Taherdoost, Hamed - In: Information & Computer Security 25 (2017) 5, pp. 535-559
dimensions are extracted. Then, exploratory factor analysis is applied to reduce the number of security dimensions. This step is … the weights of security dimensions applying analytical hierarchy process method by contribution of e-service experts and … effect on quality and intention to use e-services. Design/methodology/approach According to the literature, 13 security …