Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Factors Influencing Service Robot Adoption: A Comparative Analysis Of Hotel-Specific Service Robot Acceptance Models, Ying Dong Dec 2021

Factors Influencing Service Robot Adoption: A Comparative Analysis Of Hotel-Specific Service Robot Acceptance Models, Ying Dong

UNLV Theses, Dissertations, Professional Papers, and Capstones

The market for service robots is expected to expand significantly owing to the increasing relevance of service automation under the outbreak of the COVID-19 pandemic. Despite the growing managerial interest in robotic applications in the hotel industry, current robotic research has been mostly conceptual with limited robot data on hand. In light of this issue, this paper will conduct a comparative analysis of hotel-specific service robot acceptance models between the Service Robot Acceptance Model (sRAM) and the Service Robot Integration Willingness (SRIW) framework. By identifying key elements of each service robot acceptance model, this paper puts an emphasis on investigating …


Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova May 2013

Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova

UNLV Theses, Dissertations, Professional Papers, and Capstones

This paper aims to answer an important question regarding the development of new information systems (IS): "What is the predominant factor for the selection of communication artifacts for requirements engineering (RE)?". Many researchers have focused on the RE and communication as separate disciplines, but little or no research addressed the RE communication issues. These problems are important because they often lead to misunderstanding and misinterpretation of the gathered requirements. We develop expectations about the RE communication process based on prior literature from both disciplines and we test them through several case studies. Our methodology consists of analysis of six case …


A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim Apr 2010

A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim

UNLV Theses, Dissertations, Professional Papers, and Capstones

Nowadays, electronic payment system is an essential part of modern business. Credit cards or debit cards have been widely used for on-site or remote transactions, greatly reducing the need for inconvenient cash transactions. However, there have been a huge number of incidents of credit card frauds over the Internet due to the security weakness of electronic payment system. A number of solutions have been proposed in the past to prevent this problem, but most of them were inconvenient and did not satisfy the needs of cardholders and merchants at the same time.

In this thesis, we present a new secure …