نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

2017

In the report "Prevalence of Perceived Food and Housing Security - 15 States, 2013," on page 15, the website in reference 3 should be https://www.surgeongeneral.gov/priorities/prevention/2012-npc-action-plan.pdf.

Journal: :CoRR 2011
Tolga Mataracioglu Sevgi Özkan

This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fun...

2013
MYUNG KO HYUN SHIK YOON

In this paper, we developed a theoretical model that posits factors influencing Internet banking use and validated it with a sample of more than 300 respondents using Partial Least Squares (PLS). The results indicated that three factors, openness to experience from the Five-Factor Model, perceived usefulness, and green concern from peer pressure, were positively associated with Internet banking...

2015
Noluxolo Gcaza Rossouw von Solms Joey Jansen van Vuuren

The modern-day use of cyberspace has created a world that is increasingly relying on online services to operate. Nevertheless, cyberspace has a ‘dark side’; as there are many risks associated it. This ‘dark side’ has called for safety and security measures to be implemented through cyber security. As such, cultivating a supportive culture is perceived to be an important contributing factor to c...

2002
Vipul Gupta Sumit Gupta

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of ”wireless web” offerings. All such offerings today use a security architecture that lacks end-to-...

The aim of this study is to identify and evaluate the variables influencing consumer perceived value (CPV) in chain stores. Due to this purpose, the research uses combined methods, a qualitative method was conducted to identify variables affecting consumer perceived value and quantitative one was used to determine the relationship between variables. The statistical population of this study...

2014
Marcus Koehler Felix Wortmann

The Internet of Things significantly reduces the prices of home security systems, thereby making home security available to everyone. Prior research provides the technical foundation for Smart Home security. However, frequent false alarms still remain a severe challenge. While current work in this domain mainly focuses on the improvement of sensors and algorithms, this study proposes a semi-aut...

2012
Leonardo Montecchi Paolo Lollini Andrea Bondavalli Ernesto La Mattina

Biometric authentication systems verify the identity of users by relying on their distinctive traits, like fingerprint, face, iris, signature, voice, etc. Biometrics is commonly perceived as a strong authentication method; in practice several well-known vulnerabilities exist, and security aspects should be carefully considered, especially when it is adopted to secure the access to applications ...

2017

Much like steam engines and the internet, blockchain has emerged as a disruptive technology and a foundation for tomorrow’s businesses and ecosystem. Blockchains meld technology and economics to provide unprecedented security guarantees. As individuals seek to reduce uncertainties, economic incentives can drive human behavior, and act as the enablers of personal security, either perceived or re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید