Results for *

Displaying results 1 to 8 of 8.

  1. Transaktionskosten der Nutzung des Internet durch Missbrauch (Spamming) und Regulierungsmöglichkeiten
    Published: 2006
    Publisher:  WIK, Bad Honnef

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: German
    Media type: Book
    Format: Print
    RVK Categories: QR 760
    Series: WIK-Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste ; 272
    Subjects: Transaktionskosten; E-Mail; Regulierung; Welt; Online-Marketing; Zutrittskontrolle
    Scope: VIII, 86 S., graph. Darst., b
    Notes:

    Zsfassung in engl. Sprache. - Literaturverz. S. 80 - 81

  2. Transaktionskosten der Nutzung des Internet durch Missbrauch (Spamming) und Regulierungsmöglichkeiten
    Published: 2006
    Publisher:  WIK, Bad Honnef

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    1 B 101066
    Unlimited inter-library loan, copies and loan
    Staats- und Universitätsbibliothek Bremen
    01.K.5462
    Unlimited inter-library loan, copies and loan
    Leibniz-Institut für Wirtschaftsforschung Halle, Bibliothek
    2006/0934+3KM1
    Unlimited inter-library loan, copies and loan
    Hans-Bredow-Institut für Medienforschung an der Universität Hamburg, Bibliothek
    B III 3-1/272
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    RA 8113(272)
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    W 208 (272)
    Unlimited inter-library loan, copies and loan
    ifo Institut für Wirtschaftsforschung an der Universität München, Bibliothek
    91/1792 B-272
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: German
    Media type: Book
    Format: Print
    RVK Categories: QR 760
    Series: WIK-Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste ; 272
    Subjects: Transaktionskosten; E-Mail; Regulierung; Welt; Online-Marketing; Zutrittskontrolle
    Scope: VIII, 86 S., graph. Darst., b
    Notes:

    Zsfassung in engl. Sprache. - Literaturverz. S. 80 - 81

  3. Digitale Identitäten als Fundament des Web 3.0
    Published: Dezember 2023
    Publisher:  WIK Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste GmbH, Bad Honnef, Deutschland

    Die Evolution des World Wide Web führt zu einem verstärkten Wunsch nach und Bedarf an dezentralen, selbstverwalteten Digitalen Identitäten, auch als Self-Sovereign Identities (SSI) bekannt. Im Gegensatz zu gegenwärtig verbreiteten zentralisierten und... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    DS 735
    No inter-library loan

     

    Die Evolution des World Wide Web führt zu einem verstärkten Wunsch nach und Bedarf an dezentralen, selbstverwalteten Digitalen Identitäten, auch als Self-Sovereign Identities (SSI) bekannt. Im Gegensatz zu gegenwärtig verbreiteten zentralisierten und föderierten Digitalen Identitäten ermöglichen SSI den Usern eine eigenständige und selbstbestimmte Kontrolle über ihre Digitalen Identitäten, wodurch Datenschutz und -sicherheit auf ein neues Niveau gehoben werden. Diese Studie zielt darauf ab, das Themenfeld "Digitale Identitäten" zu strukturieren und die Rolle von SSI als fundamentalen Baustein des Web 3.0 zu untersuchen. The evolution of the World Wide Web is leading to an increased desire and need for decentralised, self-managed Digital Identities, also known as Self-Sovereign Identities (SSI). In contrast to current centralised and federated digital identities, SSIs allow users to have autonomous and self-determined control over their digital identities, taking privacy and security to a new level. This study aims to structure the topic of "Digital Identities" and to analyse the role of SSIs as a fundamental building block of Web 3.0.

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: German
    Media type: Book
    Format: Online
    Other identifier:
    hdl: 10419/280932
    Series: WIK Diskussionsbeitrag ; Nr. 503
    Subjects: Elektronische Identifikation; Internet; Datenschutz; Zutrittskontrolle; Self-Sovereign Identities; Web of Values
    Scope: 1 Online-Ressource (circa 78 Seiten), Illustrationen
  4. Data breaches and identity theft
    Published: 2008
    Publisher:  Federal Reserve Bank of Atlanta, Atlanta, Ga.

    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    DS 253 (2008,22)
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Online
    Other identifier:
    hdl: 10419/70707
    Series: Working paper / Federal Reserve Bank of Atlanta ; 2008-22
    Subjects: IT-Kriminalität; Zutrittskontrolle; Soziale Kosten; Kriminalitätsökonomik
    Scope: Online-Ressource, (52 S.)
  5. The cost impact of spam filters
    measuring the effect of information system technologies in organizations
    Published: 2008
    Publisher:  IZA, Bonn

    More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam... more

    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    DS 4 (3755)
    No inter-library loan

     

    More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam filters. Using modern econometric methods to reduce the selection bias of installing a spam filter, we deploy a unique data setting implemented at a German university to measure the costs associated with spam and the costs savings of spam filters. The applied methodological framework can easily be transferred to estimate the effect of other IS technologies (e.g., SAP) implemented in organizations. Our findings indicate that central IT costs are of little relevance since the majority of spam costs stem from employees who spend working time identifying and deleting spam. The working time losses caused by spam are approximately 1,200 minutes per employee per year; these costs could be reduced by roughly 35% through the installation of a spam filter mechanism. The individual efficiency of a spam filter installation depends on the amount of spam that is received and on the level of knowledge about spam. -- Spam ; spam filter ; treatment effects ; propensity score matching

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Online
    Other identifier:
    hdl: 10419/35436
    Series: IZA discussion papers ; 3755
    Subjects: Online-Marketing; Informationssystem; Kosten; Arbeitskosten; Zutrittskontrolle; Kosten-Nutzen-Analyse
    Scope: Online-Ressource (PDF-Datei: 35 S.), graph. Darst.
  6. Automatic editing rights management in Wikipedia
    Published: 2011
    Publisher:  Martin-Luther-Universität Halle-Wittenberg, Institut für Wirtschaftsinformatik und Operations Research, Halle (Saale)

    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    10 C 3, Kapsel (33)
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    HW 21 (25)
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9783868293777
    Series: Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research ; 25
    Subjects: Nachschlagewerk; Social Web; Ehrenamtliche Arbeit; Zutrittskontrolle; Qualitätsmanagement
    Scope: 8 S., graph. Darst.
  7. Reducing underage alcohol and tobacco use
    evidence from the introduction of vertical identification cards
    Published: 2012
    Publisher:  IZA, Bonn

    From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued... more

    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    DS 4 (6951)
    No inter-library loan

     

    From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas licenses for individuals 21 and older retain a traditional horizontal shape. This paper examines the effect of this design change on underage alcohol and tobacco use. Using a difference-in-difference methodology, we find a reduction in drinking and smoking for 16 year olds. These results are robust to the inclusion of state-specific linear time trends, and are upheld in a triple difference model that uses a within state control group of teens that did not receive a vertical license to control for state-specific unobserved factors. Interestingly, we find that the effects of the design change are concentrated in the 1-2 years after a state begins issuing vertical licenses; there is little evidence of an effect of the license on underage consumption in the long-run. This finding is consistent with a scenario where, over time, teens substitute towards other methods of obtaining age-restricted products, and/or retailers continue to make underage sales. -- youth alcohol and tobacco policies

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Online
    Other identifier:
    hdl: 10419/67209
    Series: Discussion paper series / Forschungsinstitut zur Zukunft der Arbeit ; 6951
    Subjects: Jugendschutz; Alkoholkonsum; Rauchen; Zutrittskontrolle; USA
    Scope: Online-Ressource (PDF-Datei: 45 S., 525,69 KB), graph. Darst.
  8. Broadband industry structure and cybercrime
    an empirical analysis
    Published: September 24, 2015
    Publisher:  International Telecommunications Society, Los Angeles

    Prior studies have shown that while ISPs are well positioned to provide residential and SME users critical protection from cybercrime, their incentives to do so are often insufficient. The presence of competition in providing broadband service is a... more

    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    DSM 36
    No inter-library loan

     

    Prior studies have shown that while ISPs are well positioned to provide residential and SME users critical protection from cybercrime, their incentives to do so are often insufficient. The presence of competition in providing broadband service is a factor we might expect to impact such incentives as shown in prior theoretical work. We test this finding using data consisting of intrusion attempts on residential networks obtained using honeypot sensors. We compare the frequency and nature of attack attempts found on networks served by ISPs that are monopolists with those that face competition. We also place sensors on servers to identify the IP addresses of the infected machines that conduct these attacks in order to analyze the infection rates of residential ISP networks.

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Online
    Other identifier:
    hdl: 10419/146345
    Edition: Preliminary draft, Draft 2.0
    Series: 2015 Regional Conference : Los Angeles, October 25-28, 2015 / hosted by the USC Marshall School of Business
    Subjects: IT-Kriminalität; IT-Dienstleister; Monopol; Wettbewerb; Zutrittskontrolle; USA
    Scope: 1 Online-Ressource (circa Seiten), Illustrationen