scholarly journals Digital Entrepreneurship vis-à-vis Managing Customers’ Data: Available Ways & Means to Protect the Online Presence of the Businesses

Author(s):  
Sunil Sharma

<p class="normal">The modern day businesses are having an inevitable online presence to ensure to grab every possible opportunity to do business. Even the businesses who do transact purely offline are also having their online presence by having their business websites. And those businesses which have an entire gamut of their services or digital products to offer only via online channels have to ensure near to perfect online set-ups to stay in the businesses. Online businesses receive thousands of gigabytes of data from their users or customers on a daily basis altogether. This data contains specific information about the geographics of the users, their financial information, KYCs, their investment and other key profile based data. What will happen if that enormous data lands in the hands of some unscrupulous people? The user and customers' data will get compromised affecting them negatively. Many of the users may incur financial losses due to that mishandling of digital data. And last but not the least, the digital businesses will have all the possible dents of bad reputation leading to even boycott of their businesses by the users on a massive scale. All this is sufficient to shatter the dreams of the digital entrepreneurship. This paper seeks to point out how the digital entrepreneurs can better identify key data of their users and customers, how they can keep safe custody of that data and how to manage and protect the confidentiality of the users and customers.</p>

2011 ◽  
Vol 6 (1) ◽  
pp. 81
Author(s):  
Laura Newton Miller

A Review of: Jamali, H. R., & Asadi, S. (2010). Google and the scholar: The role of Google in scientists' information seeking behaviour. Online Information Review, 34(2), 282-294. Objective – To determine how Google’s general search engine impacts the information-seeking behaviour of physicists and astronomers. Design – Using purposive stratified non-random sampling, a mixed-methods study was conducted which included one-on-one interviews, information-event cards, and an online questionnaire survey. Setting – Department of Physics and Astronomy at University College London. Subjects – The researchers interviewed 26 PhD students and 30 faculty members (23% of the department’s 242 faculty and students), and 24 of those participants completed information-event cards. A total of 114 respondents (47.1% of the department members) participated in the online survey. Methods – The researchers conducted 56 interviews which lasted an average of 44 minutes each. These were digitally recorded, fully transcribed, and coded. The researchers asked questions related to information-seeking behaviour and scholarly communication. Four information-event cards were given to volunteer interviewees to gather critical incident information on their first four information-seeking actions after the interview. These were to be completed preferably within the first week of receiving the cards, with 82 cards completed by 24 participants. Once initial analysis of the interviews was completed, the researchers sent an online survey to the members of the same department. Main Results – This particular paper examined only the results related to the scholars’ information-seeking behaviour in terms of search engines and web searching. Details of further results are examined in Jamali (2008) and Jamali and Nicholas (2008). The authors reported that 18% of the respondents used Google on a daily basis to identify articles. They also found that 11% searched subject databases, and 9% searched e-journal websites on a daily basis. When responses on daily searching were combined with those from participants who searched two to three times per week, the most popular method for finding research was by tracking references at the end of an article (61%). This was followed by Google (58%) and ToC email alerts (35%). Responses showed that 46% never used Google Scholar to discover research articles. When asked if they intentionally searched Google to find articles, all except two participants answered that they do not, instead using specific databases to find research. The researchers noted that finding articles in Google was not the original intention of participants’ searches, but more of a by-product of Google searching. In the information-event card study, two categories emerged based on the kinds of information required. This included participants looking for general information on a specific topic (64%, with 22 cases finding this information successfully), and participants knowing exactly what piece of information they were seeking (36%, with 28 cases finding information successfully). There was no occurrence of using Google specifically to conduct a literature search or to search for a paper during this information-event card study, although the researchers say that Google is progressively showing more scholarly information within its search results. (This cannot be ascertained from these specific results except for one response from an interviewee.) The researchers found that 29.4% of respondents used Google to find specific pieces of information, although it was not necessarily scholarly. Conclusion – Physics and astronomy researchers do not intentionally use Google’s general search engine to search for articles, but, Google seems to be a good starting point for problem-specific information queries.


2020 ◽  
Vol 5 (8) ◽  
pp. 645
Author(s):  
Raysa Chiquinquirá Chirino-García

The objective of this research was to analyze the deterioration of Property, Plant and Equipment (PPE) in the companies of the carpentry branch in the Municipality of Maracaibo, Zulia State, given that this industrial branch has the dilemma due to the adoption and application of the International Standards of Financial Information, specifically the (IAS 36) inherent to the impairment of the assets. In consideration with the contributions of Vázquez and Díaz (2013), Mantilla (2006), Romero (2012) and Chirino Marrufo (2017), who contributed theories for this study and provided relevant information free of the cover-up of financial losses in generating units of cash; since, the PPE must be evaluated to diagnose signs of deterioration by internal and external factors as well as the respective accounting adjustments.


2017 ◽  
Vol 43 (3) ◽  
pp. 1528
Author(s):  
P. I Tsombos ◽  
A.D. Zervakou

The Institute of Geology and Mineral Exploration of Greece (I.G.M.E.), in the framework of CSF 2000 – 2006 (Community Support Framework 2000-2006), implemented the pilot project “Collection, Codification and Documentation of geothematic information for urban and suburban areas in Greece - pilot applications”. Geological, geochemical, geophysical, geotechnical, hydrogeological and other geothematic data concerning the urban and surrounding areas of Drama (North Greece), Nafplio & Sparti (Peloponnese) and Thrakomakedones (Attica) were collected. Drillings, geological and neotectonic mapping and other “in situ” measurements and field work took place. All initial and derived analogical and digital data were compiled and processed in specially designed geo-databases in GIS Environment. The final results are presented in geothematic maps and other digital products (DEMs, 2D – 3D surfaces, geodatabases). Such data constitute the essential knowledge base for land use planning and environmental protection in specific urban areas. Through this pilot project, new scientific approaches, methodologies and standards were developed and improved in order to apply to other future projects concerning the major cities of the whole country.


1999 ◽  
Vol 36 (2) ◽  
pp. 161-173 ◽  
Author(s):  
H John Broome ◽  
David Viljoen

The NATMAP Shield Margin Project, which began in 1991, straddles the Manitoba-Saskatchewan border and studied a rectangular area with east-west and north-south extents of approximately 250 and 150 km, respectively. Among the principal objectives of the NATMAP program were a compilation of a digital geoscience database for the study area and development of digital methodology to build this database and its utilization to aid in reaching the geological goals of the project. It was anticipated that these initiatives would encourage integrated interpretation of data, improve the effectiveness of the geological mapping process, and accelerate publication of results. One of the keys to effectively applying digital methods to a geological mapping project is maintaining data in digital form throughout the project, from the field through to publication. Transcription errors are eliminated and the production of both preliminary and final maps and digital products is accelerated. Access to digital data also facilitates application of digital tools for analysis and visualization. Integrated image products generated from geophysical and geological data sets were used throughout the project and assisted in development of geological models and their visualization. Three-dimensional visualization methods were used to combine NATMAP surface and subsurface mapping with Lithoprobe interpretations of seismic reflection data. The digital database was used to prepare a digital archive of the project which will be published in CD-ROM after completion of the project.


2021 ◽  
Author(s):  
Fernanda Yukari Kawasaki ◽  
Ulisses De Oliveira Penteado Junior ◽  
André Ricardo Abed Grégio

Digital data production increases on a daily basis due to the widespreaduse of Internet and interconnected computing devices. Actingsecurity mechanisms may result in several types of information,if processed and correlated, since their output logs range from IPaddresses/regions to attack events. Hence, the application of datascience techniques is essential to extract knowledge and insightsfrom this massive amount of data. In this article, we present a platformfor cybersecurity data visualization in an effort to identifytrends, associations and patterns, which enable better data-drivendecisions. To prototype and test the proposed platform, we focusedon endpoint logs provided from a cybersecurity company. Theconclusions drawn from this study are that there is a substantialconcentration of victims in urbanized areas, notably the state capitals,as well as a higher risk level for Server Operating Systems.Nevertheless, these results are still preliminary, considering thelimitations of the dataset (few, specific samples from internal testingendpoints), but helped pave the way towards new models forfurther threat analysis.


Author(s):  
Afdallyna Fathiyah Harun ◽  
Siti Nuradzarul Aqmaar Adzman ◽  
Fauzi Mohd Saman ◽  
Saiful Izwan Suliman

<p class="Pa41"><span>In accordance with e-government initiatives, many ministries in Malaysia have engaged content to public using social media for better two-way communications. However, creating an online presence is not necessarily easy as digital content consumers are often bombarded with information and those that fail to capture information will be rendered uninteresting and irrelevant. This is imperative as for most part, users are in control of where they allocate attention and what they share. Using virality as a context, it is opined that information content that are well-designed will trigger specific information and propel the sharing of that information over the Internet. A study employing FB post categorization and sharing motivations survey was carried out in the context of Ministry of Health Malaysia Facebook page. The findings show that users are inclined towards Infographics with various sharing motivations. The results can be used by Malaysian ministries on how best to design and disseminate information for the benefit of the netizens on social media sites.</span></p>


2009 ◽  
Vol 46 (3) ◽  
pp. 181-191 ◽  
Author(s):  
John Barlow ◽  
Yvonne Martin ◽  
Steven Franklin

Debris sliding is one of the most important processes acting to transport sediment within mountainous regions. Detailed study of debris slide activity at the basin scale typically involves landslide inventories generated from aerial photographs. However, it has been shown that some types of rapid mass movement can be accurately identified using a combination of high-resolution satellite imagery and digital elevation data. This approach is beneficial as the digital products allow for a more accurate and efficient data throughput into various types of geomorphic analysis. Here, we demonstrate the use of an automated inventory in the geomorphometric evaluation of debris slide initiation for the Chilliwack Basin, British Columbia, Canada. Our results indicate that the occurrence of debris sliding is primarily determined by topographical controls. For basins that are in equilibrium with the existing climate, the frequency of debris sliding should demonstrate a strong relationship to bedrock geology as the production of unconsolidated materials available for failure is a function of weathering rates under these conditions. The lack of bedrock control within the Chilliwack Basin suggests a state of paraglacial relaxation, wherein glacial deposits dominate the sediment cascade within the area. Therefore, topographic parameters can be used to discriminate the location of metastable slopes where debris slide erosion will be active. The use of digital data in the characterization of debris slide occurrence would seem to be a viable alternative to the more traditional methods.


2018 ◽  
pp. 313-339
Author(s):  
Akashdeep Bhardwaj

Compared to the last five to six years, the massive scale by which innocent users are being subjected to a new age threat in form of digital extortion has never been seen before. With the rise of Internet, use of personal computers and devices has mushroomed to immense scale, with cyber criminals subjecting innocent users to extortion using malware. The primary victim to be hit the most has been online banking, impacting the security and reputation of banking and financial transactions along with social interactions. Online security revolves around three critical aspects – starting with the use of digital data and files, next with the use of computer systems and finally the internet as an unsecure medium. This is where Ransomware has become one of the most malicious form of malware for digital extortion threats to home and corporate user alike.


Author(s):  
Akashdeep Bhardwaj

Compared to the last five to six years, the massive scale by which innocent users are being subjected to a new age threat in form of digital extortion has never been seen before. With the rise of Internet, use of personal computers and devices has mushroomed to immense scale, with cyber criminals subjecting innocent users to extortion using malware. The primary victim to be hit the most has been online banking, impacting the security and reputation of banking and financial transactions along with social interactions. Online security revolves around three critical aspects – starting with the use of digital data and files, next with the use of computer systems and finally the internet as an unsecure medium. This is where Ransomware has become one of the most malicious form of malware for digital extortion threats to home and corporate user alike.


Author(s):  
Diego Valentinetti ◽  
Michele Antonio Rea

In this paper, we discuss the dual power of XBRL to standardise and/or accommodate firms’ financial reporting practices. We first develop a conceptual framework for understanding which factors may affect the adoption of XBRL and, in turn, standardise or customise financial reporting. We then examine the XBRL implementation models adopted in two countries: Italy and the US. In Italy, XBRL is required through the application of a standard taxonomy (the Italian GAAP Taxonomy), without the ability to create and submit taxonomy extensions. Conversely, in the US, XBRL is required through the application of a standard taxonomy (the US GAAP Taxonomy), along with the ability to define individual extensions to be submitted to the SEC. We discuss the potential effects of taxonomy application on the representation of financial information. The application of a taxonomy on a “blind basis” (extensions not permitted) leads not only to the full comparability of financial data but also to a loss of idiosyncratic information. The application of a taxonomy on a “minimum basis” (individual extensions permitted) preserves specific information, but causes a potential loss of data comparability.


Sign in / Sign up

Export Citation Format

Share Document