Focuses on Information Assurance, Security and Privacy Services. This book discusses Program Security, Data Security and Authentication, Internet Scourges, Web Security, Usable Security, Human-Centric Aspects, Security, Privacy and Access Control, Economic Aspects of Security, Threat Modeling, Intrusion and Response
Access options:
The following links lead to the full text from the respective local libraries:
ABSTRACTThis article explores the theoretical underpinnings of the dissonance framework in online consumer satisfaction formation process. Specifically, we suggest that any discrepancy between pre‐ and post‐purchase service performance would help determine consumers' evaluations of online vendors. Drawing upon cognitive dissonance theory, a conceptual model is developed and tested in two different studies (preliminary and main studies). Using data from 191 college students collected longitudinally, the preliminary study demonstrates the validity and reliability of the measurements. Using a comparative analysis, the main study then tests our conceptual model as well as various competing models, including the expectation–confirmation model, with a sample of 292 online consumers. The results in both studies support our main prediction that the service encountered in different stages establishes dissonance. Specifically, we find that dissonance explains online consumers' satisfaction process to a substantial extent, as compared with disconfirmation under the same conditions in online retailers. This study contributes to providing an alternative yet substantial approach for expectation–confirmation theory, reflecting the overarching nature of online shopping.
I:Business Modelling Fundamentals -- Introduction: Business Modelling: Multidisciplinary Approaches -- 1. Gleanings into the Second Best Debate -- 2. Transfer Pricing: From Price Guidelines To Strategic Interaction -- 3. Trading Mechanism Design for Swap Markets -- 4. Production Capacity for Durable Goods -- 5. Cost-Sharing for Pollution Abatement -- 6. A Study on Coefficient Reduction of Binary Knapsack Inequalities -- 7. Qualitative Reasoning: Theory and Applications -- 8. An Architecture for Knowledge Management Featuring Metaknow-ledge -- II-Modelling in Electronic Business -- 9. Multi Agent Enterprise Modeling -- 10. Designing IT-Supported Market Mechanisms for Organizational Coordination -- 11. Congestion Based Pricing and Management of Distributed Computational Resources -- 12. Pricing Virtual Private Networks - An Economic, Engineering and Experimental Approach -- 13. Knowledge Representation: A Classification with Applications in Telecommunications and the Web -- 14. Quasi-naturally Occurring Experiments with Electronic Markets and Digital Products -- 15. Finding the Right Products and Devising Marketing Strategies for E-Tailing -- 16. To Surf Or To Ride -- 17. Organizational and Economic Mechanisms for Buyer-Supplier Contracts -- 18. The Intelligent Internal Accounting Control Model under E-Business Environment -- 19. Internet Diffusion in Developing Countries -- III Multidisciplinary Business Modelling Progress -- 20. Advances in Business Problem Solving: Bridging Business and Computing Disciplines -- 21. The Intellectual Contribution of Professor Andrew B. Whinston to the Field of Information Systems in the Past Two Decades -- 22. IT Reference Disciplines - Andy Whinston, A Case Study.
Access options:
The following links lead to the full text from the respective local libraries:
PurposeMobile-based payment is increasing exponentially but in the developing country like India, consumers' perception is highly positive in daily cash transaction. The purpose of this research is to identify and examine the important challenges for mobile wallet (m-wallet) implementation in India. In the wake of COVID-19, one of the transmission mechanisms of this virus has been the coins and paper money passed between a buyer and a seller. As such m-wallet considered as a convenience of payment has become a necessity in light of the pandemic.Design/methodology/approachThe authors explored 19 unique sets of challenges selected from the literature and collected data from 14 experts from private sector, multinational corporations and mixed private and public partnership who have significant knowledge and experience of mobile payment implementation and use in their respective organisations. Also, the authors have used Interpretive Structural Modelling (ISM) methodology in developing a hierarchal model for the identified challenges. The authors implemented Cross-Impact Matrix Multiplication Applied to Classification (MICMAC) analysis to classify the identified challenges.FindingsThe ISM-based framework is divided into nine different hierarchical levels. "Lack of strong regulatory compliance (Ch6)" has been recognised as the most important challenge, which inhibited the mobile wallet implementation, whereas "Perception of customers about the value of using mobile wallets (Ch11)" is the most dependent critical challenge. There are seven hierarchical layers in between the top and the bottom level with the varied number of challenges based on their driving and dependence power.Originality/valueThis is the first research to the best of our knowledge that has not only comprehensively reviewed the m-wallet literature but also employed a unique ISM-MICMAC-based approach to develop a framework of challenges for the m-wallet implementation.
PurposeDigital financial services (DFS) have substantial prospect to offer a number of reasonable, appropriate and secure banking services to the underprivileged in developing countries through pioneering technologies such as mobile phone based solutions, digital platforms and electronic money models. DFS allow unbanked people to obtain access to financial services through digital technologies. However, DFS face tough challenges of adoption. Realising this, the purpose of this paper is to identify such challenges and develop a framework.Design/methodology/approachThe authors developed a framework of challenges by utilising interpretive structural modelling (ISM) and fuzzy MICMAC approach. The authors explored 18 such unique set of challenges culled from the literature and further gathered data from two sets of expert professionals. In the first phase, the authors gathered data from 29 professionals followed by 18 professionals in the second phase. All were pursuing Executive MBA programme from a metropolitan city in South India. The implementation of ISM and fuzzy MICMAC provided a precise set of driving, linkage and dependent variables that were used to derive a framework.FindingsISM model is split in eight different levels. The bottom level consists of a key driving challenge V11 (i.e. high cost and low return related problem), whereas the topmost level consists of two highly dependent challenges namely V1 (i.e. risk of using digital services) and V14 (i.e. lack of trust). The prescribed ISM model shows the involvement of "high cost and low return related problem (V11)", which triggers further challenges of DFS.Originality/valueNone of the existing research has explored key challenges to DFS in detail nor formulated a framework for such challenges. To the best of the authors' knowledge, this is the first paper on DFS that attempts to collate its challenges and incorporate them in a hierarchical model using ISM and further divide them into four categories of factors using fuzzy MICMAC analysis.
In: Knowledge and process management: the journal of corporate transformation ; the official journal of the Institute of Business Process Re-engineering, Volume 9, Issue 2, p. 57-71