32,804 Hits in 5.8 sec

Safeguarding and charging for information on the Internet

H. Garcia-Molina, S.P. Ketchpel, N. Shivakumar
Proceedings 14th International Conference on Data Engineering  
In particular, we study how one can nd and pay for digital information, and how one can safeguard the information from invalid access and duplication.  ...  With the growing acceptance of the Internet as a new dissemination medium, several new and interesting challenges arise in building a digital commerce infrastructure.  ...  These systems were not intended for e-commerce however. The goal of widespread dissemination of scienti c information was incompatible with the practice of charging for information or goods.  ... 
doi:10.1109/icde.1998.655776 dblp:conf/icde/Garcia-MolinaKS98 fatcat:gu5kkb43srhbfa3wmpfpbhjnru

Internet Service Features and Satisfaction among Internet Banking Users

Adam Ridhuan Abdullah, Nur Syarina Md Som, Azrol Ibrahim, Nooraini M. Sheriff
2015 Journal of Management Research  
Internet banking gives customers the option to perform banking transactions and other related 401 activities on the go or from home, twenty-four hours a day, 365 days a year.  ...  Hence, to strategize and convince customers to use internet banking, mandates the need to understand their satisfaction on key service features offered through internet banking to them.  ...  Equally important was their ability to access details pertaining bank charges, fund transfer between accounts, information on competitors' interest rates, foreign exchange rate commission charged for foreign  ... 
doi:10.5296/jmr.v7i2.6944 fatcat:qfcg24c46nb3xfs3q6lm62a5i4

Safeguarding Digital Library Contents

Amir Herzberg
1998 D-Lib Magazine  
We believe that the reason that most content on the Internet is provided for free is that existing payment mechanisms are inappropriate for charging for content on the Internet, especially for small charges  ...  We believe that the reason that most content on the Internet is provided for free is that existing payment mechanisms are inappropriate for charging for content on the Internet, especially for small charges  ... 
doi:10.1045/january98-herzberg fatcat:4srmcsnfyfanncjufflfgospti

Reconciling Political and Economic Goals in the Net Neutrality Debate

Johannes M. Bauer, Jonathan A. Obar
2014 The Information Society  
The net neutrality debate is one of several sites of struggles to adapt and redefine rights and obligations of stakeholders in the Internet-centric communications system.  ...  Its outcomes will shape the future of the Internet and influence the level and distribution of its benefits.  ...  It is a quest for a set of governance mechanisms and a broader governance regime that can preserve and safeguard the benefits of the Internet for society.  ... 
doi:10.1080/01972243.2013.856362 fatcat:gi5x5dtvb5bavagtdrygwqelkm


Yang Liu
2015 US-China Law Review  
In China, the online finance will be therefore jeopardized, when the foreign government to overuse its power. For this reason, China needs to construct its own safeguarded internet networks.  ...  For the investors, such kind of information is very practical, and will increase the security of investments. C.  ... 
doi:10.17265/1548-6605/2015.04.003 fatcat:bet7et7vp5dsddwkt3licr255m

Page 2 of Science Trends Vol. 68, Issue 5 [page]

1994 Science Trends  
E-mail: for information on Internet availability. For general queries: & (Radiation Testing on Humans, Serial No. 103-102.  ...  Available without charge from Chmn., Subccmmittee on Energy and Power, US House of Representatives, Wash., DC 20515.)  ... 

The Second-Order Security Dilemma [chapter]

Richard Baskerville
1996 IFIP Advances in Information and Communication Technology  
These issues also regard the safeguards that may be deployed to protect systems from these direct threats. The second-order issues regard the impact of these safeguards on the organization.  ...  The purpose of this paper is to analyze a fundamentally different perspective on the nature of infonnation systems security safeguards.  ...  One aspect is the possible increased reliance on people for safeguards rather than complete reliance on rigid technologies.  ... 
doi:10.1007/978-0-387-34872-8_15 fatcat:q7rjf6kk3rhqvk37zbz47m7obu

Safeguarding that personal bit

S. Berner
2003 South African Journal of Information Management  
For more information, see Site-seeing on the Internet: a traveler's guide to cyberspace from the FTC at  ...  The following are things one could do to safeguard hardcopy information (ARMA 2003): Order a copy of your monthly credit report from your bank.  ...  ISSN 1560-683X Published by InterWord Communications for Department of Information Studies, Rand Afrikaans University  ... 
doi:10.4102/sajim.v5i4.382 fatcat:sne2ckrnsvgpjhz6no5bymlfxy

How Should an Attorney Deal with High Technology in Their Law Practice?

