نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
electronic payment system in one of the e-banking services and must be reliable and free of security deficiencies in order to overcome traditional system. improving customer’s perceptions of security and trust in the course of electronic payment transactions is vital in order to attract, retain and retrieve users of such a system. this study aimed to investigate the effects of customers’ percep...
در بازار رقابتی امروز و با حضور فناوری های اطلاعاتی و ارتباطاتی جذب مشتری امری پیچیده تر از گذشته می باشد. در عرصه بانکداری الکترونیک نیز بدلیل نبود روابط انسانی و در نتیجه حذف مکانیسم هایی همچون اعتماد که در گذشته نه چندان دور باعث رویکرد مشتریان به یک بانک یا شعبه خاصی از یک بانک می شد، این مساله به عنوان چالشی جدید نمود پیدا کرده است . لذا در این پژوهش به بررسی عوامل موثر بر اعتماد در بانکدا...
extended abstract 1. introduction the widespread use of the internet in urban communities has changed the geographical concentration of services and has led to the emergence of urban electronic services. improving productivity and increasing access are the benefits of creating electronic services. to achieve these benefits, the acceptance of electronic services in the community should be consid...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
. Perceived organizational support has been raised as work backbone of employee in the organization and the psychological contracts are also a set of promises that top managers give to support their employees. Therefore, violation of this contract not only involves depriving organizational support, but also reduces the employee's belongings. The main purpose of this paper was to examine the imp...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological controls are necessary, computer security also depends on individual’s security behavior. It is thus important to investigate what influences a user to practice computer security. This study uses the Health Belief Model, adapted from the healthcare literature, to study u...
Knowledge Management (KM) has been recognized as a critical management strategy in generating competitive advantage for the organization. In order to protect organizational knowledge stored in or transferred through company’s Knowledge Management Systems (KMS), information security controls have to be incorporated into these systems. However, overly strict controls may adversely impact the perc...
Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information security and distinguishes it from the objective assessment of security threats. Proposes mechanisms of encryption, protection, authentication, and verification as antecedents of perceived information security. These m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید