Sciweavers

1404 search results - page 37 / 281
» internet 2010
Sort
View
IFIP
2010
Springer
14 years 4 months ago
Evaluation of Evidence in Internet Auction Fraud Investigations
Abstract Internet auction fraud has become prevalent. Methodologies for detecting fraudulent transactions use historical information about Internet auction participants to decide w...
Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Ch...
56
Voted
SIGCOMM
2010
ACM
14 years 10 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
81
Voted
IFIPTM
2009
127views Management» more  IFIPTM 2009»
14 years 7 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
DSS
2006
170views more  DSS 2006»
14 years 9 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
ITIIS
2010
130views more  ITIIS 2010»
14 years 4 months ago
A Novel System for Detecting Adult Images on the Internet
As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen. To help prevent adolescents accessi...
Jae-Yong Park, Sang-Sung Park, Young-Geun Shin, Do...