488,086 research outputs found
Are internet firms different? : evidence from insider trading
This study investigates whether the information content of insider transactions, with
a focus on sell transactions, is different for high growth, high volatility Internet-based
firms. Prior research on more traditional firms has found a small, but significant
negative abnormal return with insider sells, which points to an association of insider
sells with negative information about the firm by outsiders. We employ several
models to examine over 1,000 inside transactions for more than 100 NETDEX firms to
find that for Internet firms, insider sells are not followed by a significant negative
abnormal return. Firm size effects differ between the different methods employed. In
conclusion, it appears that while insider sales in traditional firms are motivated by
information asymmetry reason, insider sales in Internet firms are not. We conclude
that Internet firms are different indeed.
Getting Serious Online
Presents findings from a survey conducted in March 2001. Looks at how the Internet is increasingly being used to perform work-related tasks; make financial transactions; and conduct other more functional activities
Security Policies Approached by Value Analysis Concepts
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy. In this context, the purpose is to introduce the use of end user (customer) value concept in the process of Security policy framework designsecurity, privacy, Internet, value analysis, end users, requirements
Privacy Concern and Online Transactions: The Impact of Internet Self-efficacy and Internet Involvement
Purpose – This study aims to examine the effects of internet self-efficacy and internet involvement on privacy concern and the effect of privacy concern on the frequency of online transactions. The study also seeks to examine the direct effect of internet self-efficacy and internet involvement on the frequency of online transactions.
Design/methodology/approach – A structural equation model was developed to test the hypotheses. The model was tested using the LISREL 8.8 software and both structural and measurement parameters were estimated.
Findings – Findings suggest that internet self-efficacy and internet involvement affect privacy concern negatively; and privacy concern, in turn, affects frequency of online transactions negatively. Findings also indicate that the direct effect of internet self-efficacy and internet involvement on the frequency of online transactions is positive. All parameters are significant and in the hypothesized direction.
Practical implications – Findings highlight the significance of internet self-efficacy and internet involvement in explaining both privacy concern and online transactions. The negative impact of privacy concern shows strategically why businesses should take measures to protect privacy of consumers and assure them that the information they provide is protected and secure.
Originality/value – This research contributes to the debate on privacy concern and adds to the growing body of literature on the impact of privacy concern on online transactions. Both antecedents and consequence of privacy concern are examined in the study
The hidden face of electronic commerce between enterprises (La face cachée du commerce électronique inter-entreprises)
Does the development of new means of circulating and processing information (notably the internet) ensure an immediate and easy access to information by every economic agent? Strategic information, that which is essential to define and implement the technical and financial strategies of organisations, is in the centre of the global competition between enterprises and becomes a real economic good. The industry of information expands strongly, notably over the internet. Electronic transactions between enterprises are characterised by the buying and selling of strategic information. But the access capacity to information depends on the quantity of human and financial resources which permits to large enterprises to acquire, process and protect information. Electronic commerce is in the hands of large size's enterprises Le développement de nouveaux moyens techniques de diffusion et de traitement de l'information (notamment Internet) assure-t-il un accès immédiat et facile à l'information pour tous les acteurs économiques ? L'information stratégique, celle qui est essentielle à la définition et à la mise en oeuvre des stratégies techno-financières des entreprises, est au coeur de la concurrence mondiale et devient un bien économique à part entière. L'industrie de l'information se développe fortement, notamment via Internet. Les transactions électroniques interentreprises sont caractérisés par l'achat et la vente d'informations stratégiques. Mais la capacité d'accès à l'information dépend de la quantité des ressources humaines et financières qui permet aux plus grandes entreprises d'acquérir, de traiter et de protéger l'information. Le commerce électronique est entre les mains des entreprises de grande taille.Internet, Information, information stratégique, transactions électroniques/ Internet, Information, Strategic information, electronic transaction
Concurrent Knowledge-Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modelling machine possession of
values (witnesses) in a computational complexity sense. The notion provides an
essential tool for cryptographic protocol design and analysis, enabling one to
argue about the internal state of protocol players without ever looking at this
supposedly secret state. However, when transactions are concurrent (e.g., over
the Internet) with players possessing public-keys (as is common in
cryptography), assuring that entities ``know'' what they claim to know, where
adversaries may be well coordinated across different transactions, turns out to
be much more subtle and in need of re-examination. Here, we investigate how to
formally treat knowledge possession by parties (with registered public-keys)
interacting over the Internet. Stated more technically, we look into the
relative power of the notion of ``concurrent knowledge-extraction'' (CKE) in
the concurrent zero-knowledge (CZK) bare public-key (BPK) model.Comment: 38 pages, 4 figure
XML and Its Potential for Ecommerce
This paper reviews the origin and development of standards for Electronic Data Interchange, considering exceptions and variations that standards need to accommodate It examines cost factors that affect implementation and discusses conducting EDI over the Internet and the importance of metatags and data type definitions for interpreting data structures and improving functionality of business transactions. It looks at XML (eXtensible Markup Language) as a proposal to broaden the applicability of transacting business over the Internet by bringing EDI to the desktop
The ProCard mobile banking system
The mobile banking involves the use of some mobile telecommunication devices (such phones or PDAs - Personal Digital Assistants) in order to complete, in a secure manner, banking transactions (like payments, transfers, account information and so on). It doesn't matter where the user is physically located. Also, the hour when the services are requested is not important anymore, because, thanks to the internet banking, the offices are virtually opened 24 hours per day. The ProCard system represents a suite of applications used to perform mobile banking. It was intended to be a universal solution that allows EFT, Internet and mobile banking in a single package. No special software or hardware is requiredInternet banking, mobile banking, electronic transactions, electronic funds transfer, mobile terminal, PDA, SSL, parallel processing, grid networks, clusters of workstations, grid processing.
- …