Search results

1 – 10 of 141
Article
Publication date: 1 March 2002

M.Y. Siyal and B. Barkat

In this paper we present a framework for enhancing trust in Internet commerce. Experience shows that efficient cryptographic protocols are not enough to guarantee peoples’…

Abstract

In this paper we present a framework for enhancing trust in Internet commerce. Experience shows that efficient cryptographic protocols are not enough to guarantee peoples’ confidence in Internet commerce; the transacting parties must also trust each other. Hence, the main ingredient missing in today’s e‐commerce infrastructures is modeling and implementing trust. Several attempts have been made to provide secure and trusted protocols but few have seen any practical use. This paper shows how trust can be provided through a network of Trust Service Providers (TSp). We have identified a set of services that should be offered by a TSp. We also present a distributed object‐oriented implementation of trust services using CORBA, JAVA and XML.

Details

Internet Research, vol. 12 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Book part
Publication date: 15 April 2024

M. Rezaul Islam

Abstract

Details

Family Planning and Sustainable Development in Bangladesh: Empowering Marginalized Communities in Asian Contexts
Type: Book
ISBN: 978-1-83549-165-2

Content available
Article
Publication date: 1 March 2003

Gregory B. Murphy

Trust has become a major issue among online shoppers. This underresearched subject will predictably determine the success or failure of e-commerce vendors. The lack of…

2552

Abstract

Trust has become a major issue among online shoppers. This underresearched subject will predictably determine the success or failure of e-commerce vendors. The lack of face-to-face interaction, the inability to inspect goods and services prior to purchase, and the asynchronous exchange of goods and money all contribute to the perceived risk of purchasing online and the resulting need for trust. Trust is particularly critical for small and new Internet ventures confronted by the liability of newness (Stinchcombe 1965). Lacking, among other things, a name that is readily recognized in the marketplace, entrepreneurial Internet ventures require trust if they are to succeed. The research presented in this article addresses this issue by building on the work of McKnight and colleagues and considering the effects of propensity to trust on trusting beliefs. Specifically, the author predicts that propensity to trust will significantly affect perceived ability, benevolence, and integrity but only for those individuals with limited direct experience. Based on a sample of web survey participants, the author found that propensity to trust significantly impacted perceived ability and benevolence for individuals with limited direct experience only. No statistically significant results were found for the effects of propensity to trust on perceived integrity.

Details

New England Journal of Entrepreneurship, vol. 6 no. 2
Type: Research Article
ISSN: 1550-333X

Article
Publication date: 1 March 2013

Jianbin Gao, Qi Xia, Jianping Li and Mao Ye

The purpose of this paper is to present a symmetrical method to extract smooth signal from linear mixtures in the frequency domain; with experimentations, the method is thereafter…

Abstract

Purpose

The purpose of this paper is to present a symmetrical method to extract smooth signal from linear mixtures in the frequency domain; with experimentations, the method is thereafter evaluated.

Design/methodology/approach

The Second‐order Frequency Identification (SOFI) algorithm has been presented to retrieve baseband signals which have inactive bands and different bandwidths in the frequency domain. However, the SOFI method will bring about accumulative error, therefore an improved method is proposed in this paper by using symmetric extraction mode. In contrast to the SOFI algorithm, the ISOFI method can extract simultaneously the signal with the highest degree of smoothness and the signal with the lowest degree of smoothness. This means that the signals are not extracted one by one; instead, they are extracted in parallel. Experimental results in both noise‐free and noisy scenarios verified that the proposed method has a significant improvement compared with the SOFI algorithm.

Findings

An improved SOFI (ISOFI) method is proposed to reduce the accumulated error encountered in the SOFI algorithm. In the proposed method, the symmetric mode is utilized to extract in parallel the signals with different smooth degrees. Experimental results demonstrated that the ISOFI has a higher accuracy and lower accumulated error compared to the original algorithm.

