A Proposed Theoretical Framework for Assessing Quality of E-Commerce Systems

Author(s):  
Sattam Alamro ◽  
Asim El-Sheikh

Companies and institutions in the light of globalization and competitiveness are seeking to improve their services, particularly electronic access to excellence. With the tremendous growth in the global digital transactions, the entry of electronic commerce strongly in global business dealings under acceleration, heated competition in the provision of electronic services, the companies are keen on achieving the principle of comprehensive quality and special electronic sites and services on the Internet. Thus, those sites become electronic firms, so it must give good impression about the company from the outset. The significance of the study is that it addresses one of the vital issues of our time, which is the current enormous revolution in information technology and communications, it provides a framework to the quality of sites and electronic services are comprehensive, objective and flexible to reach the ideal site. The proposed framework can be used to compare the quality of E-Commerce systems, or to improve the image and performance of a particular E-Commerce systems or to provide reference guide for designers of the sites where their determination to new sites. This chapter examined and analyzed previous research studies that interrelated with the quality of sites and electronic services, and then developed an inclusive theoretical framework. This framework consisted of new indicators that are clear, measurable, and flexible to the possibility of its application on all sites and services, regardless of the nature of the company or institution. Consequently, the proposed framework can be applied easily to evaluate the quality of any system.

Author(s):  
Zhiping Wang ◽  
Xinxin Zheng ◽  
Zhichen Yang

The Internet of Things (IoT) technology is an information technology developed in recent years with the development of electronic sensors, intelligence, network transmission and control technologies. This is the third revolution in the development of information technology. This article aims to study the algorithm of the Internet of Things technology, through the investigation of the hazards of athletes’ sports training, scientifically and rationally use the Internet of Things technology to collect data on safety accidents in athletes’ sports training, thereby reducing the risk of athletes’ sports training and making athletes better. In this article, the methods of literature research, analysis and condensing, questionnaire survey, theory and experiment combination, etc., investigate the safety accident data collection of the Internet of Things technology in athletes’ sports training, and provide certain theories and methods for future in-depth research practice basis. The experimental results in this article show that 82% of athletes who are surveyed under the Internet of Things technology will have partial injuries during training, reducing the risk of safety accidents in athletes’ sports training, and better enabling Chinese athletes to achieve a consistent level of competition and performance through a virtuous cycle of development.


10.28945/2459 ◽  
2002 ◽  
Author(s):  
Simona Cerrato

There is an increasing demand for what we can call pop-science that is pertinent scientific information dedicated to the non-specialists. This demand comes both from professional categories and the general public. Simultaneously in the scientific community there is an increasing consciousness that diffusion of the scientific information is an asset the scientific community cannot afford to overlook. The Internet is a perfect tool to meet this demand. It reaches a large and ever-increasing number of people and permits an interactive and detailed exchange of information. As an experiment of how to combine high quality services and the information technology, we have set up Ulisse - In the net of science (http://ulisse.sissa.it), an innovative Italian project for the popularisation of science via the Internet. Its main purpose is to establish a connection between scientists and the general public. Ulisse is based on three major characteristics: a) high technology to create an efficient and friendly system, b) customisation of the services, c) a network of scientists, which guaranteed the quality of the materials.


2012 ◽  
pp. 1609-1620
Author(s):  
Anette Weisbecker

Cloud Computing has become the predominant paradigm in information technology for the use of distributed resources. It enables the Internet of Services where different provider offer services and compose services to new value added services. For the emerging service value chains the quality the services plays an important role. Therefore, beside software engineering methods aspects like quality of services, business models, and the interaction with the customer have to be considered during the development of cloud services. This chapter describes how these aspects can be integrated in the development process by combining software and service engineering methods and considering quality as a critical success factor in the design time.


2016 ◽  
Vol 2016 ◽  
pp. 1-14 ◽  
Author(s):  
Hong Zhong ◽  
Song Li ◽  
Ting-Fang Cheng ◽  
Chin-Chen Chang

With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.


2021 ◽  
Vol 7 (2) ◽  
pp. 333-341
Author(s):  
Pindyana Adiatama

Background of the study: The college library is the heart of higher education. In the era of information technology today the needs and desires of the settlers vary and change. Librarians are required to be creative and have competence when managing libraries and serving the users. Librarians must develop better performance by paying attention to the quality of service to users. Purpose: The research aims to determine creativity to improve the service and performance of the librarian. Method: This research uses qualitative method. Findings: The results of this research are the efforts of the librarian in increasing the creativity of the librarian's performance, which can be seen from the skills and abilities gained by the librarians through a formal education of the libraries D3, S1 and S2. In addition to increasing the knowledge and insight of librarians write scientific works. Librarians also participate in and hold training, workshops, socialization and book reviews. Conclusion: The organizational environment encourages creativity such as awards given to librarians that can be seen in the performance and aspects of librarian behavior used to calculate incentives. In addition, the support of the leadership and the good team work also affects the creativity of the librarians.


Author(s):  
C. Richard Baker

This chapter adds to the discussion of human and social perspectives in information technology by examining the existence and extent of fraudulent activities conducted through the Internet. The principal question addressed by this chapter is whether fraudulent activities perpetuated using the Internet constitute a new type of fraud, or whether they are classic forms of fraud appearing in a new medium. Three areas of fraud are investigated, namely: securities fraud, fraud in electronic commerce, and fraud arising from the rapid growth of Internet companies. The U.S. Securities and Exchange Commission (SEC) has cited more than 100 companies for committing securities fraud using the Internet. Actions prohibited under U.S. securities laws are now being conducted through the Internet, and the SEC has taken steps to suppress these frauds (SEC, 2001). The rapid growth of electronic commerce, and the natural desire on the part of consumers to feel secure while engaging in electronic commerce, has prompted the creation of mechanisms, such as web site seals and logos, to reduce concerns about fraudulent use of information. It is, however, questionable whether these mechanisms are effective in reducing fraud conducted through the Internet. A third potential area for fraud on the Internet involves the rapid growth of Internet companies, often with little economic substance and lacking in traditional managerial controls. This chapter seeks to examine areas with significant potential for fraud on the Internet and to assess implications of such activities for the management of information technology.


2016 ◽  
Vol 16 (2) ◽  
pp. 619-645 ◽  
Author(s):  
Gregory DeAngelo ◽  
Bryan C. McCannon

Abstract Numerous empirical studies have documented policing behavior and response to public opinion, social norms, changing laws, neighborhood context and a litany of other subject areas. What is missing from this literature is a general theoretical framework that explains the conflicting goals of properly applying the law and responding to social norms and the consequences of the law. We build a theoretical framework where law enforcement officials care about both reputation and performance. Outside evaluations assess the quality of the decision making of the officers, but can be influenced by strategic challenging of the sanctioning by the suspected violators. We first establish that reputational concerns can distort law enforcement, encouraging either over-enforcement or under-enforcement of the law, depending on the prior beliefs of violations and the observed signal. Introducing strategic challenging by the violator eliminates over-enforcement and allows for an even larger reduction in application of the law by less-skilled officers. Connections to empirical findings of distortions in law enforcement, along with an extension to deterrence are highlighted.


Author(s):  
Bhumika Aggarwal ◽  
Qian Xiong ◽  
Elisabeth Schroeder-Butterfill

Abstract Aim: Given the paucity of data on the use of internet and quality of life (QoL), this literature review aimed to identify the motivations and barriers for internet use and the impact on QoL on older adults using the internet. Background: Even though older adults are increasingly using information technology, the numbers remain quite small globally. Currently published research primarily focuses on the various ways and methods of information technology use by older adults and the factors influencing use rather than on the impact of information technology on QoL of older adults. Methods: The studies included in this literature review were searched in three databases: WEB of Science, GoogleScholar and PubMed. English language articles were searched using the terms ‘older’, ‘elderly’, ‘senior’, ‘well-being’, ‘life satisfaction’, ‘quality of life’, ‘internet’ and “computer”. Findings: The review demonstrated the association of internet use on QoL in older adults. The majority of the studies substantiate the advantages of internet use by older adults including the ability to communicate with family and friends, maintain a wide social network, have access to information and participate in online leisure activities. There are some studies, though less in number, which did not find a relationship between well-being and use of internet by older adults. The policy implications of this review advocate a multidimensional strategy to support internet use by the older people incorporating internet training and education, financial issues, technical support and access needs to be developed.


Author(s):  
Yanti Desnita Tasri ◽  

Patient care in the registration section of the hospital is a very important activity, because there is a recording of patient data that will be used by other health workers in providing further health care. The use of information technology in the registration section can increase work effectiveness and efficiency and produce accurate information. For this reason, it is necessary to analyze the factors that affect the benefits of using information technology in the registration section. This study aims to examine the relationship between the quality of information systems, the ability of officers and the performance of information users at RSI Siti Rahmah Padang, Indonesia. The research was conducted with survey method and data analysis using a quantitative approach. From the research results, it was found that the quality of information systems did not affect the benefits of using information technology. Meanwhile, the ability and performance of officers affect the benefits of using information technology. It is suggested that the scope of the use of information technology in the medical records section be increased. It is necessary to increase the ability of officers in the use of information technology by holding training or workshops.


Author(s):  
Melda Agnes Manuhutu ◽  
Yulianti Flasao ◽  
Lulu Jola Uktolseja

Accompanied by the development of information technology, communication technology has developed rapidly. One sector that is developing in the field of tourism which contributes to more interactive information through the internet. Where Maybrat Regency has considerable tourism and cultural potential, it is managed by the Maybrat Regency Tourism and Culture Community which is very useful if managed well and effectively. This is to improve the economy of the community, the quality of human resources, through tourism assistance that enables increased regional pride. Accurate presentation of the area that can be used to increase revenue in the region itself. Now there is not enough information about tourist objects in Maybrat Regency so that not many tourists and people know the potential of tourism objects. The system development model used is the prototype model. By building interfaces using Adobe Dreamweaver CS6. The database is stored using php and displayed via XAMMP. This system is also built on the framework of a system that is a code igniter.


Sign in / Sign up

Export Citation Format

Share Document