11,892 research outputs found
Evaluating e-commerce trust using fuzzy logic [article]
Trust is widely recognized as an essential factor for the continual development of business to customer electronic commerce (B2C EC). Many trust models have been developed, however, most are subjective and do not take into account the vagueness and ambiguity of EC trust and the customers’ intuitions and experience when conducting online transactions. In this article, we develop a fuzzy trust model using fuzzy reasoning to evaluate EC trust. This trust model is based on the information customers expect to find on an EC Website and is shown to increase customers
trust towards online merchants. We argue that fuzzy logic is suitable for trust evaluation as it takes into account the uncertainties within e-commerce data and like human relationships; it is often expressed by linguistics terms rather then numerical values. The evaluation of the proposed
model will be illustrated using two case studies and a comparison with two evaluation models was conducted to emphasise the importance of usin fuzzy logic
Recommended from our members
A Fuzzy Logic Based Decision Support System for Business Situation Assessment and e-Business Models Selection
A new decision support system is developed for assisting business executives in deciding the e-business models to adopt for new business ventures. The developed system is based on a new framework using fuzzy logic theory. A detailed conceptual design is developed. The proposed system solves important challenges such as the use of linguistic terms to capture the executives’ assessments of the key business measures. It uses fuzzy assessment rule to find the overall grade for each business dimension. Moreover, its rule-base allows adding large number of new e-business models. A prototype is tested with business executives and received positive feedback
Кибербезопасность в образовательных сетях
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Mitigating security breaches through insurance: Logit and Probit models for quantifying e-risk
The common e-threats deterring ecommerce are identity theft, hacking, virus attack, graffiti, phishing, Denial of Service (DoS), sabotage by disgruntled employees, loss of laptop, financial fraud and telecom driven frauds. These discourage users from online transactions. Organizations spend millions of dollars to implement the latest perimeter and core security technologies, to deter malicious attackers and to ensure confidentiality, integrity and availability of data. Yet, security breaches are common. It results in loss of opportunity cost, market capitalization and brand equity for organizations. We propose e-risk insurance as a strategy to supplement the security technologies, and to mitigate these financial losses. In this paper, we propose two generalized linear models (GLM) namely Logit and Probit for quantification of the probability of an e-threat, using CSI/FBI data. We also compute the expected loss amount for organizations using collective risk model. Based on it, we ascertain the net premium to be accrued to the insurance companies
Evaluation and Classification of Mobile Financial Services Sustainability Using Structural Equation Modeling and Multiple Criteria Decision-Making Methods
Despite the fast emergent of smartphones in day-to-day activity, the sustainable development of mobile financial services (MFS) remains low partially due to online consumer’s trust and perceived risk. This research broadens the trust and the perceived risk at the multi-dimensional for understanding and prioritizing alternatives of MFS decision. A combined methodology; structural equation modeling (SEM) with two multiple criteria decision-making (MCDM) methods such as a technique for order of preference by similarity to ideal solution (TOPSIS) and analytic hierarchy process (AHP) were applied for data analysis. The two steps SEM-TOPSIS techniques were adopted through a two-types survey on datasets consisting of 538 MFS users, and 74 both experienced MFS users and experts in Togo. The SEM is used for causal relationships and assigning weights for the TOPSIS input. TOPSIS was applied for providing MFS alternative classification, in which the results were compared with prior research using the SEM-AHP technique on the given population. The results via SEM revealed particularly strong support for the dispositional trust and perceived privacy risk. Trust has a negative relationship with perceived risk. Except for perceived time risk, all the antecedents of perceived risk and trust validated the proposed relationship. The findings of TOPSIS uncovered that mobile money transfer (MMT) remains the core application used, followed by mobile payment (MP) and mobile banking (MB) and, therefore, consistent with AHP. However, the TOPSIS technique is better suited to the problem of MFS selection for this study field. This research offers a novel and practical modeling and classification concept for researchers, companies’ managers, and experts in the areas of information technology. The implications, limitations, and future research are provided
Intelligent quality performance assessment for e-banking security using fuzzy logic
Security has been widely recognized as one of the
main obstacles to the adoption of Internet banking
and it is considered an important aspect in the
debate over challenges facing internet banking. The
performance evaluation of e-banking websites
requires a model that enables us to analyze the
various imperative factors and criteria related to the
quality and performance of e-banking websites. Ebanking
site evaluation is a complex and dynamic
problem involving many factors, and because of the
subjective considerations and the ambiguities
involved in the assessment, Fuzzy Logic (FL) model
can be an effective tool in assessing and evaluating
of e-banking security performance and quality. In
this paper, we propose an intelligent performance
assessment model for evaluating e-banking security
websites. The proposed model is based on FL
operators and produces four measures of security
risk attack dimensions: direct internal attack,
communication tampering attack, code programming
attack and denial of service attack with a
hierarchical ring layer structure. Our experimental
results show that direct internal attack risk has a
large impact on e-banking security performance. The
results also confirm that the risk of direct internal
attack for e-banking dynamic websites is doubled
that of all other attacks
Decision making on adoption of cloud computing in e-commerce using fuzzy TOPSIS
© 2017 IEEE. Cloud computing promises enhanced scalability, flexibility, and cost-efficiency. In practice, however, there are many uncertainties about the usage of cloud computing resources in the e-commerce context. As e-commerce is dependent on a reliable and secure online store, it is important for decision makers to adopt an optimal cloud computing mode (Such as SaaS, PaaS and IaaS). This study assesses the factors associated with cloud-based e-commerce based on TOE (technological, organizational, and environmental) framework using multi-criteria decision-making technique (Fuzzy TOPSIS). The results show that Fuzzy TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) approach proposes software-as-a-service (SaaS) as the best choice for e-commerce business
Cross-border E-commerce Risk Evaluation from Sellers’ Perspective
While the development of cross-border e-commerce is flourishing, the associated risk factors should not be underestimated. In this paper, we analyze risk in cross-border e-commerce from the external environment and platform construction to establish a cross-border e-commerce risk evaluation index system from sellers\u27 perspective. Subsequently, the weights of the indicators are calculated on account of entropy weight method, and combined with fuzzy comprehensive evaluation method to construct a cross-border e-commerce risk evaluation model. The results show that the weight of platform risk is more than environmental risk, and the risk level of cross-border e-commerce from sellers\u27 perspective is low. Finally, we attempt to propose some strategies to prevent risks, hoping to provide some theoretical insights into the issue of risk prevention in cross-border e-commerce
- …