Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Management Information Systems
Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci
Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci
Journal of International Technology and Information Management
The Internet industry is vertically integrated with Internet Backbone Providers (IBPs) and Internet Service Providers (ISPs.) Although there are many ISPs and IBPs in each stream, both markets are considered independent oligopolies in that there are a few dominant competitors in each market. It is generally accepted that the Internet industry structure has evolved into a four-tier hierarchical structure. The synergistic and codependent nature of the Internet industry is the key element in understanding the competitive environment in which both IBP’s and ISP’s cooperate. Peering is an efficient way to exchange traffic freely within the access tier, nevertheless competitive constraints …
Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz
Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz
Journal of International Technology and Information Management
Policy makers and researchers from a wide range of perspectives have expressed concern about the interplay between privacy rights and information exchanges via the Internet. Of particular interest has been the challenge of protecting sensitive personal information. In this paper, we assert that user willingness to share sensitive data is an area of critical concern and requires additional investigation. In an effort to enrich the dialogue on the question of voluntary sharing of sensitive personal data via the Internet, we present a model showcasing the relationship between personal data sharing, privacy sensitivity, and technology trust and discuss how organizations can …