نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

2014
Kholekile L. Gwebu Jing Wang Wenjuan Xie

To estimate the cost of a data breach to the inflicted firm, this study examines the relationship between a breach incident and changes in the inflicted firm’s profitability, perceived risk, and the inflicted firms’ information environment transparency. Profitability is measured as reported earnings and analysts’ earnings forecasts. Perceived risk is measured as reported stock return volatility...

Journal: :international journal of management and business research 2012
shailender singh

singapore is depicted to be the fastest growing telecommunications nation in asia. presently, all the members of the singapore banking industry have engaged in the use of information and communication technology as a platform for effective and efficient means of conducting financial transactions. this paper focuses on determining the level of users’ acceptance of the electronic banking services...

2014
Dingna Tang Yimin Yang Ying Yan Ming Zhou

With the improvement of telecommunication and wireless Internet-access technologies, smart mobile terminals have been extensively applied for mobile shopping. In this paper, PPM Model is taken as a theoretical framework and an empirical research method is employed to determine the antecedents influencing consumers’ decisions on migrating from PC-based shopping to mobile shopping. We found that ...

2010
CARL P. MAERTZ MICHAEL A. CAMPION

IND Pub In a representative sample of 13,683 U.S. employees, we compared survivors of layoffs, offshoring, outsourcing, and their combinations to a group who experienced no downsizing. Survivors of layoffs perceived lower organizational performance, job security, affective attachment, calculative attachment, and had higher turnover intentions. Offshoring survivors perceived lower performance, f...

2009
Carl P. Maertz John Cook Jack W. Wiley Cynthia LeRouge Michael A. Campion

In a representative sample of 13,683 U.S. employees, we compared survivors of layoffs, offshoring, outsourcing, and their combinations to a group who experienced no downsizing. Survivors of layoffs perceived lower organizational performance, job security, affective attachment, calculative attachment, and had higher turnover intentions than the comparison. Offshoring survivors perceived lower pe...

2013
Wenli Li Lijiao Cheng

This research aims to identify the antecedents that drive an employee to commit Internet abuses at the workplace. Drawing on literatures in criminology, this present study developed a theoretical model based on neutralization techniques and rational choice theory. The model was validated using survey data from 428 employees. Our results indicate that neutralization techniques significantly infl...

2017
Alliance Kubayi Yoga Coopoo Heather Morris-Eyton

The purpose of this study was to examine perceived hindrances encountered by sport coaches in the Gauteng Province of South Africa. A total of 224 sport coaches (122 males and 102 females) were purposively recruited to participate in this study. An exploratory factor analysis was used to assess the factor structure of the Perceived Hindrance Scale. The results of this study indicated the follow...

2016
Wen Cao Matti Rossi

This research was designed to explore the major factors affecting the acceptance of the all-in-one payment method (Plastc Card) in Finland. The primary purpose was to find out possible variables which affect users’ adoption rate in terms of the unique features of FinTech products, the second purpose was to propose a conceptual research model based on consumer acceptance theories from informatio...

Journal: :J. Computer-Mediated Communication 1999
Vanitha Swaminathan Elzbieta Lepkowska-White R. Bharat Rao

Introduction The Conceptual Model Vendor Characteristics Perceived Security of Transactions and Concern for Privacy Consumer Characteristics Data Likelihood of Electronic Exchange (PUR) Model Development Results Additional Analyses Implications of the Study and Future Research Footnotes References About the Authors

2005
Tony Coulson

With powerful regulations surrounding security and privacy of information, the authors attempt to identify challenges valuing information security investments. The authors examine three primary approaches to measuring information value: Perceived, Real, and Normative. Literature is reviewed and the approaches are examined in terms of their strengths and weaknesses in providing value measurement...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید