794 resultados para Secure Actions, Homomorphic Encryption, Electronic Commerce


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Electronic commerce (e-commerce) has become an increasingly important initiative among organisations. The factors affecting adoption decisions have been well-documented, but there is a paucity of empirical studies that examine the adoption of e-commerce in developing economies in the Arab world. The aim of this study is to provide insights into the salient e-commerce adoption issues by focusing on Saudi Arabian businesses. Based on the Technology-Organisational-Environmental framework, an integrated research model was developed that explains the relative influence of 19 known determinants. A measurement scale was developed from prior empirical studies and revised based on feedback from the pilot study. Non-interactive adoption, interactive adoption and stabilisation of e-commerce adoption were empirically investigated using survey data collected from Saudi manufacturing and service companies. Multiple discriminant function analysis (MDFA) was used to analyse the data and research hypotheses. The analysis demonstrates that (1) regarding the non-interactive adoption of e-commerce, IT readiness, management team support, learning orientation, strategic orientation, pressure from business partner, regulatory and legal environment, technology consultants‘ participation and economic downturn are the most important factors, (2) when e-commerce interactive adoption is investigated, IT readiness, management team support, regulatory environment and technology consultants‘ participation emerge as the strongest drivers, (3) pressure from customers may not have much effect on the non-interactive adoption of e-commerce by companies, but does significantly influence the stabilisation of e-commerce use by firms, and (4) Saudi Arabia has a strong ICT infrastructure for supporting e-commerce practices. Taken together, these findings on the multi-dimensionality of e-commerce adoption show that non-interactive adoption, interactive adoption and stabilisation of e-commerce are not only different measures of e-commerce adoption, but also have different determinants. Findings from this study may be valuable for both policy and practice as it can offer a substantial understanding of the factors that enhance the widespread use of B2B e-commerce. Also, the integrated model provides a more comprehensive explanation of e-commerce adoption in organisations and could serve as a foundation for future research on information systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite the proliferation of e-commerce adoption by SMEs and the world-wide growth of e-commerce, in general there is a paucity of empirical studies that examine the adoption of e-commerce by SMEs in the Middle East. In this paper, the authors provide insights into the salient e-commerce adoption issues by focusing on Saudi Arabian SMEs. This research was designed using a qualitative approach through in-depth case studies selected from firms in Saudi Arabia. The findings contribute toward a better conceptual and practical understanding of the main factors driving SMEs to adopt e-commerce. The authors find that the level of e-commerce implementation has yet to mature and customer readiness for Internet shopping must improve before e-commerce reaches the levels of maturity seen in other regions of the world. This study highlights directions for future inquiry and implications for information and technology managers and policymakers in developing Arab nations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Saudi Arabian Small and Medium Enterprises (SMEs) will face fierce competition from new entrants to local markets as a result of their accession to the Word Trade Organisation (WTO), and electronic commerce (e-commerce) technologies can reinforce SME’s competitive edge. This study investigates the state of e-commerce adoption and analyses the factors that determine the extent to which SMEs in Saudi Arabia are inclined towards deploying e-commerce technologies. This could assist future firms in designing effective implementation projects. Seven SMEs’ e-commerce adoption levels are studied as a case. The Technology-Organization-Environment (TOE) framework was used as the major source of inspiration in our analysis of e-commerce adoption amongst Saudi SMEs. In addition to advancing research on e-commerce in Saudi Arabia, this chapter also highlights several directions for future inquiry and implications for managers and policymakers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Saudi Arabian Small and Medium Enterprises (SMEs) will face fierce competition from new entrants to local markets as a result of their accession to the Word Trade Organisation (WTO), and electronic commerce (e-commerce) technologies can reinforce SME's competitive edge. This study investigates the state of e-commerce adoption and analyses the factors that determine the extent to which SMEs in Saudi Arabia are inclined towards deploying e-commerce technologies. This could assist future firms in designing effective implementation projects. Seven SMEs' e-commerce adoption levels are studied as a case. The Technology-Organization-Environment (TOE) framework was used as the major source of inspiration in our analysis of e-commerce adoption amongst Saudi SMEs. In addition to advancing research on e-commerce in Saudi Arabia, this chapter also highlights several directions for future inquiry and implications for managers and policymakers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite the proliferation of e-commerce adoption by SMEs and the world-wide growth of e-commerce, in general there is a paucity of empirical studies that examine the adoption of e-commerce by SMEs in the Middle East. In this paper, the authors provide insights into the salient e-commerce adoption issues by focusing on Saudi Arabian SMEs. This research was designed using a qualitative approach through in-depth case studies selected from firms in Saudi Arabia. The findings contribute toward a better conceptual and practical understanding of the main factors driving SMEs to adopt e-commerce. The authors find that the level of e-commerce implementation has yet to mature and customer readiness for Internet shopping must improve before e-commerce reaches the levels of maturity seen in other regions of the world. This study highlights directions for future inquiry and implications for information and technology managers and policymakers in developing Arab nations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study was to empirically investigate the adoption of retail electronic commerce (REC). REC is a business transaction which takes place over the Internet between a casual consumer and a firm. The consumer has no long-term relationship with the firm, orders a good or service, and pays with a credit card. To date, most REC applications have not been profitable. To build profitable REC applications a better understanding of the system's users is required. ^ The research model hypothesizes that the level of REC buying is dependent upon the Buying Characteristics of Internet Use and Search Experience plus the Channel Characteristics of Beliefs About Internet Vendors and Beliefs About Internet Security. The effect of these factors is modified by Time. Additional research questions ask about the different types of REC buyers, the differences between these groups, and how these groups evolved over time. ^ To answer these research questions I analyzed publicly available data collected over a three-year period by the Georgia Institute of Technology Graphics and Visualization Unit over the Internet. Findings indicate the model best predicts Number of Purchases in a future period, and that Buyer Characteristics are most important to this determination. Further, this model is evolving over Time making Buyer Characteristics predict Number of Purchases better in more recent survey administrations. Buyers clustered into five groups based on level of buying and move through various levels and buy increasing Number of Purchases over time. ^ This is the first large scale research project to investigate the evolution of REC. This implications are significant. Practitioners with casual consumer customers need to deploy a finely tuned REC strategy, understand their buyers, capitalize on the company reputation on the Internet, install an Internet-compatible infrastructure, and web-enable order-entry/inventory/fulliment/shipping applications. Researchers might wish to expand on the Buyer Characteristics of the model and/or explore alternative dependent variables. Further, alternative theories such as Population Ecology or Transaction Cost Economics might further illuminate this new I.S. research domain. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study was to empirically investigate the adoption of retail electronic commerce (REC). REC is a business transaction which takes place over the Internet between a casual consumer and a firm. The consumer has no long-term relationship with the firm, orders a good or service, and pays with a credit card. To date, most REC applications have not been profitable. To build profitable REC applications a better understanding of the system's users is required. The research model hypothesizes that the level of REC buying is dependent upon the Buying Characteristics of Internet Use and Search Experience plus the Channel Characteristics of Beliefs About Internet Vendors and Beliefs About Internet Security. The effect of these factors is modified by Time. Additional research questions ask about the different types of REC buyers, the differences between these groups, and how these groups evolved over time. To answer these research questions I analyzed publically available data collected over a three-year period by the Georgia Institute of Technology Graphics and Visualization Unit over the Internet. Findings indicate the model best predicts Number of Purchases in a future period, and that Buyer Characteristics are most important to this determination. Further, this model is evolving over Time making Buyer Characteristics predict Number of Purchases better in more recent survey administrations. Buyers clustered into five groups based on level of buying and move through various levels and buy increasing Number of Purchases over time. This is the first large scale research project to investigate the evolution of REC. This implications are significant. Practitioners with casual consumer customers need to deploy a finely tuned REC strategy, understand their buyers, capitalize on the company reputation on the Internet, install an Internet-compatible infrastructure, and web-enable order-entry/inventory/fulfillment/ shipping applications. Researchers might wish to expand on the Buyer Characteristics of the model and/or explore alternative dependent variables. Further, alternative theories such as Population Ecology or Transaction Cost Economics might further illuminate this new I.S. research domain.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The material presented in this thesis may be viewed as comprising two key parts, the first part concerns batch cryptography specifically, whilst the second deals with how this form of cryptography may be applied to security related applications such as electronic cash for improving efficiency of the protocols. The objective of batch cryptography is to devise more efficient primitive cryptographic protocols. In general, these primitives make use of some property such as homomorphism to perform a computationally expensive operation on a collective input set. The idea is to amortise an expensive operation, such as modular exponentiation, over the input. Most of the research work in this field has concentrated on its employment as a batch verifier of digital signatures. It is shown that several new attacks may be launched against these published schemes as some weaknesses are exposed. Another common use of batch cryptography is the simultaneous generation of digital signatures. There is significantly less previous work on this area, and the present schemes have some limited use in practical applications. Several new batch signatures schemes are introduced that improve upon the existing techniques and some practical uses are illustrated. Electronic cash is a technology that demands complex protocols in order to furnish several security properties. These typically include anonymity, traceability of a double spender, and off-line payment features. Presently, the most efficient schemes make use of coin divisibility to withdraw one large financial amount that may be progressively spent with one or more merchants. Several new cash schemes are introduced here that make use of batch cryptography for improving the withdrawal, payment, and deposit of electronic coins. The devised schemes apply both to the batch signature and verification techniques introduced, demonstrating improved performance over the contemporary divisible based structures. The solutions also provide an alternative paradigm for the construction of electronic cash systems. Whilst electronic cash is used as the vehicle for demonstrating the relevance of batch cryptography to security related applications, the applicability of the techniques introduced extends well beyond this.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Electronic Health Record (EHR) retrieval processes are complex demanding Information Technology (IT) resources exponentially in particular memory usage. Database-as-a-service (DAS) model approach is proposed to meet the scalability factor of EHR retrieval processes. A simulation study using ranged of EHR records with DAS model was presented. The bucket-indexing model incorporated partitioning fields and bloom filters in a Singleton design pattern were used to implement custom database encryption system. It effectively provided faster responses in the range query compared to different types of queries used such as aggregation queries among the DAS, built-in encryption and the plain-text DBMS. The study also presented with constraints around the approach should consider for other practical applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.