Search results

1 – 10 of 79
Article
Publication date: 31 October 2018

Brant K. Brown, James E. Anderson, P. Georgia Bullitt and Amelia A. Cottrell

To explain two new Financial Industry Regulatory Authority (FINRA) rule provisions, effective February 5, 2018, that were designed to provide firms with more effective tools to…

Abstract

Purpose

To explain two new Financial Industry Regulatory Authority (FINRA) rule provisions, effective February 5, 2018, that were designed to provide firms with more effective tools to address suspected financial exploitation of seniors and other vulnerable adults, a new Rule 2165, Financial Exploitation of Specified Adults, and an amended Rule 4512, the “Trusted Contact Person” amendment.

Design/methodology/approach

Mentions FINRA’s and US Securities and Exchange Commission’s (SEC’s) longstanding concern about schemes targeting the financial assets of seniors. Provides an overview of the rule changes, including the safe harbor under Rule 2165, which specifies the conditions under which it is permissible for a firm to place a temporary hold on a disbursement, the obligations generated by the decision to place such a temporary hold, and the requirement under amended Rule 4512 for a firm to make reasonable efforts to obtain the name and contact information of a Trusted Contact Person (TCP) for each non-institutional customer’s account.

Findings

The new FINRA rule provisions create obligations for firms and also provide firms with optional additional tools to address potential financial exploitation of certain customers.

Practical implications

Firms should be mindful that they must develop appropriate procedures, controls, and training around the authority to place a temporary hold on a customer disbursement.

Originality/value

This article contains valuable information about recent FINRA rule changes and practical guidance from experienced securities lawyers.

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

88054

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 1 October 2002

Georgios I. Zekos

Presents an updated version of a paper given by the author at an international conference in Athens 2000. Briefly outlines the development of the internet and e‐commerce and the…

2072

Abstract

Presents an updated version of a paper given by the author at an international conference in Athens 2000. Briefly outlines the development of the internet and e‐commerce and the effect of globalization. Considers the potential for the EU to standardize rules and advance its economic integration agenda. Looks at present EU laws in this area. Covers the unicitral model law on electronic commerce, its merits and its problems. Discusses personal jurisdiction under traditional rules and cyberspace transactions. Concludes that existing legislation must be re‐evaluated in the light of technological advances, the need for a more mobile kind of legal person and the worldwide nature of transactions across territorial boundaries, paperless contracts and digital signatures and the use of self‐regulation are also covered.

Details

Managerial Law, vol. 44 no. 5
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 1 June 2004

Asoke K Talukder and Debabrata Das

Viruses, worms, Trojan horses, spywares have been effective for quite sometime in the domain of digital computers. These malicious software cause millions of dollars of loss in…

Abstract

Viruses, worms, Trojan horses, spywares have been effective for quite sometime in the domain of digital computers. These malicious software cause millions of dollars of loss in assets, revenue, opportunity, cleanup cost, and lost productivity. To stop virus attacks, organizations frame up different security policies. These policies work only within the limited domain of the organization’s network. However, the emergence of wireless technologies, and the seamless mobility features of the wireless devices from one network to the other have created a challenge to uphold the security policies of a particular network. Hence, in this digital society, while mobile devices roam in foreign networks, they get infected through viruses in the foreign network. Anti‐virus software is not so effective for novel viruses. There have been no reports of mobile‐phone viruses in the wild as yet. However, with the emergence of execution environments on mobile phones, it will be possible to write viruses and worms for mobile devices in cellular networks. We should be prepared to fight against viruses in the cellular networks. All the technologies available to fight against viruses are specific to virus signatures. We propose that this fight needs to be multilayered. In this paper the authors have proposed a novel philosophy in cellular network called Artificial Hygiene (AH), which is virus neutral and will work at the class level. With this process a device and the network will take the necessary steps to keep the digital environment safe.

Details

Journal of Systems and Information Technology, vol. 8 no. 1/2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 5 September 2008

R. David Lankes

This paper seeks to understand how users determine credibility in the internet environment from a conceptual level and the implications of these new methods of credibility…

9468

Abstract

Purpose

This paper seeks to understand how users determine credibility in the internet environment from a conceptual level and the implications of these new methods of credibility determination on internet tools (primarily software) and services.

Design/methodology/approach

The author first examines the underlying reasons for increased dependence on the internet for information, using electronic commerce as a starting point. The central concept of “information self‐sufficiency” is introduced and then examined through the lens of the internet and conversation theory.

Findings

The author finds that users are shifting from more traditional “authority” methods of credibility determination, where users cede determinations to trusted third parties, to a “reliability” approach where users seek commonalities and coherence among multiple information sources. This has led to an increased pressure for participation and openness at all levels of the internet.

Research limitations/implications

Studies on users and credibility must better account for often invisible technical factors.

Practical implications

Libraries must take into account a greater need for participation and technical fluency when dealing with patrons, particularly in information literacy programs and instruction.

Originality/value

This paper presents a large‐scale conceptual approach to credibility on the internet. It seeks to inform current approaches to the subject nested in communications and instruction with the unique technical environment of the internet.

Details

Journal of Documentation, vol. 64 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 1 July 2004

Stefanos Gritzalis

This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture…

3066

Abstract

This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture, operational principles and vulnerabilities. Furthermore, to facilitate a detailed comparative analysis, the appropriate parameters have been selected and grouped in classes of comparison criteria, in the form of an integrated comparison framework. The main concern during the design of this framework was to cover the confronted security threats, applied technological issues and users' demands satisfaction. GNUnet's Anonymity Protocol (GAP), Freedom, Hordes, Crowds, Onion Routing, Platform for Privacy Preferences (P3P), TRUSTe, Lucent Personalized Web Assistant (LPWA), and Anonymizer have been reviewed and compared. The comparative review has clearly highlighted that the pros and cons of each system do not coincide, mainly due to the fact that each one exhibits different design goals and thus adopts dissimilar techniques for protecting privacy and anonymity.

Details

Information Management & Computer Security, vol. 12 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6447

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 June 2002

George K. Chacko

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…

3725

Abstract

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 14 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 1 September 1995

Karen A. Forcht and Richard E. Fore

Draws its topicality and relevance from the fact that not only isthe Internet widely publicized in all the media but also there are manystories regarding problems with its…

3809

Abstract

Draws its topicality and relevance from the fact that not only is the Internet widely publicized in all the media but also there are many stories regarding problems with its security. Provides a primer on the history, terminology, tools and common uses of the Internet. Identifies the most prevalent threats to security posed by using the Internet and discusses some of the traditional and emerging approaches to ensuring the security and integrity of data on the Internet.

Details

Internet Research, vol. 5 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 16 May 2008

Mohammad Osiur Rahman, Nour Mohammad and Mohammad Mahabubur Rahman

The purpose of this paper is to show that the internet together with cyberspace form an “everywhere and nowhere proposition” and to discuss numerous problems concerning legal…

Abstract

Purpose

The purpose of this paper is to show that the internet together with cyberspace form an “everywhere and nowhere proposition” and to discuss numerous problems concerning legal issues, the most vital being confusion as to jurisdiction.

Design/methodology/approach

The research was based upon theoretical sources and empirical data.

Findings

It was found that a probable solution could be extracted from the US experience for all the nations coming under the virtual framework of cyberspace. Some hi‐tech nations are facing this problem; and the USA is one of them. Even the USA – a large federal state – faces the jurisdictional problem and conflict as regards its own provinces; and the US courts, legal institutions and intellectuals are resorting to established principles of law – domestic or international. Decisions of US cases have been keenly observed to find out how the US courts and legal scholars have taken the help of traditional territorial tenets and precepts to resolve jurisdictional conflict. In many cases, US courts and legal scholars have shown their interest to adopt personal jurisdiction.

Originality/value

With the USA being a representative type of hi‐tech nation, US attitude and practice could usher the way for all other upcoming hi‐tech nations.

Details

International Journal of Law and Management, vol. 50 no. 3
Type: Research Article
ISSN: 1754-243X

Keywords

1 – 10 of 79