Who do you think you are? A review of the complex interplay between information systems, identification and identity
This paper introduces the special issue on information systems, identity and identification. In
addition to introducing the papers in the special issue, it provides a state-of-the-art review of …
addition to introducing the papers in the special issue, it provides a state-of-the-art review of …
Adverse selection in online “trust” certifications and search results
B Edelman - Electronic Commerce Research and Applications, 2011 - Elsevier
Widely-used online “trust” authorities issue certifications without substantial verification of
recipients' actual trustworthiness. This lax approach gives rise to adverse selection: the sites …
recipients' actual trustworthiness. This lax approach gives rise to adverse selection: the sites …
Adverse selection in online" trust" certifications
B Edelman - Proceedings of the 11th International Conference on …, 2009 - dl.acm.org
Widely-used online" trust" authorities issue certifications without substantial verification of
recipients' actual trustworthiness. This lax approach gives rise to adverse selection: The …
recipients' actual trustworthiness. This lax approach gives rise to adverse selection: The …
CRUISE: A platform for crowdsourcing Requirements Elicitation and evolution
R Sharma, A Sureka - 2017 Tenth International Conference on …, 2017 - ieeexplore.ieee.org
Crowdsourcing has aroused a lot of interest in Requirements Engineering (RE) research
community. RE activities are inherently complex in nature-both effort and time intensive, and …
community. RE activities are inherently complex in nature-both effort and time intensive, and …
The effect of encryption on Internet purchase intent in multiple vendor and product risk settings
Despite rapid growth, e-commerce proponents argue that individuals are still reluctant to
reveal confidential information such as credit card account numbers to unknown third …
reveal confidential information such as credit card account numbers to unknown third …
Diffusion of federated identity management
D Hühnlein, H Roßnagel, J Zibuschka - Sicherheit 2010. Sicherheit, Schutz …, 2010 - dl.gi.de
In this work, we discuss the diffusion of federated identity management. We base our
research on Roger's diffusion of innovation theory, and derive generic factors influencing the …
research on Roger's diffusion of innovation theory, and derive generic factors influencing the …
Profiling and location-based services (lbs)
L Fritsch - Profiling the European Citizen: Cross-Disciplinary …, 2008 - Springer
Until recently, profiling in the digital world was mainly based on aggregating and processing
data generated by Internet applications such as web browsers, email, online forums and …
data generated by Internet applications such as web browsers, email, online forums and …
How to govern the cloud? Characterizing the optimal enforcement institution that supports accountability in cloud computing
J Prüfer - 2013 IEEE 5th International Conference on Cloud …, 2013 - ieeexplore.ieee.org
This paper applies economic governance theory to the cloud computing industry. We
analyze which governance institution may be best suited to solve the problems stemming …
analyze which governance institution may be best suited to solve the problems stemming …
[图书][B] Globale und nationale First-Mover-Vorteile internetbasierter Geschäftsmodelle
J Halberstadt - 2014 - books.google.com
Die Frage nach den Pioniervorteilen im Internet wurde bislang nur unzureichend
erforscht. Jantje Halberstadt untersucht diese Frage empirisch und zeigt auf, dass First …
erforscht. Jantje Halberstadt untersucht diese Frage empirisch und zeigt auf, dass First …
Information strategies to support full information product pricing: The role of trust
LF Luna-Reyes, J Zhang, R Roy… - Information …, 2013 - content.iospress.com
In this paper we report on the importance of trust in the development and operation of
distribution networks that attach non-price information to products to mitigate market …
distribution networks that attach non-price information to products to mitigate market …