44,073 research outputs found
Recommended from our members
Towards successful e-Payment systems: An empirical identification and analysis of critical factors
This research aims to explore the factors relating to e-payment system to be implemented where electronic processes enable the facilitation of online transactions. A secondary analysis revealed six factors which are argued to be ‘critical’ for customer adoption of these systems. The findings were further augmented by an online survey of 155 respondents where the perceived importance of the critical factors were correlated through: security, trust, perceived advantage, assurance seals, perceived risk and usability. The results demonstrate that three of the critical factors were necessary (security, advantage, web assurance seals) and three were relatively sufficient (perceived risk, trust and usability) through customer intentions to adopt an e-payment system. The study provides a valid overall awareness that these critical factors are important in designing a successful e-payment system
The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria
With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing user’s intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. With mobile banking being a key driver of Nigeria’s cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
The biological immune system (BIS) is characterized by networks of cells, tissues, and
organs communicating and working in synchronization. It also has the ability to learn,
recognize, and remember, thus providing the solid foundation for the development
of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself
as an area of computational intelligence. Real-Valued Negative Selection Algorithm
with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated
its potentials in the field of anomaly detection. The V-Detectors algorithm depends
greatly on the random detectors generated in monitoring the status of a system.
These randomly generated detectors suffer from not been able to adequately cover
the non-self space, which diminishes the detection performance of the V-Detectors
algorithm. This research therefore proposed CSDE-V-Detectors which entail the
use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in
optimizing the random detectors of the V-Detectors. The DE is integrated with CS
at the population initialization by distributing the population linearly. This linear
distribution gives the population a unique, stable, and progressive distribution process.
Thus, each individual detector is characteristically different from the other detectors.
CSDE capabilities of global search, and use of L´evy flight facilitates the effectiveness
of the detector set in the search space. In comparison with V-Detectors, cuckoo search,
differential evolution, support vector machine, artificial neural network, na¨ıve bayes,
and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms
other algorithms with an average detection rate of 95:30% on all the datasets. This
signifies that CSDE-V-Detectors can efficiently attain highest detection rates and
lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly
detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly
detection tasks
Adoption of Internet Strategies by Agribusiness Firms
This paper explores the factors guiding Internet adoption by agribusiness firms. The relationship between Internet strategies and manager perceptions on the barriers to and catalysts for Internet adoption are analyzed in a supply-chain management framework. Using factor analysis and an ordered Probit model, results indicate that Internet strategies are more likely to be adopted in larger firms with a global scope. Also, manager perceptions regarding the impact of Internet adoption on transaction costs are just as likely to influence adoption as the perceived impacts on more traditional production costs.Internet, E-commerce, Supply-chain, Transaction costs, Ordered Probit, Agribusiness, Research and Development/Tech Change/Emerging Technologies,
Security Issues in Mobile Payment from the Customer Viewpoint
The perception of mobile payment procedures’ security by the customer is one major factor for the market breakthrough of the according systems. In this paper we examine security issues in mobile payment from the viewpoint of customers. Based on theoretical research we analyze empirical data from the MP2 mobile payment study with 8295 respondents in order to develop a set of dimensions, categories and aspects. The results do have a scientific as well as a practical impact: They provide a basis for the selection of appropriate indicators for further empirical studies. Furthermore they can serve as a guideline for mobile payment service providers in order to prevent security concerns through appropriate design and communication of payment procedures and to convince customers of the security of their mobile procedures by meeting concerns in informative advertising.
ADOPTION OF E-COMMERCE STRATEGIES FOR AGRIBUSINESS FIRMS
This paper analyzes the factors guiding Internet and e-commerce implementation by agribusiness firms. The relationship between Internet/e-commerce strategies and manager perceptions on the barriers and factors to e-commerce adoption are analyzed in a supply-chain management framework. Using factor analysis and an ordered Probit model, results indicate that the implementation of Internet/e-commerce strategies is more likely to be adopted in larger firms with a global scope. Also, manager perceptions regarding supply-chain functions influencing transaction costs are more strongly associated with Internet/e-commerce adoption than other functions influencing production costs.e-commerce, supply-chain, transaction costs, factor analysis, order Probit, Agribusiness, Marketing,
- …