Software security and privacy risks in mobile e-commerce

2001 ◽  
Vol 44 (2) ◽  
pp. 51-57 ◽  
Author(s):  
Anup K. Ghosh ◽  
Tara M. Swaminatha
2014 ◽  
Vol 10 (2) ◽  
pp. 78-95 ◽  
Author(s):  
Karen Smith ◽  
Francis Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


2007 ◽  
Vol 2 (7) ◽  
Author(s):  
Marci Meingast ◽  
Jennifer King ◽  
Deirdre K. Mulligan

2020 ◽  
Vol 9 (1) ◽  
pp. 91 ◽  
Author(s):  
Nasser Taleb ◽  
Elfadil A. Mohamed

This study is a literature review on cloud computing cloud computing trends as one the fastest growing technologies in the computer industry and their benefits and opportunities for all types of organizations. In addition, it addresses the challenges and problems that contribute to increasing the number of customers willing to adopt and use the technology. A mixed research study approach was adopted for the study, that is, by collecting and analyzing both quantitative and qualitative information within the same literature review and summarizing the findings of previous (related) studies. Results highlights the current and future trends of cloud computing and exposes readers to the challenges and problems associated with cloud computing. The reviewed literature showed that the technology is promising and is expected to grow in the future. Researchers have proposed many techniques to address the problems and challenges of cloud computing, such as security and privacy risks, through mobile cloud computing and cloud-computing governance.


2010 ◽  
pp. 1402-1421
Author(s):  
Robert Greenberg ◽  
Bernard Wong-On-Wing ◽  
Gladie Lui

The importance of consumer trust to the success of online businesses is well documented in the literature. Given the global nature of online transactions, an important question is whether trust and trust formation differ across cultures. This study compared Hong Kong and U.S. consumer trust in online businesses. Specifically, the study examined security and privacy risks related to the purchase of products as well as services. The results show that significant differences exist between consumers from the two countries regarding the perceived level of online business risks and the formation of trust via the transference process. These findings reiterate and underscore the significance of including national culture in studies of trust in e-commerce. The results also have potential implications for online businesses as well as third party certification and assurance services.


2016 ◽  
Vol 4 (1) ◽  
pp. 1-16 ◽  
Author(s):  
Linda Barthelus

Innovative technologies enable firms to strengthen their market position in today’s increasingly turbulent and competitive business environment. Cloud computing, an innovative technology, allows users to process and store data virtually via the internet and central remote servers. The purpose of this paper is to examine the forces that influence the adoption of cloud computing within the healthcare industry, through the theoretical lens of innovation resistance and the innovation decision process. This paper applied an evidence-based research methodology that consists of a systematic review of primary literature and a thematic synthesis of findings. The findings indicate that the primary reasons for resistance to cloud adoption within the healthcare industry are security and privacy risks to sensitive patient data, integration challenges, and a firms’ potential to lose control of data to cloud providers. However, incorporating analytical tools and safeguards into the decision process can mitigate these challenges. This study deepens knowledge of innovation resistance, which has been limited to innovation research thus far, and presents a conceptual model of how resistance affects each stage of the innovation decision process. This study proposes the cloud adoption toolkit to healthcare decision makers as a practical solution to address the challenges of cloud adoption.


2022 ◽  
Vol 22 (1) ◽  
pp. 1-22
Author(s):  
David Major ◽  
Danny Yuxing Huang ◽  
Marshini Chetty ◽  
Nick Feamster

Many Internet of Things devices have voice user interfaces. One of the most popular voice user interfaces is Amazon’s Alexa, which supports more than 50,000 third-party applications (“skills”). We study how Alexa’s integration of these skills may confuse users. Our survey of 237 participants found that users do not understand that skills are often operated by third parties, that they often confuse third-party skills with native Alexa functions, and that they are unaware of the functions that the native Alexa system supports. Surprisingly, users who interact with Alexa more frequently are more likely to conclude that a third-party skill is a native Alexa function. The potential for misunderstanding creates new security and privacy risks: attackers can develop third-party skills that operate without users’ knowledge or masquerade as native Alexa functions. To mitigate this threat, we make design recommendations to help users better distinguish native functionality and third-party skills, including audio and visual indicators of native and third-party contexts, as well as a consistent design standard to help users learn what functions are and are not possible on Alexa.


Sign in / Sign up

Export Citation Format

Share Document