159,831 research outputs found
Trust in Digital Currency Enabled Transactions Model
This research extends theories of trust from e-commerce to incorporate digital currencies. In particular trust in business to consumer e-commerce transactions carried out using digital currencies such as Bitcoin is explored. A model of online trust is considered to be valid in this different transaction context but the significance of each construct changes and some extensions are necessary. The role of institutional trust in transactions has differences that are explored and new constructs are suggested. These new constructs are incorporated into a new digital currency enabled transactions trust model. The results support the validity of the role of the rate of adoption and reputation of digital currencies as part of situational normality. The nature of the digital currency itself, the digital currency payment system, the payment intermediary, the digital currency P2P infrastructure, self-imposed and external regulation are also considered valid as part of structural assurance. These findings can be used by those developing the related technology, the vendors and regulatory institutions to increase consumer trust in digital currency enabled transactions in order to extend adoption and use
Consumer Fraud, Home Financing, and the Erosion of Trust
Consumer fraud is a civil violation of a remedial statute not requiring specific intent to deceive. Most consumer fraud statutes define violations as unconscionable, misleading, or deceptive practices irrespective of intent, in derogation of the principle of caveat emptor. They do not apply to business-to-business transactions. Trust plays a central role in business-to-consumer transactions. Because consumers are individuals, there is often an inherent inequality in consumer transactions. Sophisticated marketing techniquesâespecially target marketing that follows potential customers all over the internetâhound consumersâ online lives and manipulate purchasing decisions. The increasing monetization of almost everything exacerbates these effects. This transactionalism itself erodes trust because commercial trust is less robust than interpersonal trust.
âConsumersâ are not a monolithic category and the effects of consumer fraud depend on oneâs education, business sophistication, and ethnicity. The neoclassical model of a universal, rational, self-interested, decontextualized individual has numerous limitations, and we now know that rationality is bounded in any eventâwe are unable to incorporate all relevant information in our decision-making. Further, the neoclassical model does not accurately represent the financial situations and daily realities of most American consumers, who are working to middle class, struggling economically, and lacking in financial literacy.
This Essay applies this framework to the phenomenon of home lending fraud, which was the primary cause of the Great Recession and the worldwide financial meltdown of 2008. Home lending fraud of all sorts erodes trust in our system and country. Trust tends to be eroded more in consumers who do not realize the risks taken when entering into these transactions, which is disproportionally the case with lower income consumers. They are hit especially hard because they have fewer resources, and if they own a home, it is generally their only valuable asset. In this Essay, I focus particularly on the example of land contractsârent-to-own arrangements often accompanied by predatory featuresâthat have looted many millions of dollars of wealth from low- to moderate-income Americans.
The Essay finally turns to the post-Great Recession DoddâFrank Act and its creation of the Consumer Financial Protection Bureau. The Bureau is the first federal agency with the sole mission to regulate consumer financial products. DoddâFrank regulations and oversight have helped increase trust in consumer financial markets since the last financial crisis. Supervision of lending institutionsâsome of which were not previously subject to federal regulationâis a critical tool in resisting forces that continue to undermine trust in our system
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
The biological immune system (BIS) is characterized by networks of cells, tissues, and
organs communicating and working in synchronization. It also has the ability to learn,
recognize, and remember, thus providing the solid foundation for the development
of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself
as an area of computational intelligence. Real-Valued Negative Selection Algorithm
with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated
its potentials in the field of anomaly detection. The V-Detectors algorithm depends
greatly on the random detectors generated in monitoring the status of a system.
These randomly generated detectors suffer from not been able to adequately cover
the non-self space, which diminishes the detection performance of the V-Detectors
algorithm. This research therefore proposed CSDE-V-Detectors which entail the
use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in
optimizing the random detectors of the V-Detectors. The DE is integrated with CS
at the population initialization by distributing the population linearly. This linear
distribution gives the population a unique, stable, and progressive distribution process.
Thus, each individual detector is characteristically different from the other detectors.
