نتایج جستجو برای: perceived web security

تعداد نتایج: 514285  

2006
Chen Ye DongBack Seo Kevin C. Desouza Sridhar R. Papagari Sangareddy Sanjeev Jha

In this study, we examine factors that influence users’ post-adoption switching between technology products that are near perfect substitutes. The recent introduction of Mozilla Firefox Web browser provided an ideal empirical setting for this study. Drawing upon literature on post-adoption user behavior, consumer behavior, and online consumer research, we proposed a research model and validated...

2011
Francisco Javier Nieto

Web services are a powerful tool for executing functionalities using third party applications and they are widely used in business processes. For this reason, it is necessary to complement traditional security solutions by adding soft security mechanisms, which take care of trust, in order to determine whether a web service and its provider are performing as they should. An extensible model for...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

2016
O. Lee H. S. Lee M. K. Jee

This study examines the impact of the factors generated from previous research on the repurchase intentions of Chinese web shopping customers based on their shopping experience via major web shopping sites. The specific factors were classified into three general factors which are Web System Quality, Product Quality, and Customer Relation Quality. A total 421 data sample was collected. When anal...

2010
Boon-Yuen Ng Atreyi Kankanhalli

The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological controls are necessary, computer security also depends on individual’s security behavior. It is thus important to investigate what influences a user to practice computer security. This study uses the Health Belief Model, adapted from the healthcare literature, to study u...

2014
Rob Stockton Stuart Cunningham

Internet security is a well-researched and understood topic. However, the concept of online privacy is a less well-defined issue, particularly with the advent of mass email and social networking interactions. This paper presents results from a user survey to determine perceptions of privacy and trust in online environments. Results suggest that users have oftencontradictory views of their priva...

2005
Chen Ting Irene M. Y. Woon Atreyi Kankanhalli

Knowledge Management (KM) has been recognized as a critical management strategy in generating competitive advantage for the organization. In order to protect organizational knowledge stored in or transferred through company’s Knowledge Management Systems (KMS), information security controls have to be incorporated into these systems. However, overly strict controls may adversely impact the perc...

Journal: :Journal of Logical and Algebraic Methods in Programming 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید