3,564 research outputs found

    Transaction Streams: Definition and Implications for Trust in Internet-Based Electronic Commerce.

    Get PDF
    In this paper we analyze how transactions related to the exchange of goods and services are being performed on the Internet. The adoption of electronic markets in an industry has a disintermediation potential because it can create a direct link between the producer and the consumer (without the need for the intermediation role of distributors). Electronic markets lower the search cost, allowing customers to choose among more providers (which ultimately reduces both the costs for the customer and the profits for the producer). In this paper we contend that electronic markets on the Internet have the opposite effect, resulting in our increase in the number of intermediators. We introduce transaction streams, which model how transactions are being conducted and help explain the types of new intermediators that are appearing on the Internet. We also describe mechanisms by which companies are exploring ways of extending transaction streams. To illustrate the model and validate our findings, we analyze transaction streams in the insurance industry and review associated concepts such as trust and brands.transactions; electronic markets;

    The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption

    Get PDF
    A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys

    The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption

    Get PDF
    A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys
    • …
    corecore