نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

2014
Marco Marabelli Sue Newell Yun Zang

Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we d...

2003
Seth Schoen

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals...

Journal: :CoRR 2004
Aashish Sharma William Yurcik

Technical security is only part of E-Commerce security operations; human usability and security perception play major and sometimes dominating factors. For instance, slick websites with impressive security icons but no real technical security are often perceived by users to be trustworthy (and thus more profitable) than plain vanilla websites that use powerful encryption for transmission and se...

2016
Palak Gupta Akshat Dubey

Consumer disposition to the information quality of the website, trust, privacy concerns, reputation, security concerns, and the company’s reputation have strong effects on Internet consumers’ trust in the website. Major two critical problems for both e-commerce consumers and sites are privacy and security. Privacy is the control over one’s personal data whereas; security is the attempted access...

Journal: :Security and Communication Networks 2012
Tarik Taleb Yassine Hadjadj Aoul

Different security measures have emerged to encounter various Internet security threats, ensuring a certain level of protection against them. However, this does not come without a price. Indeed, there is a general agreement that high security measures involve high amount of resources, ultimately impacting the perceived Quality of Service (QoS). The objective of this paper is to define a framewo...

Journal: :The British journal of social psychology 2004
Robin Goodwin Patricia Costa Joseph Adonu

Recent research on social support has suggested that there may be only a weak correlation between perceived and received (enacted) support, with the former best seen as a stable, personality-like trait. This study investigates the relationship between individual values, self-esteem and perceived and received support, with samples taken from four nations (the UK, Portugal, Ghana and Mozambique)....

2012
Juhee Kwon M. Eric Johnson

This study examines how security resources, capabilities, and cultural values influence security performance and perceived regulatory compliance. Using binomial and multinomial logit models, we analyze qualitative and quantitative survey data collected from 250 healthcare organizations. The results show that security resources and security capabilities are positively associated with compliance ...

1996
Ronda R. Henning

A system security policy is often perceived as a set of mandatory requirements levied upon the system by an organizational directive or Information System Security Officer (ISSO). To the user, these security requirements may bear little resemblance to his actual working system security policy, which controls data modification and user privileges. In the course of reengineering business processe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید