共查询到20条相似文献,搜索用时 0 毫秒
1.
《Behaviour & Information Technology》2012,31(5):587-601
Although previous research has established that interpersonal trust and system trust are critical in shaping individual behaviour in virtual settings, the two perspectives have not been examined by IS researchers in virtual communities (VCs) simultaneously. Drawing from prior literature on trust and VCs, a research model for understanding the importance of trust in members and trust in system and their antecedents in VCs is presented. Six trust-building factors were identified using three trust-building bases (calculative base, relationship base and technology base). Data were collected from 324 members of a technical VC to test the model. The study shows that trust in members and trust in system have significant influences on knowledge sharing intention. The study also indicates that knowledge growth, perceived responsiveness and shared vision affect trust in members positively, while knowledge quality influences trust in system significantly. The study discusses the theoretical and managerial implications of this study and proposes several future research directions. 相似文献
2.
Although it is plausible to assume that the risks of disclosing personal data online are inexorably more prevalent in transactions with commercial organizations than with government organizations, such risks can also thrive in exchanges with the latter. While it is argued that risk perceptions necessitate trust, several studies have also noted that trust in an interaction or an exchange partner could significantly contribute to the reduction of the perceptions of the risks involved in an interaction or an exchange. An Internet-based survey with 208 Internet users from three Dutch cities was conducted to collect the necessary data to test the research hypotheses. Results of the online survey reveal that Dutch Internet users’ trust in a government organization’s ability to protect citizens’ personal data and users’ assessment of the sensitivity of personal data disclosed for e-government transactions are related to the perceived risks of disclosing such data negatively and positively, respectively. 相似文献
3.
随着电子政务的发展,跨域通信的需求越来越迫切,这种情况下为了保证安全需要陌生主体间能够建立信任连接,这在原有信息交换系统中是无法实现的.为此引入信任协商技术,它是一种在不同领域主体间建立信任连接的新技术,它通过信任证、访问控制策略的交互披露来自动建立信任关系.介绍了原有信息交换系统的缺陷、信任协商技术的基本概念,并对信任协商技术与信息交换系统的结合进行了研究,提出了一种可行的系统实现及其策略算法,从而满足在安全性和扩展性方面的要求. 相似文献
4.
韩谷萍 《数字社区&智能家居》2009,(35)
该文首先阐述了我国政府电子政务平台建设基本情况,指出当前电子政务所面临的各种问题。通过对SOA的概念介绍,指出其应用于政府电子政务上必要性,并提出了SOA架构下实施电子政务系统的方法,最后对该方法的可操作性进行了探讨。 相似文献
5.
Privacy policy statements and privacy assurance cues are among the most important website features that online providers use to increase individuals’ trust and willingness to disclose private information online. The focus of this study is a comprehensive examination of the process by which privacy assurance mechanisms influence trust and the moderating role of privacy concern in this process. We use the lens of the Elaboration Likelihood Model to investigate the way different individuals perceive and process privacy assurance mechanisms. We argue that the trust-enhancing role of these mechanisms depends on the individual’s privacy concern. The results of this study articulate the process by which various privacy assurance mechanisms operate in enhancing an individual’s trust, and show that there are distinct behavioral differences between individuals with high- vs low-privacy concern when forming their trust to disclose private information. The paper sheds new light on the role of elaboration in the trust building process, and shows why privacy assurance mechanisms have different impacts depending on individuals’ privacy concerns. 相似文献
6.
Jaehun Joo 《Information Technology for Development》2016,22(1):94-116
This study analyzes the determinants of information security that influence the adoption of Web-based integrated information systems (IIS) by government agencies in Peru. The study introduces Web-based information systems designed to formulate strategic plans for the Peruvian government. A theoretical model is proposed to test the impact of organizational factors such as deterrent efforts, severity efforts, and preventive efforts and individual factors such as perceived information security threats and security awareness on intentions to use Web-based IIS. The empirical results indicate that deterrent efforts and deterrent severity have no significant influence on use intentions of IIS, whereas preventive efforts play an important role in such intentions. Information security awareness and perceived information security threats as individual factors have a significant effect on intentions to use the system. This suggests that organizations should implement preventive efforts by introducing various information security solutions, and improve information security awareness while reducing perceived information security threats. 相似文献
7.
This study investigated employees’ information systems security policy (ISSP) compliance behavioural intentions in organisations from the theoretical lenses of social bonding, social influence, and cognitive processing. Given that previous research on ISSP compliance has been based on deterrence theory, this study seeks to augment and diversify research on ISSP compliance through its theoretical perspective. Relevant hypotheses were developed to test the research conceptualisation. Data from a survey of business managers and IS professionals confirmed that social bonds that are formed at work largely influence attitudes towards compliance and subjective norms, with both constructs positively affecting employees’ ISSP compliance. Employees’ locus of control and capabilities and competence related to IS security issues also affect ISSP compliance behavioural intentions. Overall, the constructs in the research model enhance our understanding of the social-organisational and psychological factors that might encourage or accentuate employees’ ISSP compliance in the workplace. 相似文献
8.
Given the uncertainty of online transactions, the digital economy encourages the creation of institutional structures that assure online interorganizational exchange relationships. This research examines how institution-based trust develops in online B2B marketplaces to facilitate interorganizational trust (buyers' trust in sellers). Building upon the notion of institutional trust [Zucker,1986], this study proposes how specific institution-based structures help engender interorganizational trust and indirectly influence transaction success in B2B marketplaces. Five specific institution-based mechanisms are proposed—perceived monitoring, perceived legal bonds, perceived accreditation, perceived feedback, and perceived cooperative norms. To assess the influence of the proposed two dimensions of interorganizational trust—credibility and benevolence—in buyer–seller relationships, three trust outcomes are examined—satisfaction, perceived risk, and continuity. The proposed model is tested on data from 102 organizational buyers in an online B2B marketplace. The results support the proposed model, delineating the relationship between institution-based trust and interorganizational trust. The study provides evidence on how specific institutional mechanisms build trust in online B2B marketplaces, stressing the ability of institution-based trust to build a trustworthy trading environment in the digital economy. The paper discusses the theoretical and managerial implications of this study and proposes several suggestions for future research. 相似文献
9.
This article examines the relationship between online dispute resolution (ODR) and trust. We discuss what trust is, why trust is important, and how trust develops. Our claim is that efforts to implement online dispute resolution on a site or service in a manner that promotes trust need to consider ODR as just one tool in a broader toolbox of trust-building tools and techniques. These techniques are amongst others marketing, education, trust seals, and transparency. By evaluating ODR in its proper context as one component of a larger trust strategy, we can more accurately set expectations for its results and position our projects for success.“Trust in Allah, but tie your camel” – Muslim Proverb 相似文献
10.
This study aims to investigate trust and privacy concerns related to the willingness to provide personal information online under the influence of cross-cultural effects. This study investigated the relationships among the content of online privacy statements, consumer trust, privacy concerns, and the moderating effect of different cultural backgrounds of the respondents. In specific, this study developed a proposed model based on Privacy–Trust–Behavioral Intention model. Further, a total of 500 participants participated in the survey, including 250 from Russia and 250 from Taiwan. The findings indicate a significant relationship between the content of privacy policies and privacy concern/trust; willingness to provide personal information and privacy concern/trust; privacy concern and trust. The cross-cultural effect on the relationships between the content of privacy policies and privacy concern/trust was also found significant. 相似文献
11.
分析目前移动平台信任传递存在的诸多缺陷,针对移动终端的特点及安全需求,提出了一种完整信任链模型,不仅能确保系统启动时的静态可信性,而且也能保障应用程序运行中的动态可信性.通过Dempster-Shafer原理计算信任值的方法验证分析,该模型能够有效解决信任度降低的问题,能增强平台可靠性,并且采用ARM微处理器对方案进行了实验验证. 相似文献
12.
In contrast with most other experimental system trust research, this paper examines indirect information as a basis for trust. In experiment 1, the overall valence of an evaluation concerning a route planner was pitted against a consensus cue, i.e. a favourable opinion about the system endorsed by a minority versus a majority. A positive evaluation caused an increase of system trust, whereas a negative evaluation led to a decrease. Control allocation, i.e. choosing manual or automatic mode, however, remained unaffected. Furthermore, no effect was found of consensus; one explanation holds that, despite the absence of outcome feedback, displaying of routes on-screen provided interfering trust-relevant information. Focusing solely on the consensus effect in the absence of route display, experiment 2 revealed consensus to affect both trust and control allocation.
These experiments show that trust-relevant information can be processed heuristically and systematically. Possibly, trust can also be based on direct information despite absence of feedback whether generated solutions are good or bad. 相似文献
These experiments show that trust-relevant information can be processed heuristically and systematically. Possibly, trust can also be based on direct information despite absence of feedback whether generated solutions are good or bad. 相似文献
13.
在资源分布广泛、实体直接交互稀疏的网格环境中,推荐信任的计算作为网格信任管理模型中的重要组成部分,已成为一个研究的热点问题。该文在阐述网格信任模型基本概念的基础上,围绕推荐信任计算中的几个关键问题展开分析讨论,指出现有机制的利弊,归纳分析了若干相应改进机制,最后提出了关于下一步的研究方向。 相似文献
14.
