نتایج جستجو برای: perceived security

تعداد نتایج: 308787  

Journal: :مدیریت فناوری اطلاعات 0
محمدرضا کریمی دکترای مدیریت بازرگانی دانشگاه شهید بهشتی، ایران صادق سپندارند دانشجوی دکترای مدیریت بازرگانی دانشگاه علامه طباطبائی، ایران فرزانه حق شناس کارشناسی ارشد مدیریت فناوری اطلاعات دانشگاه مهرالبرز، ایران

electronic payment system in one of the e-banking services and must be reliable and free of security deficiencies in order to overcome traditional system. improving customer’s perceptions of security and trust in the course of electronic payment transactions is vital in order to attract, retain and retrieve users of such a system. this study aimed to investigate the effects of customers’ percep...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - مرکز آموزش الکترونیکی 1392

در بازار رقابتی امروز و با حضور فناوری های اطلاعاتی و ارتباطاتی جذب مشتری امری پیچیده تر از گذشته می باشد. در عرصه بانکداری الکترونیک نیز بدلیل نبود روابط انسانی و در نتیجه حذف مکانیسم هایی همچون اعتماد که در گذشته نه چندان دور باعث رویکرد مشتریان به یک بانک یا شعبه خاصی از یک بانک می شد، این مساله به عنوان چالشی جدید نمود پیدا کرده است . لذا در این پژوهش به بررسی عوامل موثر بر اعتماد در بانکدا...

Journal: :جغرافیا و توسعه فضای شهری 0
لیا شاددل امیدعلی خوارزمی

extended abstract 1. introduction the widespread use of the internet in urban communities has changed the geographical concentration of services and has led to the emergence of urban electronic services. improving productivity and increasing access are the benefits of creating electronic services. to achieve these benefits, the acceptance of electronic services in the community should be consid...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

Hassan Alamdari Marzieh Heidari

. Perceived organizational support has been raised as work backbone of employee in the organization and the psychological contracts are also a set of promises that top managers give to support their employees. Therefore, violation of this contract not only involves depriving organizational support, but also reduces the employee's belongings. The main purpose of this paper was to examine the imp...

2011
Jussi Rämänen Sirpa Riihiaho Marko Nieminen

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

2010
Boon-Yuen Ng Atreyi Kankanhalli

The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological controls are necessary, computer security also depends on individual’s security behavior. It is thus important to investigate what influences a user to practice computer security. This study uses the Health Belief Model, adapted from the healthcare literature, to study u...

2005
Chen Ting Irene M. Y. Woon Atreyi Kankanhalli

Knowledge Management (KM) has been recognized as a critical management strategy in generating competitive advantage for the organization. In order to protect organizational knowledge stored in or transferred through company’s Knowledge Management Systems (KMS), information security controls have to be incorporated into these systems. However, overly strict controls may adversely impact the perc...

2005
Ramnath K. Chellappa Paul A. Pavlou

Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information security and distinguishes it from the objective assessment of security threats. Proposes mechanisms of encryption, protection, authentication, and verification as antecedents of perceived information security. These m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید