A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions

Author(s):  
Murthy V. Rallapalli

This article presents an alternate approach to effectively address the way privacy agreements are initiated through web services. In this new framework, the consumer and the service provider can mutually negotiate on the privacy terms. It contains a privacy model in which the transaction takes place after a negotiation between the service provider and the web user is completed. In addition, this framework would support various negotiation levels of the agreement lifecycle which is an important aspect of the dynamic environment of a B2C e-commerce scenario. A third party trusted agency and a privacy filter are included to handle privacy information of the web user. The author seeks to raise awareness of the issues surrounding privacy transactions and the potential ongoing impact to both service providers and clients as the use of web services accelerates.

2011 ◽  
Vol 5 (4) ◽  
pp. 1-7
Author(s):  
Murthy V. Rallapalli

This article presents an alternate approach to effectively address the way privacy agreements are initiated through web services. In this new framework, the consumer and the service provider can mutually negotiate on the privacy terms. It contains a privacy model in which the transaction takes place after a negotiation between the service provider and the web user is completed. In addition, this framework would support various negotiation levels of the agreement lifecycle which is an important aspect of the dynamic environment of a B2C e-commerce scenario. A third party trusted agency and a privacy filter are included to handle privacy information of the web user. The author seeks to raise awareness of the issues surrounding privacy transactions and the potential ongoing impact to both service providers and clients as the use of web services accelerates.


Author(s):  
Satish C. Sharma ◽  
Harshila Bagoria

Cloud computing is a new breed of service offered over the Internet, which has completely changed the way one can use the power of computers irrespective of geographic location. It has brought in new avenues for organizations and businesses to offer services using hardware or software or platform of third party sources, thus saving on cost and maintenance. It can transform the way systems are built and services delivered, providing libraries with an opportunity to extend their impact. Cloud computing has become a major topic of discussion and debate for any business or organization which relies on technology. Anyone connected to the Internet is probably using some type of cloud computing on a regular basis. Whether they are using Google’s Gmail, organizing photos on Flickr, or searching the Web with Bing, they are engaged in cloud computing. In this chapter, an attempt has been made to give an overview of this technology, its connection with libraries, the models in which libraries can deploy this technology for providing services and augment the productivity of library staff and case studies.


2010 ◽  
pp. 556-564
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Author(s):  
Nadia Ben Seghir ◽  
Okba Kazar ◽  
Khaled Rezeg ◽  
Samir Bourekkache

Purpose The success of web services involved the adoption of this technology by different service providers through the web, which increased the number of web services, as a result making their discovery a tedious task. The UDDI standard has been proposed for web service publication and discovery. However, it lacks sufficient semantic description in the content of web services, which makes it difficult to find and compose suitable web services during the analysis, search, and matching processes. In addition, few works on semantic web services discovery take into account the user’s profile. The purpose of this paper is to optimize the web services discovery by reducing the search space and increasing the number of relevant services. Design/methodology/approach The authors propose a new approach for the semantic web services discovery based on the mobile agent, user profile and metadata catalog. In the approach, each user can be described by a profile which is represented in two dimensions: personal dimension and preferences dimension. The description of web service is based on two levels: metadata catalog and WSDL. Findings First, the semantic web services discovery reduces the number of relevant services through the application of matching algorithm “semantic match”. The result of this first matching restricts the search space at the level of UDDI registry, which allows the users to have good results for the “functional match”. Second, the use of mobile agents as a communication entity reduces the traffic on the network and the quantity of exchanged information. Finally, the integration of user profile in the service discovery process facilitates the expression of the user needs and makes intelligible the selected service. Originality/value To the best knowledge of the authors, this is the first attempt at implementing the mobile agent technology with the semantic web service technology.


