21 research outputs found

    Analysis of models for e-commerce adoption factors in developing countries

    Get PDF
    Small and Medium-sized Enterprises (SMEs) have a considerable role in most developing countries because they are able to develop and improve the economy. Whereas e-commerce is also a vital subject in the field of research, where they offer significant benefits for these countries. However, the adoption of e-commerce in developing countries by SMEs is low due to several factors, including the lack of a suitable model for the adoption of e-commerce. Therefore, some of the most widely used models for the adoption of e-commerce in developing countries were highlighted, which were Technology Acceptance Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT) established by Molla and Licker (2005), Technology Organisation Environment (TOE) Integration of TOE and TAM, Perceived eReadiness Model (PERM) and E-commerce Success Factors. The exploratory research was conducted in this study. Finally, some recommendations were reached that may give the researchers a better understanding of the adoption of e-commerce in developing countries which they have not yet started using e-commerce

    A systematic review of approaches to assessing cyber security awareness

    Get PDF
    Purpose – The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness assessment research which warrants the future work. Design/methodology/approach – The authors used a systematic literature review technique to search the relevant online databases by using pre-defined keywords. The authors limited the search to retrieve only English language academic articles published from 2005 to 2014. Relevant information was extracted from the retrieved articles, and the ensuing discussion centres on providing the answers to the research questions. Findings – From the online searches, 23 studies that matched the search criteria were retrieved, and the information extracted from each study includes the authors, publication year, assessment method used, target audiences, coverage of assessment and assessment goals. Originality/value – The review of the retrieved articles indicates that no previous research was conducted in the assessment of the cybersecurity awareness using a programme evaluation technique. It was also found that few studies focused on youngsters and on the issue of safeguarding personal information

    Re-cosmetic: a mobile system for cosmetic consumers

    Get PDF
    In this day and age, the demand for cosmetics has escalated which means a lot of cosmetics containers have been produced. In conjunction with this, inappropriate cosmetic waste disposal has contributed to more plastic waste which takes many years to decompose. Hence, this project which includes the development of a mobile application system namely ‘Re-cosmetic’ is dedicated to responding to the Sustainable Development Goal 12 mission statement which is to ensure sustainable consumption and production patterns. This project involves literature review based on the existing systems, the analysis and design of the pre-production of system development, documentation on User Acceptance Test as well as overall conclusion from this project. The main features of this system include the recycle processor, newsfeed, point transfer and rewarding,cashback system as well as reminder. This system is developed using React Native, Visual Studio Code and Firebase

    Exploring staff perception of InfoSec policy compliance: Palestine Universities empirical study

    Get PDF
    There is worldwide recognition of the problems associated with insider threats, intentional and unintentional; One of the significant issues in mitigating InfoSec risks is Staff compliance intention of InfoSec policies (ISP"s). The study purpose seeks to understand and explore Staff compliance intention of ISP"s based on how Staff perceive several factors adopted from multi-Theories from ISP"s research. Such as Sanction from General Deterrence Theory, Rewards as extrinsic motivation, Coping Appraisal from Protection Motivation Theory, and, Information Reinforcement that constitute the theoretical model. In the context of Palestine universities, the research Model first part constitutes the understanding of Staff awareness of ISP"s based on four selected Policy-Focused Areas (PFA) from SANS 2014. Moreover, to assess this knowledge to reflect on the multi-Theory perception factors effects on Staff compliance intention. Furthermore, to investigated Staff SETA to assess how universities value their Staff knowledge on ISP"s. The research Methodology explores the problem empirically using descriptive analysis research design such as summaries and regression analysis. The study has 600 datasets collected from six universities by the developed research quantitative instrument. The findings show that Staff value the importance of the model factors in promoting Staff compliance intention. Staff have some awareness of PFA"s and SETA needs extra attention. The Practical implications for creating ISP compliance among university Staff by drawing on their perception of factors adopted from multi-Theories. Consequently, as for the organisation, effective SETA programs to sustain the effort of Staff compliance intention of ISP"s. Meanwhile, this study seeks to assert that ISP"s compliance is the responsibility of all academic and administrative Staff from all department and as a paradigm for other employees. The research covers ISP perception among Palestine Staff, and the expected outcome includes-A novel theoretical contribution model with six significantly contributing factors. Also, PFA in the context of Palestine contributes as a methodological contribution and Staff SETA as practical research contribution. © 2019 IEEE

    Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim

    Get PDF
    Youngsters aged 12 to 19 years old are among the highest number of Internet users in Malaysia. Characteristically, they have a high degree of enthusiasm. They tend to overshare information, and perceive everything on the Internet as the truth. They also lack security knowledge on how to protect their personal data, do not restrict themselves from sharing it on the Internet. Thus, efforts have been made in Malaysia to educate youngsters regarding the importance of protecting personal data. However, the current cybersecurity awareness module posed few challenges such as on understanding, acceptance of message and effective ways of giving awareness which require an assessment to be conducted. A literature review was thoroughly conducted to justify the lacking elements on assessment of cybersecurity awareness programs, and found that there is little attempt to use program evaluation technique, a lack of focus on youngsters and a lack of assessment on the understanding of personal data protection. Based on the aforementioned limitations, this study aims to identify the assessment criteria’s for cybersecurity awareness program based on theories and component of personal data protection, to propose the assessment framework for cybersecurity awareness program, to employ and verify the proposed assessment framework for assessing cybersecurity awareness program among youngsters. This study used a mixed method research design, where the data collections were conducted over four distinct in sequential phases. In Phase 1, a survey of 384 youngsters was conducted. In Phase 2, a pre-test and post-test survey was conducted on 397 and 391 youngsters respectively. In Phase 3, three focus group interviews were conducted. Finally, in Phase 4, observation of web recording was conducted using Camtasia Studio to record the youngsters’ online activities. Phase 3 and 4 were made up of 12 youngsters divided into 3 focus groups. All were held at two OUTREACH CyberSAFE programs conducted by Cybersecurity Malaysia. Firstly, at Bahagian Teknologi Pendidikan Negeri Johor which involved youngsters from all over Malaysia, and secondly at Sekolah Seri Puteri Kuala Lumpur. Analyses were done using SPSS and thematic analysis. The findings show that the current module has a positive degree of favourability in terms of the youngsters’ reaction and raised their knowledge and skills on personal data protection. Besides, this study also proposed four effective ways to enhance the current module of cybersecurity awareness. This includes the element of decision making in using personal data, the management of online applications, online content, usernames and passwords. From the theoretical contributions perspective, this study identified assessment criteria’s based on ARCS Model of Motivational Design Theory, SLT and TRA that used to nominate Kirkpatrick’s Four Learning Evaluation Model that used as the assessment guideline. From the practical contribution perspective, this study facilitates stakeholders such as Cybersecurity Malaysia, parents and school management to decide for a better module to convey the message on personal data protection

    Cancer prediction system: Cancer Vision

    No full text
    This project involves evaluating and designing a cancer prediction system to assist people who are health-conscious and suspect they are experiencing cancer symptoms. The main goal of this project is to assist users in predicting cancer early on before it progresses to a life-threatening level. Cancer Vision gives information about various cancer types that every user should be aware of. This system will predict cancer when users will input their symptoms and on the basis of those symptoms, the system will apply the decision tree technique i.e, it will run the results based on decisions by checking the answers of the user. Cancer Vision's results will display whether the user has a probability of getting cancer, the type of cancer, the status (positive or negative), and a test recommendation. In addition, if the user requires consultation or information on hospitals and doctors, this system can help. Visual studio code, laravel, and js node are being used to develop this system

    Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: An assessment

    No full text
    Cybersecurity awareness program has been used as a medium to educate and make awareness among youngsters on personal data protection. However, it is still unclear the extent to which the effectiveness of this cybersecurity awareness program among youngsters require an assessment. This to ensure the current content of cybersecurity awareness program is consistently updated and aligned with current Internet usage among youngsters. Our assessment was systematically conducted using Kirkpatrick's Four Learning Evaluation Model as conceptual framework; which consists of four phases of sequential assessment; Phase 1 -Reaction, Phase 2- Learning, Phase 3 - Behavior and Phase 4-Result. This study used mixed method research methodology in conducting the assessment and the instruments used in Phases 1 until 4 respectively were survey, pre-test and post-test survey, observation of web recording and focus group interview. The findings from this study revealed that youngsters do have positive reaction towards the program content, reported to have changes in terms of their knowledge and skills and practice of desired behavior on personal data protection. However, the undesired behavior also revealed practiced among youngsters and this suggest improvement required to the current module used to educate youngsters. The improvements include i) Decision making process in using personal data, ii) Management of online application iii)Management of online contents iv)Management of password and username. The result of this assessment is significant to the stakeholders in terms of providing insight into the effectiveness level of current module used to educate youngsters and assist them to decide better module. © 2019, Faculty of Computer Science and Information Technology

    Factors Influencing the adoption of e-commerce by small and medium-sized enterprises (SMEs) in Algeria: a qualitative study

    No full text
    Small and Medium sized Enterprises (SMEs) are regarded as the engine of the growth of the world economy. They had recently experienced rapid growth and improved their business activities in terms of customers’ number and revenue expansion when they began to embrace e-commerce and started using it in their business. However, although there is a growing interest in e-commerce, its use is still insufficient in Algeria. Therefore, this study aimed to identify the factors that influencethe adoption of e-commerce by SMEs in Algeria. This study adopts a qualitative methodology which involves in-depth, structured interviews to identify the factors that affect SMEs for the adoption of e-commerce in Algeria. The result of research found the main factors hindering the adoption of e-commerce by SMEs in Algeria are the e-payment methods, non-readiness of banks, lack of legal protection and lack in awareness of the benefits of e-commerce, as well as fear of risks. However, some other elements areless significant to influence the adoption of e-commerce. These research findings will give an addition in terms of bringing and giving a chance to the SMEs' leaders and the Algerian economic officials and a clear view of e-commerce practices. This can help them to design a strategy to remove barriers tactfully to its advantage

    FamLogger: the development of keylogger tools for parental online monitoring

    No full text
    Abstract—Recent advances in the Internet have brought about many benefits, but they have also created a number of major problems, particularly for children. One of the most pressing issues is the exposure of children to inappropriate content, such as cyberbullying, online grooming, phishing, and explicit material. This problem is exacerbated by the fact that children are often alone and unsupervised while using the Internet, making it difficult for parents to monitor their online activity. In order to address this issue, a developer has proposed the creation of FamLogger, a keylogger system that would allow parents to monitor their chil-dren's online activity from anywhere in the home. The system is designed to provide parents with real-time updates on their children's online activity, including the websites they visit, the apps they use, and the messages they send. To ensure that the system meets the needs of parents and children alike, a survey has been conducted to gather feedback and requirements for the system. The survey results are used to improve the quality of the system and make it more user-friendly for parents. FamLogger can help parents monitor their children's activity from anywhere in the home, providing them with peace of mind and giving them the ability to intervene if necessary
    corecore