, we introduce the mobile agents into the network...
E-commerce business is a new commodity trading patterns that is related with telecommunication and computer perfectly. E-commerce business has been developed rapidly with the development of both telecommunications and computer technologies. This paper makes a brief introduction to the E-commerce business model which is now a very popular technology for venture, and list other business benefits and...
In general website evaluation includes website function and website content and website credit, customer service and enterprise strength, website security, its interface design and website technology. These studies mainly are based on evaluation approach on traditional websites. The arrival of the era of big data provides new opportunities and challenges to the construction and application of electronic...
It is imperative to forecast advanced or emerging technologies to aid in decision making on firm's R&D investments and business plan for commercialization efforts. Even though a company must align R&D planning with overall business planning such as manufacturing, sales and marketing, personnel, and finance, systematic management approaches are limited in it based upon the prediction of technological...
The purpose of this paper is to demonstrate the importance of ethics applied to everyday moral problems arising from the use of e-banking services. These services have advantages in financial transactions, but security threats and vulnerabilities must be constantly reduced. In this framework raises the “good citizen” that desires to do well and needs to avoid harmful behavior [1]. While the “bad citizen”...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.