102 research outputs found

    The role of security notices and online consumer behaviour: An empirical study of social networking users

    Get PDF
    This paper uses a survey of social networking users to empirically explore their perceptions of security notices โ€“ independently verified artefacts informing internet site users that security measures are taken by the site owner. We investigate such factors as purchase experience, purchase intention, risk propensity, usage of various social network categories and user victimisation. The results suggest a strong positive link between purchase intention and paying attention to security notices/features on social networks. We find that higher use of narrow-purpose social networking services has a negative association with paying attention to security notices. We also show that users with higher risk propensity pay less attention to security notices/features. Finally, we find no association between purchase experience, user victimisation and perception of security notices/features. Our results provide new, and possibly more refined, evidence of the factors that influence the attention paid to security notices/features by social media users. The results have important implications for theory development, policy and practice

    Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications

    Get PDF
    Mobile applications (also known as โ€œappsโ€) have rapidly grown into a multibillion-dollar industry. Because they are available through devices that are โ€œalways onโ€ and often with the user, users often adopt mobile apps โ€œon the flyโ€ as they need them. As a result, users often base their adoption and disclosure decisions only on the information provided through the mobile app delivery platform (e.g., the Apple App Storeโ„ข or Google Playโ„ข). The fact that using a mobile app often requires one to disclose an unprecedented combination of personal information (e.g., location data, preferences, contacts, calendars, browsing history, music library) means that one makes a complex risk/benefit tradeoff decision based on only the small amount of information that the mobile app delivery platform providesโ€”and all in a short period of time. Hence, this process is much shorter and much riskier than traditional software adoption. Through two experiments involving 1,588 mobile app users, we manipulated three primary sources of information provided by a platform (app quality ratings, network size, and privacy assurances) to understand their effect on perceptions of privacy risks and benefits and, in turn, how they influence consumer adoption intentions and willingness to pay (WTP). We found that network size influenced not only perceived benefits but also the perceived risks of apps in the absence of perfect information. In addition, we found that integrating a third party privacy assurance system into the app platform had a significant influence on app adoption and information disclosure. We also found that a larger network size reduces LBS privacy risk perceptions, which confirms our information cascade hypothesis. We discuss the implications of these findings for research and practice

    AICPA Technical Practice Aids, as of June 1, 2005, Volume 2

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2584/thumbnail.jp

    AICPA Technical Practice Aids, as of June 1, 2004, Volume 2

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2554/thumbnail.jp

    AICPA Technical Practice Aids, as o June 1, 2003, Volume 2

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2551/thumbnail.jp

    A Study on the Effects of E-Service Quality of Nagarik App on User Satisfaction

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ๊ธ€๋กœ๋ฒŒํ–‰์ •์ „๊ณต, 2023. 2. ์ตœํƒœํ˜„.Purpose: The purpose of this study is to find out which construct of e-service quality of 'Nagarik App' has the greater effect on user satisfaction and examine the users satisfaction level in regards to e-service quality in Nepal. E-service quality was measured by; efficiency, system availability, privacy, fulfillment, responsiveness, and contact as independent variables. Satisfaction was examined as pleasurable experience and continuance intention of use of 'Nagarik App' as prescribed by expectation confirmation theory. Design/Methodology/Approach: Quantitative approach was employed to collect the required data. Nepali citizens who are using 'Nagarik App' are considered as the population. A Google-based online survey questionnaire, with filtering question only to collect data from the app user, was administered to collect data. 432 valid responses were analyzed with SAS software. Factor analysis, descriptive analysis, correlation, t-test, and multiple linear regression were performed to test the proposed hypothesis. Findings: With the results of principle component analysis, all the question items well represent the corresponding constructs together except for efficiency and system availability measures. Cronbach alpha (contact =0.902, privacy =0.897, responsiveness = 0.858, efficiency =0.838, fulfillment =0.849, system availability =0.840, and satisfaction =0.888) suggested the internal consistency of the items and they represent the constructs well. As the adjusted R square (0.628) suggested, predictors in the regression model showed 62.80% of fitness to explain user satisfaction. Out of the six independent variables, efficiency (0.241), privacy (0.141), fulfillment (0.328), and contact (0.255) exhibited positive and statistically significant relation (p<0.01) with user satisfaction. On the other hand, responsiveness (-0.038) displayed statistically insignificant negative relationship while system availability (0.045) has a positive but statistically insignificant relationship with user satisfaction. Standardized coefficient estimates suggested that fulfillment (0.323) has relatively the strongest effect on user satisfaction followed by contact (0.295), efficiency (0.210), and privacy (0.155). Responsiveness (-0.042), on the other hand, has the negative and the weakest effect on user satisfaction followed by system availability (0.054). Among the four control variables, both age (-0.099, p <0.01) and gender (0.117, p<0.1) showed negative relationships with user satisfaction. Education and platform of use did not show any statistically significant relationship with user satisfaction. In sum, four out of six hypotheses were confirmed by the data. Research Implications: four out of six constructs of e-service quality showed positive and statistically significant relationships with user satisfaction having fulfillment the strongest effect on the dependent variable. Users perceptions and level of satisfaction are just above the neutral point. Findings suggest that old-age users and female users are less satisfied. Government has to pay more attention to expanding the services making them easier and user-friendly along with special enabling factors for women and users from old age to bring them into the mainstream of e-governance.