11,892 research outputs found

    Evaluating e-commerce trust using fuzzy logic [article]

    Get PDF
    Trust is widely recognized as an essential factor for the continual development of business to customer electronic commerce (B2C EC). Many trust models have been developed, however, most are subjective and do not take into account the vagueness and ambiguity of EC trust and the customers’ intuitions and experience when conducting online transactions. In this article, we develop a fuzzy trust model using fuzzy reasoning to evaluate EC trust. This trust model is based on the information customers expect to find on an EC Website and is shown to increase customers trust towards online merchants. We argue that fuzzy logic is suitable for trust evaluation as it takes into account the uncertainties within e-commerce data and like human relationships; it is often expressed by linguistics terms rather then numerical values. The evaluation of the proposed model will be illustrated using two case studies and a comparison with two evaluation models was conducted to emphasise the importance of usin fuzzy logic

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Mitigating security breaches through insurance: Logit and Probit models for quantifying e-risk

    Get PDF
    The common e-threats deterring ecommerce are identity theft, hacking, virus attack, graffiti, phishing, Denial of Service (DoS), sabotage by disgruntled employees, loss of laptop, financial fraud and telecom driven frauds. These discourage users from online transactions. Organizations spend millions of dollars to implement the latest perimeter and core security technologies, to deter malicious attackers and to ensure confidentiality, integrity and availability of data. Yet, security breaches are common. It results in loss of opportunity cost, market capitalization and brand equity for organizations. We propose e-risk insurance as a strategy to supplement the security technologies, and to mitigate these financial losses. In this paper, we propose two generalized linear models (GLM) namely Logit and Probit for quantification of the probability of an e-threat, using CSI/FBI data. We also compute the expected loss amount for organizations using collective risk model. Based on it, we ascertain the net premium to be accrued to the insurance companies

    Evaluation and Classification of Mobile Financial Services Sustainability Using Structural Equation Modeling and Multiple Criteria Decision-Making Methods

    Get PDF
    Despite the fast emergent of smartphones in day-to-day activity, the sustainable development of mobile financial services (MFS) remains low partially due to online consumer’s trust and perceived risk. This research broadens the trust and the perceived risk at the multi-dimensional for understanding and prioritizing alternatives of MFS decision. A combined methodology; structural equation modeling (SEM) with two multiple criteria decision-making (MCDM) methods such as a technique for order of preference by similarity to ideal solution (TOPSIS) and analytic hierarchy process (AHP) were applied for data analysis. The two steps SEM-TOPSIS techniques were adopted through a two-types survey on datasets consisting of 538 MFS users, and 74 both experienced MFS users and experts in Togo. The SEM is used for causal relationships and assigning weights for the TOPSIS input. TOPSIS was applied for providing MFS alternative classification, in which the results were compared with prior research using the SEM-AHP technique on the given population. The results via SEM revealed particularly strong support for the dispositional trust and perceived privacy risk. Trust has a negative relationship with perceived risk. Except for perceived time risk, all the antecedents of perceived risk and trust validated the proposed relationship. The findings of TOPSIS uncovered that mobile money transfer (MMT) remains the core application used, followed by mobile payment (MP) and mobile banking (MB) and, therefore, consistent with AHP. However, the TOPSIS technique is better suited to the problem of MFS selection for this study field. This research offers a novel and practical modeling and classification concept for researchers, companies’ managers, and experts in the areas of information technology. The implications, limitations, and future research are provided

    Intelligent quality performance assessment for e-banking security using fuzzy logic

    Get PDF
    Security has been widely recognized as one of the main obstacles to the adoption of Internet banking and it is considered an important aspect in the debate over challenges facing internet banking. The performance evaluation of e-banking websites requires a model that enables us to analyze the various imperative factors and criteria related to the quality and performance of e-banking websites. Ebanking site evaluation is a complex and dynamic problem involving many factors, and because of the subjective considerations and the ambiguities involved in the assessment, Fuzzy Logic (FL) model can be an effective tool in assessing and evaluating of e-banking security performance and quality. In this paper, we propose an intelligent performance assessment model for evaluating e-banking security websites. The proposed model is based on FL operators and produces four measures of security risk attack dimensions: direct internal attack, communication tampering attack, code programming attack and denial of service attack with a hierarchical ring layer structure. Our experimental results show that direct internal attack risk has a large impact on e-banking security performance. The results also confirm that the risk of direct internal attack for e-banking dynamic websites is doubled that of all other attacks

    Decision making on adoption of cloud computing in e-commerce using fuzzy TOPSIS

    Full text link
    © 2017 IEEE. Cloud computing promises enhanced scalability, flexibility, and cost-efficiency. In practice, however, there are many uncertainties about the usage of cloud computing resources in the e-commerce context. As e-commerce is dependent on a reliable and secure online store, it is important for decision makers to adopt an optimal cloud computing mode (Such as SaaS, PaaS and IaaS). This study assesses the factors associated with cloud-based e-commerce based on TOE (technological, organizational, and environmental) framework using multi-criteria decision-making technique (Fuzzy TOPSIS). The results show that Fuzzy TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) approach proposes software-as-a-service (SaaS) as the best choice for e-commerce business

    Cross-border E-commerce Risk Evaluation from Sellers’ Perspective

    Get PDF
    While the development of cross-border e-commerce is flourishing, the associated risk factors should not be underestimated. In this paper, we analyze risk in cross-border e-commerce from the external environment and platform construction to establish a cross-border e-commerce risk evaluation index system from sellers\u27 perspective. Subsequently, the weights of the indicators are calculated on account of entropy weight method, and combined with fuzzy comprehensive evaluation method to construct a cross-border e-commerce risk evaluation model. The results show that the weight of platform risk is more than environmental risk, and the risk level of cross-border e-commerce from sellers\u27 perspective is low. Finally, we attempt to propose some strategies to prevent risks, hoping to provide some theoretical insights into the issue of risk prevention in cross-border e-commerce
    corecore