337 research outputs found

    An Empirical Study on Factors Influencing Consumers’ Trust in E-Commerce

    Get PDF
    In today's business scenario Internet is one of the key contributors in the globalization of markets which have become one of the main sources of capital flows to emerging economies. Internet technology has adopted for various application like E-governance, E-Procurement and E-commerce. E-Commerce has many advantages such as efficiency and flexibility but also disadvantages such as threat, security and fraud. In General Context, the consumer prefers to purchase the product through physical location rather than through E-Commerce. As the approach is based on the trust, there is a need to identify and analyze the factors such as security, privacy and familiarities that are affecting the trust in electronic transactions. Further, this paper provides an overview of role of trust in e-commerce and attempts to answer the questions such as how the trust can be established between the consumer and online vendor so they can purchase the product through E-commerce. In addition, the finding suggests that perceived security of E- transaction on trust is intervened by perceived privacy and perceived familiarities, and consumer’s trust in E- transaction is considerably related with the reliability of E- vendors. Also consumer’s trust is negatively related with perceived risks in E- transactions. However, there is no important impact from perceived privacy, security and familiarities to the trust in E- transactions. Keywords: WWW- World Wide Web,Trust, E-Commerce,

    Design and Implementation of Distributed Databases for Improving Law Enforcement in Developing Countries

    Get PDF
    Huge populations and low per capita incomes are the norm in developing countries. Apart from the other impacts, these two features make law enforcement in developing countries a colossal task. The absence of databases on citizens - their credit histories and felony records, is a serious impediment to normal Government activity and regulation. This lack of control can have serious consequences, domestic and international, if not checked immediately. In this paper, we propose that the rapid advance in telecommunications and computer technologies could be used very effectively in creating infrastructures in developing countries to improve the enforcement of law and order

    A Comparative Analysis of E-Commerce Governance Mechanisms

    Get PDF
    This research-in-progress compares the effectiveness of various governance mechanisms used by organizations to implement e-commerce initiatives. The research uses economic theories to develop refutable hypotheses regarding the different governance mechanisms. The hypotheses will be tested using an event-study methodology

    Choice of Information: A Study of Twitter News Sharing during the 2009 Israel-Gaza Conflict

    Get PDF
    The study explores determinants of the prominence of public information sources in Twitter. Twitter users are conceptualized as the “gated” who play an active role in selecting and distributing news sources through their Twitter messages. Using Twitter data on the Israel-Gaza conflict, the study identifies three determinants that characterize information sources: whether they are produced by mainstream media, whether they are filtered through aggregator services, and the number of in-links to the source media generated by the online public

    Identifying Implementation Bugs in Machine Learning based Image Classifiers using Metamorphic Testing

    Full text link
    We have recently witnessed tremendous success of Machine Learning (ML) in practical applications. Computer vision, speech recognition and language translation have all seen a near human level performance. We expect, in the near future, most business applications will have some form of ML. However, testing such applications is extremely challenging and would be very expensive if we follow today's methodologies. In this work, we present an articulation of the challenges in testing ML based applications. We then present our solution approach, based on the concept of Metamorphic Testing, which aims to identify implementation bugs in ML based image classifiers. We have developed metamorphic relations for an application based on Support Vector Machine and a Deep Learning based application. Empirical validation showed that our approach was able to catch 71% of the implementation bugs in the ML applications.Comment: Published at 27th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2018

    Rosuvastatin induced gynecomastia: a rare presentation of newer statin

    Get PDF
    Gynecomastia is a common benign disease characterized by the progressive enlargement of the glandular tissue of the male breast. The etiology may vary and may be physiological, pharmacological, pathological, or even idiopathic. Among men, drug induced gynecomastia may account for 10-20% of cases. Several case reports have associated this condition to the use of statins. However, there are few case reports of rosuvastatin induced gynecomastia have been reported in literature. We describe a 45-year-old male who developed bilateral gynecomastia after one month of rosuvastatin therapy, after switching to a different or less potent statin (atorvastatin), his symptoms resolved with-in one month. Use of the Naranjo adverse drug reaction probability scale indicated a possible relationship between the patient’s development of gynecomastia and rosuvastatin therapy
    • …
    corecore