Results 281 to 290 of about 4,377,536 (345)
Some of the next articles are maybe not open access.
Perceived security: An experimental study of security doors
Safety Science, 2021Abstract The feeling of security of your own home is given both by the minimization of the real risk of infringement and by the conditions for minimizing the psychological threats experienced by the user. This study investigates the impact of visual design factors on perceived security of security doors. Experiment 1 verified the effect of different
M. Sinico
openaire +3 more sources
Embracing Bitcoin: users’ perceived security and trust
Quality & Quantity, 2020Of late, disruptive innovation in financial services is driving the tremendous growth of cryptocurrency, with Bitcoin being the most popular virtual currency of interest among investors. Notwithstanding the volatility of the cryptocurrencies, Bitcoin preserves a core group of committed users.
Say Keat Ooi +3 more
openaire +2 more sources
SSRN Electronic Journal, 2019
This research will examine the correlation between perceived trust, perceived security, perceived usefulness and perceived ease of use to the intention of customers to use mobile payment. The model is empirically validated with 288 respondents with basic mobile payment information. Modeling of the structural equation of partial least squares is used to
Annisa Denaputri, Osly Usman
openaire +2 more sources
This research will examine the correlation between perceived trust, perceived security, perceived usefulness and perceived ease of use to the intention of customers to use mobile payment. The model is empirically validated with 288 respondents with basic mobile payment information. Modeling of the structural equation of partial least squares is used to
Annisa Denaputri, Osly Usman
openaire +2 more sources
Global Business Review, 2023
The objective of this study is to investigate the determinant factors of mobile wallet users’ continuance intention in Indonesia. It integrates technology continuance theory (TCT) with perceived security.
Cut Aprilia, R. Amalia
semanticscholar +1 more source
The objective of this study is to investigate the determinant factors of mobile wallet users’ continuance intention in Indonesia. It integrates technology continuance theory (TCT) with perceived security.
Cut Aprilia, R. Amalia
semanticscholar +1 more source
Journal of Science and Technology Policy Management, 2021
Purpose The purpose of this study is to investigate the antecedents of behavioral intention to use (BIU) mobile payment in Indonesia by extending unified theory of acceptance and use of technology (UTAUT) with user privacy constructs, namely, perceived ...
H. Widyanto +2 more
semanticscholar +1 more source
Purpose The purpose of this study is to investigate the antecedents of behavioral intention to use (BIU) mobile payment in Indonesia by extending unified theory of acceptance and use of technology (UTAUT) with user privacy constructs, namely, perceived ...
H. Widyanto +2 more
semanticscholar +1 more source
Jurnal Muara Ilmu Ekonomi dan Bisnis, 2021
Penelitian ini dilakukan guna mengetahui bagaimana pengaruh Perceived Ease of Use dan Perceived Security terhadap Customer Satisfaction dan Repurchase Intention pada sektor B2C E-Commerce di Indonesia.
N. Wilson +2 more
semanticscholar +1 more source
Penelitian ini dilakukan guna mengetahui bagaimana pengaruh Perceived Ease of Use dan Perceived Security terhadap Customer Satisfaction dan Repurchase Intention pada sektor B2C E-Commerce di Indonesia.
N. Wilson +2 more
semanticscholar +1 more source
Journal of Vacation Marketing, 2022
The purpose of this study is to examine travelers’ actual behavior with regard to an online travel purchase by extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) with two new variables, i.e. perceived privacy and perceived security.
Nikhil Dogra, M. Adil
semanticscholar +1 more source
The purpose of this study is to examine travelers’ actual behavior with regard to an online travel purchase by extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) with two new variables, i.e. perceived privacy and perceived security.
Nikhil Dogra, M. Adil
semanticscholar +1 more source
Kybernetes, 2022
PurposeThe objective of this study is to investigate the effect of consumption values (functional, social, epistemic, and emotional value) on mobile banking (m-banking) usage intention and intention to recommend m-banking services in the context of the ...
Marwa M. Hafez
semanticscholar +1 more source
PurposeThe objective of this study is to investigate the effect of consumption values (functional, social, epistemic, and emotional value) on mobile banking (m-banking) usage intention and intention to recommend m-banking services in the context of the ...
Marwa M. Hafez
semanticscholar +1 more source
Perceived acceptability of biometric security systems
Computers & Security, 1995The present paper examines the perceived acceptability of biometric security systems by a sample of banking and university staff. Results from 76 respondents indicated that all biometric systems were perceived as less acceptable than the traditional password approach.
Deane, F +3 more
openaire +2 more sources
Users' attitude on perceived security of enterprise systems mobility: an empirical study
Information and Computer Security, 2021Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility ...
Ramaraj Palanisamy, Yang Wu
semanticscholar +1 more source

