نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم انسانی 1389

abstract this study examines the relationship between reading anxiety and difficulty of texts as well as the relationship between reading anxiety and students perceived difficulty of the texts. since difficulty is a relative concept, i limited its definition by sticking to the readability formula. we also took students perceived difficulty levels into account. therefore, in the present study, ...

Journal: :CoRR 2009
Yi Yi Thaw Ahmad Kamil Mahmood P. Dhanapal Durai Dominic

The development of electronic commerce is characterized with anonymity, uncertainty, lack of control and potential opportunism. Therefore, the success of electronic commerce significantly depends on providing security and privacy for its consumers’ sensitive personal data. Consumers’ lack of acceptance in electronic commerce adoption today is not merely due to the concern on security and privac...

Journal: :Electronic Commerce Research and Applications 2010
Changsu Kim Wang Tao Namchul Shin Ki-Soo Kim

It is commonly believed that good security improves trust, and that the perceptions of good security and trust will ultimately increase the use of electronic commerce. In fact, customers’ perceptions of the security of e-payment systems have become a major factor in the evolution of electronic commerce in markets. In this paper, we examine issues related to e-payment security from the viewpoint...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده مدیریت و اقتصاد 1392

these days, all department stores make an effort to provide their clients with valuable products in order to project the best image for them. as a result, clients’ comprehension risk will decrease and they will be more willing to repurchase. having a good image is really important for the department stores because it makes an impression on clients’ comprehension of both quality and risk. consid...

2005
Alice M. Johnson

Security breaches have increasingly become a major threat to organizations. Nevertheless, according to recent reports, many organizations do not plan to increase spending on information security. In fact, little is known about an organization’s motivation to invest in information security. This paper uses the Technology Acceptance Model as a basis for studying factors that might motivate organi...

2015
Qin Yang Yanwu Wang

Customer loyalty or repeat purchasing is critical for the survival and success of any store. By focusing on online stores, this study investigates the repeat purchase intention of experienced online buyers based on means-end chain theory and prospect theory. Buyer concern about website security is a critical issue when it comes to maximizing the potential for electronic commerce transactions. B...

2014
Frida Ferdani Putri Anat Hovav

The trend of bring your own device (BYOD) has been rapidly adopted by organizations. Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep increasing. Yet, BYOD has raised significant concerns about information system security as employees use their personal devices to access organizational resources. This study aims to examine employees' intention to comply with...

2009
Wolter Pieters

In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the conce...

Journal: :Information Technology and Management 2014
N. R. Mukundan L. Prakash Sai

Information security governance dominates the senior management’s agenda in overall organizational informance technology (IT) governance. The globalization trends encompassing all businesses, and risks of information leakage forces organizations to institute mechanisms to protect it. In order to achieve adequate level of protection, organizations implement information security management system...

اکبرزاده صفوئی, مرتضی, زنگیان, سمیه, موسوی امیری, طیبه, نعمتی, محمد علی,

Nowadays, learning to use internet provides an opportunity for financial institutes and banks to benefit from it in their own favor in such turbulent competitive environment. In this regard, this research studies simultaneous role of perceived security, citizens’ trust and satisfaction on the acceptance of internet banking services. Statistical population of the research is customers of Bank Me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید