48 research outputs found

    Model Kepercayaan Konsumen pada Situs E-Commerce

    Full text link
    The world trading system has now grown to online commerce (electronic commerce) because a lot of people who buy goods through e-commerce. This can be evidenced by a study Consumer Web Watch reported that 86% of Internet users have switched make purchases traditional to online purchases, because that\u27s important to know what factors are forming a model of consumer confidence in e-commerce, then it is necessary a prediction to determine any factors that shape consumer confidence in e-commerce. Methods in meta analysis of studies in the form of meta data with the Systematic Literature Review (SLR) used for identifying, assessing and analyzing primary research to investigate research questions in the search for variables that influence consumer confidence in e-commerce

    Dynamics, robustness and fragility of trust

    Full text link
    Trust is often conveyed through delegation, or through recommendation. This makes the trust authorities, who process and publish trust recommendations, into an attractive target for attacks and spoofing. In some recent empiric studies, this was shown to lead to a remarkable phenomenon of *adverse selection*: a greater percentage of unreliable or malicious web merchants were found among those with certain types of trust certificates, then among those without. While such findings can be attributed to a lack of diligence in trust authorities, or even to conflicts of interest, our analysis of trust dynamics suggests that public trust networks would probably remain vulnerable even if trust authorities were perfectly diligent. The reason is that the process of trust building, if trust is not breached too often, naturally leads to power-law distributions: the rich get richer, the trusted attract more trust. The evolutionary processes with such distributions, ubiquitous in nature, are known to be robust with respect to random failures, but vulnerable to adaptive attacks. We recommend some ways to decrease the vulnerability of trust building, and suggest some ideas for exploration.Comment: 17 pages; simplified the statement and the proof of the main theorem; FAST 200

    Industry Self-Regulation of Consumer Data Privacy and Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015)

    Get PDF
    Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need for a valid privacy metric for robust empirical study of data privacy and security

    Antecedents Analysis of Purchase Intention

    Get PDF
    The advancement of technology has resulted in the creation of a new form of shopping transactions. This technology is used by residents to shop online. Thus, customers’ involvements in online purchasing have become an important trend.  The objective of this research was to identify the determinants of customer purchases online. This study used a surveymethod using questionnaires and the target is an online customer in Central Jakarta.This research used simple regression to determine the effect of purchace intention to factors that influence it. Data questionnaire distributed directly to the respondents who never buy online shopping.  Findings revealed that impulse purchase intention, quality orientation, brand orientation, online trust and prior online purchase experience were positively related to the customer online purchase intention

    To buy or not to buy: Factors influencing life insurance purchase intention

    Get PDF
    The purpose of this thesis paper is to investigate the influence of five factors namely Word-of-mouth, Trust, Reputation, Loyalty, and Customer Satisfaction on life insurance Purchase Intention. Existing customers in Great Eastern Life Assurance (M) Berhad, Alor Setar were chosen as samples of this study. A survey using 400 questionnaires was distributed to the respondents and 327 of them were returned and usable. Correlation and regression analysis were adopted to analyse all data. The findings indicated that all the independent variables (Word-of-mouth, Trust, Reputation, Loyalty, and Customer Satisfaction) had a certain degree of relationship with Purchase Intention. The results showed that customer satisfaction had the strongest significant positive relationship with purchase intention with correlation value of 0.796, followed by reputation with correlation value of 0.774. Only two variables which are reputation and customer satisfaction influenced purchase intention. The findings suggest that reputation of the company can be an important factor that influences customers’ purchase intentions. In other words, good reputation of an insurance company brings good impact in terms of image to customers. Customers will feel confident towards the insurance company and increase their intention to purchas

    Alleviating Parental Concerns for Children\u27s Online Privacy: A Value Sensitive Design Investigation

    Get PDF
    The objective of this research is to address the acute privacy challenge of protecting children’s online safety by proposing a technological solution to empower parental control over their child’s personal information disclosed online. As a preliminary conceptual investigation, this paper draws on the social, psychological, and legal perspectives of privacy to derive three design principles. We propose that, the technical systems for protecting children’s online privacy (a) should protect children’s personal information online while enabling their access to appropriate online content, (b) should maximally facilitate parental involvement of their children’s online activities, and (c) should comply with legal requirements in terms of notice, choice, access and security. This study reported here is novel to the extent that existing IS research has not systematically examined the privacy issues from the VSD perspective. We believe that, using the groundwork laid down in this study, future research along these directions could contribute significantly to addressing parental concerns for children’s online safety

    Integration of technology acceptance model in the use of mobile banking among millennial generations of sharia bank customers in Indonesia

    Get PDF
    This study explores the factors that influence the millennial generation in using Islamic bank mobile banking using the Technology Acceptance Model (TAM) approach by integrating external factors, namely religiosity and the role of trust as a mediating variable. The sample in this study was 185 respondents. Data analysis using Structural Equation Modeling - Partial Least Square (SEM-PLS). The test results show that of the seven direct effects tested, four relationships have a significant positive effect, namely perceived usefulness and trust in attitudes, as well as religiosity and attitudes towards intentions. While three relationships are not significant, namely, perceived ease of use and religiosity do not affect attitudes, and trust does not affect intentions. Furthermore, from the two indirect effects tested, there is a significant relationship: belief can mediate the relationship between religiosity and attitude

    Is Google the next Microsoft? Competition, Welfare and Regulation in Internet Search

    Get PDF
    Internet search (or perhaps more accurately `web-search') has grown exponentially over the last decade at an even more rapid rate than the Internet itself. Starting from nothing in the 1990s, today search is a multi-billion dollar business. Search engine providers such as Google and Yahoo! have become household names, and the use of a search engine, like use of the Web, is now a part of everyday life. The rapid growth of online search and its growing centrality to the ecology of the Internet raise a variety of questions for economists to answer. Why is the search engine market so concentrated and will it evolve towards monopoly? What are the implications of this concentration for different `participants' (consumers, search engines, advertisers)? Does the fact that search engines act as `information gatekeepers', determining, in effect, what can be found on the web, mean that search deserves particularly close attention from policy-makers? This paper supplies empirical and theoretical material with which to examine many of these questions. In particular, we (a) show that the already large levels of concentration are likely to continue (b) identify the consequences, negative and positive, of this outcome (c) discuss the possible regulatory interventions that policy-makers could utilize to address these

    Making GDPR Usable: A Model to Support Usability Evaluations of Privacy

    Full text link
    We introduce a new model for evaluating privacy that builds on the criteria proposed by the EuroPriSe certification scheme by adding usability criteria. Our model is visually represented through a cube, called Usable Privacy Cube (or UP Cube), where each of its three axes of variability captures, respectively: rights of the data subjects, privacy principles, and usable privacy criteria. We slightly reorganize the criteria of EuroPriSe to fit with the UP Cube model, i.e., we show how EuroPriSe can be viewed as a combination of only rights and principles, forming the two axes at the basis of our UP Cube. In this way we also want to bring out two perspectives on privacy: that of the data subjects and, respectively, that of the controllers/processors. We define usable privacy criteria based on usability goals that we have extracted from the whole text of the General Data Protection Regulation. The criteria are designed to produce measurements of the level of usability with which the goals are reached. Precisely, we measure effectiveness, efficiency, and satisfaction, considering both the objective and the perceived usability outcomes, producing measures of accuracy and completeness, of resource utilization (e.g., time, effort, financial), and measures resulting from satisfaction scales. In the long run, the UP Cube is meant to be the model behind a new certification methodology capable of evaluating the usability of privacy, to the benefit of common users. For industries, considering also the usability of privacy would allow for greater business differentiation, beyond GDPR compliance.Comment: 41 pages, 2 figures, 1 table, and appendixe
    corecore