Search results

1 – 10 of over 6000
Article
Publication date: 24 January 2020

Nasser Mohammed Al-Fannah and Chris Mitchell

Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major…

Abstract

Purpose

Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major negative impact on online privacy. Despite the availability of a range of fingerprinting countermeasures as well as some limited attempts by browser vendors to curb its effectiveness, it remains largely uncontrolled. The paper aims to discuss this issue.

Design/methodology/approach

This paper provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting, covering both user-based and browser-based techniques.

Findings

This study discusses the limitations of counter browser fingerprinting measures and the need for browser vendor support in controlling fingerprinting. Further, a somewhat counterintuitive possible new browser identifier is proposed which could make cookies and fingerprint-based tracking redundant; the need for, and possible effect of, this feature is discussed.

Originality/value

This study provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting. Also, it proposes a new browser identifier that could make cookies and fingerprint-based tracking redundant.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 1 June 2015

Tanmay De Sarkar

The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the…

1809

Abstract

Purpose

The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the features, purposes of use and types of browser extensions prevalent among libraries in different regions, the paper seeks to measure the degree of implementation of browser extensions.

Design/methodology/approach

Stratified sampling method was followed to select academic libraries, and convenient sampling method was applied to select public libraries from four continents – Asia, Oceania, Europe and North America. Two-step web content analysis was applied to gather data along the select dimensions.

Findings

The study contributes to the recent advances in application of browser extension with numerous examples focussing on the relevance of different approaches adopted by the libraries. Providing a framework of proportionate implementation along checkpoints, the study also highlights degree of acceptance of browser extension among libraries in different regions.

Research limitations/implications

The investigation was restricted to libraries having English websites and confined to four continents only. This study aims at improving understanding among the librarians about the intended use and application of browser extension and helping them benchmark their effort in support of education, research and training. The current investigation expands the scope of future research on remaining regions and website whose contents are in non-English language to attain a broader perspective of its implementation.

Originality/value

The article may guide library professionals to use, develop and promote the implementation of browser extension in libraries. The checkpoints used here may serve as bedrock for framing questionnaire and interview schedule for conducting future research examining users’ perception of browser extension in the context of library resources and usage pattern, to fully comprehend its practicability and usefulness.

Details

The Electronic Library, vol. 33 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 26 May 2021

Manjira Sinha and Tirthankar Dasgupta

The Web has become an indispensable medium used by people across the world for education, information, entertainment, social interaction as well as for various daily activities…

Abstract

Purpose

The Web has become an indispensable medium used by people across the world for education, information, entertainment, social interaction as well as for various daily activities involving shopping and employment-related tasks. It is therefore becoming increasingly essential that the Web must be accessible to all people to provide equal access and equal opportunity. This is specifically more important for people with various kind of disabilities. Several initiatives such as development of Web accessibility guidelines, tools and technologies have been undertaken to make the Web usable for people with different disabilities. However, only a handful of them are aimed at people with Severe Speech and Motor Impairment (SSMI). This paper aims to present a Web browsing interface for people with severe speech and motor impairment.

Design/methodology/approach

The browser allows easy dissemination of information through World Wide Web for people with SSMI. The browser is augmented with both automatic as well as manual scanning mechanisms through which a motor disorder person can access the browser graphical user interface (GUI). Further, the browser provides an intelligent content scanning mechanism through which the Web contents can be accessed with less time and cognitive effort. Along with the desktop version, WebSanyog is successfully ported on Android-based tablets to make the system portable.

Findings

The system has been exhaustively field tested by people with SSMI. The browser has been deployed at the Indian Institute of Cerebral Palsy (IICP), Kolkata. The performance of the browser has been measured in terms of three parameters: The Task execution time (TET); Error rates analysis (ER); and Overall usability score by the subject. The evaluation results suggests that the proposed Web browsing interface is effective in terms of task execution time, cognitive effort and overall user satisfaction.

Originality/value

The browser GUI is integrated with an automatic scanning mechanism as an alternate way to access and navigate through Web pages, instead of using keyboard and mouse. The browser provides novel content access mechanisms that makes navigating through Web page contents like links, images and embedded videos easier and faster. To facilitate text entry, the browser provides two different options, namely, the predictive virtual scanning keyboard and a novel icon-based query entry scheme that allows generating search queries through the selection of multiple icons.

Article
Publication date: 29 March 2013

Tran Khanh Dang and Tran Tri Dang

By reviewing different information visualization techniques for securing web information systems, this paper aims to provide a foundation for further studies of the same topic…

1107

Abstract

Purpose

By reviewing different information visualization techniques for securing web information systems, this paper aims to provide a foundation for further studies of the same topic. Another purpose of the paper is to discover directions in which there is a lack of extensive research, thereby encouraging more investigations.

Design/methodology/approach

The related techniques are classified first by their locations in the web information systems architecture: client side, server side, and application side. Then the techniques in each category are further classified based on attributes specific to that category.

Findings

Although there is much research on information visualization for securing web browser user interface and server side systems, there are very few studies about the same techniques on web application side.

Originality/value

This paper is the first published paper reviewing extensively information visualization techniques for securing web information systems. The classification used here offers a framework for further studies as well as in‐depth investigations.

Details

International Journal of Web Information Systems, vol. 9 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 13 July 2015

Swapan Purkait

This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly…

Abstract

Purpose

This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet.

Design/methodology/approach

The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet.

Findings

The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally.

Originality/value

This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.

