528 research outputs found

    Decision making on adoption of cloud computing in e-commerce using fuzzy TOPSIS

    Full text link
    © 2017 IEEE. Cloud computing promises enhanced scalability, flexibility, and cost-efficiency. In practice, however, there are many uncertainties about the usage of cloud computing resources in the e-commerce context. As e-commerce is dependent on a reliable and secure online store, it is important for decision makers to adopt an optimal cloud computing mode (Such as SaaS, PaaS and IaaS). This study assesses the factors associated with cloud-based e-commerce based on TOE (technological, organizational, and environmental) framework using multi-criteria decision-making technique (Fuzzy TOPSIS). The results show that Fuzzy TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) approach proposes software-as-a-service (SaaS) as the best choice for e-commerce business

    Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions

    Full text link
    News creation and consumption has been changing since the advent of social media. An estimated 2.95 billion people in 2019 used social media worldwide. The widespread of the Coronavirus COVID-19 resulted with a tsunami of social media. Most platforms were used to transmit relevant news, guidelines and precautions to people. According to WHO, uncontrolled conspiracy theories and propaganda are spreading faster than the COVID-19 pandemic itself, creating an infodemic and thus causing psychological panic, misleading medical advises, and economic disruption. Accordingly, discussions have been initiated with the objective of moderating all COVID-19 communications, except those initiated from trusted sources such as the WHO and authorized governmental entities. This paper presents a large-scale study based on data mined from Twitter. Extensive analysis has been performed on approximately one million COVID-19 related tweets collected over a period of two months. Furthermore, the profiles of 288,000 users were analyzed including unique users profiles, meta-data and tweets context. The study noted various interesting conclusions including the critical impact of the (1) exploitation of the COVID-19 crisis to redirect readers to irrelevant topics and (2) widespread of unauthentic medical precautions and information. Further data analysis revealed the importance of using social networks in a global pandemic crisis by relying on credible users with variety of occupations, content developers and influencers in specific fields. In this context, several insights and findings have been provided while elaborating computing and non-computing implications and research directions for potential solutions and social networks management strategies during crisis periods.Comment: 11 pages, 10 figures, Journal Articl

    Improving Co-Production Behavior and Citizenship Behavior of Client in Enterprise System Service: A View Based on Signaling Theory

    Get PDF
    In knowledge-intensive business service, the participation of clients is important to service providers to successfully deliver high-quality service. Our research discusses this topic in enterprise system (ES) service, where clients’ co-production behavior and citizenship behavior are critical because they need to provide specific business knowledge to vendors to develop a satisfactory ES. However, because clients are unaware of vendor’s competence and goodwill, the potential risk impedes them from performing such behaviors. As information asymmetry exists between vendors and clients, we adopt signaling theory to investigate how to improve clients’ co-production behavior and citizenship behavior. According to this theory, we consider vendor’s in-role and extra-role performance as the signal sent to clients, which influence clients’ trust in vendor’s competence and goodwill. This trust leads to co-production behavior and citizenship behavior as a consequence. The current study intends to conduct questionnaire survey among clients of a focal ES vendor. Expected contributions are specified at the end of this paper

    Internet of Things for Sustainability: Perspectives in Privacy, Cybersecurity, and Future Trends

    Get PDF
    In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards sustainability IoT are discussed in detail. The sustainability IoT risk categorization, risk mitigation goals, and implementation aspects are analyzed. The openness paradox and data dichotomy between privacy and sharing is analyzed. Accordingly, the IoT technology and security standard developments activities are highlighted. The perspectives on opportunities and challenges in IoT for sustainability are given. Finally, the chapter concludes with a discussion of sustainability IoT cybersecurity case studies

    Persistent virtual identity in community networks: Impact to social capital value chains

    Get PDF
    Community networks are digital infrastructures designed to strengthen bonds and build social capital between members of a community, facilitating accomplishment of goals. As we consider how community network implementations can be improved, we recognize the potential that social translucence and activity notification introduces to other forms of CSCW. We investigate how the underlying notion of persistent virtual identity---established at logon---impacts user perception of community networks and their social capital production process. To approach this question, we introduce a design model that reconciles various computer-mediated communication research contributions with support for typical community network scenarios of use. Using this model, we perform an inspection on existing community network implementations. Based on the insight gained through this analysis, we introduce a generic prototype that allows survey of user reaction to community network design elements under differing conditions of persistent virtual identity implementation and usage motivation---the results frame a value-chain understanding of conceptual tradeoffs

    Recognizing Patterns in Transmitted Signals for Identification Purposes

    Get PDF
    The ability to identify and authenticate entities in cyberspace such as users, computers, cell phones, smart cards, and radio frequency identification (RFID) tags is usually accomplished by having the entity demonstrate knowledge of a secret key. When the entity is portable and physically accessible, like an RFID tag, it can be difficult to secure given the memory, processing, and economic constraints. This work proposes to use unique patterns in the transmitted signals caused by manufacturing differences to identify and authenticate a wireless device such as an RFID tag. Both manufacturer identification and tag identification are performed on a population of 300 tags from three different manufacturers. A methodology to select features for identifying signals with high accuracy is developed and applied to passive RFID tags. The classifier algorithms K-Nearest Neighbors, Parzen Windows, and Support Vector Machines are investigated. The tag\u27s manufacturer can be identified with 99.93\% true positive rate. An individual tag is identified with 99.8\% accuracy, which is better than previously published work. Using a Hidden Markov Model with framed timing and power data, the tag manufacturer can be identified with 97.37\% accuracy and has a compact representation. An authentication system based on unique features of the signals is proposed assuming that the readers that interrogate the tags may be compromised by a malicious adversary. For RFID tags, a set of timing-only features can provide an accuracy of 97.22\%, which is better than previously published work, is easier to measure, and appears to be more stable than power features

