56,062 research outputs found

    Evaluating trust in electronic commerce : a study based on the information provided on merchants' websites

    Get PDF
    Lack of trust has been identified as a major problem hampering the growth of Electronic Commerce (EC). It is reported by many studies that a large number of online shoppers abandon their transactions because they do not trust the website when they are asked to provide personal information. To support trust, we developed an information framework model based on research on EC trust. The model is based on the information a consumer expects to find on an EC website and that is shown from the literature to increase his/her trust towards online merchants. An information extraction system is then developed to help the user find this information. In this paper, we present the development of the information extraction system and its evaluation. This is then followed by a study looking at the use of the identified variables on a sample of EC websites

    Systemization of Pluggable Transports for Censorship Resistance

    Full text link
    An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent blocking on this link, which we refer to as link circumvention systems (LCs). The variety and profusion of attack vectors available to a censor has led to an arms race, leading to a dramatic speed of evolution of LCs. Despite their inherent complexity and the breadth of work in this area, there is no systematic way to evaluate link circumvention systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a LC, a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an evaluation stack that underscores a layered approach to evaluate LCs, and (iv) systemize and evaluate existing censorship resistance systems that provide link circumvention. We highlight open challenges in the evaluation and development of LCs and discuss possible mitigations.Comment: Content from this paper was published in Proceedings on Privacy Enhancing Technologies (PoPETS), Volume 2016, Issue 4 (July 2016) as "SoK: Making Sense of Censorship Resistance Systems" by Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch and Ian Goldberg (DOI 10.1515/popets-2016-0028

    Good practice guidance for the providers of social networking and other user-interactive services

    Get PDF

    Integrating New Zealand census mortality study and New Zealand longitudinal census: privacy impact assessment

    Get PDF
    This paper outlines the processes for managing the privacy risks raised by integrating two particular census datasets. Overview Integrating New Zealand Census Mortality Study and New Zealand Longitudinal Census: Privacy impact assessment provides a systematic evaluation of the privacy risks associated with integrating datasets from the New Zealand Census Mortality Study (NZCMS) and the New Zealand Longitudinal Census (NZLC). It outlines the processes for managing these risks. The NZCMS comprise datasets of mortality records linked to the 1981–2006 Censuses and the NZLC datasets comprise linked census pairs covering the same period

    The Path of Internet Law: An Annotated Guide to Legal Landmarks

    Get PDF
    The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property. Justice Holmes’s classic essay on the path of the law drew upon six centuries of case reports and statutes. In less than twenty-five years, Internet law has created new legal dilemmas and challenges in accommodating new information technologies. Part I is a brief timeline of Internet case law and statutory developments for Internet-related intellectual property (IP) law. Part II describes some of the ways in which the Internet is redirecting the path of IP in a globalized information-based economy. Our broader point is that every branch of substantive and procedural law is adapting to the digital world. Part III is the functional equivalent of a GPS for locating the latest U.S. and foreign law resources to help lawyers, policymakers, academics and law students lost in cyberspace
    • …
    corecore