Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
925 result(s) for "security concerns"
Sort by:
Relationship between intangibility and perceived risk: moderating effect of privacy, system security and general security concerns
Purpose - This paper aims to explore the association between intangibility and perceived risk using a sample of North American households. This relationship is explored within two purchase environments, namely online and offline. The authors also investigated the moderating effects of privacy, system security and general security concerns when purchasing in an online environment.Design methodology approach - The survey was delivered to 156 households in a small town in the Midwest and collected upon completion.Findings - The perception of risk is increased when two negatively loaded pieces of information are processed simultaneously (i.e. product intangibility and privacy concern). Furthermore, system security was identified as the most relevant concern in e-commerce.Research limitations implications - The representativeness of the sample is limited. Theoretical and managerial implications are discussed.Originality value - The results provide interesting insights about the generalizability of previous findings based on student samples, and show the importance of privacy concerns, system security concerns, general security concerns for those purchasing in online environments.
A Comprehensive Survey on Security and Privacy for Electronic Health Data
Recently, the integration of state-of-the-art technologies, such as modern sensors, networks, and cloud computing, has revolutionized the conventional healthcare system. However, security concerns have increasingly been emerging due to the integration of technologies. Therefore, the security and privacy issues associated with e-health data must be properly explored. In this paper, to investigate the security and privacy of e-health systems, we identified major components of the modern e-health systems (i.e., e-health data, medical devices, medical networks and edge/fog/cloud). Then, we reviewed recent security and privacy studies that focus on each component of the e-health systems. Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies. In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.
Digital security by design
This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment.
Users' Concerns and the Internet of Things (IoT) Risk Beliefs
This paper builds a prediction model with four predictor variables and one dependent variable. The predictor variables are users' concerns about IoT privacy, users' concerns about IoT security, users' concerns about IoT awareness, and users' concerns about IoT device use. The dependent variable is users' IoT risk beliefs. The prediction model determines the influential predictor variables that predict the users' IoT risk beliefs. An instrument with five constructs was designed and administered to subjects working in various organizations in the USA. Collected data from 386 usable data were analyzed through multiple regression analysis. The analysis was used to answer the study's research question, which asked which of the four independent/predictor variables are influential in predicting the dependent variable. Results indicated that all four predictor variables were influential in predicting users' IoT risk beliefs, with IoT security concerns more influential than the other three. The findings, theoretical implications, practical implications, and future work are discussed.
Online Shopping and Platform Design with Ex Ante Registration Requirements
We study platform design in online markets in which buying involves a (nonmonetary) cost for consumers caused by privacy and security concerns. Firms decide whether to require registration at their website before consumers learn relevant product information. We derive conditions under which a monopoly seller benefits from ex ante registration requirements and demonstrate that the profitability of registration requirements is increased when taking into account the prospect of future purchases or an informational value of consumer registration to the firm. Moreover, we consider the effectiveness of discounts (store credit) as a means to influence the consumers’ registration decision. Finally, we confirm the profitability of ex ante registration requirements in the presence of price competition. The online appendix is available at https://doi.org/10.1287/mnsc.2016.2595 . This paper was accepted by J. Miguel Villas-Boas, marketing .
Examining the roles of students' beliefs and security concerns for using smartwatches in higher education
PurposeDespite the increased use of wearables in education, little attention has been paid to why some students are more likely to adopt smartwatches than others. The question of what impacts the adoption of smartwatches in educational activities is still neglected. In addition, the question of how security determinants can affect the adoption of smartwatches by students has not been addressed yet. Hence, this study aims to develop a theoretical model by integrating the technology acceptance model (TAM) and protection motivation theory (PMT) to study students' adoption of smartwatches for educational purposes.Design/methodology/approachQuestionnaires were distributed to university students in Malaysia. A total of 679 valid responses were collected. The collected data were analyzed using partial least squares-structural equation modeling (PLS-SEM).FindingsThe results of data analysis provide support for the proposed model. Furthermore, the findings indicated that perceived vulnerability, self-efficacy, response efficacy, response cost, ease of use and perceived usefulness have significant effects on students' behavioral intention to use smartwatches for educational purposes. In addition, perceived ease of use of smartwatches for educational purposes helps students to realize the benefits of this technology.Originality/valueThis is an original study that develops a new holistic theoretical model by combining the PMT and TAM to study the effects of ease of use, usefulness and security-related factors on the adoption of smartwatches for educational purposes. The study offers practical implications for universities and higher education institutions to improve students' learning experiences to ensure their sustainability using new and innovative ways by exploiting new technologies such as smartwatches.
Impact of Mobile Banking Application Interactivity on Consumer Engagement: An Experiment-Based Investigation
The study aims to examine the impact of mobile banking (m-banking) application interactivity on consumer engagement. The study also analyses the moderation effects of perceived security concerns, consumer innovativeness, and consumer involvement. The study employed a 2 (interactivity: high versus low) × 2 (perceived security concern: high versus low) × 2 (consumer innovativeness: high versus low) x 2 (consumer involvement: high versus low) between-subjects experimental design among 376 Indian mobile banking users. The results indicate that interactivity positively impacts consumer engagement in m-banking applications. The results also show the significant moderating effects of perceived security concerns, consumer innovativeness, and consumer involvement. The findings of the study enrich the online engagement literature by examining the impact of interactivity on consumer engagement in the m-banking context. The results of the study will help banks in enhancing their m-banking application interactivity to enhance consumer engagement.
Impact of institutional pressures and security on blockchain technology adoption and organization performance: an empirical study
Analyzing the adoption of Blockchain technology (BCT) in the supply chain becomes crucial considering its inter-organizational nature. The nodal center of power (generally the leading firm in any supply chain) pressures the other members to adopt the technology. This study investigates the impact of external pressures, such as coercive, mimetic, and normative pressures, combined with security measures, on adopting BCT and its subsequent influence on organizations’ cost performance. To achieve this, a questionnaire based on isomorphism theory and security is developed, and data is collected from 222 supply chain professionals. The collected data was then analyzed using a structural equation model to test the proposed hypotheses. The findings reveal that coercive pressure and security measures significantly influence the adoption of BCT, which in turn has a positive effect on organizational performance. This study provides a fresh perspective for practitioners and technology providers by shedding light on the external pressures that can shape the adoption of blockchain technology in a firm and its supply chain.
Sino-American Relations
Sino-American Relations brings together high-quality research articles in order to examine one aspect of the political mechanism of modern China, from empire to the PRC: political initiatives to root out corruption. Proceeding chronologically, the eleven chapters explore modern political history through a particular focus on the anti-corruption campaigns of early modern and modern China. Our interdisciplinary analysis draws on methodologies from several distinct fields, including political science, civil law, and mass media. Such an analysis reveals the unique characteristics of China’s urbanization, which have transformed not only the country, but also the CCP – from a rural-based totalitarian party to a city-centered authoritarian party, and from a party of the people to a party of powerful interest groups by 2002–2016.
Which Consumer Perceptions Should Be Used in Food Waste Reduction Campaigns: Food Security, Food Safety or Environmental Concerns?
Consumer food waste linked to restaurants and canteens has been a long-standing serious problem in China, which hungers for an effective solution. Although government and media have launched campaigns against food waste, limited information on consumer perceptions is provided in helping to guide campaign programs. The influence of perception associated with low food waste is lacking, along with targeting campaigns based on these perceptions. This research aims to fill this gap. The purpose of this paper is to identify consumption perceptions about food waste in the Chinese urban restaurant sector, so that they can be used in social marketing to promote food waste reduction behaviors. Employing Probit models using survey data collected, we found that food security and environmental perceptions are associated with low food waste. Campaigns directed toward reducing food waste should target raising awareness of food security alert and environmental concerns that are more generally appealing to altruistic spirits.