Search results

1 – 10 of 255
Article
Publication date: 7 August 2009

Bruce Chien‐Ta Ho and Kok‐Boon Oh

The purpose of this paper is to examine the use of e‐security seals on web sites and their relative impact on e‐commerce firm reputation in influencing customers' perceptions of…

3800

Abstract

Purpose

The purpose of this paper is to examine the use of e‐security seals on web sites and their relative impact on e‐commerce firm reputation in influencing customers' perceptions of trust in a service provider.

Design/methodology/approach

Two interrelated empirical studies are conducted to evaluate the use and impacts of e‐security seals in e‐commerce. An exploratory study methodology investigates the use of e‐security seals and a questionnaire survey is used to gauge consumer knowledge of seals.

Findings

Using survey data from 211 web users, the results show that 106 respondents are cognitive and affective of e‐security seals. The results also provide further clarification of the relationship between e‐security seals and sales effectiveness. The findings point towards a positive belief by consumers in e‐security seals.

Research implications

Third‐party e‐security seals organisations should undertake more promotional activities and advertising to educate comsumers about the use and benefits of e‐security seals.

Originality/value

An important issue in e‐commerce is how trust is developed between consumers and e‐vendors. This paper investigates the use of e‐security seals and their influence on consumer confidence in the online environment.

Details

Online Information Review, vol. 33 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 October 2004

Alan D. Smith

With the rapid growth of e‐commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e‐security as a…

4727

Abstract

With the rapid growth of e‐commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e‐security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e‐security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e‐security and e‐privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information‐sharing and globally networked environment.

Details

Aslib Proceedings, vol. 56 no. 5
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 30 March 2023

Mohammad Enamul Hoque, Perengki Susanto, Najeeb Ullah Shah, Husnil Khatimah and Abdullah Al Mamun

With the emergence of coronavirus disease 2019 (COVID-19), the usage of e-money has been reinforced to reach the next level. Therefore, this study aims to examine the mediating…

Abstract

Purpose

With the emergence of coronavirus disease 2019 (COVID-19), the usage of e-money has been reinforced to reach the next level. Therefore, this study aims to examine the mediating role of perceived behavioral control (PBC) on the nexus of customers' innovativeness and continuance intention of electronic money (e-money). This study also explores the moderating roles of perceived risk (PR) and electronic security (e-security) in relationships.

Design/methodology/approach

The authors employed a structured questionnaire for data collection and the partial least squares structural equation modeling (PLS-SEM) for empirical estimations.

Findings

The authors' findings reveal that customers' innovativeness promotes continuance intention of using e-money and demonstrate that PBC partially mediates the relation between customers' innovativeness and continuance intention of using e-money. The empirical findings also reveal that PR negatively moderates the relationship between customers' innovativeness and continuance intention and the relationship between customers' innovativeness and PBC. The empirical findings also exhibit that perceived e-security enhances the degree of the relationship between customers' innovativeness and continuance intention and the relationship between customers' innovativeness and PBC.

Practical implications

The findings shed light on an important factor that increases the likelihood of repeat e-money usage and has direct managerial implications for customer experience and risk concerns. Hence, the findings imply that e-money service providers should run a promotional advertisement highlighting what additional features are included or offered and how these could be beneficial for the customers. Furthermore, e-money service providers should provide some tutorial videos in order to increase innovative customers' control over e-money services as well as highlight how risk and security are protected.

Originality/value

This paper integrates three key theories: the diffusion of innovation (DOI) theory, the theory of planned behavior (TPB) and the PR theory in post-adoption behavior of e-money usage. The current study also attempts to fill a literature gap by examining the moderating role of PR and e-security, which could be useful within the relationship between customers' innovativeness, PBC and customers' continued intentions of e-money usage.

Details

International Journal of Emerging Markets, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 1 June 2004

Alan D. Smith

The information revolution, coupled with the strategic leveraging of the Internet, has exposed a number of relatively open societies to the dangers of cybercriminal and…

9244

Abstract

The information revolution, coupled with the strategic leveraging of the Internet, has exposed a number of relatively open societies to the dangers of cybercriminal and cyberterrorist acts, especially in commercial business transactions. With the development of e‐commerce, this commercial dark side has become known as cybercrime and has taken on many forms that affect the perceptions of the way we shop online. Corporations should realize that these threats to their online businesses have strategic implications to their business future and take proper measures to ensure that these threats are eliminated or significantly reduced so that consumer confidence in the Internet as an alternative means of shopping is maintained. These counter measures, coined as cybersecurity, have been developed to ensure the safety of consumer privacy and information and allow for a carefree shopping experience. There is need for the development of models that will allow corporations to study the effects of cybercrime on online consumer confidence and to counter through leveraging the benefits associated with the latest developments in cybersecurity. With these two facets of e‐commerce impacting the online consumer, corporations must ensure that the security measures taken will ultimately prevail to assure that consumers will continue to use the Internet to satisfy their shopping needs.

Details

Online Information Review, vol. 28 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 14 August 2024

Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Laszlo Barna Iantovics, Maryam Manzoor, Muhammad Ali Raza and Zoia Khan

This research aimed to raise awareness about the need for safety measures and features of online food delivery applications (OFDAs) to build electronic trust (e-trust) with…

Abstract

Purpose

This research aimed to raise awareness about the need for safety measures and features of online food delivery applications (OFDAs) to build electronic trust (e-trust) with augmented purchase intention among customers. Moreover, this study explores the attributes of electronic commerce (e-commerce) and how e-trust influences the purchasing intention of consumers while ordering food through OFDAs including fear of contagious diseases. Determinants of e-commerce in the digital era profoundly impact the performance of enterprises.

Design/methodology/approach

Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. To scrutinize the dataset, confirmatory factor analysis (CFA) was conducted to assess the construct validity in this research study. Structural equation modeling (SEM), which is facilitated by Smart-PLS, was employed to examine the direct, moderation and mediation effects of the proposed model.

Findings

Results revealed the positive and significant impact of the e-trust on the purchase intention. Additionally, e-trust acted as a mediating factor in the connection between electronic security (e-security), electronic privacy (e-privacy), usability, electronic payment (e-payment), electronic innovativeness (e-innovativeness) and the buyer's purchase intention. Furthermore, the fear of contagious viruses negatively moderated the e-trust and purchase intention that weakened buying behavior.

Originality/value

This research is primarily centered on enhancing the comprehension regarding safety orientation within the context of an evolving restaurant industry. The findings of this study hold substantial contributions for academics, web developers, application designers, OFDAs, restaurants and other businesses since they indicate the attractiveness of OFDAs in generating feelings of pleasure and boosting users' intentions to keep using the application.

Details

Journal of Trade Science, vol. 12 no. 3
Type: Research Article
ISSN: 2815-5793

Keywords

Open Access
Article
Publication date: 27 March 2024

Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Zoia Khan, Muhammad Ali Raza and Hira Hafeez

This study aims to investigate the different attributes of electronic commerce (e-commerce) that determine perceived value and electronic loyalty (e-loyalty) among consumers of…

Abstract

Purpose

This study aims to investigate the different attributes of electronic commerce (e-commerce) that determine perceived value and electronic loyalty (e-loyalty) among consumers of online food delivery applications (OFDAs). In this globalized world and competitive environment, e-commerce demands have increased and organizations are giving special attention to web development, website design and functions to hold the current consumers with sustainable performance in the globalized and competitive environment. Almost every industry has been affected by the coronavirus disease 2019 (COVID-19) and changed the way of operational work in many industries. Similarly, the food industry is facing serious challenges and now restaurants started heavily depending on OFDAs.

Design/methodology/approach

The study was quantitative and data were collected from 509 consumers of the district of Rawalpindi, Punjab Pakistan by using a convenience sampling technique who was the users of OFDAs to evaluate the proposed research model. Confirmatory factor analysis was applied to evaluate the validity of the constructs, and structural equation modeling was employed to test the model through Smart-PLS.

Findings

Our findings revealed that perceived value has a substantial positive impact on electronic loyalty (e-loyalty). Moreover, results confirmed that perceived value mediates the relationship of electronic privacy (e-privacy), electronic security (e-security), electronic payment (e-payment), usability and electronic innovativeness (e-innovativeness) with e-loyalty.

Research limitations/implications

This study added to the unified theory of acceptance and use of technology (UTAUT) and technology acceptance model (TAM) by exploring consumers’ intentions for using OFDAs in the framework of e-commerce attributes, perceived value and e-loyalty. Similarly, the study enabled the author to learn more about how people would use the information system after successfully applying the UTAUT.

Practical implications

This study has significant implications for web developers, application designers, food delivery companies, restaurants and other businesses. Subsequently, it indicates the importance of the incredible attractiveness of OFDAs in boosting users’ intentions to keep using the application.

Originality/value

This research contributes substantially to OFDAs efforts to continuously increase its meal service platform and improve client satisfaction which resulted in repurchase intent. In addition, the research facilitates OFDA firms to enhance the features of their applications according to clients.

Details

Journal of Innovative Digital Transformation, vol. 1 no. 1
Type: Research Article
ISSN: 2976-9051

Keywords

Article
Publication date: 1 February 2000

T Kippenberger

Suggests that there are four principal security functions for commercial transactions: confidentiality; integrity; authentication; and non‐repudiation. States the conduction of…

17938

Abstract

Suggests that there are four principal security functions for commercial transactions: confidentiality; integrity; authentication; and non‐repudiation. States the conduction of business has been changed by the Internet. Discusses the need for electronic business security technology, physical as well as electronic. Highlights various forms of security as: different links; encryption; digital signatures; public key infrastructure; smart cards and smart buttons; and identification. Sums up that no data security system is impenetrable and the main vulnerabilities are: secret key compromise; public key tampering; viruses; direct cryptanalysis; or old‐fashioned physical security breaches.

Details

The Antidote, vol. 5 no. 1
Type: Research Article
ISSN: 1363-8483

Keywords

Article
Publication date: 25 September 2009

Siriluck Rotchanakitumnuai and Mark Speece

The purpose of this paper is to consider the technology acceptance model (TAM) in the context of internet securities trading. It examines the antecedents of perceived usefulness…

1770

Abstract

Purpose

The purpose of this paper is to consider the technology acceptance model (TAM) in the context of internet securities trading. It examines the antecedents of perceived usefulness and explores the role of trust and attitude of securities investors toward usage. The behavioural intention of investors to use the internet securities trading service is influenced by perceived usefulness, attitude toward usage, and trust.

Design/methodology/approach

The paper uses survey research to explore the determinants in the e‐securities trading acceptance model.

Findings

The findings show five antecedents have a positive impact on perceived usefulness. These are ease‐of‐use, information quality, accessibility, trust, and flow control of the securities trading process. Respondents identify the highest benefit as the flow control of the securities trading processes via the internet channel.

Practical implications

The results suggest that investors prefer to have the freedom to control the details of the process when trading securities. In addition, trust is important for all levels of the TAM process. Trust has a large impact which is mediated through both perceived usefulness and attitude toward usage. There is a weaker direct impact on intention to use.

Originality/value

This paper includes a more comprehensive measurement of the antecedents of perceived usefulness such as ease‐of‐use, information quality, accessibility, flow control, and trust. It also demonstrates the importance of trust in explaining the psychological attitudes toward the service.

Details

Industrial Management & Data Systems, vol. 109 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 25 July 2023

Rico Kremer

Based on the theory of basic human values, this study aims to examine the impact of CEO conservation (i.e. security, conformity and tradition) and openness to change (i.e…

Abstract

Purpose

Based on the theory of basic human values, this study aims to examine the impact of CEO conservation (i.e. security, conformity and tradition) and openness to change (i.e. self-direction, stimulation and hedonism) values on one of the most conflictual decisions inside a firm: workforce downsizing.

Design/methodology/approach

The hypothesis testing was done in the context of all workforce downsizing decisions made by German companies (and their CEOs) listed on the German Prime-Index between 2005 and 2019. A software-based psycholinguistic assessment of various sources of CEO communications was conducted to tap into their underlying values.

Findings

Tobit regression analysis confirms that CEO conservation and openness-to-change values impact the severity of workforce downsizing. Namely, the higher the CEO conservation values, the lower the downsizing severity (i.e. employees dismissed in relation to overall workforce). In contrast, the higher the CEO openness to change values, the higher the downsizing severity.

Originality/value

Against prior research that has centered around political ideology as a proxy to understand the mechanisms through which values impact strategic decisions, the present study employs advanced measurement approaches to assess the general impact of CEO values on critical firm decisions. As such, the study contributes to upper echelons research by offering a new perspective on how CEO values impact critical firms' decisions.

Details

Management Decision, vol. 61 no. 9
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 20 April 2015

Ahmet Oguz Akturk

The purpose of this paper is to determine the cyberbullying sensitivity levels of high school students and their perceived social supports levels, and analyze the variables that…

2119

Abstract

Purpose

The purpose of this paper is to determine the cyberbullying sensitivity levels of high school students and their perceived social supports levels, and analyze the variables that predict cyberbullying sensitivity. In addition, whether cyberbullying sensitivity levels and social support levels differed according to gender was also investigated. While current communication technologies such as mobile phones, the Internet and social network sites provide new opportunities for learning and interaction, they may also pose a threat to personal security. The rapid increase in access to information and communication technologies by young people can also cause those technologies to be used for bullying their peers – called cyberbullying.

Design/methodology/approach

In this study, the cyberbullying sensitivity levels of high school students and their perceived social support levels were determined, and some variables (perceived social support, gender and academic success) which predicted sensitivity related to cyberbullying were analyzed. A total of 433 students studying in a large public high school located at the middle part of Turkey voluntarily participated in this study.

Findings

The findings of this research show that both the cyberbullying sensitivities of the students and their levels of the perceived social support were high and that both the cyberbullying sensitivities of the female students and their perceived social support levels were higher than the ones of the male students. Based on the result of stepwise regression analysis that investigate the predicting factors related to cyberbullying sensitivities of the students, perceived social support was found to be the strongest predicting factor.

Originality/value

It can be seen that most young people have little information about cyberbullying and they lack information about basic e-security applications. Accordingly, most young people are victims or potential victims of cyberbullying. In conclusion, to remove victimhood due to cyberbullying or reduce it to a minimum from an optimistic point of view, not only risky processes but also how the environment should protect young people from developing incompatible behaviors and how to increase their sensitivity should be taken into consideration. It may be said that the findings that we obtained in our research may contribute to relevant studies from the point of developing preventive programs against cyberbullying.

Details

Interactive Technology and Smart Education, vol. 12 no. 1
Type: Research Article
ISSN: 1741-5659

Keywords

1 – 10 of 255