CSDE capabilities of global search, and use of L´evy flight facilitates the effectiveness
of the detector set in the search space. In comparison with V-Detectors, cuckoo search,
differential evolution, support vector machine, artificial neural network, na¨Ĺve bayes,
and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms
other algorithms with an average detection rate of 95:30% on all the datasets. This
signifies that CSDE-V-Detectors can efficiently attain highest detection rates and
lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly
detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly
detection tasks
The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria
With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing userâs intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumerâs intention to adopt the technology. With mobile banking being a key driver of Nigeriaâs cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology
Recommended from our members
Towards successful e-Payment systems: An empirical identification and analysis of critical factors
This research aims to explore the factors relating to e-payment system to be implemented where electronic processes enable the facilitation of online transactions. A secondary analysis revealed six factors which are argued to be âcriticalâ for customer adoption of these systems. The findings were further augmented by an online survey of 155 respondents where the perceived importance of the critical factors were correlated through: security, trust, perceived advantage, assurance seals, perceived risk and usability. The results demonstrate that three of the critical factors were necessary (security, advantage, web assurance seals) and three were relatively sufficient (perceived risk, trust and usability) through customer intentions to adopt an e-payment system. The study provides a valid overall awareness that these critical factors are important in designing a successful e-payment system
The State of e-Banking Implementation in Nigeria: A Post-Consolidation Review
The most widely used e-Banking instrument in �igeria is e-Payment, particularly the automatic teller machine
(ATM) card. However, with the adoption of e-Banking by all the banks in �igeria, the volume of cash in circulation
has continued to increase pre-and-post bank recapitalization/consolidation exercise. Furthermore, some of the 25 banks that survived the exercise were found lately to have depleted their capital base and have lost credibility before the consumers, e-Banking implementation notwithstanding.
Therefore, in this paper, we review the state of e-Banking implementation in �igeria and evaluate the influence of
trust on the adoption of e-Payment using an extended technology acceptance model (TAM). Similarly, we
investigate organizational reputation, perceived risk and perceived trust in the management of banks as a factor for
enhancing customer loyalty.
The findings in this work reveal that perceived ease of use and perceived usefulness are not only antecedent to ebanking
acceptance, they are also factors to retain customers to the use of e-banking system such as organizational
reputation, perceived risk and trust
Effect of Trust and Ease Of Popularity of Interest Transaction System to Improve Online Website PT KAI (A Study on Passenger Train in Semarang Tawang Station)
The purpose of this research is to Investigate the Effects of Trust, Easy of System,
Popularity System and the effect the popularity of the system on an on-line transaction. The
study was conducted at passengers KAI Semarang Tawang Station, the sample size is about
125 passengers. The data is processed using the Structural Equation Modeling (SEM)
roomates assisted by the application program of Analysis of Moment Structure (AMOS)
version 18.0.
According to the analysis, it is concluded as the followings: easy of system has a
positive effect on the popularity of the system; trust has a positive effect on the popularity of
the system; popularity of the system has a positive effect on the on-line transaction; easy of
sytem has a positive effect on the on-line transaction; trust has a not effect on the on-line
transaction
Business-to-consumer e-commerce in Nigeria: Prospects and challenges
The growth of Internet usage in Nigeria continues to increase, recording over 90% growth rate between
2000 and 2008. While businesses in Nigeria are reported to have online access with opportunity for ecommercial
activities, customers in the country however access business websites only to source for
information but make purchases the traditional way. This paper aims at assessing the prospects and
challenges of Business-to-consumer (B2C) e-commerce implementation in Nigeria from the consumersâ
perspective. Survey research was adopted for this study. Research hypotheses were formulated and
questionnaire designed and administered randomly to 900 respondents. Collected data was used to
evaluate the acceptance of B2C e-commerce using the extended technology acceptance model (TAM).
The extended TAM combines task-technology fit, relationship related construct: trust and risk, and the
two TAM constructs to determine factors influencing consumer acceptance of B2C e-commerce in
Nigeria. Findings revealed that there are significant relationships between the model variables. Tasktechnology
fit and perceived usefulness have significant relationships with intentions to use, having a
correlation coefficient of 0.2623 and 0.2002 respectively. Similarly, the interrelationship among trust,
perceived risk, and behavioral intention are significant. The effect of risk on trust was statistically
showing that risk is a predictor of trust. Risk has a high significant on trust and trust in turn has low
significant effect on behavioral intention. Adding TTF and its relationships to the TAM also fit the data.
The relationship between task-technology fit, perceived ease of use, perceived usefulness and intention
are significant
Evaluating trust in electronic commerce : a study based on the information provided on merchants' websites
Lack of trust has been identified as a major problem hampering the growth of Electronic Commerce (EC). It is reported by many studies that a large number of online shoppers abandon their transactions because they do not trust the website when they are asked to provide personal information. To support trust, we developed an information framework model based on research on EC trust. The model is based on the information a consumer expects to find on an EC website and that is shown from the literature to increase his/her trust towards online merchants. An information extraction system is then developed to help the user find this information. In this paper, we present the development of the information extraction system and its evaluation. This is then followed by a study looking at the use of the identified variables on a sample of EC websites
- âŚ