The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to study factors influencing trust and purchase intention on the Internet, develop model of trust and purchase intention by empirical data, and analyze path of antecedents influencing purchase intention. This study identifies the factors proposed in the existing social commerce constructs: recommendation and referrals, rating and reviews, forums and communities, together with three...
This paper examines the impact of privacy, security, and trust (PST) on the Technology Acceptance Model (TAM) and Task-Technology Fit (TTF) model for consumers of e-commerce. The findings of this pilot study were drawn by designing a structural equation model (SEM) on the impact of privacy, security, and trust (PST) on TAM and TTF models for consumers of e-commerce. The population for this pilot study...
Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service...
Today, E-Commerce has become the largest revenue generation industry, letting seller sell everything from a pen to plane to the customers across the globe. Over an E-commerce platform where user and vendor merely interact with each other, the trust is undeniably the most important factor for users to perform transactions online. But at the same time it can't be assessed directly using some pre-defined...
Cloud computing has proved to be a viable model for delivering information technology services through the web. It provides users the ability to share distributed resources owned by a central service provider at minimal setup costs. However, due to its nature, existing and potential users of the cloud are more concerned about the integrity, security and privacy of their data, and also the ability...
Trust plays an important role in the development and profitability of users in mobile commerce systems. In order to estimate the amount of trust, the variety of trust management systems have been proposed and implemented. One of the main challenges facing these systems is the types of attacks that threaten them and their impact on trust evaluation. In this paper, we studied four important attacks...
Online review plays an important role when people are making decisions to purchase a product or service. It is shown that sellers can benefit from boosting their product review or downgrading their competitors' product review. Dishonest behavior on reviews can seriously affect both buyers and sellers. In this paper, we introduce a novel angle to detect dishonest reviews, called Equal Rating Opportunity...
Peer to peer (P2P) e-commerce applications exist at the edge of the Internet with vulnerabilities to passive and active attacks. These attacks have pushed away potential business firms and individuals whose aim is to get the best benefit in e-commerce with minimal losses. The attacks occur during interactions between the trading peers as a transaction takes place. In this paper, we propose how to...
Previous researches have revealed that the creation of synergy between retailers' channels can enhance customers' satisfaction and loyalty. Nevertheless, little is known about utilizing such synergy in inducing customers' purchasing behavior in electronic commerce. In an attempt to address this issue, few empirical studies have been conducted on the role of trust transference from brick to click channels...
Phishing is a type of electronic identity theft in which a combination of social engineering and website spoofing techniques is used to deceive a user into giving away confidential information with economic value. Phishing has flourished exponentially together with the expansion of the Internet. This flourish and the development of technology has not only benefitted Internet users, but also has enabled...
Building on Technology Acceptance Model, this paper aims to investigate the influence of perceived ease of use, perceived usefulness and trust on behavioral intention of social commerce users. The model is empirically tested using survey data collected from 220 social commerce users. Our results show that four measures (i.e., security, situational normality, vendor familiarity, structural assurance)...
Are trust and satisfaction important in consumers' electronic commerce acceptance procedure? What are the antecedents of trust and satisfaction in this context? How do trust and satisfaction affect the Internet consumer's purchasing decision? To answer these questions, we develop a theoretical framework describing the trust-satisfaction based decision-making process a consumer uses when making a purchase...
A major problem facing the full deployment of business-to-consumer (B2C) electronic commerce (e-commerce) is the development of trust on the side of the consumer, particularly in developing countries. Differing characteristics of local environments and their cultures have created a significant level of variation in the acceptance and trust to e-commerce and e-transactions. Exploring influencing factors...
This paper investigates the factors that influencing the adoption of ubiquitous commerce (u-commerce) focusing on users' trust in privacy and security. Specifically, a framework is developed to show the interrelationships among users' trust, privacy and security on the adoption of u-commerce. The precedent factors that affecting privacy and security are also analyzed, including technology familiarity,...
In a faceless business transaction such as in e-commerce, trust plays a major influence on a customer's decision making behavior. Trust on e-commerce is very much dependent on the information obtained from the vendors' websites. From our own personal experiences with e-commerce websites, it is not unusual to find some essential information missing. In this paper, we present to the readers our findings...
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on the budgeting of IT budgeting but also affect traditional security, trust and privacy mechanisms. Many of these...
Industrial adoption of cloud computing for collaborative business processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In this paper, we present...
Trust plays an important role in the development, implementation and operation of e-commerce systems. This paper Analyzes the current research of e-commerce trust model and research method, proposes a formal model of e-commerce trust management based on reputation, disccusses the various issues involved and their solution ideas, which gives a good foundation for further research.
This study attempted to investigate the determinants that affecting current Internet shoppers' intention to continually purchase online in one of biggest states in Malaysia. A total of 150 respondents were selected form Johor state, Malaysia and the questionnaires were being personally distributed to the respondents. The data collected is analyzed by statistical methods, such as mean analysis, Pearson...
It has become apparent to researchers that traditional approaches are not sufficient to foster trust for today's pervasive online businesses. Individuals and businesses are adopting e-commerce as means of resources, improvements and generating revenue. As online transaction increase, it is important to understand why users still reserved on conducting business online. This research aims to overcome...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.