Search results

1 – 10 of 532
Article
Publication date: 24 January 2020

Nasser Mohammed Al-Fannah and Chris Mitchell

Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major…

Abstract

Purpose

Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major negative impact on online privacy. Despite the availability of a range of fingerprinting countermeasures as well as some limited attempts by browser vendors to curb its effectiveness, it remains largely uncontrolled. The paper aims to discuss this issue.

Design/methodology/approach

This paper provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting, covering both user-based and browser-based techniques.

Findings

This study discusses the limitations of counter browser fingerprinting measures and the need for browser vendor support in controlling fingerprinting. Further, a somewhat counterintuitive possible new browser identifier is proposed which could make cookies and fingerprint-based tracking redundant; the need for, and possible effect of, this feature is discussed.

Originality/value

This study provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting. Also, it proposes a new browser identifier that could make cookies and fingerprint-based tracking redundant.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 1 December 1992

Chris Mitchell

Discusses hedging currency exposures that arise from foreignacquisitions. Particular emphasis is placed on the use of currency swapsand their derivatives. Argues that hedging…

473

Abstract

Discusses hedging currency exposures that arise from foreign acquisitions. Particular emphasis is placed on the use of currency swaps and their derivatives. Argues that hedging opportunities are now so varied that a strategy of not hedging exposures can be taken as speculative in itself.

Details

Journal of Property Finance, vol. 3 no. 2
Type: Research Article
ISSN: 0958-868X

Keywords

Article
Publication date: 1 December 1990

Chris Mitchell and Janine H. Peake

Discusses the adverse effect on some types of companies whenexposed to fluctuations in interest rates. Discusses the different sortsof tools available to protect against…

988

Abstract

Discusses the adverse effect on some types of companies when exposed to fluctuations in interest rates. Discusses the different sorts of tools available to protect against fluctuations: forward rate agreements, interest rate swaps and interest rate options. Concludes that whatever option or combination of options is or is not taken, a purely passive approach carries the greatest risk.

Details

Journal of Property Finance, vol. 1 no. 4
Type: Research Article
ISSN: 0958-868X

Keywords

Content available
Article
Publication date: 1 August 2002

Mitchell Dorfmann and Chris Dambra

532

Abstract

Details

Aircraft Engineering and Aerospace Technology, vol. 74 no. 4
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 1 September 2005

Adil Alsaid and Chris J. Mitchell

Aims to address some of the problems that arise when signing digital documents that contain dynamic content.

1010

Abstract

Purpose

Aims to address some of the problems that arise when signing digital documents that contain dynamic content.

Design/methodology/approach

Briefly introduces the problem of signing digital documents with dynamic content and discusses possible locations for signature functionality in a computer system. Outlines existing solutions to the problems and introduces a novel solution. Finally, discusses issues and unresolved problems.

Findings

The suggested solution requires all document handling applications to possess application awareness of the digital signature program in order to function properly. Every application must implement a COM interface and register itself in the Registry, in a locale specific to the digital signature program to sign the digital document.

Originality/value

Provides a new solution to the problem of digitally signing a digital document.

Details

Information Management & Computer Security, vol. 13 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 22 April 2013

John Harrison

This chapter examines the changes proposed to the current media ethics and regulation regime in Australia following a government inquiry by former Federal Court judge Ray…

Abstract

This chapter examines the changes proposed to the current media ethics and regulation regime in Australia following a government inquiry by former Federal Court judge Ray Finkelstein. The inquiry was prompted by The News of the World phone hacking scandal in the United Kingdom, which resulted in that publication being closed down by its publisher, News International, and principal shareholder Rupert Murdoch. While finding no evidence of similar misbehaviour by journalists and proprietors in Australia, Finkelstein recommended the establishment of a statutory News Media Council, and the inclusion of online media outlets in this new regulatory regime. This chapter argues that such a regime is unlikely to come into effect, given that it will be opposed by media proprietors and working journalists alike, as well the Federal Opposition, and the taxpayer funded ABC, and that a government with low levels of political capital is unlikely to risk much of that capital in a fight with the media industries in an election year.

Article
Publication date: 1 January 2003

Daniel Druckman

The theme of this keynote address is conceptual puzzles raised by empirical research on conflict management and resolution. Three types of puzzles are highlighted: those that deal…

Abstract

The theme of this keynote address is conceptual puzzles raised by empirical research on conflict management and resolution. Three types of puzzles are highlighted: those that deal with processes, identities, and situations. The process puzzles include some counter‐intuitive implications of negotiating strategies and interaction process dynamics. The identity puzzles include the ways in which identity is negotiated, perceptions of ingroups and outgroups, and the connection between loyalty to groups and collective action. The situation puzzles address attribution issues, the distinction between passive actors and active agents, and the role of history. An attempt is then made to juxtapose the puzzles toward a larger conception of a field that emphasizes change in the phenomena we analyze in research and shape through practice. A number of these ideas are found also in the research of previous IACM lifetime award recipients, with whom connections are made.

Details

International Journal of Conflict Management, vol. 14 no. 1
Type: Research Article
ISSN: 1044-4068

Content available
Article
Publication date: 20 July 2010

87

Abstract

Details

International Journal of Health Care Quality Assurance, vol. 23 no. 6
Type: Research Article
ISSN: 0952-6862

Keywords

Book part
Publication date: 10 August 2010

Abstract

Details

Conflict, Complexity and Mathematical Social Science
Type: Book
ISBN: 978-1-84950-973-2

Content available
Article
Publication date: 1 October 2006

265

Abstract

Details

Information Management & Computer Security, vol. 14 no. 5
Type: Research Article
ISSN: 0968-5227

1 – 10 of 532