2,093 research outputs found

    The Use of Firewalls in an Academic Environment

    No full text

    Role of Social Commerce Forums in Establishing Purchase Intention: A Nexus Between Credibility, Trust and E-Commerce Satisfaction

    Get PDF
    Social media is persuading to consumers in field of social commerce (S-Commerce) by providing goods or services and fulfill their demands in a very short period of time. Electronic-satisfaction (e-satisfaction) and credibility have distinctive activities of social media that motivate and successively build the trust at various stages of purchase intentions. For better understanding it is necessary to recognize the factors of social commerce such as referrals, reviews & ratings because they have a strong influence on buying behaviour of ecommerce consumers. A quantitative and descriptive approach has been projected through simple random sampling. A cross-sectional data of 250 participants were collected by a survey questionnaire from social commerce users examined through Partial Least Square- Structural Educational Modeling-3 (PLS-SEM-3). A social support theory has supported relationship on trust through social media activities, surface credibility, and presumedcredibility as well as e-commerce satisfaction. Interestingly trust, surface and presumed credibility considerably significant impact on e-commerce and social commerce satisfaction that leads to develop purchase intention. The current study theoretically contributes novel indicator, presumed credibility in the social commerce industry and practically it promotes specific websites that triggers trust

    Enhancing AIS to Improve Whale-Ship Collision Avoidance and Maritime Security

    Get PDF
    Whale-ship strikes are of growing worldwide concern due to the steady growth of commercial shipping. Improving the current situation involves the creation of a communication capability allowing whale position information to be estimated and exchanged among vessels and other observation assets. An early example of such a system has been implemented for the shipping lane approaches to the harbor of Boston, Massachusetts where ship traffic transits areas of the Stellwagen Bank National Marine Sanctuary frequently used by whales. It uses the Automated Identification Systems (AIS) technology, currently required for larger vessels but becoming more common in all classes of vessels. However, we believe the default mode of AIS operation will be inadequate to meet the long-term needs of whale-ship collision avoidance, and will likewise fall short of meeting other current and future marine safety and security communication needs. This paper explores the emerging safety and security needs for vessel communications, and considers the consequences of a communication framework supporting asynchronous messaging that can be used to enhance the basic AIS capability. The options we analyze can be pursued within the AIS standardization process, or independently developed with attention to compatibility with existing AIS systems. Examples are discussed for minimizing ship interactions with Humpback Whales and endangered North Atlantic Right Whales on the east coast, and North Pacific Right Whales, Bowhead Whales, Humpback Whales, Blue Whales and Beluga Whales in west coast, Alaskan and Hawaiian waters

    Summary care record early adopter programme: an independent evaluation by University College London.

    Get PDF
    Benefits The main potential benefit of the SCR is considered to be in emergency and unscheduled care settings, especially for people who are unconscious, confused, unsure of their medical details, or unable to communicate effectively in English. Other benefits may include improved efficiency of care and avoidance of hospital admission, but it is too early for potential benefits to be verified or quantified. Progress As of end April 2008, the SCR of 153,188 patients in the first two Early Adopter sites (Bolton and Bury) had been created. A total of 614,052 patients in four Early Adopter sites had been sent a letter informing them of the programme and their choices for opting out of having a SCR. Staff attitudes and usage The evaluation found that many NHS staff in Early Adopter sites (which had been selected partly for their keenness to innovate in ICT) were enthusiastic about the SCR and keen to see it up and running, but a significant minority of GPs had chosen not to participate in the programme and others had deferred participation until data quality improvement work was completed. Whilst 80 per cent of patients interviewed were either positive about the idea of having a SCR or ?did not mind?, others were strongly opposed ?on principle?. Staff who had attempted to use the SCR when caring for patients felt that the current version was technically immature (describing it as ?clunky? and ?complicated?), and were looking forward to a more definitive version of the technology. A comparable technology (the Emergency Care Summary) introduced in Scotland two years ago is now working well, and over a million records have been accessed in emergency and out-of-hours care. Patient attitudes and awareness Having a SCR is optional (people may opt out if they wish, though fewer than one per cent of people in Early Adopter sites have done so) and technical security is said to be high via a system of password protection and strict access controls. Nevertheless, the evaluation showed that recent stories about data loss by government and NHS organisations had raised concerns amongst both staff and patients that human fallibility could potentially jeopardise the operational security of the system. Despite an extensive information programme to inform the public in Early Adopter sites about the SCR, many patients interviewed by the UCL team were not aware of the programme at all. This raises important questions about the ethics of an ?implied consent? model for creating the SCR. The evaluation recommended that the developers of the SCR should consider a model in which the patient is asked for ?consent to view? whenever a member of staff wishes to access their record. Not a single patient interviewed in the evaluation was confident that the SCR would be 100 per cent secure, but they were philosophical about the risks of security breaches. Typically, people said that the potential benefit of a doctor having access to key medical details in an emergency outweighed the small but real risk of data loss due to human or technical error. Even patients whose medical record contained potentially sensitive data such as mental health problems, HIV or drug use were often (though not always) keen to have a SCR and generally trusted NHS staff to treat sensitive data appropriately. However, they and many other NHS patients wanted to be able to control which staff members were allowed to access their record at the point of care. Some doctors, nurses and receptionists, it seems, are trusted to view a person?s SCR, whereas others are not, and this is a decision which patients would like to make in real time

    Fixing What’s Broken: The Outdated Guidelines of the SCA and Its Application to Modern Information Platforms

    Get PDF
    In 1986, Congress enacted the Electronic Communications Privacy Act (ECPA) to afford privacy protections to electronic communications and it has not changed since its inception. The ECPA has proven problematic as technology has advanced, but Congress has not modified the law to reflect this change. Courts have struggled to apply the law to both old technologies that have been updated and new technologies that have emerged. The ECPA needs to be revised to reflect the new advances in technology or be repealed and replaced with a new approach. This will ensure that consumer data will be safeguarded while in the hands of data provider companies

    The Study of Crowdsourcing in Knowledge Management: The Role of Employees\u27 Innovative Behavior on Job Performance

    Get PDF
    Employees are a main source of innovative ideas via their insights on companies’ products, processes, customers, and competitors. Enterprise crowdsourcing systems (ECSs) are used to collect, refine, and realize ideas. However, only a small percentage of employees submit ideas – about 7.7% at Pfizer, 2% at HCL Technologies, and 3% at Polaris Industries. Why is employee participation low? More specifically, what factors can lead employees to actively use ECS to submit and share their innovative ideas for improving their job performance? In this research, we used a multi-actor dyadic survey to survey 183 employees and their managers and conducted data analysis to understand the impact of ECS factors on employees’ job performance. Partial Least Squares (PLS) approach using Smart PLS was used to test both the measurement and structural models, and the results lend support for the proposed research model. The findings of the study confirm that knowledge sharing and employees’ cognitive features have a positive effect on effective knowledge application (EKA), and in turn, EKA increases employees’ ECS satisfaction, innovative behavior, and job performance. The study also confirmed that employees’ ECS satisfaction and innovative behavior have a positive effect on their job performance. The findings of this study can help organizations refine their ECSs and innovation initiatives to increase employees’ participation, innovative behavior, and job performance by enabling and supporting knowledge sharing among them, and implementing ECS with a solid, reward system meeting employees’ intrinsic and extrinsic motivational factors

    Global Risk Leadership and Resilience: A US/India Information Technology Start-up Case Study

    Get PDF
    Globalization can take many forms. In the case of a technology start-up firm operating across cultures, it could be said that its world is fundamentally global. More properly stated, E-commerce Start-up (ECS) operates within a global high-tech network and thus finds itself to be competing within (and outside of) a highly interconnected system of data, commerce, and emerging economies as a service provider to some of the United States’ most recognized brands. This interconnectivity serves as a central fact for the IT firms and its risk management efforts. Beyond the obvious exposure to global risks, how does operating across cultures affect risk management and risk leadership practices within ECS? The evolutionary story of ECS, from launch to acquisition, and the analysis of four scenarios presented in this case provide insights into the challenges facing operating organizations and the risk leadership capabilities needed to recover from internal and external threats
    • …
    corecore