نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
Many e-commerce transactions via e-payment systems is carried out. The aim of this study is that the theory of structures, an empirical analysis about the importance and ranking key factors that may be on customer satisfaction in electronic payment systems affect the Iranian banks.9 specific topics of the factors in e-payment systems, customer satisfaction and affect are more key, were selected...
The present study aims to identify the factors affecting the behavior of customers’ use of e-banking services of Tejarat Bank in Tehran. A qualitative method and an in-depth interview have been applied to achieve the research goal. The information and data collected from the interviews have been analyzed using open coding and axial coding. Then, the initial indicators of the model of using e-ba...
Deviant behaviors are harmful to individuals and organizations in most situations. However, at the individual level these behaviors in response to stress can be considered as compensatory behaviors. The present study aimed to investigate the moderating role of deviant behaviors on the relationship between job stress and perceived psychological safety and compare discussed relations between the ...
The objective of this paper is to investigate the significant perceived security threats of computerized accounting information systems (CAIS) in Saudi organizations. An empirical survey using a self-administered questionnaire has been carried out to achieve this objective. The survey results revealed that almost half of the responded Saudi organizations have suffered financial losses due to in...
background and objectives: health human resources is the major asset of the health system. the status of human resources in upstream and regulatory health organizations can exert high impact on the effectiveness of health policies and the performance of health system. this study, hence, was designed to explore the possible area of human resource damage to the employees of the iranian ministry o...
General deterrence theory suggests that deterrent security countermeasures (e.g., security policies, security awareness programs, security software) can be used to control IS misuse in organizations. However, empirical studies that have examined the effectiveness of such techniques have produced inconclusive results. A limitation of these studies is that they ignore the impacts of sanction perc...
Advances in electronic banking technology have created novel ways of handling daily banking affairs, especially via the online banking channel. The acceptance of online banking services has been rapid in many parts of the world. In the leading e-banking countries the number of ebanking contracts has exceeded 50 percent. This study investigates into online banking acceptance in the light of the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید