Third Party Internet Seals

Author(s):  
Peter Kerkhof ◽  
Guda van Noort

Buying online is still perceived as risky. A key strategy of online marketers to increase consumer trust in online ordering is to display privacy and security seals on their web sites. Although research indicates that these Internet seals do not necessarily mean better safety for online consumers, findings of several other studies demonstrated that these safety cues do influence consumer responses. The goal of this chapter is to provide the reader with an overview of findings regarding the persuasiveness of Internet seals and to reflect upon possible explanatory mechanisms for these effects. Future research directions and managerial implications for e-business are provided.

2007 ◽  
Vol 2 (2) ◽  
pp. 61-73 ◽  
Author(s):  
Sally Rao ◽  
Indrit Troshani

Mobile services are heralded to create a tremendous spectrum of business opportunities. User acceptance of these services is of paramount importance. Consequently, a deeper insight into theory-based research is required to better understand the underlying motivations that lead users to adopting mobile services. As mobile services bring additional functional dimensions, including hedonic and experiential aspects, using extant models for predicting mobile services acceptance by individuals may be inadequate. The aim of this paper is to explore, analyse and critically assess the use of existing acceptance theories in the light of the evolving and ubiquitous mobile services and their underlying technologies. Constructs affecting consumer adoption behaviour are discussed and relevant propositions are made. Managerial implications are explored and future research directions are also identified.


2020 ◽  
pp. 0032258X2096858
Author(s):  
Alexander E Carter ◽  
Mariea Hoy ◽  
Betsy Byrne DeSimone

Despite law enforcement’s best efforts to use social media as a means of community policing, some engagement tactics may lead citizens to disclose personally identifiable information (PII). We coded 200 tweets with the popular #9PMRoutine that tagged @PascoSheriff (Florida) for participant PII. We found numerous postings of adults’ and children’s PII that are problematic including pictures, health information and security-related comments about their routines or vacations. Implications for law enforcement to protect their communities are discussed as well as opportunities to continue to cultivate their online relationships in a more secure forum. We also provide future research directions.


Author(s):  
Ammar Rashid ◽  
William Yu Chung Wang ◽  
Felix B. Tan

In recent years, there has been considerable interest in cloud services in academic literature. Most research in this area has focused on the technical aspects of designing and implementing cloud services, with few studies focusing on understanding the value of cloud services and the processes by which consumer and service providers engage each other to co-create these services. This chapter explains the co-creation processes, and, the role of consumer in the value co-creation process of cloud services. It incorporates extant marketing and information systems literature, industry reports, and practical experience reflections to highlight the significance of cloud services. The drivers of co-creation are explored with the description of co-creation processes and the underlying factors involved in value co-creation of cloud services. The chapter concludes by outlining the opportunities associated with the development of cloud services, noting future research directions and discussing academic and managerial implications.


2008 ◽  
pp. 193-215 ◽  
Author(s):  
Indrit Troshani ◽  
Sally Rao Hill

Mobile services are touted to create a significant spectrum of business opportunities. Acceptance of these services by users is, therefore, of paramount importance. Consequently, a deeper insight is required to better understand the underlying motivations leading users to adopting mobile services. Further, enhanced understanding would also help designing service improvements and appropriate adoption strategies. Most of the existing theoretical acceptance models available originate from organisational contexts. As mobile services bring additional functional dimensions, such as hedonic or experiential aspects, using extant models for predicting mobile services acceptance by individuals may be inadequate. The aim of this chapter is to explore and critically assess the use of existing acceptance theories in the light of evolving mobile services. Constructs affecting adoption behaviour are discussed and relevant extensions are made which culminate with a framework for mobile services adoption. Managerial implications are explored and future research directions are also identified.


1982 ◽  
Vol 19 (2) ◽  
pp. 240-254 ◽  
Author(s):  
Pradeep K. Tyagi

The author examines how organizational climate contributes to salespersons’ intrinsic and extrinsic motivation to perform. On the basis of expectancy-valence theory of motivation, specific relationships between organizational climate and motivational components are tested using a sample of insurance salespersons. Managerial implications and future research directions are discussed.


2014 ◽  
Vol 10 (2) ◽  
pp. 78-95 ◽  
Author(s):  
Karen Smith ◽  
Francis Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


2019 ◽  
Vol 10 (3) ◽  
pp. 57-73
Author(s):  
Emmanuel (Manos) Kalargiros ◽  
Cindy Strickler ◽  
Long Pham ◽  
Thomas DeNardin ◽  
Tatyana N Coomer

Vietnam is classified as one of the five largest textile and garment exporters in the world. With its ambition to engage more effectively in the global textile and garment supply chains, Vietnam's textile and garment enterprises have been implementing total quality management (TQM) programs in order to improve their product and service quality. However, many of Vietnam's textile and garment enterprises are facing barriers to successful TQM implementation. The objective of this study is to empirically examine these barriers to TQM faced by Vietnam's textile and garment enterprises and to compare the results with previous studies conducted with U.S. and Mexican businesses. The results of this study indicate five barriers to Vietnam's textile and garment enterprises' successful TQM implementation. Among these five barriers, the common barrier shared by Vietnamese, US and Mexican businesses is that employees are resistant to change. Managerial implications and future research directions are discussed.


1983 ◽  
Vol 47 (3) ◽  
pp. 82-91 ◽  
Author(s):  
Gabriel J. Biehal

A survey examined information search for auto repair services and its determining factors. As in other decision contexts, external search was limited. Linear regression models found that consumers' prior experiences were a major determinant of search behavior. Managerial implications and future research directions are briefly discussed.


1998 ◽  
Vol 24 (1) ◽  
pp. 21-42 ◽  
Author(s):  
T. K. Das ◽  
Bing-Sheng Teng

Resource-based and risk-based views of strategic alliances have not been adequately reflected in the literature. This paper identifies four types of critical resources that the partners bring to an alliance: financial, technological, physical, and managerial resource. It also suggests two basic types of risk in strategic alliances: relational risk and performance risk. The alliance making process is examined in terms of the interactive effects of resource and risk on the orientations and objectives of the prospective alliance partners. Managerial implications are discussed and future research directions indicated in the form of propositions for empirical testing.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.


Sign in / Sign up

Export Citation Format

Share Document