منابع مشابه
Adopting E-commerce to User's Needs
The objectives of this paper are to identify and analyse the extent to which the site is fulfilling all the user’s requirements and needs. The related works comprise the history of interactive design and the benefits of user-centered development, which is the methodology followed in this survey. Moreover, there is a brief comparison between Waterfall and User-centered methodology in terms of ad...
متن کاملAre E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is not true for the client side. End users are usually undereducated in the field of computer security. They use internet clients such as web browsers and e-mail programs to do their e-commerce business. Their platform that...
متن کاملe-Bay.Net: Helping Users to Buy in e-commerce Applications
With the growth of the Web over the past years, there has been a similar increase in the services that are accessible over the Web. E-commerce, such on-line stores, is one of the most promising applications. Recommendation Systems are tools designed to help users to find items within a given domain, according to their own preferences , expressed by means of a user profile. A general model for r...
متن کاملAdopting User-centred Development for Arabic E-commerce Websites
Over the past few years the Internet has become an essential business platform by aiding trading, distribution and sales between organisations, consumers, and even between consumers. This has brought ecommerce to an entirely new level which raised some issues in websites usability and the human-computer interaction. Therefore, the objectives of this paper are to identify and analyse the extent ...
متن کاملComparing Security Perceptions of E-Commerce Users
In today’s computer security paradigm, e-commerce participants are faced with many types of malware. Spyware and viruses are two such examples that continue to threaten secure e-business. Despite the best efforts of information security professionals to lessen the frequency and impact of the infections, they show no sign of abatement. Because normal user behaviors make them vulnerable to malwar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Science & Engineering Survey
سال: 2012
ISSN: 0976-3252
DOI: 10.5121/ijcses.2012.3101