218,374 research outputs found
A business-oriented framework for enhancing web services security for e-business
Security within the Web services technology field is a complex and very
topical issue. When considering using this technology suite to support interacting
e-businesses, literature has shown that the challenge of achieving security
becomes even more elusive. This is particularly true with regard to attaining a
level of security beyond just applying technologies, that is trusted, endorsed and
practiced by all parties involved. Attempting to address these problems, this research
proposes BOF4WSS, a Business-Oriented Framework for enhancing Web
Services Security in e-business. The novelty and importance of BOF4WSS is its
emphasis on a tool-supported development methodology, in which collaborating
e-businesses could achieve an enhanced and more comprehensive security and
trust solution for their services interactions.
This investigation began with an in-depth assessment of the literature in
Web services, e-business, and their security. The outstanding issues identified
paved the way for the creation of BOF4WSS. With appreciation of research limitations
and the added value of framework tool-support, emphasis was then shifted
to the provision of a novel solution model and tool to aid companies in the use and
application of BOF4WSS. This support was targeted at significantly easing the
difficulties incurred by businesses in transitioning between two crucial framework
phases.
To evaluate BOF4WSS and its supporting model and tool, a two-step
approach was adopted. First, the solution model and tool were tested for compatibility
with existing security approaches which they would need to work with
in real-world scenarios. Second, the framework and tool were evaluated using interviews
with industry-based security professionals who are experts in this field.
The results of both these evaluations indicated a noteworthy degree of evidence
to affirm the suitability and strength of the framework, model and tool. Additionally,
these results also act to cement this thesis' proposals as innovative and
significant contributions to the research field
Consumer Participation in Using Online Product Recommendation Agents: Effects of Trust, PerceivedControl, and Perceived Risk in Providing Personal Information
Online product recommendation agents are gaining greater strategic importance as an innovative technology to deliver value-added services to consumers. Yet the active role of consumers as the participants in using this technology is not well understood. This dissertation builds on the technology-based self-service (TBSS) literature, consumer participation literature, the service-dominant logic, and the trust literature on recommendation agents to develop a research framework that explains the role of consumer participation in using online product recommendation agents.
The objective of this dissertation is three-fold: (1) to examine the effects of consumer participation and privacy/security disclosures in using online product recommendation agents, (2) to explore the mediating effects of trust, perceived control, and perceived risk in providing personal information, and (3) to test the trust transference process within the current research context.
A field experiment using existing recommendation agents was conducted with multiple sessions in computer labs to collect data from university students, a representative sample of the online population. 67 undergraduate students participated in the pretest, and 117 participated in the main study. Structural equation modeling with AMOS 7.0 was used to test the research hypotheses.
The results showed that consumer participation was a contributing factor in building consumers’ trust in recommendation agents and that privacy/security disclosures decreased consumers’ perceived risk in providing personal information. Moreover, the trust transference process was validated among the three different types of consumer trust within the agent-mediated environment, that is, trust in the recommendation agent, trust in the Web site, and trust in recommendations. Finally, perceived control was shown to be a salient factor in increasing consumers’ trust and motivating consumers to reuse the recommendation technolog
Factors that impact the acceptance of e-services in the public sector in the United Arab Emirates case study: the general directorate of residency and foreigners affairs (GDRFA) - UAE
The invention of the computer and the development of the Internet has proven to be of vital importance and benefit to society, with increasingly more services delivered through the Internet are becoming available to end-users. E-services are usually more convenient to use, although it is still not fully known how inclined consumers are towards acceptance of e-services. The level of e-government adoption in the Gulf Corporation countries is still at an immature state despite various efforts taken by the government to propagate the importance of e-services. The United Arab Emirates (UAE) government is investing significant funds for its e-services; but there is still low acceptance in the adoption of these services.
The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Seven factors were adopted as determinants of acceptance of e-services: security, trust, support, e-marketing mix, computer self-efficacy, web skills, and language.
The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services.
The overall findings revealed that security, e-marketing mix, language, web skills, computer self-efficacy and support significantly affected ease of use and perceived usefulness. However, the trust and computer self-efficacy doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness.
This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE
Towards A model for Citizens’ Acceptance of E-Payment Systems for Public Sector Services in Jordan: Evidence from Crisis Era
E-payment systems (EPS) are an attractive trend in electronic services nowadays, and the public sector is not an exception. Earlier studies on e-payment services acceptance have paid attention to the use of web/mobile services during traditional common circumstances. However, given the distinguishing characteristics of the crisis-era (e.g., COVID-19 pandemic) and how this could lead to new business models based on online services and applications, more studies of EPS for e-government services, in particular, are warranted. This study explored an important issue related to the factors affecting citizens acceptance of E-payment systems for public sector services in the Jordanian context in order to develop a conceptual framework. Studying the acceptance and use of e-payment systems (EPSs) is not a new research topic. However, investigating the factors affecting the acceptance of EPSs in public organizations is a topic of great importance. This study extends the Unified Theory of Acceptance and Use of Technology (UTAUT2) by integrating the theory original variables (i.e., Performance Expectancy (PE), Effort Expectancy (EE), Social influence (SI), and Facilitating Conditions (FC)) with contextual variables (i.e., Fear of COVID-19 (FoC), Trust (TR), Security concern (SEC), and Perceived Risks (PR)). The proposed conceptual model will offer a contribution to the literature in the field as well as practical implications, enhancing the understanding of E-payment services during crisis time
A business-oriented framework for enhancing web services security for e-business
Security within the Web services technology field is a complex and very topical issue. When considering using this technology suite to support interacting e-businesses, literature has shown that the challenge of achieving security becomes even more elusive. This is particularly true with regard to attaining a level of security beyond just applying technologies, that is trusted, endorsed and practiced by all parties involved. Attempting to address these problems, this research proposes BOF4WSS, a Business-Oriented Framework for enhancing Web Services Security in e-business. The novelty and importance of BOF4WSS is its emphasis on a tool-supported development methodology, in which collaborating e-businesses could achieve an enhanced and more comprehensive security and trust solution for their services interactions. This investigation began with an in-depth assessment of the literature in Web services, e-business, and their security. The outstanding issues identified paved the way for the creation of BOF4WSS. With appreciation of research limitations and the added value of framework tool-support, emphasis was then shifted to the provision of a novel solution model and tool to aid companies in the use and application of BOF4WSS. This support was targeted at significantly easing the difficulties incurred by businesses in transitioning between two crucial framework phases. To evaluate BOF4WSS and its supporting model and tool, a two-step approach was adopted. First, the solution model and tool were tested for compatibility with existing security approaches which they would need to work with in real-world scenarios. Second, the framework and tool were evaluated using interviews with industry-based security professionals who are experts in this field. The results of both these evaluations indicated a noteworthy degree of evidence to affirm the suitability and strength of the framework, model and tool. Additionally, these results also act to cement this thesis' proposals as innovative and significant contributions to the research field.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
A business-oriented framework for enhancing web services security for e-business
Security within the Web services technology field is a complex and very topical issue. When considering using this technology suite to support interacting e-businesses, literature has shown that the challenge of achieving security becomes even more elusive. This is particularly true with regard to attaining a level of security beyond just applying technologies, that is trusted, endorsed and practiced by all parties involved. Attempting to address these problems, this research proposes BOF4WSS, a Business-Oriented Framework for enhancing Web Services Security in e-business. The novelty and importance of BOF4WSS is its emphasis on a tool-supported development methodology, in which collaborating e-businesses could achieve an enhanced and more comprehensive security and trust solution for their services interactions. This investigation began with an in-depth assessment of the literature in Web services, e-business, and their security. The outstanding issues identified paved the way for the creation of BOF4WSS. With appreciation of research limitations and the added value of framework tool-support, emphasis was then shifted to the provision of a novel solution model and tool to aid companies in the use and application of BOF4WSS. This support was targeted at significantly easing the difficulties incurred by businesses in transitioning between two crucial framework phases. To evaluate BOF4WSS and its supporting model and tool, a two-step approach was adopted. First, the solution model and tool were tested for compatibility with existing security approaches which they would need to work with in real-world scenarios. Second, the framework and tool were evaluated using interviews with industry-based security professionals who are experts in this field. The results of both these evaluations indicated a noteworthy degree of evidence to affirm the suitability and strength of the framework, model and tool. Additionally, these results also act to cement this thesis' proposals as innovative and significant contributions to the research field.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
Recommended from our members
Towards successful e-Payment systems: An empirical identification and analysis of critical factors
This research aims to explore the factors relating to e-payment system to be implemented where electronic processes enable the facilitation of online transactions. A secondary analysis revealed six factors which are argued to be ‘critical’ for customer adoption of these systems. The findings were further augmented by an online survey of 155 respondents where the perceived importance of the critical factors were correlated through: security, trust, perceived advantage, assurance seals, perceived risk and usability. The results demonstrate that three of the critical factors were necessary (security, advantage, web assurance seals) and three were relatively sufficient (perceived risk, trust and usability) through customer intentions to adopt an e-payment system. The study provides a valid overall awareness that these critical factors are important in designing a successful e-payment system
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
The biological immune system (BIS) is characterized by networks of cells, tissues, and
organs communicating and working in synchronization. It also has the ability to learn,
recognize, and remember, thus providing the solid foundation for the development
of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself
as an area of computational intelligence. Real-Valued Negative Selection Algorithm
with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated
its potentials in the field of anomaly detection. The V-Detectors algorithm depends
greatly on the random detectors generated in monitoring the status of a system.
These randomly generated detectors suffer from not been able to adequately cover
the non-self space, which diminishes the detection performance of the V-Detectors
algorithm. This research therefore proposed CSDE-V-Detectors which entail the
use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in
optimizing the random detectors of the V-Detectors. The DE is integrated with CS
at the population initialization by distributing the population linearly. This linear
distribution gives the population a unique, stable, and progressive distribution process.
Thus, each individual detector is characteristically different from the other detectors.
CSDE capabilities of global search, and use of L´evy flight facilitates the effectiveness
of the detector set in the search space. In comparison with V-Detectors, cuckoo search,
differential evolution, support vector machine, artificial neural network, na¨ıve bayes,
and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms
other algorithms with an average detection rate of 95:30% on all the datasets. This
signifies that CSDE-V-Detectors can efficiently attain highest detection rates and
lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly
detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly
detection tasks
Critical review of the e-loyalty literature: a purchase-centred framework
Over the last few years, the concept of online loyalty has been examined extensively in the literature, and it remains a topic of constant inquiry for both academics and marketing managers. The tremendous development of the Internet for both marketing and e-commerce settings, in conjunction with the growing desire of consumers to purchase online, has promoted two main outcomes: (a) increasing numbers of Business-to-Customer companies running businesses online and (b) the development of a variety of different e-loyalty research models. However, current research lacks a systematic review of the literature that provides a general conceptual framework on e-loyalty, which would help managers to understand their customers better, to take advantage of industry-related factors, and to improve their service quality. The present study is an attempt to critically synthesize results from multiple empirical studies on e-loyalty. Our findings illustrate that 62 instruments for measuring e-loyalty are currently in use, influenced predominantly by Zeithaml et al. (J Marketing. 1996;60(2):31-46) and Oliver (1997; Satisfaction: a behavioral perspective on the consumer. New York: McGraw Hill). Additionally, we propose a new general conceptual framework, which leads to antecedents dividing e-loyalty on the basis of the action of purchase into pre-purchase, during-purchase and after-purchase factors. To conclude, a number of managerial implementations are suggested in order to help marketing managers increase their customers’ e-loyalty by making crucial changes in each purchase stage
Linking consumer trust perception in constructing an e-commerce trust model
Trust issues is still considered as a main obstacle in the implementation of eCommerce Due to the increasing numbers of cyber crimes committed today, consumers are faced with doubt to engage in online shopping. As a safety precaution, consumers will take certain measures to protect their information by evaluating and assessing these websites trustworthiness before an actual purchase occurs. This paper describes a model that examines the elements related to online consumer behavior and to investigate this behavior towards building and increasing trust. The applicability of the model was tested in attempt to view consumers' acceptance towards the model and its component. The fmdings indicate the respondents are aware of the trust issue surrounding e-Commerce implementation as they accept and agreed with the model and its components
- …