Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Law
La Nullità Del Contratto Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni
La Nullità Del Contratto Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni
Valerio Sangiovanni
No abstract provided.
L'Informazione Del Consumatore Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni
L'Informazione Del Consumatore Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni
Valerio Sangiovanni
No abstract provided.
Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner
Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner
Laura Quilter
No abstract provided.
Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti
Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti
Corey A Ciocchetti
As the twenty-first century bustles forward, the e-commerce arena becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires. This process provides many benefits – such as tailored websites and relevant marketing – that few Web surfers would care to do without. However, serious threats lurk in cyberspace and are enhanced by consumers who continue to submit vast amounts of information in a state of relative unawareness. Not wanting to miss out on their Web surfing experience, visitors submit …
The Privacy Matrix, Corey A. Ciocchetti
The Privacy Matrix, Corey A. Ciocchetti
Corey A Ciocchetti
The twenty-first-century e-commerce environment is a scary place. Lurking within are technologically-sophisticated e-threats ready to compromise an individual’s personally identifying information (PII). At the same time, consumers submit vast amounts of PII into cyberspace without comprehending such dangers while businesses stumble to protect the information they collect and sell it on the open market. The United States legal system – currently a mixture of self-regulation and a patchwork of federal/state legislation – is ill-equipped to deal with these e-threats effectively. A new paradigm is needed. The Privacy Matrix paradigm categorizes the most prominent e-threats into three stages of the PII …