Showing 41 - 50 of 51
Purpose: Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of Collaborative Environments. There is a need for a better understanding and classification of...
Persistent link: https://www.econbiz.de/10009434998
It is widely acknowledged that Information Privacy is subjective in nature and contextually influenced. Individuals value their personal privacy differently with many willing to trade-off of privacy for some form of reward or personal gain. Many of the proposed privacy protection schemes do not...
Persistent link: https://www.econbiz.de/10009434999
Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We...
Persistent link: https://www.econbiz.de/10009435000
Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original...
Persistent link: https://www.econbiz.de/10009435001
This paper presents a new conceptual framework and practical solution for Customer Relationship Management(CRM) and E-Loyalty programs for cutting edge M-Commerce. CRM has come to the world of technology to help companies maximise technology usage. CRM means disciplined business strategy to...
Persistent link: https://www.econbiz.de/10009435014
There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design...
Persistent link: https://www.econbiz.de/10009479423
With the increasing number of proposals and approaches to privacy protection, it has become very difficult to build information systems that provide comprehensive protection for a very broad range of information privacy issues. Proposals to information privacy are normally based on one or a...
Persistent link: https://www.econbiz.de/10009479425
In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification and explanation for each of these components is provided, followed by...
Persistent link: https://www.econbiz.de/10009479427
The advent of the internet and web based applications have created connectivity in a previously inconceivable manner between organizations, businesses and individuals, leading to the networked economy. This has introduced new organizational forms of doing business moving from closed static...
Persistent link: https://www.econbiz.de/10009481191
Persistent link: https://www.econbiz.de/10011744777