نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) e-commerce environment are also available for wireless transactions. In this paper we will show that these per...
Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights management security systems, there is little scholarly/academic literature dedicated to the human aspects associated with circumvention of DRM secur...
Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact crucial in the overall value of service quality. A security ontology that enables a quantification of risks related to the usage of Semantic Web services in enterprise information systems was created to meet users’ requir...
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
Investigations of computer user behavior become especially important when behaviors like security software adoption affect organizational information resource security, but adoption antecedents remain elusive. Technology adoption studies typically predict behavioral outcomes by investigating the relationship between attitudes and intentions, though intention may not be the best predictor of act...
In a distributed multi-user environment, the security policy must not only specify legitimate user privileges but also aid in the detection of the abuse of the privileges and adapt to perceived system threat conditions. This paper advocates extending authorization policy evaluation mechanisms with a means for generating audit data allowing immediate notification of suspicious application level ...
The prevailing approach to cyber security continues to be the implementation of controls—technical, formal, and informal. We have seen little departure from a fundamentally preventive strategy. The criminal justice field has called for an increased emphasis on deterrence strategies, specifically Situational Crime Prevention (SCP). This paper presents the results of an exploratory (pilot) study ...
Objectives Life satisfaction is an important psychological concept that is associated with person's general assessment of life. Many variables can affect life satisfaction. This research was conducted to determine the relationship between perceived social support and life satisfaction with mediating role of resilience and hope. Methods A total of 270 adolescents who had records at Imam Khomei...
many e-commerce transactions via e-payment systems is carried out. the aim of this study is that the theory of structures, an empirical analysis about the importance and ranking key factors that may be on customer satisfaction in electronic payment systems affect the iranian banks.9 specific topics of the factors in e-payment systems, customer satisfaction and affect are more key, were selected...
In press) How reward, computer self-efficacy, and perceived power security affect KMS success: An empirical investigation in high-tech companies.
a significant technological revolution is currently occurring, with intense competition between companies to deliver their services via emerging technologies. In Saudi Arabia, mobile payment applications have become more important due the increasing number of users. By filling in gaps m-payment setting, this work contributes theory. It practice by giving service providers clear image effects Pe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید