Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In case that individuals feel their privacy is violated while using any recommender system, they might be willing to declare incorrect information or even completely refuse to use such services. To relieve customer concerns, privacy risks that are inherent in the utilization of such systems need to be discussed principally, and service providers should offer privacy-preservation mechanisms. Also,...
We study the relationship between personalization and individual privacy on the customer's online buying behavior. Following a laboratory experiment we tested the differences for number of clicks and number of products added to cart with respect to two factors-personalization and product privacy. Our results show significant mean differences with respect to clicks and number of products added to the...
Web Search Engines (WSEs) keep the record of the queries sent by their users in files named query logs. This kind of data is mainly used to improve the user experience by means of personalizing search results, auto-completing search terms, correcting spelling mistakes, etc. On the other hand, the companies that offer WSE services can also sell this data to obtain economic benefits, this is known as...
Companies often update their privacy policies, but it is unclear whether these updates strengthen or weaken user privacy. Using a principal-agent theoretical lens, we analyze over 200 changes to privacy policies of five prominent Internet companies over a period of fifteen years. We find that over time, privacy policy updates are more likely to weaken, rather than strengthen, user privacy on the Internet...
With the global digitalization of information, the spate of personal data protection cases had disturbed not only Malaysian but netizens over the world. People's awareness and perceptions towards personal data protection had exacerbated the problem of personal data protection. A group of 126 students from the Bachelor of Information Technology program was surveyed on their awareness and perceptions...
Outsourcing can provide companies with a competitive advantage in cost. Finding the right company to outsource operations can be a challenge. Part of this challenge is communicating with prospective suppliers. Requests for quotations were sent to injection molders in the U.S., Mexico, and China. U.S. suppliers were found to be more responsive to e-mail and requested more information regarding the...
Cloud computing is emerging as a serious paradigm shift in the way we use computers. It relies on several technologies that are not new. However, the increasing availability of bandwidth allows new combinations and opens new IT perspectives. The data storage and processing power are being moved to more efficient and centralized structures over the web. Costs are being reduced with the loss of our...
Evolution of Web 2.0 applications has changed the outlook of business models and companies. Organizations need to rethink their communication, marketing and sale channels and how their employees and customers interact together internally and externally. Following this new trend, they also need to adopt their IT infrastructure and enhance their online presence and services in order to stay competitive...
An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose a solution for anonymous yet reliable access control and accountability based on ring and group signatures.
The rush-to market attitude of B2C e-commerce Web sites development affects their quality. Thus, big number of these Web sites includes many vulnerabilities are shipped to end users. Many researchers attempted to build models to evaluate the quality of B2C Web sites. However, the majority of these models used big number of quality factors and need a big amount of data for testing. This study attempts...
E-commerce is growing at an exceptional rate as more organizations are offering their goods and services on-line every day. Importantly, this growth is being matched by the number of people gaining access to the Internet in a variety of ways. E-commerce offers opportunities as well as threats. Information is crucial for any organization especially in the e-market. A key negative perception centres...
Although several studies have examined individuals' privacy concerns and companies' privacy policy disclosures, only a few studies examined whether customers' privacy concerns are adequately addressed in companies' privacy policy disclosures. This study investigates companies' privacy policy statements and important privacy policies that individuals want to know. We examine the privacy policy statements...
Personal data is a valuable asset for service providers. To collect such data, free services are offered to users, for whom the risk of loosing privacy by subscribing to a service is often not clear. Although the services are free in terms of money, the user does not know how much he or she actually pays for a given service when allowing his or her data to be collected, unaware of taking a significant...
There are several factors restricting the development of online-shopping in China, the imperfect privacy protection law and consumers' distrust are the main barriers. By using a sample of 759 Chinese students, our study examined the IUIPC instrument and analyzed the relationship between Internet users' information privacy concerns and their intention to transact online. Consistent with prior findings,...
Due to the considerably big marketplace, enterprises seek to benefit from e-commerce in China. But up to now very few of them have been successful, because some successful business models and strategies in developed countries can not be applied in China. This study examines obstacles on e-commerce development in China and attempts to find out some solutions to overcome these barriers. The relevant...
We present a personal data management framework called Polis, which abides by the following principle: Every individual has absolute control over her personal data, which reside only at her own side. Preliminary results indicate that beyond the apparent advantages of such an environment for userspsila privacy, everyday transactions remain both feasible and straightforward.
Understanding how consumers perceive the market is a necessity for an E-commerce (EC) site's survival. The number of EC consumers has been increasing, and customerpsilas trust in EC has become a critical issue. The objective of our study was to apply a two-step cluster analysis in profiling EC consumerspsila demographic characteristics and perception of trust in EC. The findings suggest four clusters...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.