نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

Background and Objectives: Health human resources is the major asset of the health system. The status of human resources in upstream and regulatory health organizations can exert high impact on the effectiveness of health policies and the performance of health system. This study, hence, was designed to explore the possible area of human resource damage to the employees of the Iranian Ministry o...

2014
Qing Yang Xinhua Qian Chuan Pang Baoxu An

This paper takes the potential release of online transaction market size as the starting point of research, and discusses how Chinese consumer perceived risks influence online payment willingness. This study divides consumer perceived risks of online payment into eight dimensions: Economic risk, Functional risk, Private risk, Security risk, Time risk, Service risk, Psychological risk and Social...

Journal: :Journal of Research in Social Science and Humanities 2023

Public security, as the central axis of state and citizen agenda, has been approached from different angles which phases analysis have established; rule law, crime prevention, administration justice, persecution social rehabilitation without considering participation beyond complaints or demonstrations. The objective this work was to review structure establish types self-government, government ...

2008
Guangying Hua

Email: Guangying Hua is a PhD candidate at Bentley University. Her research interests include business analytics, social networking, and issues in IT applications in business area. Abstract Online banking, an Internet based service enabling people to do financial transactions, has been an obstacle for the development of e-commerce in China. This paper investigates the online banking acceptance ...

Journal: :Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) 2017

Journal: :International Journal of Information Technology and Decision Making 2016
Mario Silic Andrea Back

Nobody ever got fired for buying IBM,” was a widely used cliché in the 1970s in the corporate IT (information technology) world. Since then, the traditional process of purchasing software has dramatically changed, challenged by the advent of open source software (OSS). Since its inception in the 1980s, OSS has matured, grown, and become one of the important driving forces of the enterprise ecos...

Journal: :JOEUC 2006
Tabitha L. James Taner Pirim Katherine Boswell Brian J. Reithel Reza Barkhi

Protection of physical assets and digital information is of growing importance to society. As with any new technology, user acceptance of new software and hardware devices is often hard to gauge, and policies to introduce and ensure adequate and correct usage of such technologies are often lacking. Security technologies have widespread applicability to different organizational contexts that may...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید