Sciweavers

558 search results - page 42 / 112
» Electronic commerce
Sort
View
WETICE
1997
IEEE
15 years 1 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
SPW
1997
Springer
15 years 1 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
ECIS
2000
14 years 11 months ago
Glocalizing Trust: The Role of IT in a De-Coupling Industrial District
: This paper addresses a specific problem that may arise as consequence of the globalization of the markets. This is the incompatibility between local and global standards of trust...
A. Ganzaroli
61
Voted
ECRA
2010
114views more  ECRA 2010»
14 years 9 months ago
Social networks and mathematical models: A research commentary on "Critical Mass and Willingness to Pay for Social Networks" by
This brief research commentary on Westland's (2010) article in this issue of Electronic Commerce Research and Applications is intended to add two cautionary notes. He attempts...
Andrew M. Odlyzko
INTERNET
2006
157views more  INTERNET 2006»
14 years 9 months ago
Distributed Data Mining in Peer-to-Peer Networks
Distributed data mining deals with the problem of data analysis in environments with distributed data, computing nodes, and users. Peer-to-peer computing is emerging as a new dist...
Souptik Datta, Kanishka Bhaduri, Chris Giannella, ...