نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

2016
Lena Gribel Stefanie Regier Ingo Stengel

Despite the vast economic potential of wearable technologies, up to now there is only little scientific research on the acceptance determinants of the wearable computing phenomenon. Therefore, the overall aim of this study is to explain psychographic factors that lead to either acceptance or resistance of wearable computing. This paper synthesises a cause and effect model of wearable computing ...

2012
Efosa C. Idemudia

A lot of studies in the information systems, advertising, and marketing literature have shown that for the past two decades online banner ad click-through rate is decreasing steadily (Idemudia et al. 2007). To address this issue, we develop the Visual Perception Model (VP) for Online Target marketing and then conducted an experiment by manipulating the independent variables (i.e. perceived secu...

Journal: :Jurnal Ilmiah Manajemen Kesatuan 2022

Changing patterns of behavior in public financial transactions during this pandemic has increased the use e-wallet services. One Indonesian people's most widely used services is DANA. This study aims to determine effect perceived usefulness, ease use, security, and cashback promotion on behavioral intention DANA (a survey people Special Region Yogyakarta). The sampling technique non-probability...

In recent years, tenure security has been one of the main objectives of improvement projects in ‎urban poor settlements. Despite lots of international studies initiated in this field, it has received ‎little attention in Iran. The main aim of this paper is to assess the influence of tenure security on ‎the level of household investment in housing. Survey method is considered as the methodology ...

2014
Doug Alards-Tomalin Tamara L. Ansons Tara C. Reich Yumiko Sakamoto Rita Davie Jason P. Leboe-McGowan

Airport security measures can be grouped into two types; standardized screening techniques, which all passengers must undergo (e.g., baggage X-rays, metal detecting scans); and elevated-risk screening (including pat-downs and strip searches) for which only a sub-set of passengers are selected. In the current study, an undergraduate sample (n 1⁄4 636) was surveyed regarding the professionalism o...

2012
Tobias Ackermann Thomas Widjaja Alexander Benlian Peter Buxmann

Despite increasing interest in IT outsourcing (ITO) and the various benefits it promises, Cloud Computing (CC) as the currently most prevalent ITO paradigm still entails serious IT security risks. Little attention has been paid so far to fully and unambiguously capture the complex nature of IT security risks and how to measure it. Against this backdrop, we first propose a comprehensive conceptu...

Journal: :MMWR. Morbidity and Mortality Weekly Report 2017

2012
Afshan Azam

This paper integrates extant literature on retailing and consumer choice to develop an economic model of consumer choice in which a consumer self-selects on-line shopping. Three important factors impacting consumer choice of on-line shopping: (1) the online shopping utility (2) the consumers’ perceived product and service risks (Perceived Privacy Protection, Perceived Security Protection etc.) ...

2007
Tim Chenoweth Robert P. Minch Sharon Tabor

This research in progress essay reviews the existing technology acceptance literature to evaluate its ability to predict the adoption of network security controls. We suggest that an expanded view of current technology acceptance theory may be required to adequately address the complex variables that influence the acceptance of security controls. An important differentiator is that while tradit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید