The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Companies often update their privacy policies, but it is unclear whether these updates strengthen or weaken user privacy. Using a principal-agent theoretical lens, we analyze over 200 changes to privacy policies of five prominent Internet companies over a period of fifteen years. We find that over time, privacy policy updates are more likely to weaken, rather than strengthen, user privacy on the Internet...
Growth in the interconnectivity of the internet and mobile technology has paved the way for augmented reality (AR) to be used in apparel, engaging consumers through extended garment features, such as promotion, entertainment and information delivery. However, for this to achieve social acceptance, consumers have to be informed of the emerging technology and persuaded of its benefits. Using a qualitative...
With the proliferation of technology it is important the healthcare industry advance to adapt to market competition. With recent electronic prescription service becoming up and running it demonstrates how the use of technology can improve efficiency of work. Utilising this technology we can see first-hand how it helps facilitate the doctor-patient relationship. The use of a computer system also has...
We are living in an era of big data - an age of huge information. Big Data incorporate endless information. Big Data is getting larger in industries and providing better business. It has changes the world in the terms of predicting customer's behaviour. Another buzz word these days is social networks and relation between two of these is very obvious yet complicated. Both Big Data and Social network...
This paper measures marketing ability and financial performance and examines what cause the overall operations inefficiency based on the operational process decomposition. The empirical research on e-portal and e-commerce company show that e-portal company has better marketing ability while e-commerce firm has better financial performance. For e-commerce company, it is marketing ability conversion...
In this paper, we developed a business model of Social Web of Services that combines the idea of common social web and usual service selling, enhancing usual suggested ways of controlling smart devices. We modelled human-thing interactions using an agent-based simulation (ABM) to investigate the impact of IoT on human (user) behaviour patterns in order to provide analytical support and enhance the...
On the market there are many commercial web classification services and a few publicly available web directory services. Unfortunately they mostly focus on English-speaking web sites, making them unsuitable for other languages in terms of classification reliability and coverage. This paper covers the design and implementation of a web-based classification tool for TLDs (Top Level Domain). Each domain...
Fatal accidents continue occurring even though speed tracking system has been made mandatory in Malaysia. Most fleet management system receives time and location data from GPS module installed in every express bus through internet connection. These data are then manipulated to derive information for fleet management system including the real-time speed of the travelling bus. However the assigned personnel...
IP Geolocation is a key enabler for many areas of application like determination of an attack origin, targeted advertisement, and Content Delivery Networks. Although IP Geolocation is an ongoing field of research for over one decade, it is still a challenging task, whereas good results are only achieved by the use of active latency measurements. Nevertheless, an increased accuracy is needed to improve...
Social media data has become an important part of the digital ecosystem, especially for marketers who consider it as a precious and dangerous weapon companies should acquire to conquer the digital world. By every connection or navigation on networks and social media, internet users generate a huge amount of data: likes, tweets, shares … etc. This data flow gives brands the opportunity to attract more...
Contemporary human behaviours using the Internet and social media are an extension of behaviours seen long before the knowledge society. In particular, online identities and avatars, and the behaviours associated with these, have strong precedents in literature, in philosophy and in medieval carnival. The philosopher Mikhail Bakhtin has described these phenomena in detail. The growth in scale of such...
Cyber-Physical Systems and Internet-of-Things are a current pinnacle of technical, organizational, economical and social developments being present in all sectors of our lives, from industry to service infrastructures. When the Industry4.0 paradigm leaves the labs to come in broad daylight, understandable to be applied by small and medium enterprises is only a question of possessing the necessary...
Due to the rapid development of the IT industry, the threat of cyber-attacks has been increasing gradually and more intelligent. These days, the same attack groups carry out cyber-attack continuously by using their resources that are necessary to the attack. To respond more effectively to cyber terrors occurred by same the attack groups with the same purpose, we need to detect the same attack groups...
Building a knowledge base (KB) describing domain-specific entities is an important problem in industry, examples including KBs built over companies (e.g. Dun & Bradstreet), skills (LinkedIn, CareerBuilder) and people (inome). The task involves several engineering challenges, including devising effective procedures for data extraction, aggregation and deduplication. Data extraction involves processing...
Internet technology has changed many aspects in business these days, from new product and services development, to business process improvement such as online tender, mobile payment, online registration, and many others. As a result of those changes, companies need the right resources who understand on how to do business and compete in this new economy hence new competencies are hired. This research...
In this paper, we discuss how using Secondary Non-Admin Privileged (SNAP) accounts can mitigate a variety of attacks targeting privileged accounts. We present our methodology for implementing this approach and discuss how this can prevent a variety of attack-types. We note that other studies have shown that over 92 % of critical vulnerabilities require administrative access and present multiple case-studies...
In the changing development industry, training for the project team members is necessary to maintain with the most up-to-date tools and techniques. The software development organizations that provide appropriate training to their employees can expect e a higher quality from their development. In global software development as project members are scattered geographically, the training for the employees...
Research institutes and companies are focusing intensively on Complex Event Processing, Event Stream Processing, Information Flow Processing and Surprise Event Detection methods and algorithms. This phenomenon is intensified by the rapid evolution and spreading in practice of the Internet of Things services. A huge amount of data is created continuously by the physical and logical sensors embedded...
the development of internet comes with the other domain that is cyber-crime. The record and intelligently can be exposed to a user of illegal activity so that it has become important to make the technology reliable. Phishing techniques include domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.