نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
Despite the vast economic potential of wearable technologies, up to now there is only little scientific research on the acceptance determinants of the wearable computing phenomenon. Therefore, the overall aim of this study is to explain psychographic factors that lead to either acceptance or resistance of wearable computing. This paper synthesises a cause and effect model of wearable computing ...
A lot of studies in the information systems, advertising, and marketing literature have shown that for the past two decades online banner ad click-through rate is decreasing steadily (Idemudia et al. 2007). To address this issue, we develop the Visual Perception Model (VP) for Online Target marketing and then conducted an experiment by manipulating the independent variables (i.e. perceived secu...
Changing patterns of behavior in public financial transactions during this pandemic has increased the use e-wallet services. One Indonesian people's most widely used services is DANA. This study aims to determine effect perceived usefulness, ease use, security, and cashback promotion on behavioral intention DANA (a survey people Special Region Yogyakarta). The sampling technique non-probability...
In recent years, tenure security has been one of the main objectives of improvement projects in urban poor settlements. Despite lots of international studies initiated in this field, it has received little attention in Iran. The main aim of this paper is to assess the influence of tenure security on the level of household investment in housing. Survey method is considered as the methodology ...
Airport security measures can be grouped into two types; standardized screening techniques, which all passengers must undergo (e.g., baggage X-rays, metal detecting scans); and elevated-risk screening (including pat-downs and strip searches) for which only a sub-set of passengers are selected. In the current study, an undergraduate sample (n 1⁄4 636) was surveyed regarding the professionalism o...
Despite increasing interest in IT outsourcing (ITO) and the various benefits it promises, Cloud Computing (CC) as the currently most prevalent ITO paradigm still entails serious IT security risks. Little attention has been paid so far to fully and unambiguously capture the complex nature of IT security risks and how to measure it. Against this backdrop, we first propose a comprehensive conceptu...
An Economic Model of the Consumers' Online Shopping Utility and Factors Affecting on Online Shopping
This paper integrates extant literature on retailing and consumer choice to develop an economic model of consumer choice in which a consumer self-selects on-line shopping. Three important factors impacting consumer choice of on-line shopping: (1) the online shopping utility (2) the consumers’ perceived product and service risks (Perceived Privacy Protection, Perceived Security Protection etc.) ...
This research in progress essay reviews the existing technology acceptance literature to evaluate its ability to predict the adoption of network security controls. We suggest that an expanded view of current technology acceptance theory may be required to adequately address the complex variables that influence the acceptance of security controls. An important differentiator is that while tradit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید