The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet, Web 2.0 and Social Networking technologies are enabling citizens to actively participate in “citizen science” projects by contributing data to scientific programs. However, the limited expertise of contributors can lead to poor quality or misleading data being submitted. Subsequently, the scientific community often perceive citizen science data as not worthy of being used in serious...
How will information from online banks influence the choice of customers? This research uses information processing theory, WOM theory, perceived risk theory and trust theory, in order to find the flow of information from online banks to customers, and the relationships among those issues. Moreover, online banks in Mainland China are the targets of this research.
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. However, cloud computing facing so many security challenges due to the possible compromise or byzantine failures. In this paper, we focus on Ensuring data storage security in cloud computing, which is an important aspect of Quality...
Perceived risk is the crucial factor that influences consumers' online shopping intention, it is of great importance for the development of online shopping to examine how perceived risk affects consumers' online shopping intention. The result shows: Under the C2C model, financial risk, performance risk, time risk, health risk and psychological risk have remarkable negative impact on purchase intention,...
The security of data which is transferred in E-business and E-Government is becoming more and more important. Using of IP security protocol can solve the reality and reliability problem, greatly improves the security of transmitted data. An IP security gateway realization is introduced in this paper.
The Internet based educational systems is playing more and more important role in the modern education systems. In the system, one of the key problems is the network test management system and its security. In this paper, we introduce a network test management system based on certification authority and security transmission mechanism.
Dependability, which is regarded to be an integrative concept characterized by properties such as reliability, safety, security, and maintainability, has been paid more and more attentions recently. However, it has not been followed with enough interest by traditional requirements engineering approaches. This paper proposes a knowledge based approach for dependability requirements elicitations. This...
In this paper, a concept of mobile service platform (MSP) is put forward, and the generating process of this platform is elaborated. To realize the platform, some analysis about existing technologies of mobile application is made, and the research of trusted platform is also involved in this paper. A method of hypothesized attestation platform is stated based on the technology of remote attestation...
Trust is critical for the growth of e-commerce. For consumers with or without experience, this study examines the influencing factors on online initial trust and ongoing trust by conducting an empirical test involving 800 participants with structure equation modeling (SEM). The results suggest the effects of perceived information quality on initial trust is significant, but its effect on ongoing trust...
Virtual Community and E-commerce are both new research area which is becoming popular in IS academia. In most of research papers, virtual community and e-commerce are talked separately in different stream. Since many e-commerce websites contain a virtual community, we combine these two together to consider whether discussions in virtual communities can influence people's online shopping behaviors...
This paper proposes a new image based CAPTCHA test, activity recognition CAPTCHA. In this test the user is presented with a set of distorted images depicting a randomly chosen activity. The user has to recognize the common activity associated with the images and annotate it from a given list of activities to pass the test. The user studies indicate that this CAPTCHA can be solved with 99.04% average...
According to the fact that consumer trust is widely perceived as an essential factor to the success of electronic commerce, we develop a model of consumer trust in e-commerce and use empirical research method to test it. After deep analyzing, we find that perceived size, propensity to trust, perceived privacy information protection, and perceived legal environment security are insignificantly related...
Nowadays technology is growing fast and always adds new dimensions to our daily lives. In this way, Internet banking systems allow users to manage financial affairs such as checking account balances and transferring money between accounts as fast and easy as it can be. This study is done in Iran and Malaysia, the basic structure in Malaysia causes more concern, as well as use of this new way of banking...
Due to perceived high risk in the first transaction and Internet low switching cost, building consumer initial trust is crucial for online vendors. Extant research has often examined determinants of initial trust from the perspectives of TAM and trust transference, and seldom considered the initial trust building from dual-routes. Drawing on ELM, we analyzed the different effect of argument quality...
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congress' goals for 2007 was for 80% of tax and informational returns to be filed electronically. However, to date that goal has not been achieved. This paper proposes a model of e-file adoption integrating the UTAUT model, online trust, perceived risk, and optimism bias into a comprehensive model of...
As cyberspace has evolved into a large, dynamic, and tangled web of computing devices, engineers often fail to design in dependability properties-such as stability, robustness, and security-at the system level. Consequently, unintentional and malevolent actions taken in cyberspace have affected critical infrastructures in the physical world. These disturbances and systems' resultant undependable behavior...
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of social informatics on cyber trust. Therefore, it is essential to establish a research framework that applies in cyber trust from a perspective of social informatics so that cyber trust may be achieved by different professionals...
A distributed file system integrates the storage devices on the network and stores files on remote file servers so that clients can access them through Internet anytime and anywhere. However, to ensure the reliability and security of critical data, the maintenance cost is usually high. Some researches propose solutions to use Webspace as storage. These are efficient for individual users or small enterprises...
The following topics are dealt with: Internet; network architecture; Web services; security; wireless sensor network; data management; data modelling; networked sensing system; reliability; social responsibility; grid computing middleware; Web-supported learning communities; ubiquitous networking; and mobile systems.
Reputation is a crucial factor in trust and thus in Web communities. Trust strategies may involve investigating user reputation or directly using transitive reputation to form the Web of Trust. We suggest an approach that takes advantage of both strategies without increasing the cost of investigation. Several systems nowadays form what we call ldquouser Web communitiesrdquo. In these communities,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.