๋ชฉ์ : ๋ณธ ์—ฐ๊ตฌ์˜ ๋ชฉ์ ์€ '๋‚˜๊ฐ€๋ฆญ ์•ฑ'์˜ E-์„œ๋น„์Šค ํ’ˆ์งˆ ์ค‘ ์–ด๋–ค ๊ตฌ์„ฑ์ด ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„์— ๋” ํฐ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š”์ง€ ์•Œ์•„๋ณด๊ณ  ๋„คํŒ”์˜ E-์„œ๋น„์Šค ํ’ˆ์งˆ๊ณผ ๊ด€๋ จํ•˜์—ฌ ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„๋ฅผ ๋ถ„์„ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. E-์„œ๋น„์Šค ํ’ˆ์งˆ์€ ํšจ์œจ์„ฑ, ์‹œ์Šคํ…œ ๊ฐ€์šฉ์„ฑ, ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ, ์ดํ–‰, ๋Œ€์‘์„ฑ ๋ฐ ์ ‘์ด‰์„ ๋…๋ฆฝ์ ์ธ ๋ณ€์ˆ˜๋กœ ์ธก์ •ํ–ˆ๋‹ค. ๋งŒ์กฑ๋„๋Š” ๊ธฐ๋Œ€ ํ™•์ธ ์ด๋ก ์— ๋”ฐ๋ผ '๋‚˜๊ฐ€๋ฆญ ์•ฑ'์„ ์‚ฌ์šฉํ•˜๋Š” ์ฆ๊ฑฐ์šด ๊ฒฝํ—˜๊ณผ ์ง€์†์ ์ธ ์˜๋„๋ฅผ ๊ฐ€์ง€๊ณ  ๋ถ„์„๋˜์—ˆ๋‹ค. ์„ค๊ณ„/๋ฐฉ๋ฒ•/์ ‘๊ทผ๋ฒ•: ํ•„์š”ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๊ธฐ ์œ„ํ•ด ์ •๋Ÿ‰์  ์ ‘๊ทผ๋ฒ•์„ ์‚ฌ์šฉํ•˜์˜€๋‹ค. '๋‚˜๊ฐ€๋ฆญ ์•ฑ'์„ ์‚ฌ์šฉํ•˜๋Š” ๋„คํŒ” ์‹œ๋ฏผ๋“ค์ด ์ธ๊ตฌ๋กœ ๊ณ ๋ ค๋œ๋‹ค. ๊ตฌ๊ธ€ ๊ธฐ๋ฐ˜ ์˜จ๋ผ์ธ ์„ค๋ฌธ์ง€๋Š” ์•ฑ ์‚ฌ์šฉ์ž๋กœ๋ถ€ํ„ฐ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๊ธฐ ์œ„ํ•ด ์งˆ๋ฌธ์„ ํ•„ํ„ฐ๋งํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๊ด€๋ฆฌ๋˜์—ˆ๋‹ค. SAS ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ 432๊ฐœ์˜ ์œ ํšจํ•œ ์‘๋‹ต์„ ๋ถ„์„ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ œ์•ˆ๋œ ๊ฐ€์„ค์„ ๊ฒ€์ฆํ•˜๊ธฐ ์œ„ํ•ด ์š”์ธ๋ถ„์„, ๊ธฐ์ˆ ๋ถ„์„, ์ƒ๊ด€๊ด€๊ณ„, t-๊ฒ€์ •, ๋‹ค์ค‘์„ ํ˜•ํšŒ๊ท€๋ฅผ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. ๊ฒฐ๊ณผ: ์ฃผ์š” ๊ตฌ์„ฑ์š”์†Œ ๋ถ„์„ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ํšจ์œจ์„ฑ ๋ฐ ์‹œ์Šคํ…œ ๊ฐ€์šฉ์„ฑ ์ธก์ •์„ ์ œ์™ธํ•œ ๋ชจ๋“  ์งˆ๋ฌธ ํ•ญ๋ชฉ์ด ํ•ด๋‹น ๊ตฌ์„ฑ์š”์†Œ๋ฅผ ํ•จ๊ป˜ ์ž˜ ๋‚˜ํƒ€๋‚ธ๋‹ค. Cronbach alpha(์ ‘์ด‰ = 0.902, ํ”„๋ผ์ด๋ฒ„์‹œ = 0.897, ์‘๋‹ต๋„ = 0.858, ํšจ์œจ์„ฑ = 0.838, ์ถฉ์กฑ๋„ = 0.849, ์‹œ์Šคํ…œ ๊ฐ€์šฉ์„ฑ = 0.840, ๋งŒ์กฑ๋„ = 0.888)๋Š” ํ•ญ๋ชฉ์˜ ๋‚ด๋ถ€ ์ผ๊ด€์„ฑ์„ ์ œ์‹œํ•˜์˜€์œผ๋ฉฐ ๊ตฌ์„ฑ์„ ์ž˜ ๋‚˜ํƒ€๋‚ธ๋‹ค. ์ˆ˜์ •๋œ R์ œ๊ณฑ(0.628)์ด ์‹œ์‚ฌํ•˜๋Š” ๋ฐ”์™€ ๊ฐ™์ด ํšŒ๊ท€๋ชจํ˜•์˜ ์˜ˆ์ธก์ž๋“ค์€ ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„๋ฅผ ์„ค๋ช…ํ•˜๊ธฐ ์œ„ํ•œ ์ ํ•ฉ๋„๊ฐ€ 62.80%๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค. 6๊ฐœ์˜ ๋…๋ฆฝ๋ณ€์ˆ˜ ์ค‘ ํšจ์œจ์„ฑ(0.241), ํ”„๋ผ์ด๋ฒ„์‹œ(0.141), ์„ฑ์ทจ๋„(0.328), ์ ‘์ด‰(0.255)์€ ์ด์šฉ์ž ๋งŒ์กฑ๋„์™€ ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜ํ•œ ๊ด€๊ณ„(p<0.01)๋ฅผ ๋‚˜ํƒ€๋‚ด์—ˆ๋‹ค. ๋ฐ˜๋ฉด, ์‘๋‹ต๋„(-0.038)์€ ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜ํ•˜์ง€ ์•Š์€ ๋ถ€์ •์  ๊ด€๊ณ„๋ฅผ ๋ณด์ธ ๋ฐ˜๋ฉด, ์‹œ์Šคํ…œ ๊ฐ€์šฉ์„ฑ(0.045)์€ ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„์™€ ๊ธ์ •์ ์ด์ง€๋งŒ ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜ํ•˜์ง€ ์•Š์€ ๊ด€๊ณ„๋ฅผ ๋ณด์˜€๋‹ค. ํ‘œ์ค€ํ™”๋œ ๊ณ„์ˆ˜ ์ถ”์ •์น˜๋Š” ์ถฉ์กฑ๋„(0.323)๊ฐ€ ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„์— ์ƒ๋Œ€์ ์œผ๋กœ ๊ฐ€์žฅ ํฐ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ์œผ๋ฉฐ, ์—ฐ๋ฝ(0.295), ํšจ์œจ์„ฑ(0.210), ํ”„๋ผ์ด๋ฒ„์‹œ(0.155) ์ˆœ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค. ๋ฐ˜๋ฉด ์‘๋‹ต๋„(-0.042)๋Š” ์‹œ์Šคํ…œ ๊ฐ€์šฉ์„ฑ(0.054) ๋‹ค์Œ์œผ๋กœ ์‚ฌ์šฉ์ž ๋งŒ์กฑ์— ๋ถ€์ •์ ์ด๊ณ  ๊ฐ€์žฅ ์•ฝํ•œ ์˜ํ–ฅ์„ ๋ฏธ์ณค๋‹ค. 4๊ฐœ์˜ ๋Œ€์กฐ๊ตฐ ๋ณ€์ˆ˜ ์ค‘ ์—ฐ๋ น(-0.099, p<0.01)๊ณผ ์„ฑ๋ณ„(0.117, p<0.1) ๋ชจ๋‘ ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„์— ๋ถ€์ •์ ์ธ ๊ด€๊ณ„๋ฅผ ๋ณด์˜€๋‹ค. ๊ต์œก๊ณผ ์ด์šฉ ํ”Œ๋žซํผ์€ ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜๋ฏธํ•œ ์ด์šฉ์ž ๋งŒ์กฑ๋„์™€์˜ ๊ด€๊ณ„๋ฅผ ๋ณด์ด์ง€ ์•Š์•˜๋‹ค. ์ข…ํ•ฉํ•ด๋ณด๋ฉด 6๊ฐœ ๊ฐ€์„ค ์ค‘ 4๊ฐœ ๊ฐ€์„ค์ด ์ž๋ฃŒ๋กœ ํ™•์ธ๋๋‹ค. ์—ฐ๊ตฌ์˜ ์‹œ์‚ฌ์ : E-์„œ๋น„์Šค ํ’ˆ์งˆ์˜ ๊ตฌ์„ฑ์š”์†Œ 6๊ฐœ ์ค‘ 4๊ฐœ๋Š” ์ข…์†๋ณ€์ˆ˜์— ์žˆ์–ด ๊ฐ€์žฅ ํฐ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„์™€ ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜ํ•œ ๊ด€๊ณ„๋ฅผ ๋ณด์˜€๋‹ค. ์‚ฌ์šฉ์ž์˜ ์ธ์‹๊ณผ ๋งŒ์กฑ๋„๋Š” ์ค‘๋ฆฝ์  ๋ฐ”๋กœ ์œ„์— ์žˆ๋‹ค. ์กฐ์‚ฌ ๊ฒฐ๊ณผ๋Š” ๋…ธ๋…„์ธต ์‚ฌ์šฉ์ž์™€ ์—ฌ์„ฑ ์‚ฌ์šฉ์ž์˜ ๋งŒ์กฑ๋„๊ฐ€ ๋‚ฎ๋‹ค๋Š” ๊ฒƒ์„ ์‹œ์‚ฌํ•œ๋‹ค. ์ •๋ถ€๋Š” ์—ฌ์„ฑ๊ณผ ๋…ธ๋…„์ธต ์‚ฌ์šฉ์ž๋“ค์ด ์ „์ž ๊ฑฐ๋ฒ„๋„Œ์Šค์˜ ์ฃผ๋ฅ˜๋กœ ์ง„์ž…ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ํŠน๋ณ„ํ•œ ํ™œ์„ฑํ™” ์š”์†Œ์™€ ํ•จ๊ป˜ ๋” ์‰ฝ๊ณ  ์‚ฌ์šฉ์ž ์นœํ™”์ ์ธ ์„œ๋น„์Šค๋ฅผ ํ™•๋Œ€ํ•˜๋Š” ๋ฐ ๋” ๋งŽ์€ ๊ด€์‹ฌ์„ ๊ธฐ์šธ์—ฌ์•ผ ํ•œ๋‹ค.Chapter 1: Introduction and purpose of the research 1 1.1 Background 1 1.2 Nagarik App 2 1.3 How does 'Nagarik App' work 3 1.5 Scope of the study 7 1.6 Research question 7 1.7 Purpose and importance of the study 8 Chapter 2: Theoretical background and Literature review 10 2.1 Theoretical Background 10 2.1.1 Defining Satisfaction 10 2.1.2 Factors contributing to affect user satisfaction 13 2.2 Defining e-governance and e-service quality 15 2.2.1 E-government 15 2.2.2 E-government development stages 18 2.2.3 Nepal and E-government 23 2.2.4 Challenges in E-government service in Nepal 27 2.2.5 E-Service quality 30 2.2.6 Previous studies 34 2.2.7 Critical review 36 2.2.8 Research gap 37 Chapter 3: Research Design and Methodology 39 3.1 Research Design 39 3.2 Analytical framework 39 3.3 Research Model 39 3.4 Research Hypothesis 41 3.4.1 Conceptualization and Operationalization 46 3.5 Construct and measures 48 3.6 Sampling and Data Collection method 49 3.6.1 Population 49 3.6.2 Sampling frame and size 50 3.6.3 Survey instrument 50 3.6.4 Data collection 51 3.6.5 Data Analysis Method 51 Chapter 4: Presentation, Analysis, and Discussion of Results 53 4.1 Descriptive statistics 53 4.1.1 Descriptive statistics of survey respondents 53 4.1.2 Reliability and validity of the survey instrument 56 4.1.3 Descriptive statistics of independent variables 56 4.1.4 Demographic comparison of efficiency 57 4.1.5 Demographic comparison of system availability 59 4.1.6 Demographic comparison of privacy 60 4.1.7 Demographic comparison of fulfillment 62 4.1.8 Demographic comparison of responsiveness 65 4.1.9 Demographic comparison of Contact 67 4.1.10 Descriptive statistics for dependent variable; satisfaction 69 4.1.11 Demographic comparison of the dependent variable; Satisfaction 69 4.1.12 Reliability and Construct validity of the survey Instruments 72 4.1.13 Correlations between variables of the study 73 4.1.14 Pearson's correlation coefficients test 74 4.2 Hypotheses testing 76 4.3 Multiple Linear Regression Analysis 77 4.3.1 Hypothesis 1 79 4.3.2 Hypothesis 2 79 4.3.3 Hypothesis 3 79 4.3.4 Hypothesis 4 80 4.3.5 Hypothesis 5 80 4.3.6 Hypothesis 6 80 4.4 Summary of the Major findings 84 4.4.1 Efficiency and user satisfaction 86 4.4.2 System availability and user satisfaction 87 4.4.3 Privacy and user satisfaction 88 4.4.4 Fulfillment and user satisfaction 88 4.4.5 Responsiveness and user satisfaction 89 4.4.6 Contact and user satisfaction 90 4.4.7 Control variables and user satisfaction 91 Chapter 5: Conclusion, Recommendations and Limitations 93 5.1 Conclusion 93 5.2 Policy Recommendations to the Government of Nepal 95 5.3 Recommendations for future studies 97 5.4 Limitations of the Current study 98 Bibliography 100 Annexure 1: Survey instrument (questionnaire) 111 Abstract in Korean 116 Acknowledgements 118์„

    On Preserving Secrecy in Mobile Social Networks

    Get PDF
    Location-based services are one of the most important services offered by mobile social networks. Offering this kind of services requires accessing the physical position of users together with the access authorizations, i.e., who is authorized to access what information. However, these physical positions and authorizations are sensitive information which have to be kept secret from any adversary, including the service providers. As far as we know, the problem of offering location-based services in mobile social networks with a revocation feature under collusion assumption, i.e., an adversary colludes with the service provider, has not been studied. In this paper, we show how to solve this problem in the example of range queries. Specifically, we guarantee any adversary, including the service provider, is not able to learn (1) the physical position of the users, (2) the distance between his position and that of the users, and (3) whether two users are allowed to learn the distance between them. We propose two approaches namely two-layer symmetric encryption and two-layer attribute-based encryption. The main difference between the first and the second approach is that they use, among other encryption schemes, symmetric and attribute-based encryption, respectively. Next, we prove the secrecy guarantees of both approaches, analyze their complexity and provide experiments to evaluate their performance in practice

    Collusion in Peer-to-Peer Systems

    Get PDF
    Peer-to-peer systems have reached a widespread use, ranging from academic and industrial applications to home entertainment. The key advantage of this paradigm lies in its scalability and flexibility, consequences of the participants sharing their resources for the common welfare. Security in such systems is a desirable goal. For example, when mission-critical operations or bank transactions are involved, their effectiveness strongly depends on the perception that users have about the system dependability and trustworthiness. A major threat to the security of these systems is the phenomenon of collusion. Peers can be selfish colluders, when they try to fool the system to gain unfair advantages over other peers, or malicious, when their purpose is to subvert the system or disturb other users. The problem, however, has received so far only a marginal attention by the research community. While several solutions exist to counter attacks in peer-to-peer systems, very few of them are meant to directly counter colluders and their attacks. Reputation, micro-payments, and concepts of game theory are currently used as the main means to obtain fairness in the usage of the resources. Our goal is to provide an overview of the topic by examining the key issues involved. We measure the relevance of the problem in the current literature and the effectiveness of existing philosophies against it, to suggest fruitful directions in the further development of the field
    • โ€ฆ
    corecore