Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Mississippi (3)
- California State University, San Bernardino (2)
- Edith Cowan University (2)
- Singapore Management University (2)
- Air Force Institute of Technology (1)
-
- Andrews University (1)
- Brigham Young University (1)
- Central Washington University (1)
- Columbus State University (1)
- Florida International University (1)
- Grand Valley State University (1)
- Selected Works (1)
- Stephen F. Austin State University (1)
- University of Nebraska at Kearney (1)
- University of Texas at El Paso (1)
- University of Wollongong (1)
- Keyword
-
- Accounting -- Data Processing (3)
- Computer (2)
- Evolution (2)
- Information (2)
- Information management (2)
-
- Security (2)
- Antecedents of trust (1)
- Association rules (1)
- B-to-C consumer trust (1)
- Business enterprises (1)
- Business faculty opinions (1)
- Business teachers (1)
- Computer networks. (1)
- Computers (1)
- Consumer online trust (1)
- Consumer satisfaction (1)
- Criminal registers (1)
- Data mining (1)
- El paso county (1)
- Electronic commerce (1)
- Employee rights (1)
- Expectation-confirmation theory (1)
- Forensic computing (1)
- Globalization (1)
- Human Development (1)
- Human development (1)
- Industries--Security measures. (1)
- Information technology--Security measures (1)
- Internet (1)
- Internet banking (1)
- Publication
-
- Newsletters (3)
- Faculty Publications (2)
- Journal of International Information Management (2)
- Research Collection Lee Kong Chian School Of Business (2)
- Theses and Dissertations (2)
-
- Theses: Doctorates and Masters (2)
- All Faculty Scholarship for the College of Business (1)
- Dissertations (1)
- Faculty of Commerce - Papers (Archive) (1)
- Hospitality Review (1)
- IPED Technical Reports (1)
- Kathy K Dhanda (1)
- Mountain Plains Journal of Business and Technology (1)
- Peer Reviewed Articles (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Entire DC Network
An Investigation Of Consumer Online Trust And Purchase-Repurchase Intentions, Dan J. Kim, Donald Ferrin, Raghav Rao
An Investigation Of Consumer Online Trust And Purchase-Repurchase Intentions, Dan J. Kim, Donald Ferrin, Raghav Rao
Research Collection Lee Kong Chian School Of Business
There is little research on trust and satisfaction in the electronic commerce from a longitudinal (pre- and postpurchase) perspective. Based on previous frameworks and theories, this study developed a combined model of consumer trust and satisfaction in the context of Internet shopping. From the valance framework and expectation-confirmation theory, several prepurchase and post-purchase factors such as risk, benefit, consumer trust, expectation, confirmation, and satisfaction are investigated as research variables affecting consumer repurchase intention.
The results of the study show that trust is the strongest predictor of the consumer’s purchase intention. In addition, as in traditional consumer satisfaction studies, it holds …
Business Faculty Opinions Of Teaching Methods And Resources, Gundars Kaupins, Malcolm Coco
Business Faculty Opinions Of Teaching Methods And Resources, Gundars Kaupins, Malcolm Coco
Mountain Plains Journal of Business and Technology
About two hundred and eighty business professors compared seventeen teaching methods and resources based on four objectives. Interactive, hands-on teaching methods such as internships were rated first and less interactive teaching resources such as radio were rated last. Web courses that included more interaction such as chats were rated higher than Web courses with audio, typed lectures, and videos. However, all four types of Web courses investigated were rated in the bottom half of the teaching methods and resources. Results correspond to major principles of andragogy theory.
Infotech Update, Volume 11, Number 5, September/October 2003, American Institute Of Certified Public Accountants. Information Technology Section
Infotech Update, Volume 11, Number 5, September/October 2003, American Institute Of Certified Public Accountants. Information Technology Section
Newsletters
No abstract provided.
Antecedents Of Consumer Trust In B-To-C Electronic Commerce, Dan J. Kim, Donald L. Ferrin, H. Raghav Rao
Antecedents Of Consumer Trust In B-To-C Electronic Commerce, Dan J. Kim, Donald L. Ferrin, H. Raghav Rao
Research Collection Lee Kong Chian School Of Business
Despite the importance of trust in electronic commerce, there is insufficient theory and evidence concerning the determinants of consumer trust about an Internet vendor’s trustworthiness, and the influence of consumer trust on the consumer’s purchasing intention. The purpose of this study is to: i) develop a theoretical framework identifying the antecedents of a consumer’s trust and purchase intention, ii) test the proposed model using Structural Equation Modeling, analyzing Internet consumer behavior data collected via a Web survey, and iii) provide theoretical and managerial implications. The results of the study show that consumers’ disposition to trust, privacy protection, security protection, consumers’ …
Infotech Update, Volume 11, Number 4, July/August 2003, American Institute Of Certified Public Accountants. Information Technology Section
Infotech Update, Volume 11, Number 4, July/August 2003, American Institute Of Certified Public Accountants. Information Technology Section
Newsletters
No abstract provided.
Infotech Update, Volume 11, Number 3, May/June 2003, American Institute Of Certified Public Accountants. Information Technology Section
Infotech Update, Volume 11, Number 3, May/June 2003, American Institute Of Certified Public Accountants. Information Technology Section
Newsletters
No abstract provided.
International Advertising And The Use Of The Sex Appeal: Acceptance Of Sex Appeal In China, Katie Hunt
International Advertising And The Use Of The Sex Appeal: Acceptance Of Sex Appeal In China, Katie Hunt
Theses and Dissertations
Modern American culture reflects equality between men and women. Modern Chinese culture reflects a growing equality between men and women.
Information Sharing And Interoperability In Law Enforcement: An Investigation Of Federal Criminal Justice Information Systems Use By State/Local Law Enforcement Organizations, David R. Dethlefs
Theses and Dissertations
This thesis investigates the frequency of use and perceptions of usefulness of federal criminal justice information systems among state and local law enforcement personnel and certain IS environmental factors that affect usage. The study is predicated by a demonstrated need for increased information sharing, interoperability, and collaboration among the three tiers of law enforcement as public safety threats within U.S. borders increase in complexity; e.g., the Murrah Federal Building bombing, Columbine High School shooting, 9/11 terrorist attacks, and D.C. sniper case. The results of this research indicate high usage and perceived usefulness of the National Crime Information Center Network (NCIC …
Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden
Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden
IPED Technical Reports
No abstract provided.
Employer And Employee Rights And Responsibilities In A Networked Office, Ronald Tidd, Nancy Graber Pigeon
Employer And Employee Rights And Responsibilities In A Networked Office, Ronald Tidd, Nancy Graber Pigeon
All Faculty Scholarship for the College of Business
Internet-connectivity is having a profound impact on the workplace. Employees use it to access data and information from global sources, communicate with others instantaneously regardless of physical proximity, work anytime, anywhere, so long as they have a digital device connected to the Internet. Alternatively, the technology can be used to subject coworkers to objectionable material, violate workers' privacy, and convey the appearance of working when actually abusing Internet resources. This article discusses the existing laws regarding employee usage of an employer's Internet resources and employer monitoring of that usage. Thus, it provides a foundation for understanding a body of law …
Website Performance: Hong Kong Hotels, Rob Law, Tony Chung
Website Performance: Hong Kong Hotels, Rob Law, Tony Chung
Hospitality Review
This research examines the performance of Hong Kong hotel websites in terms of information quality, and compares the performance among different hotel categories. Different from exsisting theoretical studies analyzing hotel websites, this research incorporates the perceptions of hotel guests and practitioners in the evaluation development process. Empirical results reveal that significant differences exist in the performance scores of luxury, mid-priced, and economy hotels. The authors also discuss implications for hotel industry practitioners and policymakers.
A Study Of .Net Framework, Sml Wev Services And Supply Chain Management, Huei Lee, Vance Etnyre, Kuo Lane Chen
A Study Of .Net Framework, Sml Wev Services And Supply Chain Management, Huei Lee, Vance Etnyre, Kuo Lane Chen
Journal of International Information Management
The. primary purpose of this paper is to explore Microsoft's platform - .Net, Web services, and XML for supply chain management. The following topics are studied: 1) The development of scripting languages for a supply chain management application; 2) The use of XML to enhance compatibility of the scripted applications; and 3) The implementation issues of Microsoft .Net platform. To answer the research questions, a technique similar to content analysis is used in this study. Seventeen case studies regarding the implementation of the .Net Web Services are examined.
Tam: The Moderating Effect Of Gender On Online Shopping, Xiaoni Zhang, Victor R. Prybutok
Tam: The Moderating Effect Of Gender On Online Shopping, Xiaoni Zhang, Victor R. Prybutok
Journal of International Information Management
In this study we applied Technology Acceptance Model (TAM) to address consumers' online purchasing intentions and examine the effect of gender as a moderating variable on purchase intention. Six hypotheses were proposed based on our research model. We validate TAM in an ecommerce environment using two split data sets one containing females and the other males. Structural equation modelling and t tests were performed to test the hypotheses. The results show that gender is an important moderating variable in online commerce. Understanding the differences between males and females provides practitioners with better understanding of the behaviour of consumers on the …
Building Literacy For Knowledge Economies: Reading And Writing About Trends And Issues In Business Week, Clive Muir
Building Literacy For Knowledge Economies: Reading And Writing About Trends And Issues In Business Week, Clive Muir
Faculty Publications
Knowledge economies require highly skilled workers to perform complex, information-based tasks with minimum supervision. Yet, studies in Canada and the United States show that even college educated workers often lack the information literacy skills necessary to perform their jobs. In this session, we will discuss how reading and writing about business trends and issues can help to improve business students’ analytical and critical thinking abilities.
How To Handle The Threat Of Catastrophe, Carol M. Sanchez, Stephen R. Goldberg
How To Handle The Threat Of Catastrophe, Carol M. Sanchez, Stephen R. Goldberg
Peer Reviewed Articles
One of the principal jobs of chief executives is to minimize risk and vulnerability to catastrophic events. Analyzing risk has become more complex since September 11, 2001. In addition to terrorism, other catastrophes can change the course of life as we know it including cyber crime, biological attacks, and the spread of diseases such as SARS. Companies must realign corporate priorities and put the security issue at the forefront, as many companies have done since the 9/11 attacks. Risk management has dealt traditionally with two types of events: known risk and unknown risk. Known risks are events you know exist, …
An Examination Of Employees' Understanding And Implementation Of The Information Security Program At Xyz Engineering Center, Dale J. Mancini
An Examination Of Employees' Understanding And Implementation Of The Information Security Program At Xyz Engineering Center, Dale J. Mancini
Dissertations
Purpose of Study. Due to an increase in global competition and employee dishonesty, the need for information security is on the rise. Consequently the XYZ Engineering Center faces an ever-increasing threat of industrial espionage and information theft. Employees of the Center have been given the product-security policy and have been encouraged to secure confidential information. Therefore, this study was designed to determine the level at which employees at the XYZ Engineering Center understand, value, and practice information security. Additionally, the study also examined employee views on physical safety while at work.
Methodology. The study used analysis of variance and a …
Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy
Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy
Faculty Publications
Data mining offers a potentially powerful method for analyzing the large data sets that are typically found in forensic computing (FC) investigations to discover useful and previously unknown patterns within the data. The contribution of this paper is an innovative and rigorous data mining methodology that enables effective search of large volumes of complex data to discover offender profiles. These profiles are based on association rules, which are computationally sound, flexible, easily interpreted, and provide a ready set of data for refinement via predictive models. Methodology incorporates link analysis and creation of predictive models based on association rule input.
Who’S Riding The Wave? An Investigation Into Demographic And Psychographic Characteristics Of Surf Tourists, Sara Dolnicar, M. Fluker
Who’S Riding The Wave? An Investigation Into Demographic And Psychographic Characteristics Of Surf Tourists, Sara Dolnicar, M. Fluker
Faculty of Commerce - Papers (Archive)
Surfing has grown from its beginnings as a western civilisation sport in the early 1900’s to a stage where it is now an industry worth an estimated $8 billion dollars and involves surfers travelling to both domestic and international destinations as surf tourists. However, there is a dearth of empirical academic research that has been conducted into this segment of the sports tourism market. This study makes a contribution towards understanding surf tourism behaviour by analysing the demographic and psychographic characteristics of 430 surf tourists. The most lucrative segments of the five identified, from the tour operators perspective, are the …
Determinants Of Internet Banking Adoption In Thailand, Bussakorn Jaruwachirathanakul
Determinants Of Internet Banking Adoption In Thailand, Bussakorn Jaruwachirathanakul
Theses: Doctorates and Masters
Increasingly competition in the financial services sector is forcing service providers to develop and utilise alternative delivery channels (Daniel, 1999). Within the sector, banking has always been a highly service intensive activity that relies heavily on technology to acquire, process, and deliver services and information to consumers (Tan & Teo, 2000). The emergence of the Internet has provided a way for banks to improve the efficiency of their service delivery and to gain a competitive advantage by reducing the number of brick-and-mortar branches. The study investigated the adoption of lnternet banking services in Thailand and is based on the premise …
Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli
Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli
Theses: Doctorates and Masters
Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what …
Technological Achievement And Human Development: A View From The United Nations Development Programme, Kathy K. Dhanda, Ronald Hill
Technological Achievement And Human Development: A View From The United Nations Development Programme, Kathy K. Dhanda, Ronald Hill
Kathy K Dhanda
No abstract provided.