Showing 1 - 10 of 3,896
Persistent link: https://www.econbiz.de/10011293762
personally identifiable information. We have termed it Privacy Shield. Through the application of anonymity and privacy …
Persistent link: https://www.econbiz.de/10009434973
Persistent link: https://www.econbiz.de/10014503406
We investigate whether revealing the identities in a public good game that includes a donation incentive leads to higher contributions to the public good. Previous evidence suggests that contributions to a public good increase significantly when these take place in public. Also, the amount of...
Persistent link: https://www.econbiz.de/10013200094
Crowdfunding allows the public to donate small amounts of money to entrepreneurs through online platforms. In contrast with traditional financial institutions, this new method facilitates the financing process through direct and easy online contact between initiators and investors. Based on the...
Persistent link: https://www.econbiz.de/10012611309
We propose a simple criterion to compare generalized median voter schemes according to their manipulability. We identify three necessary and sufficient conditions for the comparability of two generalized median voter schemes in terms of their vulnerability to manipulation. The three conditions...
Persistent link: https://www.econbiz.de/10011599577
Purpose – Given the current ecological state of the planet organizations now need to develop their sustainability to a significantly greater extent and at a faster pace. This paper aims to propose stakeholder collectives as a means for rapid and comprehensive sustainability, while also...
Persistent link: https://www.econbiz.de/10014714433
Location Based Services (LBS) expose user data to malicious attacks. Approaches, evolved, so far, for preserving privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved. In particular, accuracy of results vs. privacy degree,...
Persistent link: https://www.econbiz.de/10012042666
. However, such strategy has many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs … system focused on: (i) anonymity and resilience to censorship; (ii) authenticatable content; (iii) semantic interoperability …
Persistent link: https://www.econbiz.de/10012044163
fall under a watchful eye on their Internet activities then maintaining anonymity it not only essential for getting out …
Persistent link: https://www.econbiz.de/10012045239