The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on reducing consumers' perceived risk through Website service quality cues in C2C e-commerce trading. It reveals a negative correlation between consumers' perceived risk and Website service quality in C2C E-commerce trading, and explores the internal composition of this relationship. Functional, physical, service, and psychological risks are found to be negatively affected mainly...
The following topics are dealt with: grid and cluster computing; performance evaluation and measurement; architectures and systems; wireless and mobile communications; network communications; security and privacy; reliability and fault tolerance; data mining and caching; AHPCN; multicore and multithreaded architectures and programming; network storage and data management; and parallel algorithm and...
According to the fact that consumer trust is widely perceived as an essential factor to the success of electronic commerce, we develop a model of consumer trust in e-commerce and use empirical research method to test it. After deep analyzing, we find that perceived size, propensity to trust, perceived privacy information protection, and perceived legal environment security are insignificantly related...
As cyberspace has evolved into a large, dynamic, and tangled web of computing devices, engineers often fail to design in dependability properties-such as stability, robustness, and security-at the system level. Consequently, unintentional and malevolent actions taken in cyberspace have affected critical infrastructures in the physical world. These disturbances and systems' resultant undependable behavior...
In these uncertain economic times, two key ingredients in short supply are trust and confidence. The concept of trust has been around for many decades (if not centuries) in different disciplines such as business, psychology, and philosophy as well as in technology.
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.