scholarly journals The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone

2012 ◽  
Vol 17 (8) ◽  
pp. 145-161
Author(s):  
Seung-Min Jung
Author(s):  
Matthew Warren ◽  
William Hutchinson

During the last ten years there has been a growth of Information Systems and related Internet technology. In recent years the Internet has grown from a solely military/academic network to one that can be used by business or individuals. In the years since the first World Wide Web (WWW) applications were developed, there has been an explosion in the global use of the Internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups.This chapter will explain why and how cyber-terrorists attack these services. The aims of the chapter are to: describe the background of cyber-terrorism; describe what cyber-terrorism is; describe the vulnerabilities of electronic commerce to cyber-terrorism; discuss the future of electronic commerce and cyber-terrorism.


2021 ◽  
Vol 13 (1) ◽  
pp. 54-66
Author(s):  
Ernane Rosa Martins ◽  
Solange da Silva ◽  
Ulisses Rodrigues Afonseca ◽  
Wendell Bento Geraldes ◽  
Luís Borges Gouveia

Plagiarism is the act of presenting as an idea or work of another author without mentioning it as a source. This practice has been common in academia, especially with the ease offered by the use of the internet. This study aims to verify how students of the Information Systems course understand plagiarism and what possible actions to reduce this practice in academic work. The research was carried out through semi-structured questionnaires, using research and descriptive analysis. The results showed that students do not have full knowledge of plagiarism, not being able to identify specific types of plagiarism, the correct use of citations and the need to place direct and indirect citations of the sources used in their texts.


Author(s):  
Ayan Chatterjee ◽  
Mahendra Rong

The communication through wireless medium is very popular to the developed society. More specifically, the use of the internet as well as the use of social networking sites is increasing. Therefore, information security is an important factor during wireless communication. Three major components of it are confidentiality, integrity, and availability of information among authorized users. Integrity level is maintained through various digital authentication schemes. Fuzzy logic is an important soft computing tool that increases the digital watermarking system in various ways. In this chapter, different popular and high secured watermarking schemes using fuzzy logic are analyzed with their mathematical and experimental efficiency. A comparative analysis is developed here with corresponding different parameters.


Author(s):  
Pushkar Aneja

With the growing use of the Internet, and more people being connected with it, the security of the data becomes a major concern. It is necessary that the data can only be accessed by the intended receiver and no person in the middle makes alterations to it. This is achieved by encryption of the data using cryptography. This paper presents a comparative analysis of RSA (Rivest-Shamir-Adleman), Caesar Cipher and Playfair Cipher cryptographic techniques. This paper also presents a comparative analysis of Symmetric Key Cryptography and Asymmetric Key Cryptography. Also, this paper includes the basic working of the above-mentioned techniques along with their implementation in C language over Visual Studio Code 1.49.3.


2009 ◽  
pp. 758-765
Author(s):  
Wita Wojtkowski

Portals are information systems that support the user in his or her individual process with information production and communication. The term portal, in information technology terms, appeared in late 1990s at a time of the widespread use of the Internet by individuals and organizations (Finkelstein & Aiken, 1999; Dias, 2001; Bristow, Dickinson, Duke, Henry, & Makey, 2001; Collins, 2001, 2003). There are many types of portals on the Internet: portals for general consumer use and entertainment (my.yahoo.com), for specialized information (www.brint.com), for specific communities (Austrian Academic Portal at www.portal.ac.at/), for business enterprises (NEC global portal at www.nec.com, NEC US portal at www.necus. com/, NEC European portal at www.neceurope. com). In general, portals can be divided into two categories: public and enterprise (Goodman & Kleinschmidt, 2003; Forrester, 2003). Public portals started as Internet directories (Yahoo!) or search engines (Excite, Lycos, Alta- Vista, and InfoSeek). Services that require user registration such as free e-mail, customization features, and chat rooms were added to allow repeated use, and to make users stay longer at the site. Enterprise portals started as intranets and extranets, the “enterprise webs” that were intended to provide easy-to-use, secure, and personalized sites that may extend to an organization’s employees as well as to its customers and business partners. Enterprise portals evolved to include collaboration tools so that customers, business partners, and employees are empowered to maximize their value to the organization. Portals that combine Web communications and thinking inside large enterprises are considered as both a labor-saving and a cost-saving technology. Enterprise portals are also referred to as corporate portals. Some corporate analysts predict that portals spending will be one of the top five areas for growth in the Internet technologies sector.


2002 ◽  
Vol 2 (1) ◽  
pp. 65-69 ◽  
Author(s):  
Steven R. Ray

The growth in the use of the Internet brings with it an increase in the number of interconnections among information systems supporting the manufacturing supply chain as well as other businesses. Each of these interconnections must be carefully prescribed to ensure interoperability. However, the sheer number of interconnections and the resulting complexity threaten to overwhelm the ability of the standards community or industry to provide the necessary specifications—a way out of this impasse must be found. This paper outlines the elements of an approach and the technology to move toward self-integrating systems, wherein the systems negotiate meaningful interfaces as needed in a dynamic environment.


2021 ◽  
Author(s):  
Catherine A. Middleton

The Internet is becoming an essential communication tool for North American businesses, but to date there has been little research on the expected impacts of using the Internet in a business context. This paper will examine theories of communications, information systems, and organizations, in order to understand what existing research can offer to businesses venturing onto the Internet. It will note lessons that can be learned from previous adoptions of new technologies, and identify instances where existing theory does not inform business use of the Internet and its associated new communication technologies1.


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Fernando Almeida

The evolution of information systems and the growth in the use of the Internet and social networks has caused an explosion in the amount of available data relevant to the activities of the companies. Therefore, the treatment of these available data is vital to support operational, tactical and strategic decisions. This paper aims to present the concept of big data and the main technologies that support the analysis of large data volumes. The potential of big data is explored considering nine sectors of activity, such as financial, retail, healthcare, transports, agriculture, energy, manufacturing, public, and media and entertainment. In addition, the main current opportunities, vulnerabilities and privacy challenges of big data are discussed. It was possible to conclude that despite the potential for using the big data to grow in the previously identified areas, there are still some challenges that need to be considered and mitigated, namely the privacy of information, the existence of qualified human resources to work with Big Data and the promotion of a data-driven organizational culture.


Author(s):  
Wita Wojtkowski

Portals are information systems that support the user in his or her individual process with information production and communication. The term portal, in information technology terms, appeared in late 1990s at a time of the widespread use of the Internet by individuals and organizations (Finkelstein & Aiken, 1999; Dias, 2001; Bristow, Dickinson, Duke, Henry, & Makey, 2001; Collins, 2001, 2003). There are many types of portals on the Internet: portals for general consumer use and entertainment (my.yahoo.com), for specialized information (www.brint.com), for specific communities (Austrian Academic Portal at www.portal.ac.at/), for business enterprises (NEC global portal at www.nec.com, NEC US portal at www.necus.com/, NEC European portal at www.neceurope.com). In general, portals can be divided into two categories: public and enterprise (Goodman & Kleinschmidt, 2003; Forrester, 2003). Public portals started as Internet directories (Yahoo!) or search engines (Excite, Lycos, AltaVista, and InfoSeek). Services that require user registration such as free e-mail, customization features, and chat rooms were added to allow repeated use, and to make users stay longer at the site. Enterprise portals started as intranets and extranets, the “enterprise webs” that were intended to provide easy-to-use, secure, and personalized sites that may extend to an organization’s employees as well as to its customers and business partners. Enterprise portals evolved to include collaboration tools so that customers, business partners, and employees are empowered to maximize their value to the organization. Portals that combine Web communications and thinking inside large enterprises are considered as both a labor-saving and a cost-saving technology. Enterprise portals are also referred to as corporate portals. Some corporate analysts predict that portals spending will be one of the top five areas for growth in the Internet technologies sector.


2021 ◽  
Author(s):  
Catherine A. Middleton

The Internet is becoming an essential communication tool for North American businesses, but to date there has been little research on the expected impacts of using the Internet in a business context. This paper will examine theories of communications, information systems, and organizations, in order to understand what existing research can offer to businesses venturing onto the Internet. It will note lessons that can be learned from previous adoptions of new technologies, and identify instances where existing theory does not inform business use of the Internet and its associated new communication technologies1.


Sign in / Sign up

Export Citation Format

Share Document