Consumer protection

View this topic in
Consumer protection laws designed to ensure fair trade competition and the free flow of truthful information in the marketplace. The laws are designed to prevent businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors and may provide additional protection for the weak and those unable to take care of themselves. (Wikipedia.org)






Conferences related to Consumer protection

Back to Top

2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII)

This conference provides an idea-exchange and discussion platform for researchers and practitioners interested in information management, innovation management and industrial engineering. The topics will arrange from the technology management theories to the management practice methods and technology.


2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)

Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best efforts to convince the public that cyber space is a safe place to do business. The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practiceperspectives, encouraging multidisciplinary research, and fosterin

  • 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)

    The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government. PST-2012 will be a valuable place for IEEE members to present papers and meet with one another to discuss their work.

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST)

    PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers.

  • 2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)

    PST2010 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.

  • 2008 6th Annual Privacy, Security and Trust Research Conference (PST2008)

    The PST conference is unique in its broad approach to privacy, security and trust research including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government.


2013 International Conference on Management Science and Engineering (ICMSE)

Management science and engineering, including operations research, organizational systems and behavior, economics and finance, and public administration.


2012 5th International Workshop on Soft Computing Applications (SOFA)

After four successful editions, the 5th IEEE SOFA is moving to Szeged - Hungary, where it aims to gather as many Soft Computing (SC) researchers and professionals as possible. The main goal of the Workshop is to communicate and publish new theoretical and applicative research results, in the areas of Fuzzy Logic, Neural Networks, Evolutionary Computing, and other methods belonging or connected to SC. A second and just as important goal is to encourage new reflections on SC issues and new links between interested researchers, R&D engineers, managers, etc.

  • 2010 4th International Workshop on Soft Computing Applications (SOFA)

    SOFA 2009 workshop focuses on theory and application in the field of theoretical and applied computational intelligence and informatics. The aim is to provide platform for scientist, teachers, researchers and students as well to publish their papers and discuss the results. SOFA encourages the scientific communication and collaboration among IEEE members.


2012 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

The symposium is a forum for exchange of knowledge related to systems approaches to sustainability in the context of technological change.

  • 2011 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

    This conference was known between 1993 and 2008 as the IEEE International Symposium on Electronics and the Environment. The program includes sessions covering the spectrum of issues for assessing and managing products and services across their life cycle, and the design, management, and policy implications of sustainable engineered systems and technologies, including design for environment, design for sustainability, materials selection, energy management, end-of-life policy and reuse/recycling.

  • 2010 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

    The program includes sessions covering the spectrum of issues for assessing and managing products and services across their life cycle, and the design, management, and policy implications of sustainable engineered systems and technologies, including design for environment, design for sustainability, materials selection, energy management, end-of-life policy and reuse/recycling, process integration, and institutional and policy implications of services and technology systems.

  • 2009 IEEE International Symposium on Sustainable Systems and Technology (ISSST) (Formerly known as ISEE)

    Conference will cover environmental and social implications of ICT technologies, including services. Areas of focus will include industrial ecology, design for environment, design for sustainability, emerging technologies, and sustainable ICT services

  • 2008 IEEE International Symposium on Electronics and the Environment (ISEE)

    Issues associated with sustainable environmental and health of engineered systems, with a focus on information and communication technology systems.

  • 2007 IEEE International Symposium on Electronics and the Environment (ISEE)

  • 2006 IEEE International Symposium on Electronics and the Environment (ISEE) in conjunction with Electronics Recycling Summit

  • 2005 IEEE International Symposium on Electronics and the Environment (ISEE)


More Conferences

Periodicals related to Consumer protection

Back to Top

Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Signal Processing Magazine, IEEE

IEEE Signal Processing Magazine is ranked as the number three most-cited journal in Electrical and Electronics Engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This publication features tutorial style papers on signal processing research and applications. The primary means of communication of the society leadership ...


Spectrum, IEEE

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies. It anticipates trends in engineering, science, and technology, and provides a forum for understanding, discussion and leadership in these areas. IEEE Spectrum is the world's leading engineering and scientific magazine. Read by over 300,000 engineers worldwide, Spectrum provides international coverage of all ...



Most published Xplore authors for Consumer protection

Back to Top

Xplore Articles related to Consumer protection

Back to Top

Studying on the adverse selection in e-commerce market

Jianwen Yao; Lifang Zou The 2nd International Conference on Information Science and Engineering, 2010

In response to the information asymmetry problem in e-commerce market, the solution involves in the process of building the adverse selection model in e-commerce market and analyzing the effect of adverse selection on businesses and consumers. Then the results derived from establishing e-commerce transaction law, building third-party organization by using signal transmission and other measures.


Does SaaS Backup Pass the Fitness-for-Purpose Test?

Roger Clarke IEEE Cloud Computing, 2015

Software-as-a-service (SaaS) providers have achieved dramatic take-up rates for their services. However, they are placing their businesses at risk through their inadequate attention to security issues. Nowhere is this more evident than in the area of backup and recovery. When assessed against users' needs for assured accessibility of the data that they entrust to the cloud, SaaS services are found ...


RiskVA: A visual analytics system for consumer credit risk analysis

Xiaoyu Wang; Dong Jeong; Remco Chang; William Ribarsky Tsinghua Science and Technology, 2012

Consumer credit risk analysis plays a significant role in stabilizing a bank's investments and in maximizing its profits. As a large financial institution, Bank of America relies on effective risk analyses to minimize the net credit loss resulting from its credit products (e.g., mortgage and credit card loans). Due to the size and complexity of the data involved in this ...


Protection of consumer right to a fair transaction in E-commerce

Meirong Guo 2011 International Conference on Business Management and Electronic Information, 2011

E-commerce is perhaps most commonly used to describe shopping on the Internet. It has been rapidly developing in accordance with the development of information system and network technology. The protection on consumer rights has become more and more serious in E-commerce. In this study, we compared relevant regulations of the right to a fair transaction in the USA, European Union ...


Caller ID: Whose Privacy?

Michael Lesk IEEE Security & Privacy, 2014

Today, we consider it routine to see the name of the person calling us when our phone rings. When this service was introduced, it was debated: was a telephone caller entitled to anonymity? We opted for disclosure, and we should remember that maximum privacy isn't always the best public policy.


More Xplore Articles

Educational Resources on Consumer protection

Back to Top

eLearning

Studying on the adverse selection in e-commerce market

Jianwen Yao; Lifang Zou The 2nd International Conference on Information Science and Engineering, 2010

In response to the information asymmetry problem in e-commerce market, the solution involves in the process of building the adverse selection model in e-commerce market and analyzing the effect of adverse selection on businesses and consumers. Then the results derived from establishing e-commerce transaction law, building third-party organization by using signal transmission and other measures.


Does SaaS Backup Pass the Fitness-for-Purpose Test?

Roger Clarke IEEE Cloud Computing, 2015

Software-as-a-service (SaaS) providers have achieved dramatic take-up rates for their services. However, they are placing their businesses at risk through their inadequate attention to security issues. Nowhere is this more evident than in the area of backup and recovery. When assessed against users' needs for assured accessibility of the data that they entrust to the cloud, SaaS services are found ...


RiskVA: A visual analytics system for consumer credit risk analysis

Xiaoyu Wang; Dong Jeong; Remco Chang; William Ribarsky Tsinghua Science and Technology, 2012

Consumer credit risk analysis plays a significant role in stabilizing a bank's investments and in maximizing its profits. As a large financial institution, Bank of America relies on effective risk analyses to minimize the net credit loss resulting from its credit products (e.g., mortgage and credit card loans). Due to the size and complexity of the data involved in this ...


Protection of consumer right to a fair transaction in E-commerce

Meirong Guo 2011 International Conference on Business Management and Electronic Information, 2011

E-commerce is perhaps most commonly used to describe shopping on the Internet. It has been rapidly developing in accordance with the development of information system and network technology. The protection on consumer rights has become more and more serious in E-commerce. In this study, we compared relevant regulations of the right to a fair transaction in the USA, European Union ...


Caller ID: Whose Privacy?

Michael Lesk IEEE Security & Privacy, 2014

Today, we consider it routine to see the name of the person calling us when our phone rings. When this service was introduced, it was debated: was a telephone caller entitled to anonymity? We opted for disclosure, and we should remember that maximum privacy isn't always the best public policy.


More eLearning Resources

IEEE-USA E-Books

  • The Shifting Landscape of Regulation and Consumer Protection

    This chapter contains sections titled: Why Regulation Still Matters, The Evolution of Regulation: Trust, Institutions, and Brands, Where the Sharing Economy Is Taking Regulation, Future Regulatory Models

  • The Groups

    This chapter contains sections titled: Privacy-centric Advocacy Groups, Privacy Advocacy and Civil Liberties, Privacy Advocacy and Human Rights, Privacy Advocacy and Consumer Protection, Privacy Advocacy and Digital Rights, Privacy Advocacy and the "Single Issue", The Privacy Advocacy Network

  • Netting the Cybershark: Consumer Protection, Cyberspace, the Nation-State, and Democracy

    This chapter contains sections titled: Introduction, Consumer Protection Law, Technology, and Antisocial Behavior, Democracy and Globalization, Will Nation- States Survive?, Legal Rights and Remedies, Cyberspace and the Law, Is Regulation Possible?, Conclusions: Democracy and Market Forces, Notes, References



Standards related to Consumer protection

Back to Top

No standards are currently tagged "Consumer protection"


Jobs related to Consumer protection

Back to Top