The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study integrates Technology Acceptance Model (TAM) and flow theory to explore the relationship among online consumers' internal and external perceptive factors, and intention to return. This study examines the online consumers from Taiwan's biggest B to C website, and questionnaire-based empirical study is used to collect data. There are 1254 valid surveys and structure equation model (SEM) is...
The rapid development of the Internet has brought an opportunity for the development for enterprises. Web mining in the status of e-commerce Websites have became more and more important. In the e-commerce, the data mining is helpful of the discovery to trade development tendency, of the correct decision-making made by the enterprise. This article mainly summarizes the present electronic commerce's...
The insufficiency of consumer's trust is one of bottlenecks to China online shopping, and now most Web sites resort to the renowned third party or trust displaying mechanism to promoting consumer's trust. However, whether the two kinds of trust promotion strategies above have the same effect? And whether their own attributes and assurance contents have the significant influence on consumer's trust?...
From Web 1.0 to Web 2.0, the development of Internet technology makes the existing value of Web sites has revolutionary change. How to provide suitable service platform for human-machine interaction through Websites is the subject of debate that many technology developers and users concern about nowadays. This study uses Unified Theory of Acceptance and Use of Technology (UTAUT) as the foundation,...
In this paper, e-commerce, related concept of data mining technologies and the realization process of data mining techniques are described. Combine data mining and guide features of e-shopping site, study intelligent shopping guide system based on data mining. Use data mining technology to guide customers to buy goods or to provide recommendations in order to provide higher quality services. Take...
Web 2.0 is a new Internet platform that allows users to build personalized content through participation and sharing. The technologies used and business opportunities brought by this new platform have impacted many conventional Websites. This paper aims to explore the relationships among constructs in Technology Acceptance Model 2 (TAM 2) and survey the general userspsila acceptance of Web 2.0 Websites...
The increasing popularity of the Internet in China has created great challenges and opportunities for various business sectors. The banking industry is no exception. To sustain business competitiveness, more and more financial institutions are providing Internet banking services. Thus, there is a need for research to investigate the way in which Internet banking site features ultimately influence...
From the perspective of social influence, this study developed an integrated model to explain different roles of social referents in an individual's e-commerce adoption based on theory of planned behavior (TPB) and trust relative theories. On basis of available research, online consumers' social referents were divided into three types: interpersonal norm, social norm of subjective norm and external...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.