771 research outputs found

    The Online Consumer Trust Construct: A Web Merchant Practitioner Perspective

    Get PDF
    If companies are to enjoy long-term success in the Internet marketplace, they must effectively manage the complex, multidimensional process of building online consumer trust. eMerchants must understand the characteristics of web interfaces, policies, and procedures that promote trust and enact this knowledge in the form of specific trust-building mechanisms. Therefore, eMerchants must exercise a variety of trust-building techniques in the design of their online consumer interface as well as the principles upon which they operate. In doing so, eMerchants look to a variety of sources, outside the discussions available in academic literature, which influence and govern their perception of online consumer trust development. The purpose of this paper is to identify these sources and leverage the theoretical framework of previous academic literature by incorporating these practitioner sources into a framework from which future research efforts of online consumer trust can be based

    Implementation of marker-assisted selection for lodging resistance in pea breeding

    Get PDF
    Non-Peer ReviewedLodging resistance is a key criterion in pea breeding programs. In traditional breeding, a large number of lines are discarded in F3 or later generations, because of susceptibility to lodging and much labor and other costs are wasted. Implementation of selection using molecular markers for lodging resistance at earlier generations will significantly enhance the efficiency of the pea breeding process. Ten F2 populations consisting of a total of 869 plants were grown in the field in Saskatoon in the summer of 2002. These 10 populations were derived from crosses between the lodging susceptible variety Carrera, crossed with ten other lodging resistant lines. DNA samples were extracted from each individual plant. Each plant was scored for the presence of coupling phase linked SCAR markers A001 and A002, as well as a repulsion phase linked SCAR marker A004. The results showed that the frequency of marker presence is similar to the estimated frequency, obeying the rule of independent single gene segregation. Chi-Square analysis showed that the combination of A001 and A004 markers also followed a two gene model (P>0.05) in 8 populations. Due to linkage between A001 and A002 markers, population No. 3 and No. 4 did not follow the two or three independent gene segregation model. F3 populations will be planted in the field in 2003 to evaluate the effectiveness of Marker Assist Selection for lodging resistance in pea

    Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research

    Get PDF
    Organizations increasingly use fear appeals to motivate users to engage in behaviors that protect information security. Though academic interest in the topic has burgeoned, prior research has mainly focused on providing process evidence on how low- and high-threat security messages influence protective behaviors. According to protection motivation theory, however, the threat-appraisal phase, in which the receiver evaluates whether a fear appeal is threatening or not, follows exposure to the fear appeal. One can indeed design fear appeals to manipulate different dimensions, including the threat depicted and the coping response provided. These dimensions, in turn, influence protection motivation. The general focus on low- and high-threat messages runs the risks of 1) foregoing key theoretical insights that can stem from specific message manipulations and 2) inadvertently introducing message confounds. To address this issue, we introduce construal-level theory as the theoretical lens to design and identify potential confounds in fear-appeal manipulations. We further discuss how researchers can seamlessly integrate construal-level theory into information security studies based on protection motivation theory. Our work has important theoretical and methodological implications for IS security researchers

    The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance

    Get PDF
    Organizational leaders seek to establish a safe information environment, including perimeter controls against external threats and also internal controls to monitor for intentional or accidental internal threats. Are individuals who are more oriented toward individualistic perceptions more likely to reject or resent the use of such controls designed to facilitate organizational security? A related question is whether national culture, specifically the cultural environment within East Asian countries such as China, may promote a predominance of individuals who are more oriented toward collectivist or allocentric perceptions such that they may be more willing to relinquish some degree of individual privacy in order to increase overall organizational security. A large sample of working professionals in the insurance and other industries will be surveyed in China and in the United States to address these research questions, and the results will be presented and discussed at the conference

    Issues in Mobile E-Commerce

    Get PDF
    Though many companies are still just beginning to grasp the potential uses and impacts of the Web and e-commerce, advances in technologies and their application continue. These advances often present various managerial and technological issues for individuals, companies, governments, and other entities. One significant area of technological advancement is the development of mobile e-commerce, which encompasses interactive business activities and processes related to a (potential) commercial transaction conducted through communications networks that interface with wireless devices. These systems provide the potential for organizations and users to perform various commerce-related tasks without regard to time and location (anytime from anywhere). This emerging mobile e-commerce environment presents a new set of issues. This paper identifies and categorizes some of these issues so that researchers, developers, and managers have a starting point for focusing their activities within the emerging m-commerce domain. Our examination finds categories that include technological (both client and infrastructure) issues, application issues, and areas for future research

    A Broader View of Perceived Risk during Internet Transactions

    Get PDF
    Ubiquitous networking facilitates Internet access across multiple network environments, whose value is tied directly to user perceptions of its ability to securely execute transactions. Prior research has cited awareness, trust, and risk as critical determinants of adoption but has failed to examine these factors as they relate to infrastructure and its provider. Because information in transit is at risk from a network environment’s vulnerabilities, we focus on the implications of such risk on Internet activities. We examine the multiple parties that must be trusted to complete and facilitate an online transaction. We propose that the user must trust not only the information recipient to act benevolently but also the technologies and organizations that facilitate the online exchange

    Parental child-feeding practices at 4 years of age are associated with dietary patterns of 7-year-olds

    Get PDF
    BackgroundParental child-feeding practices have been associated with child body mass index (BMI) and specific food group consumption; however, their role in the development of dietary patterns is less understood. We aim to study the association between parental child-feeding practices at 4 years old and dietary patterns at 7 years that explain BMI z-scores at age 10. MethodsParticipants were children from the Generation XXI birth cohort (n = 3272). Three patterns of feeding practices at 4 years were previously identified: 'Perceived monitoring', 'Restriction' and 'Pressure to eat'. At 7 years, two dietary patterns were derived: 'Energy-dense foods', higher consumption of energy-dense foods and drinks and processed meats and lower consumption of vegetable soup (significantly associated with BMI z-scores at 10 years) and 'Fish-based', higher in fishery intake and lower in energy-dense food intake. Associations were estimated by linear regression models, adjusted for potential confounders (mother's age, education and pre-pregnancy BMI). ResultsGirls whose parents used more Restriction, Perceived monitoring and Pressure to eat at 4 years were less likely to follow the 'Energy-dense foods' dietary pattern at 7 years (beta = -0.082; 95% confidence intervals [CI]: -0.134; -0.029; beta = -0.093; 95% CI: -0.146; -0.039; beta = -0.079; 95% CI: -0.135; -0.04, respectively). In both sexes, children whose parents used more Restriction and Perceived monitoring at 4 years were more likely to follow the 'Fish-based' dietary pattern at 7 years (girls: beta = 0.143; 95% CI: 0.077; 0.210; beta = 0.079; 95% CI: 0.011; 0.148; boys: beta = 0.157; 95% CI: 0.090; 0.224; beta = 0.104; 95% CI: 0.041; 0.168). ConclusionsChildren whose parents used more Restriction and Perceived monitoring at preschool age were more likely to follow healthier dietary patterns at age 7.Fundacao para a Ciencia e a Tecnologi

    Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination

    Get PDF
    Information security management programs have long included “fear appeals”, managerial communiqués designed to promote secure behaviors among organizational insiders. However, recent research has found a conflict between the predictions of contemporary fear appeal theory for how we expect individuals to experience fear appeals and what actually occurs in IS security situations. Using the opportunity presented by neuroimaging tools to examine cognitive and affective reactions to fear appeals, we take a comparative look at the contentions of fear appeal theory and the realities of what insiders experience neurologically when exposed to ecologically relevant IS security fear appeals. Our fMRI results suggest that fear appeals elicit threat and threat response assessments, which partially supports fear appeal theory but does not support the presence of an actual fear response. Furthermore, appraisals of recommended threat responses had a stronger impact on intentions to enact security behaviors than appraisals of the threat itself, which suggests that a focus on threats might be misplaced. Instead, focusing on ways to make the responses to the threats more appealing to users might work better. These controversial findings suggest future research that should explore how fear appeals play out in IS security and in what ways

    IgG-class anti-PF4/heparin antibodies and symptomatic DVT in orthopedic surgery patients receiving different anti-thromboembolic prophylaxis therapeutics

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Heparin-induced thrombocytopenia (HIT) is a thromboembolic complication that can occur with unfractionated heparin (UFH) or low molecular weight heparin (LMWH). Our objective was to determine and compare the incidence of IgG-class HIT antibodies in patients undergoing total hip arthroplasty (THA) or total knee arthroplasty (TKA) with different antithrombotic prophylaxis therapies and their contributions to the occurrence of venous thromboembolism (VTE).</p> <p>Methods</p> <p>A prospective observational study was performed for 374 Japanese patients undergoing THA or TKA to determine the incidence of VTE. IgG-class anti-PF4/heparin antibodies were measured using IgG-specific EIA before and after the operation.</p> <p>Results</p> <p>In the clinical outcome, the incidence of symptomatic deep vein thrombosis (DVT) was 15.0% (56/374, TKA; 35, THA; 21) and pulmonary emboli (PE) were not observed. The total seroconversion incidence of IgG-class PF4/heparin antibodies was 19.8% (74/374). The seroconversion incidence of IgG-class PF4/heparin antibodies was higher in patients receiving UFH (32.7%) compared to those receiving LMWH (9.5%) or fondaparinux (14.8%). Furthermore, the seroconversion incidence was significantly higher in patients undergoing TKA compared to those undergoing THA. Based on multivariate analysis, seroconversion of the IgG-class PF4/heparin antibodies was independent a risk factor for symptomatic DVT.</p> <p>Conclusion</p> <p>Our findings show that the seroconversion of IgG-class anti-PF4/heparin antibodies differed with various anti-thrombotic prophylaxis therapeutics and was associated with the risk of DVT in a subset of patients undergoing total joint arthroplasty (TKA and THA).</p
    corecore