Details

Information & Computer Security, vol. 23 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 July 2014

Xiaohui Shi, Pattarin Chumnumpan and Kiran Fernandes

This paper aims to develop a diffusion model that can be used to understand and forecast the market growth of service products in a competitive environment. Despite the fast…

1180

Abstract

Purpose

This paper aims to develop a diffusion model that can be used to understand and forecast the market growth of service products in a competitive environment. Despite the fast growth of the service sector, the existing literature has dedicated little effort to modeling the market growth of service products.

Design/methodology/approach

The authors propose a choice-type diffusion model that links the issues of service product utility, customers’ choice preference, customer switching behavior and the market growth of service products. The authors use the market data of one online product and assess the performance of the proposed model using this case.

Findings

The results demonstrate the model’s good fitting and forecasting performance. Specifically, the proposed model has better performance than the benchmarks the authors choose from the existing literature.

Originality/value

This study shows that market growth of service products can have different diffusion patterns with that of durable goods, which is evidence of the needs for specific models for service diffusion. Further, this study demonstrates the important role of customer switching in service diffusion. Also for marketing practitioners, this study provides an explanation and forecasting tool for the market growth of service products, which can be used for marketing planning in the service industry.

Details

Journal of Services Marketing, vol. 28 no. 4
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 11 January 2013

Tingting Jiang

Social library systems are Web 2.0 sites where users discover interesting books, movies, and music, etc., collect these resources to their personal libraries, and share their…

2082

Abstract

Purpose

Social library systems are Web 2.0 sites where users discover interesting books, movies, and music, etc., collect these resources to their personal libraries, and share their collections with others. The purpose of this study is to identify the information seeking modes adopted by users in this context as well as to reveal the characteristics of the users who are dominated by each mode.

Design/methodology/approach

An online survey was conducted to capture the background and behavior data of regular users from Douban, the most influential Chinese‐language social library system. The “friend‐of‐a‐friend” recruitment technique resulted in a total of 129 responses, 112 of which were valid and analyzed to generate both descriptive and inferential statistics.

Findings

Searching, browsing, encountering, and monitoring are the four major information seeking modes adopted by social library system users. The majority of the users tend to combine two or more modes, but each user has a dominating one that helps define him/her as a searcher, browser, encounterer, or monitor. While searching is the most widely adopted mode, browsers are the most prevalent type of information seekers. Different information seekers do not demonstrate significantly different characteristics by and large, however with some exceptions.

Originality/value

This study is one of the first to investigate how users look for resources in social library systems, a problem neglected by previous studies mostly focusing on how users organize and tag resources. The research findings enrich our understanding of social library systems as diverse and dynamic information seeking environments. This in turn will provide useful implications for their interface design to more effectively address the needs and expectations of special types of information seekers.

Details

Journal of Documentation, vol. 69 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 1 June 2003

Judith Wusteman

Now that XML is five years old, is it time for e‐libraries to start exploiting its full potential by delivering it to the end user rather than converting it to HTML first? What…

Abstract

Now that XML is five years old, is it time for e‐libraries to start exploiting its full potential by delivering it to the end user rather than converting it to HTML first? What, if any, would be the advantages to users and providers? Could browsers cope? And is it worth the bother?

Details

Library Hi Tech, vol. 21 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 June 2004

Samer Faraj, Dowan Kwon and Stephanie Watts

Much of IT research focuses on issues of adoption and adaptation of established technology artifacts by users and organizations and has neglected issues of how new technologies…

3022

Abstract

Much of IT research focuses on issues of adoption and adaptation of established technology artifacts by users and organizations and has neglected issues of how new technologies come into existence and evolve. To fill this gap, this paper depicts a complex picture of technology evolution to illustrate the development of Web browser technology. Building on actor‐network theory as a basis for studying complex technology evolution processes, it explores the emergence of the browser using content analysis techniques on archival data from 1993‐1998. Identifies three processes of inscribing, translating, and framing that clarify how actors acted and reacted to each other and to the emergent technological definition of the browser. This spiral development pattern incorporates complex interplay between base beliefs about what a browser is, artifacts that are the instantiation of those beliefs, evaluation routines that compare the evolving artifact to collective expectations, and strategic moves that attempt to skew the development process to someone's advantage. This approach clarifies the complex interdependence of disparate elements that over time produced the Web browser as it is known today.

Details

Information Technology & People, vol. 17 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 2 January 2024

Gautami Jagadhane, Rosy Khan and Anjaneya Reddy N.M.

This study aims to explore browsing extension plugins for searching open scholarly literature and gain an understanding of the various available extensions, their functionalities…

Abstract

Purpose

This study aims to explore browsing extension plugins for searching open scholarly literature and gain an understanding of the various available extensions, their functionalities and their benefits.

Design/methodology/approach

Instant retrieval of scholarly literature on the internet is challenging for any researcher due to incredibly accessible free and paid content, including various forms of resources, despite the availability of federated and discovery tools. This paper aimed to explore “Access Broker Browser extensions” available for quick retrieval of open scholarly literature. This paper explicitly explains browser extensions – Google Scholar Button, Open Access Button, Open Access Helper, Core, GetFTR and EndNote Click. Furthermore, the paper elaborated on the extension’s features, functionalities and usability in finding scholarly literature. This study found that the Google Scholar Button and GetFTR extensions seems more user-friendly, effective and easy to use on all internet browsers.

Findings

This paper identifies that the “Google Scholar Button” and “GetFTR” browser extensions are more effective than any other extensions and very user-friendly to use.

Originality/value

This study recommends that libraries should create awareness and provide training on access broker browser extensions for discovering scholarly open literature for learning.

1 – 10 of over 6000