The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In past few years, mobile wallet took spotlight as alternative of existing payment solution in many countries such as USA, South Korea, Germany and China. Although considered as one of the most convenient payment, mobile wallet only claimed 1% from total electronic payment transaction in Indonesia. The aim of this study is to identify the behavior and user acceptance factors of mobile wallet technology...
Current research indicates that a novelty, exciting and engaging shopping experience can positively affect consumer buying behavior. Identifying factors that influence the consumer behavior on use a virtual world for shopping will help retailers to create and maintain a presence in a virtual world, while positive impacting purchases and returns intentions. Therefore, the objectives of this study are...
Studies have consistently found information technology (IT) enhances the business operation and performance, but the adoption of IT among micro-enterprises for business growth is still considerably poor. The factors that influence the micro-enterprises to actively embrace IT that include social networking sites and whether the adoption has led to stronger business performance have become the major...
The technology acceptance model (TAM) proposes that perceived usefulness and perceived ease of use can predict that whether an information technology will be accepted and used by people. In this research, we were trying to find out dominant factors which could be predictors to the usage of privacy setting tools on Social Networking Sites (SNS) based on TAM. We used a modified TAM to take usefulness...
Serving citizens through an integrated e-Health system requires an understanding of the behaviour of the population as well as the factors that influence their acceptance and usage of technology, such as technology design and sociocultural factors. This has been called e-Health acceptance. The research reported in this paper employed the well established Technology Acceptance Model (TAM) to empirically...
Information technology and the Internet have transformed business, but the transformation is not limited to conducting business online; it's also about integrating Internet and IT into every aspect of value creation, such as procurement, customer relations management and export. For the individual enterprise, e-commerce offers competitive advantages, including helping the enterprise perform value-chain...
The development of information technology improves the globalization of the world economy. This change was able to expand the cyber space, and the online community known as the cyber community is made within the existing offline community. From the cyber community's activity, the concept of social network services created, and recently developed social computing. Social computing is the current situation...
Recent years, government agencies have achieved some degree of success on strengthening the protection of software copyright and enhancing its managements and laws. According to technology acceptance model theory, the reason why consumers have intention to accept genuine antivirus software were explored from five aspects, perceived usefulness, perceived ease of use, subjective norm, self efficacy...
Mobile Web browsing services bring the full PC browsing experience to customer's mobile handsets which have been emerged. This study is to investigate the intention to use mobile Web browsing based on technology acceptance model (TAM) which has been widely used to explain and predict the IT acceptance and incorporated with self-efficacy which was identified as an important determinant of user's new...
Power transformer has degraded under its normal and abnormal operating conditions, maintenance activities are vital to restore the condition back to the normal condition. The traditional preventive maintenance is well known and successfully performed, but its cost is very high. This paper aims to improve the drawback by introducing asset management system for systematical records of scattering failure...
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congress' goals for 2007 was for 80% of tax and informational returns to be filed electronically. However, to date that goal has not been achieved. This paper proposes a model of e-file adoption integrating the UTAUT model, online trust, perceived risk, and optimism bias into a comprehensive model of...
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of social informatics on cyber trust. Therefore, it is essential to establish a research framework that applies in cyber trust from a perspective of social informatics so that cyber trust may be achieved by different professionals...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
Robustness against geometric distortion is one of the most important problems in image authentication. In this paper, an image watermarking algorithm robust to geometric transformations is proposed. Radon transformation is used to detect and invert geometric transformations, and a perceptual hash feature detector is proposed to extract significant feature points, finally compares features from two...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.