487,847 research outputs found

    Are internet firms different? : evidence from insider trading

    Get PDF
    This study investigates whether the information content of insider transactions, with a focus on sell transactions, is different for high growth, high volatility Internet-based firms. Prior research on more “traditional” firms has found a small, but significant negative abnormal return with insider sells, which points to an association of insider sells with negative information about the firm by outsiders. We employ several models to examine over 1,000 inside transactions for more than 100 NETDEX firms to find that for Internet firms, insider sells are not followed by a significant negative abnormal return. Firm size effects differ between the different methods employed. In conclusion, it appears that while insider sales in traditional firms are motivated by information asymmetry reason, insider sales in Internet firms are not. We conclude that Internet firms are different indeed.

    Getting Serious Online

    Get PDF
    Presents findings from a survey conducted in March 2001. Looks at how the Internet is increasingly being used to perform work-related tasks; make financial transactions; and conduct other more functional activities

    Security Policies Approached by Value Analysis Concepts

    Get PDF
    This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy. In this context, the purpose is to introduce the use of end user (customer) value concept in the process of Security policy framework designsecurity, privacy, Internet, value analysis, end users, requirements

    Privacy Concern and Online Transactions: The Impact of Internet Self-efficacy and Internet Involvement

    Get PDF
    Purpose – This study aims to examine the effects of internet self-efficacy and internet involvement on privacy concern and the effect of privacy concern on the frequency of online transactions. The study also seeks to examine the direct effect of internet self-efficacy and internet involvement on the frequency of online transactions. Design/methodology/approach – A structural equation model was developed to test the hypotheses. The model was tested using the LISREL 8.8 software and both structural and measurement parameters were estimated. Findings – Findings suggest that internet self-efficacy and internet involvement affect privacy concern negatively; and privacy concern, in turn, affects frequency of online transactions negatively. Findings also indicate that the direct effect of internet self-efficacy and internet involvement on the frequency of online transactions is positive. All parameters are significant and in the hypothesized direction. Practical implications – Findings highlight the significance of internet self-efficacy and internet involvement in explaining both privacy concern and online transactions. The negative impact of privacy concern shows strategically why businesses should take measures to protect privacy of consumers and assure them that the information they provide is protected and secure. Originality/value – This research contributes to the debate on privacy concern and adds to the growing body of literature on the impact of privacy concern on online transactions. Both antecedents and consequence of privacy concern are examined in the study

    The hidden face of electronic commerce between enterprises (La face cachée du commerce électronique inter-entreprises)

    Get PDF
    Does the development of new means of circulating and processing information (notably the internet) ensure an immediate and easy access to information by every economic agent? Strategic information, that which is essential to define and implement the technical and financial strategies of organisations, is in the centre of the global competition between enterprises and becomes a real economic good. The industry of information expands strongly, notably over the internet. Electronic transactions between enterprises are characterised by the buying and selling of strategic information. But the access capacity to information depends on the quantity of human and financial resources which permits to large enterprises to acquire, process and protect information. Electronic commerce is in the hands of large size's enterprises Le développement de nouveaux moyens techniques de diffusion et de traitement de l'information (notamment Internet) assure-t-il un accès immédiat et facile à l'information pour tous les acteurs économiques ? L'information stratégique, celle qui est essentielle à la définition et à la mise en oeuvre des stratégies techno-financières des entreprises, est au coeur de la concurrence mondiale et devient un bien économique à part entière. L'industrie de l'information se développe fortement, notamment via Internet. Les transactions électroniques interentreprises sont caractérisés par l'achat et la vente d'informations stratégiques. Mais la capacité d'accès à l'information dépend de la quantité des ressources humaines et financières qui permet aux plus grandes entreprises d'acquérir, de traiter et de protéger l'information. Le commerce électronique est entre les mains des entreprises de grande taille.Internet, Information, information stratégique, transactions électroniques/ Internet, Information, Strategic information, electronic transaction

    Concurrent Knowledge-Extraction in the Public-Key Model

    Get PDF
    Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the internal state of protocol players without ever looking at this supposedly secret state. However, when transactions are concurrent (e.g., over the Internet) with players possessing public-keys (as is common in cryptography), assuring that entities ``know'' what they claim to know, where adversaries may be well coordinated across different transactions, turns out to be much more subtle and in need of re-examination. Here, we investigate how to formally treat knowledge possession by parties (with registered public-keys) interacting over the Internet. Stated more technically, we look into the relative power of the notion of ``concurrent knowledge-extraction'' (CKE) in the concurrent zero-knowledge (CZK) bare public-key (BPK) model.Comment: 38 pages, 4 figure

    XML and Its Potential for Ecommerce

    Get PDF
    This paper reviews the origin and development of standards for Electronic Data Interchange, considering exceptions and variations that standards need to accommodate It examines cost factors that affect implementation and discusses conducting EDI over the Internet and the importance of metatags and data type definitions for interpreting data structures and improving functionality of business transactions. It looks at XML (eXtensible Markup Language) as a proposal to broaden the applicability of transacting business over the Internet by bringing EDI to the desktop

    Les transactions commerciales sur Internet

    Get PDF

    The ProCard mobile banking system

    Get PDF
    The mobile banking involves the use of some mobile telecommunication devices (such phones or PDAs - Personal Digital Assistants) in order to complete, in a secure manner, banking transactions (like payments, transfers, account information and so on). It doesn't matter where the user is physically located. Also, the hour when the services are requested is not important anymore, because, thanks to the internet banking, the offices are virtually opened 24 hours per day. The ProCard system represents a suite of applications used to perform mobile banking. It was intended to be a universal solution that allows EFT, Internet and mobile banking in a single package. No special software or hardware is requiredInternet banking, mobile banking, electronic transactions, electronic funds transfer, mobile terminal, PDA, SSL, parallel processing, grid networks, clusters of workstations, grid processing.
    corecore