2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *This paper empirically examines the 17 U.S.C. § 512 notice and takedown process as implemented by the Texas online service provider, The Planet. We reviewed a random sample of notices from a population of all notices processed by The Planet from August 2004 to June 2007. We used a mixed methodology, qualitatively assessing the notices, and running quantitative checks to ensure that we were not mistakenly over- or understating the importance of qualitative findings. Because the notices most clearly show sender behavior, we focus on senders’ use of section 512; we then more generally discuss the possible effects of sender behavior on targets and OSPs. We conclude that section 512 continues to be useful for copyright holders; in addition, it undoubtedly provides important innovation-promoting protection for intermediaries. Yet the section 512 regime also shows serious strain in practice, at least within our observed set of notices. A considerable group of senders have difficulty following section 512’s technical requirements and understanding the substantive underlying copyright law. Further, as expected, the large copyright industries appear to be challenged by peer-to-peer filesharing — a problem for which the notice and takedown framework does not provide immediate relief — leading them to make broader demands than are supported by section 512. Finally, the emerging dominance of third-party rights enforcement organizations ("REOs") and trade associations, which have incentives to generate notices and achieve takedowns, add a layer of complexity to the process. Ultimately, these strains, and senders’ responses to them, likely affect both OSPs and targets. Overall, they prompt concerns about due process for targets and potential harms to Internet expression. We reaffirm our previous suggestions for reform, and call for greater information sharing and transparency to help rebalance and strengthen the section 512 process.Available at SSRN: http://ssrn.com/abstract=2694348


2020 ◽  
Vol 6 (1) ◽  
pp. 100-114
Author(s):  
Isabel Espín Alba

Digital technologies have transformed the way creative content protected by copyright is created, produced, distributed and accessed. The Directive on Copyright in the Digital Single Market aims to update copyright rules, taking into account changes in these paradigms. Of all the aspects of the reform, this paper critically analyses the content of Article 17, in order to deal with the so-called value gap that forced a change in the liability regime of the online content sharing service provider.


2018 ◽  
Vol 7 (3.33) ◽  
pp. 183
Author(s):  
Sung-Ho Cho ◽  
Sung-Uk Choi ◽  
. .

This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction of web application firewalls. The port redirection type configured with the help of peripheral network equipment such as routers or L4 switches can maintain web services even when physical obstruction of the web application firewall occurs and is suitable for large scale networks where several web services are mixed. In this study, port redirection type web application firewalls were configured in large-scale networks and there was a problem in that the performance of routers was degraded due to the IP-based VLAN when a policy was set for the ports on the routers for web security. In order to solve this problem, only those agencies and enterprises that provide web services of networks were separated and in-line type web application firewalls were configured for them. Internet service providers (ISPs) or central line-concentration agencies can apply the foregoing to configure systems for web security for unit small enterprises or small scale agencies at low costs.  


Author(s):  
Sandra A. Vannoy

The Internet and emerging technologies are facilitating the creation of new marketplaces designed to address a diverse range of business and societal needs. As companies are utilizing technology to manage their business processes, such a marketplace has emerged that is designed to provide third-party availability of business services delivered via Web services technology, particularly in the context of Cloud Computing. The Web Services Marketplace creates a common trading ground wherein buyers and sellers of business services can come together within a centralized marketplace. However, sellers of business services must provide a mechanism by which knowledge and awareness of the service is created for the buyer and a means by which sellers can effectively compete in the marketplace. The most widely accepted method for accomplishing these tasks is advertising. This study investigates the nascent phenomenon of the advertising of business services within the Web services marketplace, develops a theoretically grounded definition and characteristics of business services offered in the Web Services Marketplace, and develops a model for the effective advertisement of business services offered in the Web Services Marketplace.


2013 ◽  
Vol 22 (05) ◽  
pp. 1360003
Author(s):  
SINA HONARI ◽  
BRIGITTE JAUMARD ◽  
JAMAL BENTAHAR

Despite the widespread usage of the evaluation mediums for online services by the clients, there is a requirement for a trust evaluation tool that provides the clients with the degree of trustworthiness of the service providers. Such a tool can provide increased familiarity with unknown third party entities, e.g. service providers, especially when those entities neither project completely trustworthy nor totally untrustworthy behaviour. Indeed, developing some metrics for trust evaluation under uncertainty can come handy, e.g., for customers interested in evaluating the trustworthiness of an unknown service provider throughout queries to other customers of unknown reliability. In this research, we propose an evaluation metric to estimate the degree of trustworthiness of an unknown agent, say aD, through the information acquired through a group of agents who have interacted with agent aD. This group of agents is assumed to have an unknown degree of reliability. In order to tackle the uncertainty associated with the trust of these set of unknown agents, we suggest to use possibility distributions. Later, we introduce a new certainty metric to measure the degree of agreement in the information reported by the group of agents in A on agent aD. Fusion rules are then used to measure an estimation of the agent aD’s degree of trustworthiness. To the best of our knowledge, this is the first work that estimates trust, out of empirical data, subject to some uncertainty, in a discrete multi-valued trust domain. Finally, numerical experiments are presented to validate the proposed tools and metrics.


Sign in / Sign up

Export Citation Format

Share Document