Originality/value

The paper demonstrates use of the symmetric extraction mode to overcome the disadvantage of accumulated errors existing in the SOFI algorithm.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Content available
Article
Publication date: 1 October 2003

238

Abstract

Details

Internet Research, vol. 13 no. 4
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 1 December 2006

Sally Harridge‐March

To explore the role of trust and risk in consumers' apparent reluctance to convert from internet browsers to potential online purchasers. To consider how marketing planners in…

11097

Abstract

Purpose

To explore the role of trust and risk in consumers' apparent reluctance to convert from internet browsers to potential online purchasers. To consider how marketing planners in that environment can devise strategies that balance perceptions of risk against perceptions of trustworthiness.

Design/methodology/approach

The literatures of trust and risk were reviewed, with a focus on internet usage and online buying. Six components of organisational trust are used as the framework for a discussion of perceived risk, and of the tactics available to counterbalance perceptions of the riskiness of online buying with evidence of the trustworthiness of the online merchant.

Findings

The conclusion is that marketing planners can overcome the barrier of perceived risk if they find the means to generate sufficient trust among their potential customers.

Research limitations/implications

This presents no empirical evidence but does draw together the work of others and build from it a framework for understanding how the twin concepts of risk and trust work together. Fellow researchers are invited to test its propositions experimentally.

Practical implications

Planners of marketing campaigns for online suppliers of products and services can use the framework presented in this paper as a basis for the formulation of effective strategies to convert current web‐browsers into future internet shoppers, and thereby benefit to the full from the advantages of online distribution channels.

Originality/value

Provides a general overview of a topic that is clearly relevant to gatherers of marketing intelligence and planners of marketing strategy, in the rapidly changing online environment.

Details

Marketing Intelligence & Planning, vol. 24 no. 7
Type: Research Article
ISSN: 0263-4503

Keywords

Book part
Publication date: 7 December 2021

Angela Page, Joanna Anderson, Penelope Serow, Elvira Hubert and Anne O’Donnell-Ostini

Inclusive education can be viewed as an ongoing active process or journey that is impacted by changes in policy, practices, and values (Anderson & Boyle, 2020). This “journey…

Abstract

Inclusive education can be viewed as an ongoing active process or journey that is impacted by changes in policy, practices, and values (Anderson & Boyle, 2020). This “journey toward inclusion” is not always an easy undertaking, but rather a progression that requires modification to systems, structures, and functioning in schools. Nauru, a small Pacific republic situated in the Micronesian central Pacific Ocean, has worked in partnership with Australian education providers since 2011 to improve educational learning experiences for all Nauruan students. More recently, initiatives by the Nauru Government resulted in the commissioning of a national project to develop a Nauru policy on inclusive education and also to deliver professional development for teachers that would be needed to support inclusion. Inclusive education staff at the University of England, Australia, guided the development of the project which culminated in the Nauru Inclusive Education Policy and Guidelines (2017) (Page, 2018). From this policy, a series of workshops were delivered on unpacking the policy directions, guidelines, and roles and responsibilities for teaching staff in Nauru. This chapter describes the university staff who are working in collaboration with Nauruan teachers in order to develop their capacity to create inclusive classrooms. In doing so, we embraced approaches that incorporated culturally responsive practices into our work, using the framework of Ekereri (educational approaches that embody the core values of Nauruan culture) into our practices. With this chapter, we hope to further the understanding of how contextual factors influence the collaboration and implementation of educational partnerships between culturally distinctive groups of people.

Details

Instructional Collaboration in International Inclusive Education Contexts
Type: Book
ISBN: 978-1-83982-999-4

Keywords

Article
Publication date: 12 June 2007

Marijke Coetzee and J.H.P. Eloff

This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of users.

Abstract

Purpose

This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of users.

Design/methodology/approach

A literature review is presented to provide background to the progressive role that trust plays in access control architectures. The web services access control architecture is defined.

Findings

The architecture of an access control service of a web service provider consists of three components, namely an authorisation interface, an authorisation manager, and a trust manager. Access control and trust policies are selectively published according to the trust levels of web services requestors. A prototype highlights the incorporation of a trust level in the access control policy as a viable solution to the problem of web services access control, where decisions of an autonomous nature need to be made, based on information and evidence.

Research limitations/implications

The WSACT architecture addresses the selective publication of policies. The implementation of sophisticated policy‐processing points at each web service endpoint, to automatically negotiate about policies, is an important element needed to complement the architecture.