    Consumer behavior and counterfeit purchase in the Tanzanian mainland

    Get PDF
    The primary focus of the present study is to examine the influence of moral judgement, subjective norm and self-regulatory efficacy in predicting behavioural intention to purchase counterfeit products among Tanzanian consumers. This study also aims to examine the direct relationship between self-regulatory efficacy and purchase behaviour of counterfeit products. In addition, the present study also fills the gap in the intention-actual behaviour relationship by examining the moderating effect of idolatry on the relationship between consumers’ behavioural intention and purchase behaviour of counterfeit products. The present study also aims to examine to what extent intention to purchase counterfeit products contributes to the purchase behaviour of counterfeit products among Tanzanian consumers.It is an attempt to develop a conceptual framework for determining purchasing behaviour of counterfeit products in Tanzania. The aim is to provide adequate information to marketers on how to reap the expected benefits of sales as well as to facilitate prompt decision-making by the government through the execution and implementation of stringent regulations

    Authentic Leadership Within Local Government: An Empirical Evaluation

    Get PDF
    This research study established the current issue of low authentic leadership in business as a known issue that has contributed to lower confidence in leadership throughout various organizations. The study aimed to investigate the relationship between authentic leadership and confidence in leadership in a medium to large size department of a local government located in the Commonwealth of Virginia. To achieve this aim, the researcher adopted a descriptive and diagnostic analytical approach. The sample of the study consisted of 207 participants, consisting of positions consistent with regular positions within local government. The researcher used two survey instruments to achieve the aim of the study. The first instrument was the Authentic Leadership Questionnaire, which consisted of 16 questions, and the second instrument was the Leadership Efficacy Questionnaire, which consisted of 22 items. The literature review, theoretical framework, and research methods established a foundation for answering the research questions To what extent, if any, is there a relationship between authentic leadership and confidence in overall organizational leadership within local government?” and “To what extent, if any, is there a difference in the relationship between authentic leadership assessment scores and lower confidence in leadership between direct supervisors and indirect supervisors within local government? Further analysis of the findings of the research could be expanded to better understand authentic leadership theory and the impact on the public sector, particularly local government

    Some Agents are more Similar than Others:Customer Orientation of Frontline Robots and Employees

    Get PDF
    Purpose: The impact of frontline robots (FLRs) on customer orientation perceptions remains unclear. This is remarkable because customers may associate FLRs with standardization and cost-cutting, such that they may not fit firms that aim to be customer oriented. Design/methodology/approach: In four experiments, data are collected from customers interacting with frontline employees (FLEs) and FLRs in different settings. Findings: FLEs are perceived as more customer-oriented than FLRs due to higher competence and warmth evaluations. A relational interaction style attenuates the difference in perceived competence between FLRs and FLEs. These agents are also perceived as more similar in competence and warmth when FLRs participate in the customer journey's information and negotiation stages. Switching from FLE to FLR in the journey harms FLR evaluations. Practical implications: The authors recommend firms to place FLRs only in the negotiation stage or in both the information and negotiation stages of the customer journey. Still then customers should not transition from employees to robots (vice versa does no harm). Firms should ensure that FLRs utilize a relational style when interacting with customers for optimal effects. Originality/value: The authors bridge the FLR and sales/marketing literature by drawing on social cognition theory. The authors also identify the product categories for which customers are willing to negotiate with an FLR. Broadly speaking, this study’s findings underline that customers perceive robots as having agency (i.e. the mental capacity for acting with intentionality) and, just as humans, can be customer-oriented.</p

    Pricing practices in digital markets: an abuse of dominance approach

    Get PDF
    Digital platforms have reshaped the world economic order. Competition laws around the world have required acclimatizing to developments occurring in digital platform markets with respect to new types of conduct being deemed anti-competitive by competition law enforcement bodies. Between 2016-2019, more than 30 competition agencies from around the world released reports regarding competition in the digital age. In the EU, the need to develop tools to assess abusive conduct by dominant digital platform firms led to the creation of the Digital Markets Act (DMA) in 2022 which is to act as an additional regulatory tool to Article 102 TFEU. Cases relating to the exploitative nature of the data collection policy of Meta/Facebook have been initiated in Germany and the UK. Data collection has also allowed price personalization to take place which has the capability of resembling first-degree price discrimination which can be harmful to consumers when there is no increase in total output. There has been minimal discussion on the occurrence of predatory pricing in online platform markets through cross-subsidization being facilitated due to the nature of two-sided online platforms. The thesis considers the role of competition law in the assessment of these. This thesis examines the occurrence of conduct that may resemble unfair pricing, unfair trading conditions, first-degree price discrimination, and predatory pricing which are prohibited under Article 102 TFEU. The thesis evaluates whether Article 102 TFEU can and should be used in such cases and tries to devise suitable remedies for certain digital platform market infringements by also considering the use of other relevant legislations such as the GDPR, Consumer Protection Directives, and the DMA. The thesis provides an evaluative contribution to the area of pricing-based abuse of dominance in digital platform markets
    • …
    corecore