نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

Journal: :iranian journal of public health 0
aa noorbala m agah heris a alipour e mousavi g farazi

background: to compare mental health and well- being in different levels of the perceived discrimination among iranian people living in tehran. method: using multi- stage sampling, 1255 subjects with the average age of 45 years and 9 months (including 672 women and 583 men) were selected and they completed all items of the general health questionnaire (ghq), the social well- being inventory (sw...

2013
Larry Koved Shari Trewin Cal Swart Kapil Singh Pau-Chen Cheng Suresh Chari

The broad scale move to mobile devices as a primary computing platform raises a number of issues about how people perceive the security risks when using and relying on these devices for performing sensitive computing tasks. We are studying mobile authentication and authorization, focusing our attention on applications with high security requirements, such as mobile banking, in the context of mo...

2009
Burcu Bulgurcu Hasan Cavusoglu Izak Benbasat

Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive an employee to comply with requirements of the information security policy (ISP) of her organization with regards to protecting information and technology resources: an employee’s information security awareness (ISA) and her perceived fairness of the requirements of the ISP. Our results, which is ...

2017
Katsiaryna Labunets Fabio Massacci Federica Paci

[Context] Many security risk assessment methods are proposed both in academia (typically with a graphical notation) and industry (typically with a tabular notation). [Question] We compare methods based on those two notations with respect to their actual and perceived efficacy when both groups are equipped with a domain-specific security catalogue (as typically available in industry risk assessm...

Journal: :Sustainability 2023

Effective security support remains a challenge, even for mobile banking applications; this is leading to the loss of many customers due limited protection customer data and privacy. Cyber threats include everything from identity theft malware email online fraud. Thus, businesses individuals should use risk assessment methods countermeasures protect their m-banking apps. With in mind, new model ...

Journal: :JORS 2008
Z. Liao W. K. Wong

This paper empirically explores the major considerations associated with Internet-enabled ebanking systems and systematically measures the determinants of customer interactions with ebanking services. The results suggest that perceived usefulness, ease of use, security, convenience and responsiveness to service requests significantly explain the variation in customer interactions. Exploratory f...

2015
Martina de Gramatica Katsiaryna Labunets Fabio Massacci Federica Paci Alessandra Tedeschi

[Context and motivation] To remedy the lack of security expertise, industrial security risk assessment methods come with catalogues of threats and security controls. [Question/problem] We investigate in both qualitative and quantitative terms whether the use of catalogues of threats and security controls has an effect on the actual and perceived effectiveness of a security risk assessment metho...

2012
Tan He Yaowu Wang Wanyu Liu

Based on TAM and TTF theory, we construct an adoption model to analyze factors that influence users adoption m-commerce. The theoretical model is tested by Smart-PLS 2.0 on a dataset of 236 samples. The empirical result indicates that perceived fit have positive effect on perceived usefulness and perceived security, perceived value was positively related to intention to adopt m-commerce; moreov...

2014
Wadie Nasri Mohamed Zarai

This paper aims to identify empirically the factors influencing the intention to use Internet Banking in Tunisia. The impact of perceived usefulness, perceived ease of use, awareness, social norm, security and privacy, and computer self efficacy on intention to use Internet banking is tested through structural equation modelling techniques. The 284 self-administrated questionnaires were collect...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید