20,944 research outputs found

    Linking consumer trust perception in constructing an e-commerce trust model

    Get PDF
    Trust issues is still considered as a main obstacle in the implementation of eCommerce Due to the increasing numbers of cyber crimes committed today, consumers are faced with doubt to engage in online shopping. As a safety precaution, consumers will take certain measures to protect their information by evaluating and assessing these websites trustworthiness before an actual purchase occurs. This paper describes a model that examines the elements related to online consumer behavior and to investigate this behavior towards building and increasing trust. The applicability of the model was tested in attempt to view consumers' acceptance towards the model and its component. The fmdings indicate the respondents are aware of the trust issue surrounding e-Commerce implementation as they accept and agreed with the model and its components

    Project characteristics for design and build procurement in Malaysian construction industry

    Get PDF
    Design & Build procurement approach is one of the procurement methods which is known to be widely gaining popularity in order to serve the modern day construction clients desire of having a constructed facility. To effectively service the market-driven expansion of this project delivery strategy in the construction community, a fundamental understanding of the characteristics of the Design & Build procurement approach is necessary. This study is aimed at appraising the Design & Build procurement approach in the Malaysian construction industry based on current practice through identifying the characteristics of the procurement approach. For this purpose, a detailed literature review of the Design & Build characteristics was conducted and data was collected from a two round Delphi questionnaire survey conducted with experienced professionals that have vast experience in the Design & Build procurement practice. The relative importance of these characteristics were quantified by the relative importance index method demonstrating their level of priority. The key findings in the study showed that the practice of the procurement approach in Malaysia is most importantly characterized by the fact that it is most suitable for projects that are complex in nature, while ‘effective client representation’ is the least important characteristic of the Design & Build procurement approach with regard to the Malaysian construction industry. It is expected that with the consideration of these characteristics of the D&B procurement approach, it will consequently result in the overall improvement in the performance of the Malaysian construction industry in relation to project delivery

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure

    Critical success factors for preventing E-banking fraud

    Get PDF
    E-Banking fraud is an issue being experienced globally and is continuing to prove costly to both banks and customers. Frauds in e-banking services occur as a result of various compromises in security ranging from weak authentication systems to insufficient internal controls. Lack of research in this area is problematic for practitioners so there is need to conduct research to help improve security and prevent stakeholders from losing confidence in the system. The purpose of this paper is to understand factors that could be critical in strengthening fraud prevention systems in electronic banking. The paper reviews relevant literatures to help identify potential critical success factors of frauds prevention in e-banking. Our findings show that beyond technology, there are other factors that need to be considered such as internal controls, customer education and staff education etc. These findings will help assist banks and regulators with information on specific areas that should be addressed to build on their existing fraud prevention systems

    Factors Influencing Hotel Managers’ Perceptions Regarding the Use of Mobile Apps to Gain a Competitive Advantage

    Get PDF
    The purpose of this quantitative study is to examine the opinions of hotel managers regarding the use of mobile applications in the hotel industry and to analyse the influence of these applications on a hotel’s perceived competitive advantage. Factor analysis and multiple regression analysis were performed to analyse the data collected from 106 hotel managers in Turkey. The results of the study indicate that the factors connection and assistance had a significant impact on hotel managers’ perceived competitive advantage. The findings of this study, one of the few that have examined managers’ attitudes toward the use of mobile apps in the hotel industry, provide valuable information that will help to guide technology vendors and software companies that develop mobile apps for hotel

    E-Business Models In The Travel Industry

    Get PDF
    Drawing on recently published data, this report examines some of the trends in travel e-commerce. Using a case study approach, the author examines in detail some of the e-business models impacting on the travel industry both in the Business-to-Business (B2B) and Business-to-Consumer (B2C) markets. Although B2C leisure transactions currently account for just 1% of the value of global travel, there is real potential for future growth. However to be successful both new entrants and existing players will need to ensure their e-business model adds value for the customer, otherwise their position in the value chain will be threatened. The most immediate potential for growth and profitability lies in the B2B market, particularly in the development of vertical portals or community extranets. These are virtual spaces enabling travel buyers and suppliers to trade online. The integration of legacy systems with Internet Protocol (IP) technology is taking place across a range of travel sectors and will provide the platform on which a wide range of e-business applications can be developed. This development will lead to the ultimate catalyst for travel e-business -- the convergence of data (internet), voice (telephone) and video (television)

    A model and framework for online security benchmarking

    Full text link
    The variety of threats and vulnerabilities within the online business environment are dynamic and thus constantly changing in how they impinge upon online functionality, compromise organizational or customer information, contravene security implementations and thereby undermine online customer confidence. To nullify such threats, online security management must become proactive, by reviewing and continuously improving online security to strengthen the enterpriseis online security measures and policies, as modelled. The benchmarking process utilises a proposed benchmarking framework to guide both the development and application of security benchmarks created in the first instance, from recognized information technology (IT) and information security standards (ISS) and then their application to the online security measures and policies utilized within online business. Furthermore, the benchmarking framework incorporates a continuous improvement review process to address the relevance of benchmark development over time and the changes in threat focus.<br /

    Market bundling strategies in the horizontal portal industry

    Get PDF
    The arrival of the Internet offers opportunities for both incremental efficiency gains and complete industry redefinition, presenting new value propositions and hence leading to the emergence of new businesses and industries. One particular case is that of the horizontal portal industry, such portals being consistently the most visited sites on the Web. Nevertheless, despite ongoing market concentration, overall profitability remains low. In this paper we contend that, although the industry has great potential for value creation, value appropriation in such information-based businesses remains problematic. The only way to achieve it is through cross-market bundling; that is, portals selling their products packaged with Internet access and proprietary content through system competition. We support our claims with theoretical argument and empirical evidence, analyzing the information distribution value chain in its entirety.Portals; information goods; Internet advertising; Internet service providers; content provider;
    • 

    corecore