نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

2011
Diana van Dongen Tjabe Smid Daniëlle RM Timmermans

BACKGROUND The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. METHODS Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with me...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده ادبیات و علوم انسانی 1388

the purpose of this study was to investigate how english language teachers in mashhad who teach students in the pre-university cycle perceived the impact of the efltee on their teaching. the target population was nearly all pre-university english language teachers in seven districts of mashhad in the scholastic year 2008/2009. a survey questionnaire which consisted of (36) likert type items, wa...

Journal: :JECO 2013
Hongjiang Xu

M-commerce as a special form of e-commerce has grown rapidly both in developed and developing countries. New advancements in its underlying technology have increased the functionality of m-commerce. However, they also present potential security risks. Security issues have been a top concern for m-commerce management. In spite of the benefits m-commerce could bring, new security and privacy risk...

2016

This study develops an extended model to predict customer adoption of Internet banking based on the Technology Acceptance Model (TAM) integrating with perceived risks, perceived web site features. In particular, drawing from the perceived risk construct, six specific risk facets; security, privacy, social, time, performance and financial risk synthesized with the construct perceived web site fe...

2015
Liezel Cilliers Stephen Flowerday

With the growing number of people living in cities, the challenges faced by governments in providing an acceptable standard of service delivery are immense. ‘Smart cities’ is a new and innovative approach that has been formulated over the past few years in order to use current infrastructure and resources more effectively and efficiently. For a smart city to work, large amounts of information m...

Journal: :international journal of information science and management 0
a. sanayei ph.d. pofessor of marketing research university of isfahan, itm research group, isfahan, e. bahmani member of itm research group, university of isfahan, isfahan

this article proposes a revised technology acceptance model to measure customers ‘acceptance of internet banking, in iran. this study uses the technology acceptance model, theory of planned behavior and theory of perceived risk to build a comprehensive model. we designed a questionnaire and used it to survey a randomly selected sample of customers of internet banking, and in june 2010, a sample...

2011
Juhee Kwon M. Eric Johnson

This study examines how a healthcare organization’s security practices (including IT controls, policies, education, and hiring practices) influence their perceived regulatory compliance and security performance. We utilized qualitative and quantitative survey data provided by senior IT managers from 250 healthcare organizations. The data provides a snapshot of patient information security in th...

Journal: :Jurnal Minds 2022

This study's primary goal is to examine the effect of perceived security on mobile wallet users’ continuance intention using Cognitive Model. A survey was conducted, and 230 responses from users were collected through distribution online-questionnaire. The data analyzed Partial Least Square- Structural Equation Model (PLS-SEM). study revealed that directly correlates with satisfaction attitude ...

The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید