Current Search: Electronic commerce -- Security measures (x)
View All Items
- Title
- Implementation of a fuzzy-logic-based trust model.
- Creator
- Zhao, Yuanhui., Florida Atlantic University, Zhuang, Hanqi, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In the last 10 years, due to the rapid developments in computers and Internet, the Electronic Commerce has advanced significantly. More and more companies have shifted their businesses activities to the Internet. However, the popular use of ecommerce has also raised serious security problems. Therefore developing security schemes has become a key issue both in the academic as well as industrial research. Since the Internet is open to the public, the associated security issue is challenging. A...
Show moreIn the last 10 years, due to the rapid developments in computers and Internet, the Electronic Commerce has advanced significantly. More and more companies have shifted their businesses activities to the Internet. However, the popular use of ecommerce has also raised serious security problems. Therefore developing security schemes has become a key issue both in the academic as well as industrial research. Since the Internet is open to the public, the associated security issue is challenging. A good security strategy should not only protect the vendors' interest, but also enhance the mutual trust between vendors and customers. As a result, the people will feel more confident in conducting e-commerce. This thesis is dedicated to develop a fuzzy-logic based trust model. In general, the ecommerce transactions need costly verification and authentication process. In some cases, it is not cost effective to verify and authenticate each transaction, especially for transactions involving only small amount of money and for customers having an excellent transaction history. In view of this, in this research a model that distinguishes potentially safe transactions from unsafe transactions is developed. Only those potentially unsafe transactions need to be verified and authenticated. The model takes a number of fuzzy variables as inputs. However, this poses problems in constructing the trust table since the number of fuzzy rules will increase exponentially as the number of fuzzy variables increase. To make the problem more trackable, the variables are divided into several groups, two for each table. Each table will produce a decision on trust. The final decision is made based on the "intersection" of all these outputs. Simulation studies have been conducted to validate the effectiveness of the proposed trust model. Therefore simulations, however, need to be tested in a real business environment using real data. Relevant limitations on the proposed model are hence discussed and future research direction is indicated.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12812
- Subject Headings
- Fuzzy logic, Electronic commerce--Security measures
- Format
- Document (PDF)
- Title
- The impact of IT security psychological climate on salient user beliefs toward IT security: an empirical study.
- Creator
- Warner, Janis A., College of Business, Information Technology and Operations Management
- Abstract/Description
-
There is a growing need to better understand what influences user behavior for developing comprehensive IT security systems. This study integrates two prominent bodies of research, the theory of planned behavior used to frame the factors influencing user behavior and individual level climate perceptions used to frame organizational environment influences, to develop a multidimensional IT security user behavior model. The model is then used as the basis for a survey based research to...
Show moreThere is a growing need to better understand what influences user behavior for developing comprehensive IT security systems. This study integrates two prominent bodies of research, the theory of planned behavior used to frame the factors influencing user behavior and individual level climate perceptions used to frame organizational environment influences, to develop a multidimensional IT security user behavior model. The model is then used as the basis for a survey based research to empirically test the hypotheses whether the perceived IT security climate of an organization significantly influences the users beliefs regarding the use of IT security. The intent of the study is to extend the theory of planned behavior and IT security literature by investigating salient IT security beliefs and environmental influences on those beliefs. First, anti-spyware was identified as an appropriate target IT security artifact, and then incorporated into a multi-phased research approach. Second, a semi-structured interview process was used to elicit salient beliefs regarding use of the IT security artifact. Third, IT security psychological climate was conceptualized based on the extant literature on organizational climate, safety climate and IT security in order to examine the organizational environment influences on these beliefs. Finally, a survey was used to collect data to validate the constructs and test the hypothesized relationships., The study found that there was a significant positive relationship between IT security psychological climate and 1) the belief that anti-spyware will protect organizational interests such as privacy and data, 2) the belief that anti-spyware will prevent disruptions to work, 3) the belief that the approval of anti-spyware use by the technical support group is important, 4) the belief that monetary resources are needed to enable the use of anti-spyware, and 5) the belief that time is a facilitating condition for the use of anti-spyware. A discussion of the findings and their implications for theory and practice is provided.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186772
- Subject Headings
- Security (Psychology), Electronic commerce, Security measures, Web sites, Design, Consumer behavior, Mathematical models, Organizational effectiveness
- Format
- Document (PDF)