Showing 1 - 10 of 33
To date, consumer behaviour research is still over-focused on the functional rather than the dysfunctional. Both empirical and anecdotal evidence suggest that service organisations are burdened with the concept of consumer sovereignty, while consumers freely flout the ‘rules’ of social...
Persistent link: https://www.econbiz.de/10009438183
Drawing on the labelling process in reactions to deviance, a model of the interplay of a coworker’s extra …-organizational deviance and an individual’s reactions to that coworker has been developed. Three studies were conducted to further explore the … model in order to more fully understand the phenomenon of extra-organizational deviance. The first study (n=12) was …
Persistent link: https://www.econbiz.de/10009455323
degree on IT efficiency and security. The findings of this study, which has been conducted in partnership with the … of the present e-security situation in SMEs of Queensland's Gold Coast region. The data shows that the installation and … to handle this burden by themselves without the availability of support programs to reasonable charges, for specialised e-security …
Persistent link: https://www.econbiz.de/10009437520
risk is placed on the security and privacy of the data. PVI, LoBot, and TVEM provide a means for clients to establish trust … in cloud platforms, thus reducing their risk exposure. PVI is a new management and security model that shares the … responsibility of security management in cloud computing between the service provider and client, decreasing the risk exposure to …
Persistent link: https://www.econbiz.de/10009439441
are more likely to affect user satisfaction than unintentional security breaches. Additional analyses were performed using … privacy policies and the impact of privacy and security breaches. As part of this research, a conceptual model is presented … that demonstrates the relationships between factors such as usability, privacy and security, and complexity of a …
Persistent link: https://www.econbiz.de/10009439442
In this thesis we discuss two demanding problems from the field of computer and communication security that involve …, other than in traditional computer security problems, the adversary has a lot of control over the situation. The untrusted … ways: We propose relaxed, but still practically useful, notions of security for the DSP problem; we identify theoretical …
Persistent link: https://www.econbiz.de/10009467070
an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions … prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with …
Persistent link: https://www.econbiz.de/10009467071
information about this object. This thesis discusses the information security challenges involved in the design and use of an IOT … discussed, including multilateral security and the client perspective, which have been neglected in IOT standards and research … literature so far. Second, we conduct a detailed security analysis of the most influential standard Object Naming Service (ONS …
Persistent link: https://www.econbiz.de/10009467072
Rapide Fortschritte in der Netzwerk- und Speichertechnologie haben dazu geführt, dass Informationen über viele verschiedene Quellen wie z.B. Personal Computer oder Datenbanken verstreut sind. Weil diese Informationen oft auch sehr heterogen sind, wurde gleichzeitig die Entwicklung effektiver...
Persistent link: https://www.econbiz.de/10009467121