Practical implications

The WSACT access control architecture illustrates how access control decisions can be made autonomously by including a trust level of web services requestors in an access control policy.

Originality/value

The WSACT architecture incorporates the trust levels of web services requestors and the attributes of users into one model. This allows web services providers to grant advanced access to the users of trusted web services requestors, in contrast with the limited access that is given to users who make requests through web services requestors with whom a minimal level of trust has been established.

Details

Internet Research, vol. 17 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 28 January 2020

Tooba Akram and Saadia Irfan

This case captures the experience of the newly hired investigation officer (IO) at the SECP, who crafts a front running case focused on the ethical transgressions by equity trader…

Abstract

Purpose

This case captures the experience of the newly hired investigation officer (IO) at the SECP, who crafts a front running case focused on the ethical transgressions by equity trader and KATS operator, at a famous brokerage house named Mir Ali Chaudhary Securities (MAC) Securities and three traders at DICE in Pakistan. The case outlines the whole series of investigation event that took place, from the IO identifying the smoke to all the pieces of puzzle together to form collectively evidence of front running. The case outlines and probes students to think at each stage of investigation as to how to answer the general claims that insider trading should be legalized. All these questions are viewed from the perspective of Pakistan’s regulatory environment.

Design/methodology/approach

The authors use a descriptive case study methodology approach.

Findings

The investigation trial held Sidney and Aslam guilty, sentencing them to imprisonment and making them pay fine to the Securities Exchange Commission of Pakistan (SECP) worth Rs 5m and Rs 1m, respectively. Likewise, the three equity traders at DICE were sentenced to imprisonment and charged a fine of Rs. 1m each.

Originality/value

On March 21, 2018, Mr Sidney, the equity trader, Mr Aslam, a KATS operator at MAC Securities and three equity traders at DICE Securities (Pvt.) Ltd were convicted under Securities Act (2015) and Court of law. Sidney and Aslam were alleged of tipping off advance confidential information of their clients’ order to the three equity traders at DICE, whereas the three traders at DICE were alleged of trading shares based on the tipped information in their trading account before the MAC clients’ orders were filled.

Details

Journal of Financial Crime, vol. 27 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 15 February 2021

Majid Farahian, Farnaz Avarzamani and Mehrdad Rezaee

Many scholars have recognized the cultural dependency of the concept of plagiarism and have investigated the influence of cultural attitude on university students' plagiarism;…

6598

Abstract

Purpose

Many scholars have recognized the cultural dependency of the concept of plagiarism and have investigated the influence of cultural attitude on university students' plagiarism; however, since the findings are inconsistent and because plagiarism is a major concern in academic institutions in Asia, we were motivated to examine the understanding and prevalence of plagiarism among Canadian and some Asian language students.

Design/methodology/approach

To elicit the data, the questionnaire developed by Maxwell et al. (2008) was adapted for this study. The scale included three sections. In the initial section, the students' background information was inquired. Section two included 10 scenarios, all of which consisted of two levels; understanding and experience. Section three of the scale consisted of five open-ended questions. In fact, the questions intended to complement the survey findings. Finally, in the fourth section, five yes/no questions were asked. Because the respondents could evade answering some open-ended questions, we developed five questions with yes/no answers in order to probe deeper into the participants' answers.

Findings

The results showed significant differences among the participants concerning both understanding and prevalence of plagiarism. Most of the differences were between Canadian and Asian students in that Canadians had a higher level of understanding. They also enjoyed a lower rate of incidence of plagiarism. Nevertheless, further analyses revealed that the students' academic misconduct is probably influenced by other factors including lack of proper education rather than cultural differences.

Social implications

The findings lead us to argue that cultural differences may not be the main source of the prevalence of plagiarism across nations and that Asian language university students plagiarize mainly due to a lack of understanding of the principles of plagiarism. Therefore, Asian universities should take measures to make sure that they promote language students' understanding regarding the misconduct.

Originality/value

Apart from a few studies, no other study has scrutinized plagiarism across cultures. As such, our study attempted to shed more light on the student, especially language students' plagiarism across different nations.

Details

Journal of Applied Research in Higher Education, vol. 14 no. 1
Type: Research Article
ISSN: 2050-7003

Keywords

1 – 10 of 141