scholarly journals Culture and Consumer Trust in Online Businesses

Author(s):  
Robert Greenberg ◽  
Bernard Wong-On-Wing ◽  
Gladie Lui

The importance of consumer trust to the success of online businesses is well documented in the literature. Given the global nature of online transactions, an important question is whether trust and trust formation differ across cultures. This study compared Hong Kong and U.S. consumer trust in online businesses. Specifically, the study examined security and privacy risks related to the purchase of products as well as services. The results show that significant differences exist between consumers from the two countries regarding the perceived level of online business risks and the formation of trust via the transference process. These findings reiterate and underscore the significance of including national culture in studies of trust in e-commerce. The results also have potential implications for online businesses as well as third party certification and assurance services.

2010 ◽  
pp. 1402-1421
Author(s):  
Robert Greenberg ◽  
Bernard Wong-On-Wing ◽  
Gladie Lui

The importance of consumer trust to the success of online businesses is well documented in the literature. Given the global nature of online transactions, an important question is whether trust and trust formation differ across cultures. This study compared Hong Kong and U.S. consumer trust in online businesses. Specifically, the study examined security and privacy risks related to the purchase of products as well as services. The results show that significant differences exist between consumers from the two countries regarding the perceived level of online business risks and the formation of trust via the transference process. These findings reiterate and underscore the significance of including national culture in studies of trust in e-commerce. The results also have potential implications for online businesses as well as third party certification and assurance services.


2022 ◽  
Vol 22 (1) ◽  
pp. 1-22
Author(s):  
David Major ◽  
Danny Yuxing Huang ◽  
Marshini Chetty ◽  
Nick Feamster

Many Internet of Things devices have voice user interfaces. One of the most popular voice user interfaces is Amazon’s Alexa, which supports more than 50,000 third-party applications (“skills”). We study how Alexa’s integration of these skills may confuse users. Our survey of 237 participants found that users do not understand that skills are often operated by third parties, that they often confuse third-party skills with native Alexa functions, and that they are unaware of the functions that the native Alexa system supports. Surprisingly, users who interact with Alexa more frequently are more likely to conclude that a third-party skill is a native Alexa function. The potential for misunderstanding creates new security and privacy risks: attackers can develop third-party skills that operate without users’ knowledge or masquerade as native Alexa functions. To mitigate this threat, we make design recommendations to help users better distinguish native functionality and third-party skills, including audio and visual indicators of native and third-party contexts, as well as a consistent design standard to help users learn what functions are and are not possible on Alexa.


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Ming Di ◽  
Shah Nazir ◽  
Fucheng Deng

The wide-ranging implementation of Android applications used in various devices, from smartphones to intelligent television, has made it thought-provoking for developers. The permission granting mechanism is one of the defects imposed by the developers. Such assessing of defects does not allow the user to comprehend the implication of privacy for granting permission. Mobile applications are speedily easily reachable to typical users of mobile. Despite possible applications for improving the affordability, availability, and effectiveness of delivering various services, it handles sensitive data and information. Such data and information carry considerable security and privacy risks. Users are usually unaware of how the data can be managed and used. Reusable resources are available in the form of third-party libraries, which are broadly active in android apps. It provides a diversity of functions that deliver privacy and security concerns. Host applications and third-party libraries are run in the same process and share similar permissions. The current study has presented an overview of the existing approaches, methods, and tools used for influencing user behavior concerning android privacy policy. Various prominent libraries were searched, and their search results were analyzed briefly. The search results were presented in diverse perspectives for showing the details of the work done in the area. This will help researchers to offer new solutions in the area of the research.


2012 ◽  
Vol 2 (2) ◽  
pp. 10-24
Author(s):  
Anuradha Reddy ◽  
G. V. Bhavani Prasad

With the introduction of Internet and e-commerce many companies have been performing their business transactions through e-portals. Increasing technology has bought tremendous changes in online business transactions (buying and selling). This paper examines consumer perceptions of varying characteristics of e-portals, identifies various factors that influence consumer trust and privacy e-portals, and analyzes how various security and privacy factors affect consumer perceptions toward e-portals. A survey questionnaire consisting 21 questions was developed and mailed to 150 e-commerce (B2B and B2C) consumers in 3 emirates of UAE wherein 108 individuals responded. Questions were developed from a literature review of news, as well as security and privacy issues. Factor analysis that included principal component analysis and varimax rotation was performed on all multiple scale items that determined retention of items. Results indicated that most participants are concerned about security and privacy issues while they are using e-portals, but few participants stated that security is the main issue that creates a barrier for their online shopping. Most participants are not aware of internet privacy and security policies and are not interested in knowing technology used for security of e-portals.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-26
Author(s):  
Georgios Fragkos ◽  
Cyrus Minwalla ◽  
Eirini Eleni Tsiropoulou ◽  
Jim Plusquellic

Electronic cash ( e-Cash ) is a digital alternative to physical currency such as coins and bank notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience much akin to cash, and in direct contrast to traditional forms of payment such as credit and debit cards. Implementing security and privacy within e-Cash, i.e., preserving user anonymity while preventing counterfeiting, fraud, and double spending, is a non-trivial challenge. In this article, we propose major improvements to an e-Cash protocol, termed PUF-Cash, based on physical unclonable functions ( PUFs ). PUF-Cash was created as an offline-first, secure e-Cash scheme that preserved user anonymity in payments. In addition, PUF-Cash supports remote payments; an improvement over traditional currency. In this work, a novel multi-trusted-third-party exchange scheme is introduced, which is responsible for “blinding” Alice’s e-Cash tokens; a feature at the heart of preserving her anonymity. The exchange operations are governed by machine learning techniques which are uniquely applied to optimize user privacy, while remaining resistant to identity-revealing attacks by adversaries and trusted authorities. Federation of the single trusted third party into multiple entities distributes the workload, thereby improving performance and resiliency within the e-Cash system architecture. Experimental results indicate that improvements to PUF-Cash enhance user privacy and scalability.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Daniel Jung Yue Chun ◽  
Wahid Abdul Nabsiah ◽  
Cheng Ling Tan

Purpose This paper aims to discover why such a public partnership project had been successful with a non-profit third-party alliance such as a smart city consortium (SCC) promoting smart city development. Design/methodology/approach This descriptive case study is primarily based on analysing data collected from various texts, public statements, media interviews and three semi-structured interviews with key members involved in the Covid-19 dashboard project. Findings The data and analysis reviews that both interpersonal and interorganisational trust, dedication and proactiveness of the leaders at SCC were major contributing factors to why SCC was able to partner with the Hong Kong Government in the Covid-19 dashboard in the first place and that the success was also a direct outcome of effective mass collaborative knowledge management activities. Research limitations/implications The research in leadership attributes and activities in the non-profit alliance has been few and this collaborative partnership between the alliance and the government is an example of the importance of further research in smart city leadership. Practical implications In deploying projects for mass collaboration and knowledge sharing in smart city development (which is multi-disciplinary in nature). there are still many new and evolving organisational practices and leadership matters that many business leaders and city managers can learn from. Social implications Smart city development projects involve the notion of sharing data in an open environment enabled by software and mediating tools. Successful projects such as this Hong Kong Covid-19 dashboard which serves a diverse audience can further promote the importance of an open data policy regime for the benefit of the public. Originality/value This case study covers a highly original and unique case study with the leaders at the SCC and representatives from the Hong Kong Government.


Sign in / Sign up

Export Citation Format

Share Document