A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is
In particular, we study how one can nd and pay for digital information, and how one can safeguard the information from invalid access and duplication. ... With the growing acceptance of the Internet as a new dissemination medium, several new and interesting challenges arise in building a digital commerce infrastructure. ... These systems were not intended for e-commerce however. The goal of widespread dissemination of scienti c information was incompatible with the practice of charging for information or goods. ...doi:10.1109/icde.1998.655776 dblp:conf/icde/Garcia-MolinaKS98 fatcat:gu5kkb43srhbfa3wmpfpbhjnru
Internet banking gives customers the option to perform banking transactions and other related 401 activities on the go or from home, twenty-four hours a day, 365 days a year. ... Hence, to strategize and convince customers to use internet banking, mandates the need to understand their satisfaction on key service features offered through internet banking to them. ... Equally important was their ability to access details pertaining bank charges, fund transfer between accounts, information on competitors' interest rates, foreign exchange rate commission charged for foreign ...doi:10.5296/jmr.v7i2.6944 fatcat:qfcg24c46nb3xfs3q6lm62a5i4
We believe that the reason that most content on the Internet is provided for free is that existing payment mechanisms are inappropriate for charging for content on the Internet, especially for small charges ... We believe that the reason that most content on the Internet is provided for free is that existing payment mechanisms are inappropriate for charging for content on the Internet, especially for small charges ...doi:10.1045/january98-herzberg fatcat:4srmcsnfyfanncjufflfgospti
The net neutrality debate is one of several sites of struggles to adapt and redefine rights and obligations of stakeholders in the Internet-centric communications system. ... Its outcomes will shape the future of the Internet and influence the level and distribution of its benefits. ... It is a quest for a set of governance mechanisms and a broader governance regime that can preserve and safeguard the benefits of the Internet for society. ...doi:10.1080/01972243.2013.856362 fatcat:gi5x5dtvb5bavagtdrygwqelkm
US-China Law Review
In China, the online finance will be therefore jeopardized, when the foreign government to overuse its power. For this reason, China needs to construct its own safeguarded internet networks. ... For the investors, such kind of information is very practical, and will increase the security of investments. C. ...doi:10.17265/1548-6605/2015.04.003 fatcat:bet7et7vp5dsddwkt3licr255m
E-mail: firstname.lastname@example.org for information on Internet availability. For general queries: email@example.com.) & (Radiation Testing on Humans, Serial No. 103-102. ... Available without charge from Chmn., Subccmmittee on Energy and Power, US House of Representatives, Wash., DC 20515.) ...
IFIP Advances in Information and Communication Technology
These issues also regard the safeguards that may be deployed to protect systems from these direct threats. The second-order issues regard the impact of these safeguards on the organization. ... The purpose of this paper is to analyze a fundamentally different perspective on the nature of infonnation systems security safeguards. ... One aspect is the possible increased reliance on people for safeguards rather than complete reliance on rigid technologies. ...doi:10.1007/978-0-387-34872-8_15 fatcat:q7rjf6kk3rhqvk37zbz47m7obu
For more information, see Site-seeing on the Internet: a traveler's guide to cyberspace from the FTC at www.ftc.gov. ... The following are things one could do to safeguard hardcopy information (ARMA 2003): Order a copy of your monthly credit report from your bank. ... ISSN 1560-683X Published by InterWord Communications for Department of Information Studies, Rand Afrikaans University ...doi:10.4102/sajim.v5i4.382 fatcat:sne2ckrnsvgpjhz6no5bymlfxy
The paper briefly describes the common law and regulatory law associated with safeguarding data. Compliance with existing ABA Rules and federal and state statutes is paramount. ... Electronic court filing, how a client employs technology, the presenting of digital evidence in a courtroom, and open-source Internet investigations and research tools. ... Open-Source Internet Investigations and Research Tools Open-source Internet investigations gather data that is freely available on the Internet. ...doi:10.47191/ijsshr/v5-i2-14 fatcat:hbtdztvk75ewdia4bwu2s5t4gq
Conceptual—Security is one of the significant issues which the present progressed IoT dangers require a point by point episode reaction methodology when complex hacking assaults. ... dynamically getting to be noticeably brilliant as anyone might expect, It's been IoT (Internet of Things) to IoE (Internet of Every Thing) time, Sapless security may influence the lives of a large number ... Digital performing artists can change the design, and run charges on the gadgets, possibly empowering the gadgets to gather touchy data or lead assaults against homes and organizations, or participate ...doi:10.35940/ijitee.i3265.0789s319 fatcat:7vyekuazn5btfd4ku6sbkiosyy
As the application for compliance remains pending, internet shutdown orders continue to be issued on an ad hoc basis with no streamlined procedure, safeguards, or judicial oversight in place. ... The Court provided detailed guidelines and safeguards to be adopted by the state before ordering the internet to be suspended. ...doi:10.17176/20211026-183052-0 fatcat:3dpg57at75dspd2btdy5b2rpcm
However, sovereignty is not the last word in debates concerning the future of digital society, for even liberal democracies have advanced ideas of technological or digital sovereignty, and data sovereignty ... , for their own very different purposes. ... model for information flows on the Internet and a potential instrument for suppressing dissents, 60 the attempts demonstrate the ambition of China and other SCO members to shape global cyber governance ...doi:10.17104/0044-2348-2021-3-651 fatcat:qpkq5xwhtbh2znfwlkzjzoo7du
Newsletter on Intellectual Freedom
‘‘Technology can provide a much more effective safeguard without restricting the free flow of ideas and opinions on the Internet.’’ ... James Exon (D-NE), who sponsored the CDA, charged that the court had ‘‘taken the ACLU line that anything goes on the Internet, even though that overlooks ...
In the Access Charge Reform Order, the Commission decided to maintain the existing pricing structure and continue to treat ESPs as end users for the purpose of applying access charges. ... subscribers use the service for Internet access). ... In order to safeguard the competitive nature of the marketplace, Congress imposed an interLATA safeguard for the provision of "information services. ...doi:10.2139/ssrn.274660 fatcat:pt44lvq75rdqlih6a2z6f6dnym
The most frequently chosen categories were related to security and the uncertain nature of the legal contract between supplier and customer. ... Although some differences were found among certain types of companies, such concerns were generally felt by small and large companies and those with varying e-commerce experience. ... Robust security devises using encryption are needed to increase trust in and provide safeguards for e-commerce users  . ...doi:10.1002/j.1681-4835.2000.tb00013.x fatcat:ywzuebfjuzhvdpbfloqpmb4j3q
« Previous Showing results 1 — 15 out of 32,804 results