نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
In the report "Prevalence of Perceived Food and Housing Security - 15 States, 2013," on page 15, the website in reference 3 should be https://www.surgeongeneral.gov/priorities/prevention/2012-npc-action-plan.pdf.
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fun...
In this paper, we developed a theoretical model that posits factors influencing Internet banking use and validated it with a sample of more than 300 respondents using Partial Least Squares (PLS). The results indicated that three factors, openness to experience from the Five-Factor Model, perceived usefulness, and green concern from peer pressure, were positively associated with Internet banking...
The modern-day use of cyberspace has created a world that is increasingly relying on online services to operate. Nevertheless, cyberspace has a ‘dark side’; as there are many risks associated it. This ‘dark side’ has called for safety and security measures to be implemented through cyber security. As such, cultivating a supportive culture is perceived to be an important contributing factor to c...
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of ”wireless web” offerings. All such offerings today use a security architecture that lacks end-to-...
The aim of this study is to identify and evaluate the variables influencing consumer perceived value (CPV) in chain stores. Due to this purpose, the research uses combined methods, a qualitative method was conducted to identify variables affecting consumer perceived value and quantitative one was used to determine the relationship between variables. The statistical population of this study...
The Internet of Things significantly reduces the prices of home security systems, thereby making home security available to everyone. Prior research provides the technical foundation for Smart Home security. However, frequent false alarms still remain a severe challenge. While current work in this domain mainly focuses on the improvement of sensors and algorithms, this study proposes a semi-aut...
Biometric authentication systems verify the identity of users by relying on their distinctive traits, like fingerprint, face, iris, signature, voice, etc. Biometrics is commonly perceived as a strong authentication method; in practice several well-known vulnerabilities exist, and security aspects should be carefully considered, especially when it is adopted to secure the access to applications ...
Much like steam engines and the internet, blockchain has emerged as a disruptive technology and a foundation for tomorrow’s businesses and ecosystem. Blockchains meld technology and economics to provide unprecedented security guarantees. As individuals seek to reduce uncertainties, economic incentives can drive human behavior, and act as the enablers of personal security, either perceived or re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید