48 research outputs found
Model Kepercayaan Konsumen pada Situs E-Commerce
The world trading system has now grown to online commerce (electronic commerce) because a lot of people who buy goods through e-commerce. This can be evidenced by a study Consumer Web Watch reported that 86% of Internet users have switched make purchases traditional to online purchases, because that\u27s important to know what factors are forming a model of consumer confidence in e-commerce, then it is necessary a prediction to determine any factors that shape consumer confidence in e-commerce. Methods in meta analysis of studies in the form of meta data with the Systematic Literature Review (SLR) used for identifying, assessing and analyzing primary research to investigate research questions in the search for variables that influence consumer confidence in e-commerce
Dynamics, robustness and fragility of trust
Trust is often conveyed through delegation, or through recommendation. This
makes the trust authorities, who process and publish trust recommendations,
into an attractive target for attacks and spoofing. In some recent empiric
studies, this was shown to lead to a remarkable phenomenon of *adverse
selection*: a greater percentage of unreliable or malicious web merchants were
found among those with certain types of trust certificates, then among those
without. While such findings can be attributed to a lack of diligence in trust
authorities, or even to conflicts of interest, our analysis of trust dynamics
suggests that public trust networks would probably remain vulnerable even if
trust authorities were perfectly diligent. The reason is that the process of
trust building, if trust is not breached too often, naturally leads to
power-law distributions: the rich get richer, the trusted attract more trust.
The evolutionary processes with such distributions, ubiquitous in nature, are
known to be robust with respect to random failures, but vulnerable to adaptive
attacks. We recommend some ways to decrease the vulnerability of trust
building, and suggest some ideas for exploration.Comment: 17 pages; simplified the statement and the proof of the main theorem;
FAST 200
Industry Self-Regulation of Consumer Data Privacy and Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015)
Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need for a valid privacy metric for robust empirical study of data privacy and security
Antecedents Analysis of Purchase Intention
The advancement of technology has resulted in the creation of a new form of shopping transactions. This technology is used by residents to shop online. Thus, customers’ involvements in online purchasing have become an important trend. The objective of this research was to identify the determinants of customer purchases online. This study used a surveymethod using questionnaires and the target is an online customer in Central Jakarta.This research used simple regression to determine the effect of purchace intention to factors that influence it. Data questionnaire distributed directly to the respondents who never buy online shopping. Findings revealed that impulse purchase intention, quality orientation, brand orientation, online trust and prior online purchase experience were positively related to the customer online purchase intention
To buy or not to buy: Factors influencing life insurance purchase intention
The purpose of this thesis paper is to investigate the influence of five factors namely Word-of-mouth, Trust, Reputation, Loyalty, and Customer Satisfaction on life insurance Purchase Intention. Existing customers in Great Eastern Life Assurance (M) Berhad, Alor Setar were chosen as samples of this study. A survey using 400 questionnaires was distributed to the respondents and 327 of them were returned and usable. Correlation and regression analysis were adopted to analyse all data. The findings indicated that all the independent variables (Word-of-mouth, Trust, Reputation, Loyalty, and Customer Satisfaction) had a certain degree of relationship with Purchase Intention. The results showed that customer satisfaction had the strongest significant positive relationship with purchase intention with correlation value of 0.796, followed by reputation with correlation value of 0.774. Only two variables which are reputation and customer satisfaction influenced purchase intention. The findings suggest that
reputation of the company can be an important factor that influences customers’ purchase
intentions. In other words, good reputation of an insurance company brings good impact in
terms of image to customers. Customers will feel confident towards the insurance company
and increase their intention to purchas
Alleviating Parental Concerns for Children\u27s Online Privacy: A Value Sensitive Design Investigation
The objective of this research is to address the acute privacy challenge of protecting children’s online safety by proposing a technological solution to empower parental control over their child’s personal information disclosed online. As a preliminary conceptual investigation, this paper draws on the social, psychological, and legal perspectives of privacy to derive three design principles. We propose that, the technical systems for protecting children’s online privacy (a) should protect children’s personal information online while enabling their access to appropriate online content, (b) should maximally facilitate parental involvement of their children’s online activities, and (c) should comply with legal requirements in terms of notice, choice, access and security. This study reported here is novel to the extent that existing IS research has not systematically examined the privacy issues from the VSD perspective. We believe that, using the groundwork laid down in this study, future research along these directions could contribute significantly to addressing parental concerns for children’s online safety
Integration of technology acceptance model in the use of mobile banking among millennial generations of sharia bank customers in Indonesia
This study explores the factors that influence the millennial generation in using Islamic bank mobile banking using the Technology Acceptance Model (TAM) approach by integrating external factors, namely religiosity and the role of trust as a mediating variable. The sample in this study was 185 respondents. Data analysis using Structural Equation Modeling - Partial Least Square (SEM-PLS). The test results show that of the seven direct effects tested, four relationships have a significant positive effect, namely perceived usefulness and trust in attitudes, as well as religiosity and attitudes towards intentions. While three relationships are not significant, namely, perceived ease of use and religiosity do not affect attitudes, and trust does not affect intentions. Furthermore, from the two indirect effects tested, there is a significant relationship: belief can mediate the relationship between religiosity and attitude
Is Google the next Microsoft? Competition, Welfare and Regulation in Internet Search
Internet search (or perhaps more accurately `web-search') has grown exponentially over the last decade at an even more rapid rate than the Internet itself. Starting from nothing in the 1990s, today search is a multi-billion dollar business. Search engine providers such as Google and Yahoo! have become household names, and the use of a search engine, like use of the Web, is now a part of everyday life. The rapid growth of online search and its growing centrality to the ecology of the Internet raise a variety of questions for economists to answer. Why is the search engine market so concentrated and will it evolve towards monopoly? What are the implications of this concentration for different `participants' (consumers, search engines, advertisers)? Does the fact that search engines act as `information gatekeepers', determining, in effect, what can be found on the web, mean that search deserves particularly close attention from policy-makers? This paper supplies empirical and theoretical material with which to examine many of these questions. In particular, we (a) show that the already large levels of concentration are likely to continue (b) identify the consequences, negative and positive, of this outcome (c) discuss the possible regulatory interventions that policy-makers could utilize to address these
Making GDPR Usable: A Model to Support Usability Evaluations of Privacy
We introduce a new model for evaluating privacy that builds on the criteria
proposed by the EuroPriSe certification scheme by adding usability criteria.
Our model is visually represented through a cube, called Usable Privacy Cube
(or UP Cube), where each of its three axes of variability captures,
respectively: rights of the data subjects, privacy principles, and usable
privacy criteria. We slightly reorganize the criteria of EuroPriSe to fit with
the UP Cube model, i.e., we show how EuroPriSe can be viewed as a combination
of only rights and principles, forming the two axes at the basis of our UP
Cube. In this way we also want to bring out two perspectives on privacy: that
of the data subjects and, respectively, that of the controllers/processors. We
define usable privacy criteria based on usability goals that we have extracted
from the whole text of the General Data Protection Regulation. The criteria are
designed to produce measurements of the level of usability with which the goals
are reached. Precisely, we measure effectiveness, efficiency, and satisfaction,
considering both the objective and the perceived usability outcomes, producing
measures of accuracy and completeness, of resource utilization (e.g., time,
effort, financial), and measures resulting from satisfaction scales. In the
long run, the UP Cube is meant to be the model behind a new certification
methodology capable of evaluating the usability of privacy, to the benefit of
common users. For industries, considering also the usability of privacy would
allow for greater business differentiation, beyond GDPR compliance.Comment: 41 pages, 2 figures, 1 table, and appendixe