Showing 6,421 - 6,430 of 6,512
The dramatic spreading of mobile devices (smartphones and tablets) brings new information security risks and threats. These have to be taken seriously because they are weakening not just our personal security but the security of the organisations too. The security of organisations is mainly...
Persistent link: https://www.econbiz.de/10010790192
As not only the amount of data stored digitally in computers but our dependency of these data, too, increases day by day it is of critical importance to prevent unathorized data accesses. To gain access to other parties' data and, on the other hand, make it as hard as possible is (and has always...
Persistent link: https://www.econbiz.de/10010878302
Cloud computing technologies have the potential to increase innovation and economic growth considerably. But many users worry that data in the cloud can be accessed by others, thereby damaging the data owner. Consequently, they do not use cloud technologies up to the efficient level. I design an...
Persistent link: https://www.econbiz.de/10011144432
Purpose – To investigate the evolutionary process of the retail logistics network formation, and to propose a relationship framework between the logistics asset buyer (the retailer) and the logistics asset supplier (the third‐party logistics firm). Design/methodology/approach – The...
Persistent link: https://www.econbiz.de/10014842765
Looks at where companies go wrong in measuring supply chain performance. Gives a number of examples of those who are doing it right.
Persistent link: https://www.econbiz.de/10014844912
Purpose – This paper aims to examine privacy breaches in personal health record information that expose consumers to unsolicited marketing. Design/methodology/approach – Examples of: data theft by healthcare workers; sale of consumer health data by entities not covered by the Health...
Persistent link: https://www.econbiz.de/10014848762
Purpose – Privacy is a topic of major interest to the marketing community that has fuelled the development of legal and technical mechanisms to protect customers' anonymity and to prevent the misuse of customer data. Nevertheless, data breaches continue to occur. The purpose of this paper is...
Persistent link: https://www.econbiz.de/10014848765
Purpose – A wallet phone is a type of cell phone that is used for storage of all information, including identification, pictures, even airline tickets. This study seeks to understand consumer rejection of a technology, specifically wallet phone technology, using the technology acceptance...
Persistent link: https://www.econbiz.de/10014848809
Purpose – This paper aims to explore the association between intangibility and perceived risk using a sample of North American households. This relationship is explored within two purchase environments, namely online and offline. The authors also investigated the moderating effects of privacy,...
Persistent link: https://www.econbiz.de/10014848953
Purpose – Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the...
Persistent link: https://www.econbiz.de/10014859616