Search results

1 – 10 of 32
Article
Publication date: 1 December 1999

S.M. Furnell and T. Karweni

Examines the general requirement for security technologies in order to provide a basis for trust in the e‐commerce environment. The discussion is supported by the findings from…

7748

Abstract

Examines the general requirement for security technologies in order to provide a basis for trust in the e‐commerce environment. The discussion is supported by the findings from two surveys, conducted by the authors, among general Internet users (i.e. potential target consumers) and commercial businesses. These surveys considered both the attitudes to e‐commerce in general and opinions relating to the associated security requirements. Attempts were also made to assess the respondent’s knowledge of the existing security safeguards that may be applied. The survey results suggest that, while there is significant concern among Internet‐based consumers regarding the security of their purchasing activities, these are outweighed by the merits offered by the medium. The results also suggested a lack of awareness or understanding of the security technologies that are available and it is concluded that overcoming this problem would help to establish a wider foundation of trust in the new technology.

Details

Internet Research, vol. 9 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 January 2004

Riyad Eid and Myfanwy Trueman

Business‐to‐business international Internet marketing is one of the key drivers in sustaining an organisation’s competitive advantage. The challenge for organisations today is to…

7337

Abstract

Business‐to‐business international Internet marketing is one of the key drivers in sustaining an organisation’s competitive advantage. The challenge for organisations today is to understand the factors that play a critical role in utilising Internet capabilities and their implications on business strategic objectives to enable them to compete successfully in the electronic age. Proposes 33 critical factors classified into five categories and validated empirically through a sample of 123 UK companies. Discusses the significance, importance and implications for each category and makes recommendations.

Details

Industrial Management & Data Systems, vol. 104 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 June 2001

S.M. Furnell and T. Karweni

This paper considers the issue of security in the provision of online distance learning. Security represents an aspect that may not suggest itself as a high priority in an…

Abstract

This paper considers the issue of security in the provision of online distance learning. Security represents an aspect that may not suggest itself as a high priority in an educational environment, but evidence indicates that it is definitely required. The discussion presents an overview of the key security requirements and the main technical elements needed to address them.

Details

VINE, vol. 31 no. 2
Type: Research Article
ISSN: 0305-5728

Article
Publication date: 1 March 2003

Jayoung Choi and Kyu‐Hye Lee

The purpose of this study is to examine first, whether there are differences in risk perception between the USA and Korea, second, whether there are differences in risk perception…

6274

Abstract

The purpose of this study is to examine first, whether there are differences in risk perception between the USA and Korea, second, whether there are differences in risk perception between apparel purchasers and non‐apparel purchasers across countries, third whether there are differences in the effect of risk factors on purchasing intention between the USA and Korea, and, fourth, whether there are differences in the effect of risk factors on purchasing intention between apparel purchasers and non‐apparel purchasers across countries. The findings suggest that there were differences in consumers’ risk perception between apparel and non‐apparel purchasers across countries. In addition, there are similarities and differences in the relationships between risk perception and purchase intention across countries.

Details

Journal of Fashion Marketing and Management: An International Journal, vol. 7 no. 1
Type: Research Article
ISSN: 1361-2026

Keywords

Article
Publication date: 1 May 2002

Riyad Eid, Myfanwy Trueman and Abdel Moneim Ahmed

Business‐to‐business international Internet marketing (B2B IIM) has emerged as one of the key drivers in sustaining an organisation’s competitive advantage. However, market entry…

11756

Abstract

Business‐to‐business international Internet marketing (B2B IIM) has emerged as one of the key drivers in sustaining an organisation’s competitive advantage. However, market entry and communication via the Internet have affected the dynamics and traditional process in B2B commerce. Difficulties resulting from these new trends have been cited in the literature. Research into identifying what are the critical success factors for global market entry is rare. This research presents a comprehensive review in this field. The study identified 21 critical success factors applicable to most of the B2B IIM. These factors were classified into five categories: marketing strategy, Web site, global, internal and external related factors. The significance, importance and implications for each category are discussed and then recommendations are made.

Details

Internet Research, vol. 12 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Abstract

Details

Logistics Systems for Sustainable Cities
Type: Book
ISBN: 978-0-08-044260-0

Article
Publication date: 5 July 2021

Hanif Adinugroho Widyanto, Kunthi Afrilinda Kusumawardani and Helmy Yohanes

The purpose of this study is to investigate the antecedents of behavioral intention to use (BIU) mobile payment in Indonesia by extending unified theory of acceptance and use of…

2267

Abstract

Purpose

The purpose of this study is to investigate the antecedents of behavioral intention to use (BIU) mobile payment in Indonesia by extending unified theory of acceptance and use of technology (UTAUT) with user privacy constructs, namely, perceived security (PS), perceived risk (PR) and trust (Tr).

Design/methodology/approach

This is a quantitative research using the covariance-based structural equation modeling method, whereby the researchers conducted an online survey and distributed online questionnaires to users of mobile payment from all over Indonesia to obtain the data. The sample in this study consisted of 358 respondents.

Findings

This study found that social influence, facilitating conditions, PS, performance expectancy and Tr have a significant and direct influence on BIU mobile payment. PR was not found to have a significant and direct relationship with BIU, but it was indirectly affecting the latter through Tr as the mediating variable.

Originality/value

The researchers modified UTAUT by incorporating PS, PR and Tr to create a more comprehensive model in predicting mobile payment adoption, especially considering the risky nature of digital transactions in emerging economies like Indonesia. This extended model has never been thoroughly explored in previous studies.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 4
Type: Research Article
ISSN: 2053-4620

Keywords

Book part
Publication date: 29 May 2023

Ashulekha Gupta and Rajiv Kumar

Purpose: Nowadays, many terms like computer vision, deep learning, and machine learning have all been made possible by recent artificial intelligence (AI) advances. As new types…

Abstract

Purpose: Nowadays, many terms like computer vision, deep learning, and machine learning have all been made possible by recent artificial intelligence (AI) advances. As new types of employment have risen significantly, there has been significant growth in adopting AI technology in enterprises. Despite the anticipated benefits of AI adoption, many businesses are still struggling to make progress. This research article focuses on the influence of elements affecting the acceptance procedure of AI in organisations.

Design/Methodology/Approach: To achieve this objective, propose a hierarchical paradigm for the same by developing an Interpretive Structural Modelling (ISM). This paper reveals the barriers obstructing AI adoption in organisations and reflects the contextual association and interaction amongst those barriers by emerging a categorised model using the ISM approach. In the next step, cross-impact matrix multiplication is applied for classification analysis to find dependent, independent and linkages.

Findings: As India is now focusing on the implementation of AI adoption, therefore, it is essential to identify these barriers to AI to conceptualise it systematically. These findings can play a significant role in identifying essential points that affect AI adoption in organisations. Results show that low regulations are the most critical factor and functional as the root cause and further lack of IT infrastructure is the barrier. These two factors require the most attention by the government of India to improve AI adoption.

Implications: This study may be utilised by organisations, academic institutions, Universities, and research scholars to fill the academic gap and faster implementation of AI.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Article
Publication date: 9 March 2015

Habibullah Khan, Faisal Talib and Mohd. Nishat Faisal

The purpose of this paper is to identify and develop a hierarchical model for the barriers affecting the growth of mobile commerce (M-commerce). Based on the model developed, the…

1027

Abstract

Purpose

The purpose of this paper is to identify and develop a hierarchical model for the barriers affecting the growth of mobile commerce (M-commerce). Based on the model developed, the authors’ objective is to identify those variables that are of strategic nature and are the root cause of the issue.

Design/methodology/approach

Variables considered as barriers are identified, and utilizing the interpretive structural model approach, a relationship model is developed. Further, the impact matrix cross-reference multiplication applied to a classification approach is used to analyze the effect and dependence among these factors.

Findings

The research in the area of M-commerce in the Arab world and related to the strategic aspect is limited in the extant literature. The present study tries to fill this gap by investigating the variables that inhibit the growth of M-commerce in Qatar. The research shows that there exists a group of barriers having a high driving power and low dependence requiring maximum attention and of strategic importance, while another group consists of those variables that have high dependence and are the resultant actions.

Practical implications

There is a growing concern that although the numbers of mobile subscribers are increasing at a very fast pace in Qatar, actual M-commerce activities in the country remain low. The findings of this study can be used to understand the differences between the independent and dependent variables and their mutual relationships. The study would also help the policy makers to develop suitable strategies to facilitate growth of M-commerce in the country.

Originality/value

This research was the first attempt to investigate the relationships among the variables inhibiting the growth of M-commerce in a fast-growing economy in a Gulf Cooperation Council (GCC) region. Given that there is limited research on M-commerce in the GCC context, the study can be viewed as an investigation that provides a good understanding of the variables and their interrelationships affecting M-commerce proliferation.

Details

Journal of Systems and Information Technology, vol. 17 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 1 June 2001

James Currall

The papers in this volume look at security from a variety of viewpoints. Behind all the papers is the idea that security is important and that security can and should be improved…

145

Abstract

The papers in this volume look at security from a variety of viewpoints. Behind all the papers is the idea that security is important and that security can and should be improved. The papers ask some fairly fundamental questions and provide considerable food for thought. In this paper I am looking at the landscape and making an assumption that a change in culture as a result of better understanding of technology will result from increasing familiarity with technology and its limitations.

Details

VINE, vol. 31 no. 2
Type: Research Article
ISSN: 0305-5728

1 – 10 of 32