Showing 1 - 10 of 18
As there is a lack of central management in an ecommerce interaction carried out based on peer-to-peer architecture, it is obvious for the trusting peer to analyze the Risk beforehand that could be involved in dealing with a trusted peer in these types of interactions. Another characteristic of...
Persistent link: https://www.econbiz.de/10009434921
In a peer-to-peer financial transaction there is a possibility of the trusted peer engaging in an untrustworthy manner and in a negative behaviour on the buyer's expense resulting in the loss of the buyer's resources. This possibility of the loss in the buyer's resources is termed as Risk. Hence...
Persistent link: https://www.econbiz.de/10009479409
Persistent link: https://www.econbiz.de/10002749884
Persistent link: https://www.econbiz.de/10004855793
Persistent link: https://www.econbiz.de/10009619023
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434833
There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design...
Persistent link: https://www.econbiz.de/10009434834
When considering information security and privacy issues most of the attention has previously focused on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security...
Persistent link: https://www.econbiz.de/10009434918
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434924
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating...
Persistent link: https://www.econbiz.de/10009434970