Results 11 to 20 of about 4,377,536 (345)
Perceived Security of E-Learning Portal [PDF]
Information technology has made e-learning possible and available on a large scale. Learning management system (LMS) has been widely used and is accessible through the Internet. However, LMS are exposed to various threats. Proper understanding of the threats is required.
Hilmi, Mohd Faiz, Mustapha, Yanti
openaire +3 more sources
The Influence of Perceived Security in Childhood on Adult Self-Concept: The Mediating Role of Resilience and Self-Esteem. [PDF]
Secure attachment, developed through consistent relationships with attachment figures in childhood, is a crucial factor in fostering healthy interpersonal relationships and a positive self-perception.
Martín Quintana JC +2 more
europepmc +2 more sources
The Use of Urban Parks by Older Adults in the Context of Perceived Security. [PDF]
The perception of urban greenery is determined by many aspects, including the personal security of different groups of city dwellers. The objective of this study was to investigate if there are differences between the sense of security of older adults ...
Kimic K, Polko P.
europepmc +2 more sources
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security [PDF]
When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and the actual system state can lead to potentially risky behaviors.
Distler, Verena +2 more
openaire +3 more sources
Integrating an information systems success model with perceived privacy, perceived security, and trust: the moderating role of Facebook addiction. [PDF]
Maqableh M +3 more
europepmc +2 more sources
Due to the high amount of electronic health records, hospitals have prioritized data protection. Because it uses parallel computing and is distributed, the security of the cloud cannot be guaranteed.
Mustafa M +5 more
europepmc +2 more sources
Measuring User Perceived Security of Mobile Banking Applications [PDF]
This paper expands the extended unified theory of acceptance and use of technology (UTAUT2) to include four additional constructs (security, risk, institutional trust, and technology trust), providing a more comprehensive understanding of mobile banking ...
Richard Apau, H. Lallie
semanticscholar +1 more source
Effective security support remains a challenge, even for mobile banking applications; this is leading to the loss of many customers due to limited protection of customer data and privacy.
Mohammed Amin Almaiah +7 more
semanticscholar +1 more source
This study investigates the application of the technology acceptance model (TAM) on the digital payment using social media platforms with the extended inclusion of perceived ease of use, perceived security, perceived usefulness, and trust in enhancing ...
H. Siagian +3 more
semanticscholar +1 more source
This study aims to investigate the perceptions of near-field communication (NFC) usage for mobile payments in Saudi Arabia. In order to develop a mathematical framework for the acceptance of NFC quality of information for mobile payments, researchers ...
Mohammed Amin Almaiah +9 more
semanticscholar +1 more source

