22,369 research outputs found

    Keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals

    Get PDF
    Pembinaan bahan bantu belajar untuk tujuan PdPC sememangnya digalakkan oleh Kementerian Pendidikan Malaysia bagi meningkatkan kualiti pendidikan. Kajian ini bertujuan untuk membangun dan mengenalpasti keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals. Kajian ini adalah kuasi-eksperimen yang melibatkan dua buah sekolah menengah harian di daerah Batu Pahat. Instrumen kajian yang digunakan ialah soalan ujian pra dan pasca, soal selidik dan senarai semak. Dapatan kajian telah dianalisis menggunakan perisian Statistic Package For The Social Science Version 22.0 (SPSS). Analisis deskriptif dalam bentuk frekuensi, peratus, min dan sisihan piawai digunakan semasa penganalisaan data. Ujian-t pula digunakan untuk melihat perbezaan pencapaian antara ujian pra dengan ujian pasca bagi kumpulan rawatan dan kumpulan kawalan. Kumpulan rawatan diberi set soal selidik tentang motivasi pelajar selepas menggunakan carta pembelajaran Omygram dalam PdPC. Hasil dapatan kajian mendapati bahawa, terdapat perbezaan pencapaian yang signifikan antara skor ujian pra dengan skor ujian pasca bagi kumpulan rawatan. Motivasi pelajar selepas menggunakan carta pembelajaran Omygram juga berada pada tahap tinggi

    E-commerce Systems and E-shop Web Sites Security

    Get PDF
    Fruitfulnes of contemporary companies rests on new business model development, elimination of communication obstacles, simplification of industrial processes, possibilities of responding in real-time and above all meeting the floating custom needs. Quite a number of company activities and transactions are realized within the framework of e-business. Business transactions are supported by e-commerce systems. One of the e-commerce system part is web interface (web sites). Present trend is putting the accent on security. E-commerce system security and web sites security is the most overlooked aspect of securing data. E-commerce system security depends on technologies and its correct exploitation and proceedings. If we want e-commerce system and e-shops web sites with all services to be safety, it is necessary to know all possible risks, use up to date technologies, follow conventions of web sites development and have good security management system. The article deals with definition and description of risk areas refer to e-commerce systems and e-shop web sites and show fundamental principles of e-commerce systems and e-shop web sites security.E-commerce system, e-shop web sites, security, security proceedings, web technologies

    Factors Influencing Hotel Managers’ Perceptions Regarding the Use of Mobile Apps to Gain a Competitive Advantage

    Get PDF
    The purpose of this quantitative study is to examine the opinions of hotel managers regarding the use of mobile applications in the hotel industry and to analyse the influence of these applications on a hotel’s perceived competitive advantage. Factor analysis and multiple regression analysis were performed to analyse the data collected from 106 hotel managers in Turkey. The results of the study indicate that the factors connection and assistance had a significant impact on hotel managers’ perceived competitive advantage. The findings of this study, one of the few that have examined managers’ attitudes toward the use of mobile apps in the hotel industry, provide valuable information that will help to guide technology vendors and software companies that develop mobile apps for hotel

    webXice: an Infrastructure for Information Commerce on the WWW

    Get PDF
    Systems for information commerce on the WWW have to support flexible business models if they should be able to cover a wide range of requirements imposed by the different types of information businesses. This leads to non-trivial functional and security requirements both on the provider and consumer side, for which we introduce an architecture and a system implementation, webXice. We focus on the question, how participants with minimal technological requisites, i.e. solely standard Web browsers available, can be technologically enabled to articipate in the information commerce at a system level, while not sacrificing the functionality and security required by an autonomous participant in an information commerce scenario. In particular, we propose an implementation strategy to efficiently support persistent message logging for light-weight clients, that enables clients to collect and manage non-reputiable messages as proofs. We believe that the capability to support minimal system platforms is a necessary precondition for the wide-spread use of any information commerce infrastructure

    TECHNOLOGICAL ENABLERS FOR PREVENTING SERVICE FAILURE WITH E-COMMERCE WEBSITES

    Get PDF
    Problems with digital services still occur at times, even for the most reliable services. Considering the consequences of these failures and their effects on the customer’s overall service quality perception and satisfaction, preventing these failures, and delivering reliable digital services, is a critical business competency. In addition, the fact that digital services are often co-produced by both service providers and their customers, shows the increasing role of both service providers and customers in preventing digital service failures (or service problems). In this study, we view the concept of digital service failure from the perspective of expectation-conformation theory, develop an Archimate architecture model and use it to design a typology of technological enablers (technologies and technological approaches) that can be used by businesses and their customers to prevent service failures at different stages of online purchase via e-commerce websites. The typology is relevant and useful for management information systems (MIS) academics and practitioners, particularly for information technology and digital service management researchers and the practitioner community

    A Comprehensive Exploration of Privacy and Security Mechanisms in E-commerce

    Get PDF
    This research is all about making online shopping, or e-commerce, safer. We know that buying and selling things on the internet is easy, but we need to make sure our information stays safe. The study looks at the problems we face, like attacks that try to make websites stop working, unauthorized access to our information, and stealing or fraud. It talks about how important it is to have strong security measures to deal with these risks. It suggests different safety measures like improving how websites talk to each other using SSL/TLS, using strong encryption to protect user information, adding an extra layer of verification (Two-Factor Authentication), and making sure online transactions are secure. It also looks at protecting against specific types of attacks like SQL injection, which is when unauthorized individuals try to mess with a website's database. The study talks about how important it is for online stores to have clear privacy rules, let people shop without giving away too much personal information, and make sure payments are safe. It wants to give practical advice to online stores to make their privacy and security better. The research knows that security problems keep changing, so it says online stores should keep updating how they protect themselves. The primary inquiry it seeks to address is how to make the e-commerce experience safer for all users

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Norms and Law: Putting the Horse Before the Cart

    Get PDF
    Law and society scholars have long been fascinated with the interplay of formal legal and informal extralegal procedures. Unfortunately, the fascination has been accompanied by imprecision, and scholars have conceptually conflated two very different mechanisms that extralegally resolve disputes. One set of mechanisms might be described as the shadow of the law, made famous by seminal works by Professors Stewart Macaulay and Marc Galanter, in which social coercion and custom have force because formal legal rights are credible and reasonably defined. The other set of mechanisms, recently explored by economic historians and legal institutionalists, might be described as order without law, borrowing from Professor Robert Ellickson\u27s famous work.1 In this second mechanism, extralegal mechanisms—whether organized shunning, violence, or social disdain—replace legal coercion to bring social order and are an alternative to, not an extension of, formal legal sanctions. One victim of conflating these mechanisms has been our understanding of industry-wide systems of private law and private adjudication, or private legal systems. Recent examinations of private legal systems have chiefly understood those systems as efforts to economize on litigation and dispute-resolution costs, but private legal systems are better understood as mechanisms that economize on enforcement costs. This is not a small mischaracterization. Instead, it reveals a deep misunderstanding of when and why private enforcement systems arise in a modern economy. This Essay provides a taxonomy for the various mechanisms of private ordering. These assorted mechanisms, despite their important differences, have been conflated in large part because there has been a poor understanding of the particular institutional efficiencies and costs of the alternative systems. Specifically, enforcement costs have often been inadequately distinguished from procedural or disputeresolution costs, and this imprecision has produced theories that inaccurately predict when private ordering will thrive and when the costs of private ordering overwhelm corresponding efficiencies. The implications for institutional theory are significant, as confusion in the literature has led to overappreciation of private ordering, underappreciation of social institutions, and Panglossian attitudes toward both lawlessness and legal development
    • 

    corecore