Ehab ElSalamouny Karl Tikjb Krukow Vladimiro Sassone 《Theoretical computer science》2009,410(41):4067
Research in models for experience-based trust management has either ignored the problem of modelling and reasoning about dynamically changing principal behaviour, or provided ad hoc solutions to it. Probability theory provides a foundation for addressing this and many other issues in a rigorous and mathematically sound manner. Using Hidden Markov Models to represent principal behaviours, we focus on computational trust frameworks based on the ‘beta’ probability distribution and the principle of exponential decay, and derive a precise analytical formula for the estimation error they induce. This allows potential adopters of beta-based computational trust frameworks and algorithms to better understand the implications of their choice. 相似文献
15.
Enterprise systems represent a strategic asset that enables an organization to integrate business processes and data throughout its organization. Firms often rely on consultants to transfer implementation knowledge to their employees and expect successful project outcome; however, widespread project failures raise concerns regarding whether the use of consultants are effective. This study examines whether mutual trust affects knowledge transfer effectiveness which then impacts project outcome. Building on psychological contract, knowledge management, and trust literature, the results of this matched-pair, field survey suggest knowledge transfer mediates the relationship between mutual trust and project outcome. Implications for research and practice are discussed. 相似文献
16.
《Ergonomics》2012,55(9):1197-1206
AbstractResearch on the feeling of embitterment at work is still in its infancy. The present study investigated the predictors and consequences of the feeling of embitterment at work. It was hypothesised that organisational injustice as well as over-controlling supervision would predict embitterment at work and that embitterment would be associated with work-related rumination. Three hundred and thirty-seven employees completed an online survey. Regression analysis revealed that procedural injustice and over-controlling supervision were significant predictors of embitterment and that embitterment contributed significantly to the prediction of increased affective rumination and reduction in detachment. Mediation analysis indicated that embitterment at work was a significant mechanism through which organisational injustice and over-controlling supervision exerted their effect on affective rumination, which is indicative of insufficient recovery from work. Findings suggest that breaches in organisational justice can generate feelings of embitterment at work, which in turn can interfere with employees’ ability to adequately recover from work.Practitioner Summary: The purpose of this study was to investigate predictors and consequences of embitterment in the workplace using an online questionnaire. Findings suggest that perceived unfairness, because of structural and organisational aspects, predicts feelings of embitterment and that feeling embittered at work can prevent employees from adequately recovering from work. 相似文献
17.
近年来,我国钓鱼网站、网络欺诈等网络安全事件层出不穷,扰乱了网络秩序,挫伤了网络用户的信心,严重阻碍网络经济的健康有序发展。本文介绍了网站可信认证相关的概念,分析了国内外网站可信认证的发展概况,针对我国当前网站可信认证所面临的问题,提出了适合我国现阶段发展情况的网站可信认证实现路径。 相似文献
18.
移动电子政务是基于无线网络技术的新型电子政务模式。移动电子政务具有不受网络拓扑结构限制、配置简单、应用灵活等特点。移动电子政务借助移动终端设备,以便捷的方式随时随地提供服务。但是由于移动通信自身的特点,与有线系统相比,移动电子政务系统中的安全问题需要考虑的问题更多。 相似文献
19.
Previous research confirms there are differences between men and women concerning website design preferences. A few researchers have further suggested website preferences based on gender (i.e. whether one is a man or a woman) differ in countries that are typically considered higher in masculinity versus higher in femininity. As such, this supposes fewer differences exist between men and women in more feminine societies, while more significant differences occur in more masculine societies. To test this assumption, we survey a total of 955 participants located in six countries. More particularly, we examine design constructs of Information Content, Navigation Design, Visual Design modeled to Website Trust and Website Satisfaction. We are interested to determine if gender differences are strong in higher masculinity countries and weak in lower masculinity countries. We also investigate if gender moderates the various relationships in our model. As predicted, in higher masculinity countries there are more differences between men and women, and gender is more likely to moderate the relationships in the model. This research has implications for the complexity of website design preferences, and extends earlier work on website design in a multiple country sample where masculinity–femininity differs. Theoretical contributions and design issues are elaborated. 相似文献
20.
蒋文娟 《数字社区&智能家居》2009,(29)
安全是制约电子商务发展的瓶颈。通过分析电子商务安全课程的特点,对《电子商务安全》课程实验教学的实施进行了总结和讨论,并提出今后要改进的方面。 相似文献