نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
Background and Objectives: Health human resources is the major asset of the health system. The status of human resources in upstream and regulatory health organizations can exert high impact on the effectiveness of health policies and the performance of health system. This study, hence, was designed to explore the possible area of human resource damage to the employees of the Iranian Ministry o...
This paper takes the potential release of online transaction market size as the starting point of research, and discusses how Chinese consumer perceived risks influence online payment willingness. This study divides consumer perceived risks of online payment into eight dimensions: Economic risk, Functional risk, Private risk, Security risk, Time risk, Service risk, Psychological risk and Social...
Public security, as the central axis of state and citizen agenda, has been approached from different angles which phases analysis have established; rule law, crime prevention, administration justice, persecution social rehabilitation without considering participation beyond complaints or demonstrations. The objective this work was to review structure establish types self-government, government ...
Email: Guangying Hua is a PhD candidate at Bentley University. Her research interests include business analytics, social networking, and issues in IT applications in business area. Abstract Online banking, an Internet based service enabling people to do financial transactions, has been an obstacle for the development of e-commerce in China. This paper investigates the online banking acceptance ...
Nobody ever got fired for buying IBM,” was a widely used cliché in the 1970s in the corporate IT (information technology) world. Since then, the traditional process of purchasing software has dramatically changed, challenged by the advent of open source software (OSS). Since its inception in the 1980s, OSS has matured, grown, and become one of the important driving forces of the enterprise ecos...
Protection of physical assets and digital information is of growing importance to society. As with any new technology, user acceptance of new software and hardware devices is often hard to gauge, and policies to introduce and ensure adequate and correct usage of such technologies are often lacking. Security technologies have widespread applicability to different organizational contexts that may...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید