Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In case that individuals feel their privacy is violated while using any recommender system, they might be willing to declare incorrect information or even completely refuse to use such services. To relieve customer concerns, privacy risks that are inherent in the utilization of such systems need to be discussed principally, and service providers should offer privacy-preservation mechanisms. Also,...
The implications of the Trans Pacific Partnership (TPP) Agreement for promoting innovation and growth in the Digital Economy of the Asia-Pacific Region are examined. The Treaty is the first multilateral agreement to specifically take up economic and trade issues related to the Internet and includes ground-breaking provisions with respect to online privacy, cybersecurity, promotion of cross-border...
We study the relationship between personalization and individual privacy on the customer's online buying behavior. Following a laboratory experiment we tested the differences for number of clicks and number of products added to cart with respect to two factors-personalization and product privacy. Our results show significant mean differences with respect to clicks and number of products added to the...
People are used to getting served by using mobileapplications. Applications for taxi calling such as Uber andDidi are in a dominant position. Along with employing thesesoftwares, personal information may leak while being transferredor preserved on the internet. Consider that a user's information preserved on the internet is obtained by an malicious adversary then he may further speculate user's privacy...
Companies often update their privacy policies, but it is unclear whether these updates strengthen or weaken user privacy. Using a principal-agent theoretical lens, we analyze over 200 changes to privacy policies of five prominent Internet companies over a period of fifteen years. We find that over time, privacy policy updates are more likely to weaken, rather than strengthen, user privacy on the Internet...
Consumer privacy and protection of personal information are among the forefront of emerging complex social issues in the internet age. This growing threat to consumers' safety and security is framed as a systemic problem of structural inequality, specifically one where consumers are situated in positions of inferior bargaining power compared to the online service providers they engage in personal...
Software applications such as e-services need to obtain knowledge about their users. This is essential in many platforms in which the user has to get the comfort and easiness of a more personal feeling. Examples of these platforms are intelligent e-commerce applications, intelligent tutoring systems, intelligent agents, adaptive multimedia systems and search engines. The purpose of this paper is to...
This study aims to understand how customers perceive the value of the electronic reservation services and how the perception influences their acceptance intention toward the services. Four potential factors (perceived ease of use, usefulness, negativity, and compatibility) are incorporated to examine their impacts on customers' acceptance of the three electronic reservation services (Internet, telephone,...
The Internet of Things (IoT) becomes reality. But its restrictions become obvious as we try to connect solutions of different vendors and communities. Apart from communication protocols appropriate identity management mechanisms are crucial for a growing IoT. The recently founded Identities of Things Discussion Group within Kantara Initiative will work on open issues and solutions to manage “Identities...
Topics include ongoing problems caused by the Heartbleed Internet-security flaw, the end of another epic Apple-Samsung patent-related trial, an Internet Explorer bug threatening users of the world's most popular browser, new laser technology that could quadruple Internet-access speeds, Facebook working on drones and satellites to bring the Internet to remote areas, a US government report that says...
Topics include a huge personal-data theft in South Korea; Microsoft choosing a new CEO; the first Internet of Things attack; large amounts of Chinese Internet traffic being accidentally redirected to two small US companies; a court overturning the US's controversial Net neutrality policy; concerns about connected cars; Google's smart contact lenses; a new product that adds physical buttons to touchscreens;...
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs) have been identified as some of the most common means of social engineering attacks. Due to factors that reduce users' ability to detect social engineering tricks and increase attackers' ability to launch them, SNSs seem to be perfect breeding...
The development of the Internet is sustainable because of existing business models. Among them one of the most common is currently pay-per-click which is based on recording users' behaviors (in particular clicks but it may also be actions) and charging advertisers according to this information. On the other hand registering users clicks causes a serious threat for privacy. Additionally part of this...
With the global digitalization of information, the spate of personal data protection cases had disturbed not only Malaysian but netizens over the world. People's awareness and perceptions towards personal data protection had exacerbated the problem of personal data protection. A group of 126 students from the Bachelor of Information Technology program was surveyed on their awareness and perceptions...
There has been increasing challenges in the effective structure of crucial information for effectual information security, personal privacy and data protection. Especially, when in an age of e-commerce, risks and threats from e-commerce transaction have been keeping rising up. Both new ways of cyber information security and security breach, which have affected people's life in some particular aspects,...
E-commerce is one of the mediums being used for online business via internet. Buying, selling and exchanging information are examples of activities conducted in e-commerce. In order to use e-commerce, some private information must be revealed by the customer. At this point, privacy policy plays the role in preventing unauthorized access to the user's private information. This study will investigate...
There have been increasing uses of Internet technologies as marketing tools to manage online customer experience, from personalized emails to location-aware apps on smart handheld devices. However, due to a lack of a comprehensive and integrated framework for managing customer's experience, it remains challenging for e-marketers to effectively employ these tools. This paper proposes a formal approach...
Almost all IT enabled service systems such as Google, Face book, Apple, Microsoft, Skype are facing criticisms on their use of customer data and their failure to protect customer privacy. These service companies rely on customers to participate actively in the co-creation of value by providing personal information, data and preferences. Such important resources and assets, if mishandled by companies,...
Trust issues have drawn widespread attention in e- commerce research. Traditional trust theories believe that the level of trust develops over time; and trusts in the initial interactions are normally low in level. However, a certain empirical studies show that by certain means can e-retailers higher the level of initial trust. This paper first reviews the concept and formation mechanisms of initial...
This paper investigated the factors that influence consumers in Malaysia to repurchase online. The emergence of Internet technology has created avenues for all firms to stay competitive through a more proactive approach, which involves building a sustainable business practice that leads to better business opportunities in this digital era. It is becoming critical for online firms to understand their...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.