نتایج جستجو برای: perceived web security

تعداد نتایج: 514285  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم انسانی 1389

abstract this study examines the relationship between reading anxiety and difficulty of texts as well as the relationship between reading anxiety and students perceived difficulty of the texts. since difficulty is a relative concept, i limited its definition by sticking to the readability formula. we also took students perceived difficulty levels into account. therefore, in the present study, ...

2016
Ravinder Yadav RAVINDER YADAV

Web application security is a branch of Information Security that deals specifically with security of websites, web applications and web services. Simply, Web Application Security is ―The securing of web applications‖. Web applications are one of the most prevalent platforms for information and services delivery over Internet today. As they are increasingly used for critical services, web appli...

Journal: :Electronic Commerce Research and Applications 2010
Changsu Kim Wang Tao Namchul Shin Ki-Soo Kim

It is commonly believed that good security improves trust, and that the perceptions of good security and trust will ultimately increase the use of electronic commerce. In fact, customers’ perceptions of the security of e-payment systems have become a major factor in the evolution of electronic commerce in markets. In this paper, we examine issues related to e-payment security from the viewpoint...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده مدیریت و اقتصاد 1392

these days, all department stores make an effort to provide their clients with valuable products in order to project the best image for them. as a result, clients’ comprehension risk will decrease and they will be more willing to repurchase. having a good image is really important for the department stores because it makes an impression on clients’ comprehension of both quality and risk. consid...

2013
Alimatu-Saadia Yussiff Wan Fatimah Wan Ahmad

The need to implement and adopt web 2.0 technologies into teaching and learning is glaring for higher educational institutions. This is because there are increase numbers of students’ visà-vis teaching staff, competition for resources, over-crowded classroom, the need for efficient teaching and learning, as well as the need to learn anytime and anywhere. However, it’s of no doubt that every tec...

2005
Alice M. Johnson

Security breaches have increasingly become a major threat to organizations. Nevertheless, according to recent reports, many organizations do not plan to increase spending on information security. In fact, little is known about an organization’s motivation to invest in information security. This paper uses the Technology Acceptance Model as a basis for studying factors that might motivate organi...

2002
Maryann Hondo

WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message confidentiality, and single message authentication. These mechanisms can be used to accommodate a wide variety of security models and encryption technologies. WS-Security also provides a general-purpose mechanism for associating security tokens with messages. No specific type...

2011
Dominique Guinard Iulia Ion Simon Mayer

Current trends inspired from the development of the Web 2.0 advocate designing smart things (e.g., wireless sensors nodes or home appliances) as service platforms. Interoperable services are mainly achieved using two different approaches: WS-* and RESTful Web services. These approaches have previously been compared with respect to performance and features, but no work has been done to elicit th...

2004
Kenny Khoo Lina Zhou

The promising features of Web services also make them vulnerable to new types of security threats. Web service providers must assure their clients’ confidentiality, integrity and availability over a trusted relationship that may be asynchronous and that may involve multiple business partners. Despite the continued significance of the traditional approaches to securing content, transmission and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید