Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Studies

Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen Jul 2018

Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen

Information Technology & Decision Sciences Theses & Dissertations

Security is identified as a major barrier for consumers in adopting mobile payment. Although existing literature has incorporated security into the Technology Acceptance Model (TAM), the Unified Theory of Acceptance, and the Use of Technology (UTAUT) and it has investigated the way in which security affects consumers’ acceptance of mobile payment, security is a factor only in diverse research models. Studies of mobile payment that focus on security are not available. Additionally, previous studies of mobile payment are based on Direct Carrier Billing- (DCB)-based mobile payment or Near Field Communication- (NFC)-based mobile payment. The results regarding security might not be …


Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler Jul 2014

Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler

Health Services Research Dissertations

States and the federal government continue to invest heavily in child welfare information systems (CWIS) to improve caseworkers' performance, but the extent to which these systems meet caseworkers' needs is unclear. In the field of child welfare there are no reliable user-evaluation measures states can use to assess the degree to which a CWIS meets caseworkers' needs, and identify which specific features of the CWIS most need improvement. The study developed such a measure based on the task-technology fit (TTF) framework, which posits that users will evaluate the usefulness of a technology based on how well it meets their tasks …


Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens Apr 2014

Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens

Electrical & Computer Engineering Theses & Dissertations

The licensed wireless spectrum is currently under-utilized by as much as 85%. Cognitive radio networks have been proposed to employ dynamic spectrum access to share this under-utilized spectrum between licensed primary user transmissions and unlicensed secondary user transmissions. Current secondary user opportunistic spectrum access methods, however, remain limited in their ability to provide enough incentive to convince primary users to share the licensed spectrum, and they rely on primary user absence to guarantee secondary user performance. These challenges are addressed by developing a Dynamic Spectrum Co-Access Architecture (DSCA) that allows secondary user transmissions to co-access transparently and concurrently with primary …