Donald L. Buresh, Morgan State University
2022 International journal of social science and human research  
The paper briefly describes the common law and regulatory law associated with safeguarding data. Compliance with existing ABA Rules and federal and state statutes is paramount.  ...  Electronic court filing, how a client employs technology, the presenting of digital evidence in a courtroom, and open-source Internet investigations and research tools.  ...  Open-Source Internet Investigations and Research Tools Open-source Internet investigations gather data that is freely available on the Internet.  ... 
doi:10.47191/ijsshr/v5-i2-14 fatcat:hbtdztvk75ewdia4bwu2s5t4gq

Safeguard Clothing and Dive Decrease

Conceptual—Security is one of the significant issues which the present progressed IoT dangers require a point by point episode reaction methodology when complex hacking assaults.  ...  dynamically getting to be noticeably brilliant as anyone might expect, It's been IoT (Internet of Things) to IoE (Internet of Every Thing) time, Sapless security may influence the lives of a large number  ...  Digital performing artists can change the design, and run charges on the gadgets, possibly empowering the gadgets to gather touchy data or lead assaults against homes and organizations, or participate  ... 
doi:10.35940/ijitee.i3265.0789s319 fatcat:7vyekuazn5btfd4ku6sbkiosyy

Why don't they just stop stopping the internet?

Tanmay Singh, Fachinformationsdienst Für Internationale Und Interdisziplinäre Rechtsforschung
2021 Verfassungsblog  
As the application for compliance remains pending, internet shutdown orders continue to be issued on an ad hoc basis with no streamlined procedure, safeguards, or judicial oversight in place.  ...  The Court provided detailed guidelines and safeguards to be adopted by the state before ordering the internet to be suspended.  ... 
doi:10.17176/20211026-183052-0 fatcat:3dpg57at75dspd2btdy5b2rpcm

Sovereignty Fever: The Territorial Turn of Global Cyber Order

Chien-Huei Wu
2021 Heidelberg Journal of International Law  
However, sovereignty is not the last word in debates concerning the future of digital society, for even liberal democracies have advanced ideas of technological or digital sovereignty, and data sovereignty  ...  , for their own very different purposes.  ...  model for information flows on the Internet and a potential instrument for suppressing dissents, 60 the attempts demonstrate the ambition of China and other SCO members to shape global cyber governance  ... 
doi:10.17104/0044-2348-2021-3-651 fatcat:qpkq5xwhtbh2znfwlkzjzoo7du

Page 183 of Newsletter on Intellectual Freedom Vol. 45, Issue 5 [page]

1996 Newsletter on Intellectual Freedom  
‘‘Technology can provide a much more effective safeguard without restricting the free flow of ideas and opinions on the Internet.’’  ...  James Exon (D-NE), who sponsored the CDA, charged that the court had ‘‘taken the ACLU line that anything goes on the Internet, even though that overlooks  ... 

Where Internet Service Providers and Telephone Companies Compete: A Guide to the Computer Inquiries, Enhanced Service Providers and Information Service Providers

Robert NMI Cannon
2001 Social Science Research Network  
In the Access Charge Reform Order, the Commission decided to maintain the existing pricing structure and continue to treat ESPs as end users for the purpose of applying access charges.  ...  subscribers use the service for Internet access).  ...  In order to safeguard the competitive nature of the marketplace, Congress imposed an interLATA safeguard for the provision of "information services.  ... 
doi:10.2139/ssrn.274660 fatcat:pt44lvq75rdqlih6a2z6f6dnym

Barriers to Putting Businesses on the Internet in Malaysia

Norhayati Abd. Mukti
2000 Electronic Journal of Information Systems in Developing Countries  
The most frequently chosen categories were related to security and the uncertain nature of the legal contract between supplier and customer.  ...  Although some differences were found among certain types of companies, such concerns were generally felt by small and large companies and those with varying e-commerce experience.  ...  Robust security devises using encryption are needed to increase trust in and provide safeguards for e-commerce users [3] .  ... 
doi:10.1002/j.1681-4835.2000.tb00013.x fatcat:ywzuebfjuzhvdpbfloqpmb4j3q
« Previous Showing results 1 — 15 out of 32,804 results