Showing 1 - 10 of 204
Persistent link: https://www.econbiz.de/10012108861
Persistent link: https://www.econbiz.de/10011585060
Trust is just as essential to online business as it is to offline transactions but can be more difficult to achieve - especially for newer websites with unknown web vendors. Research on web-based trust development explains that web vendor trust can be created by both cognitive and affective...
Persistent link: https://www.econbiz.de/10014038740
Trust is just as essential to online business as it is to offline transactions but can be more difficult to achieve — especially for newer Web sites associated with unknown Web vendors. Research explains that Web vendor trust can be created by cognitive and affective influences. But under what...
Persistent link: https://www.econbiz.de/10014147241
Password reuse - using the same password for multiple accounts - is a prevalent phenomenon that can make even the most secure systems vulnerable. When passwords are reused across multiple systems, hackers may compromise accounts by stealing passwords from low-security sites to access sites with...
Persistent link: https://www.econbiz.de/10010973704
Privacy concerns can greatly hinder consumers’ intentions to interact with a website. The success of a website therefore depends on its ability to improve consumers’ perceptions of privacy assurance. Seals and assurance statements are mechanisms often used to increase this assurance; however,...
Persistent link: https://www.econbiz.de/10014176348
Historically, inaccurate credibility assessments have resulted in tremendous costs to businesses and to society. Recent research offers unobtrusive credibility assessment aids as a solution; however, the accuracy of these decision aids is inadequate, and users often resist accepting the aids’...
Persistent link: https://www.econbiz.de/10014178768
Persistent link: https://www.econbiz.de/10003990184
Persistent link: https://www.econbiz.de/10009299422
Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, as well as their derivative theories, in a variety of ways, leading to...
Persistent link: https://www.econbiz.de/10014360878