Results 11 to 20 of about 4,377,536 (345)

Perceived Security of E-Learning Portal [PDF]

open access: yesarXiv.org, 2022
Information technology has made e-learning possible and available on a large scale. Learning management system (LMS) has been widely used and is accessible through the Internet. However, LMS are exposed to various threats. Proper understanding of the threats is required.
Hilmi, Mohd Faiz, Mustapha, Yanti
openaire   +3 more sources

The Influence of Perceived Security in Childhood on Adult Self-Concept: The Mediating Role of Resilience and Self-Esteem. [PDF]

open access: yesHealthcare (Basel), 2023
Secure attachment, developed through consistent relationships with attachment figures in childhood, is a crucial factor in fostering healthy interpersonal relationships and a positive self-perception.
Martín Quintana JC   +2 more
europepmc   +2 more sources

The Use of Urban Parks by Older Adults in the Context of Perceived Security. [PDF]

open access: yesInt J Environ Res Public Health, 2022
The perception of urban greenery is determined by many aspects, including the personal security of different groups of city dwellers. The objective of this study was to investigate if there are differences between the sense of security of older adults ...
Kimic K, Polko P.
europepmc   +2 more sources

Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security [PDF]

open access: yes2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020
When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and the actual system state can lead to potentially risky behaviors.
Distler, Verena   +2 more
openaire   +3 more sources

Perceived Security Risk Based on Moderating Factors for Blockchain Technology Applications in Cloud Storage to Achieve Secure Healthcare Systems.

open access: yesComput Math Methods Med, 2022
Due to the high amount of electronic health records, hospitals have prioritized data protection. Because it uses parallel computing and is distributed, the security of the cloud cannot be guaranteed.
Mustafa M   +5 more
europepmc   +2 more sources

Measuring User Perceived Security of Mobile Banking Applications [PDF]

open access: yesDe Computis, 2022
This paper expands the extended unified theory of acceptance and use of technology (UTAUT2) to include four additional constructs (security, risk, institutional trust, and technology trust), providing a more comprehensive understanding of mobile banking ...
Richard Apau, H. Lallie
semanticscholar   +1 more source

Investigating the Role of Perceived Risk, Perceived Security and Perceived Trust on Smart m-Banking Application Using SEM

open access: yesSustainability, 2023
Effective security support remains a challenge, even for mobile banking applications; this is leading to the loss of many customers due to limited protection of customer data and privacy.
Mohammed Amin Almaiah   +7 more
semanticscholar   +1 more source

The effect of perceived security, perceived ease of use, and perceived usefulness on consumer behavioral intention through trust in digital payment platform

open access: yesInternational Journal of Data and Network Science, 2022
This study investigates the application of the technology acceptance model (TAM) on the digital payment using social media platforms with the extended inclusion of perceived ease of use, perceived security, perceived usefulness, and trust in enhancing ...
H. Siagian   +3 more
semanticscholar   +1 more source

Investigating the Effect of Perceived Security, Perceived Trust, and Information Quality on Mobile Payment Usage through Near-Field Communication (NFC) in Saudi Arabia

open access: yesElectronics, 2022
This study aims to investigate the perceptions of near-field communication (NFC) usage for mobile payments in Saudi Arabia. In order to develop a mathematical framework for the acceptance of NFC quality of information for mobile payments, researchers ...
Mohammed Amin Almaiah   +9 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy