نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
To estimate the cost of a data breach to the inflicted firm, this study examines the relationship between a breach incident and changes in the inflicted firm’s profitability, perceived risk, and the inflicted firms’ information environment transparency. Profitability is measured as reported earnings and analysts’ earnings forecasts. Perceived risk is measured as reported stock return volatility...
singapore is depicted to be the fastest growing telecommunications nation in asia. presently, all the members of the singapore banking industry have engaged in the use of information and communication technology as a platform for effective and efficient means of conducting financial transactions. this paper focuses on determining the level of users’ acceptance of the electronic banking services...
With the improvement of telecommunication and wireless Internet-access technologies, smart mobile terminals have been extensively applied for mobile shopping. In this paper, PPM Model is taken as a theoretical framework and an empirical research method is employed to determine the antecedents influencing consumers’ decisions on migrating from PC-based shopping to mobile shopping. We found that ...
IND Pub In a representative sample of 13,683 U.S. employees, we compared survivors of layoffs, offshoring, outsourcing, and their combinations to a group who experienced no downsizing. Survivors of layoffs perceived lower organizational performance, job security, affective attachment, calculative attachment, and had higher turnover intentions. Offshoring survivors perceived lower performance, f...
In a representative sample of 13,683 U.S. employees, we compared survivors of layoffs, offshoring, outsourcing, and their combinations to a group who experienced no downsizing. Survivors of layoffs perceived lower organizational performance, job security, affective attachment, calculative attachment, and had higher turnover intentions than the comparison. Offshoring survivors perceived lower pe...
This research aims to identify the antecedents that drive an employee to commit Internet abuses at the workplace. Drawing on literatures in criminology, this present study developed a theoretical model based on neutralization techniques and rational choice theory. The model was validated using survey data from 428 employees. Our results indicate that neutralization techniques significantly infl...
The purpose of this study was to examine perceived hindrances encountered by sport coaches in the Gauteng Province of South Africa. A total of 224 sport coaches (122 males and 102 females) were purposively recruited to participate in this study. An exploratory factor analysis was used to assess the factor structure of the Perceived Hindrance Scale. The results of this study indicated the follow...
This research was designed to explore the major factors affecting the acceptance of the all-in-one payment method (Plastc Card) in Finland. The primary purpose was to find out possible variables which affect users’ adoption rate in terms of the unique features of FinTech products, the second purpose was to propose a conceptual research model based on consumer acceptance theories from informatio...
Introduction The Conceptual Model Vendor Characteristics Perceived Security of Transactions and Concern for Privacy Consumer Characteristics Data Likelihood of Electronic Exchange (PUR) Model Development Results Additional Analyses Implications of the Study and Future Research Footnotes References About the Authors
With powerful regulations surrounding security and privacy of information, the authors attempt to identify challenges valuing information security investments. The authors examine three primary approaches to measuring information value: Perceived, Real, and Normative. Literature is reviewed and the approaches are examined in terms of their strengths and weaknesses in providing value measurement...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید