نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

2001
Paul Ashley Heather M. Hinton Mark Vandenwauver

The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) e-commerce environment are also available for wireless transactions. In this paper we will show that these per...

2015
Neil McDonald Shamal Faily Marcella Favale Christos Gatzidis

Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights management security systems, there is little scholarly/academic literature dedicated to the human aspects associated with circumvention of DRM secur...

2007
Witold Abramowicz Andreas Ekelhart Stefan Fenz Monika Kaczmarek A Min Tjoa Edgar R. Weippl Dominik Zyskowski

Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact crucial in the overall value of service quality. A security ontology that enables a quantification of risks related to the usage of Semantic Web services in enterprise information systems was created to meet users’ requir...

Journal: :Computers & Security 2015
Jordan Shropshire Merrill Warkentin Shwadhin Sharma

Investigations of computer user behavior become especially important when behaviors like security software adoption affect organizational information resource security, but adoption antecedents remain elusive. Technology adoption studies typically predict behavioral outcomes by investigating the relationship between attitudes and intentions, though intention may not be the best predictor of act...

2002
Tatyana Ryutov B. Clifford Neuman

In a distributed multi-user environment, the security policy must not only specify legitimate user privileges but also aid in the detection of the abuse of the privileges and adapt to perceived system threat conditions. This paper advocates extending authorization policy evaluation mechanisms with a means for generating audit data allowing immediate notification of suspicious application level ...

2009
Nicole Beebe V. Srinivasan Rao

The prevailing approach to cyber security continues to be the implementation of controls—technical, formal, and informal. We have seen little departure from a fundamentally preventive strategy. The criminal justice field has called for an increased emphasis on deterrence strategies, specifically Situational Crime Prevention (SCP). This paper presents the results of an exploratory (pilot) study ...

ژورنال: روانشناسی معاصر 2018

Objectives Life satisfaction is an important psychological concept that is associated with person's general assessment of life. Many variables can affect life satisfaction. This research was conducted to determine the relationship between perceived social support and life satisfaction with mediating role of resilience and hope.  Methods A total of 270 adolescents who had records at Imam Khomei...

Journal: :international journal of finance, accounting and economics studies 0
taghi torabi associate professor at islamic azad university sciences and research branch mahsa ghorbani phd student, management & accounting faculty of allameh tabataba’i university, tehran, iran meysam bagheri phd student, management & accounting faculty of allameh tabataba’i university, tehran, iran samaneh tarighi phd student, economic faculty of islamic azad university, sciences and research branch

many e-commerce transactions via e-payment systems is carried out. the aim of this study is that the theory of structures, an empirical analysis about the importance and ranking key factors that may be on customer satisfaction in electronic payment systems affect the iranian banks.9 specific topics of the factors in e-payment systems, customer satisfaction and affect are more key, were selected...

2009
Jung-Yu Lai

In press) How reward, computer self-efficacy, and perceived power security affect KMS success: An empirical investigation in high-tech companies.

Journal: :International Journal on Advanced Science, Engineering and Information Technology 2022

a significant technological revolution is currently occurring, with intense competition between companies to deliver their services via emerging technologies. In Saudi Arabia, mobile payment applications have become more important due the increasing number of users. By filling in gaps m-payment setting, this work contributes theory. It practice by giving service providers clear image effects Pe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید