159,831 research outputs found

    Trust in Digital Currency Enabled Transactions Model

    Get PDF
    This research extends theories of trust from e-commerce to incorporate digital currencies. In particular trust in business to consumer e-commerce transactions carried out using digital currencies such as Bitcoin is explored. A model of online trust is considered to be valid in this different transaction context but the significance of each construct changes and some extensions are necessary. The role of institutional trust in transactions has differences that are explored and new constructs are suggested. These new constructs are incorporated into a new digital currency enabled transactions trust model. The results support the validity of the role of the rate of adoption and reputation of digital currencies as part of situational normality. The nature of the digital currency itself, the digital currency payment system, the payment intermediary, the digital currency P2P infrastructure, self-imposed and external regulation are also considered valid as part of structural assurance. These findings can be used by those developing the related technology, the vendors and regulatory institutions to increase consumer trust in digital currency enabled transactions in order to extend adoption and use

    Consumer Fraud, Home Financing, and the Erosion of Trust

    Get PDF
    Consumer fraud is a civil violation of a remedial statute not requiring specific intent to deceive. Most consumer fraud statutes define violations as unconscionable, misleading, or deceptive practices irrespective of intent, in derogation of the principle of caveat emptor. They do not apply to business-to-business transactions. Trust plays a central role in business-to-consumer transactions. Because consumers are individuals, there is often an inherent inequality in consumer transactions. Sophisticated marketing techniques—especially target marketing that follows potential customers all over the internet—hound consumers’ online lives and manipulate purchasing decisions. The increasing monetization of almost everything exacerbates these effects. This transactionalism itself erodes trust because commercial trust is less robust than interpersonal trust. “Consumers” are not a monolithic category and the effects of consumer fraud depend on one’s education, business sophistication, and ethnicity. The neoclassical model of a universal, rational, self-interested, decontextualized individual has numerous limitations, and we now know that rationality is bounded in any event—we are unable to incorporate all relevant information in our decision-making. Further, the neoclassical model does not accurately represent the financial situations and daily realities of most American consumers, who are working to middle class, struggling economically, and lacking in financial literacy. This Essay applies this framework to the phenomenon of home lending fraud, which was the primary cause of the Great Recession and the worldwide financial meltdown of 2008. Home lending fraud of all sorts erodes trust in our system and country. Trust tends to be eroded more in consumers who do not realize the risks taken when entering into these transactions, which is disproportionally the case with lower income consumers. They are hit especially hard because they have fewer resources, and if they own a home, it is generally their only valuable asset. In this Essay, I focus particularly on the example of land contracts—rent-to-own arrangements often accompanied by predatory features—that have looted many millions of dollars of wealth from low- to moderate-income Americans. The Essay finally turns to the post-Great Recession Dodd–Frank Act and its creation of the Consumer Financial Protection Bureau. The Bureau is the first federal agency with the sole mission to regulate consumer financial products. Dodd–Frank regulations and oversight have helped increase trust in consumer financial markets since the last financial crisis. Supervision of lending institutions—some of which were not previously subject to federal regulation—is a critical tool in resisting forces that continue to undermine trust in our system

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection

    Get PDF
    The biological immune system (BIS) is characterized by networks of cells, tissues, and organs communicating and working in synchronization. It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself as an area of computational intelligence. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. This research therefore proposed CSDE-V-Detectors which entail the use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in optimizing the random detectors of the V-Detectors. The DE is integrated with CS at the population initialization by distributing the population linearly. This linear distribution gives the population a unique, stable, and progressive distribution process. Thus, each individual detector is characteristically different from the other detectors. CSDE capabilities of global search, and use of L´evy flight facilitates the effectiveness of the detector set in the search space. In comparison with V-Detectors, cuckoo search, differential evolution, support vector machine, artificial neural network, na¨Ĺve bayes, and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms other algorithms with an average detection rate of 95:30% on all the datasets. This signifies that CSDE-V-Detectors can efficiently attain highest detection rates and lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks

    The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria

    Get PDF
    With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing user’s intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. With mobile banking being a key driver of Nigeria’s cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology

    The State of e-Banking Implementation in Nigeria: A Post-Consolidation Review

    Get PDF
    The most widely used e-Banking instrument in �igeria is e-Payment, particularly the automatic teller machine (ATM) card. However, with the adoption of e-Banking by all the banks in �igeria, the volume of cash in circulation has continued to increase pre-and-post bank recapitalization/consolidation exercise. Furthermore, some of the 25 banks that survived the exercise were found lately to have depleted their capital base and have lost credibility before the consumers, e-Banking implementation notwithstanding. Therefore, in this paper, we review the state of e-Banking implementation in �igeria and evaluate the influence of trust on the adoption of e-Payment using an extended technology acceptance model (TAM). Similarly, we investigate organizational reputation, perceived risk and perceived trust in the management of banks as a factor for enhancing customer loyalty. The findings in this work reveal that perceived ease of use and perceived usefulness are not only antecedent to ebanking acceptance, they are also factors to retain customers to the use of e-banking system such as organizational reputation, perceived risk and trust

    Effect of Trust and Ease Of Popularity of Interest Transaction System to Improve Online Website PT KAI (A Study on Passenger Train in Semarang Tawang Station)

    Get PDF
    The purpose of this research is to Investigate the Effects of Trust, Easy of System, Popularity System and the effect the popularity of the system on an on-line transaction. The study was conducted at passengers KAI Semarang Tawang Station, the sample size is about 125 passengers. The data is processed using the Structural Equation Modeling (SEM) roomates assisted by the application program of Analysis of Moment Structure (AMOS) version 18.0. According to the analysis, it is concluded as the followings: easy of system has a positive effect on the popularity of the system; trust has a positive effect on the popularity of the system; popularity of the system has a positive effect on the on-line transaction; easy of sytem has a positive effect on the on-line transaction; trust has a not effect on the on-line transaction

    Business-to-consumer e-commerce in Nigeria: Prospects and challenges

    Get PDF
    The growth of Internet usage in Nigeria continues to increase, recording over 90% growth rate between 2000 and 2008. While businesses in Nigeria are reported to have online access with opportunity for ecommercial activities, customers in the country however access business websites only to source for information but make purchases the traditional way. This paper aims at assessing the prospects and challenges of Business-to-consumer (B2C) e-commerce implementation in Nigeria from the consumers’ perspective. Survey research was adopted for this study. Research hypotheses were formulated and questionnaire designed and administered randomly to 900 respondents. Collected data was used to evaluate the acceptance of B2C e-commerce using the extended technology acceptance model (TAM). The extended TAM combines task-technology fit, relationship related construct: trust and risk, and the two TAM constructs to determine factors influencing consumer acceptance of B2C e-commerce in Nigeria. Findings revealed that there are significant relationships between the model variables. Tasktechnology fit and perceived usefulness have significant relationships with intentions to use, having a correlation coefficient of 0.2623 and 0.2002 respectively. Similarly, the interrelationship among trust, perceived risk, and behavioral intention are significant. The effect of risk on trust was statistically showing that risk is a predictor of trust. Risk has a high significant on trust and trust in turn has low significant effect on behavioral intention. Adding TTF and its relationships to the TAM also fit the data. The relationship between task-technology fit, perceived ease of use, perceived usefulness and intention are significant

    Evaluating trust in electronic commerce : a study based on the information provided on merchants' websites

    Get PDF
    Lack of trust has been identified as a major problem hampering the growth of Electronic Commerce (EC). It is reported by many studies that a large number of online shoppers abandon their transactions because they do not trust the website when they are asked to provide personal information. To support trust, we developed an information framework model based on research on EC trust. The model is based on the information a consumer expects to find on an EC website and that is shown from the literature to increase his/her trust towards online merchants. An information extraction system is then developed to help the user find this information. In this paper, we present the development of the information extraction system and its evaluation. This is then followed by a study looking at the use of the identified variables on a sample of EC websites
    • …
    corecore