QRishing: A User Perspective
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 10
Abstract
QR Code offers more benefits and features than its predecessor, Barcode, which make it more popular. However, there is no doubt that behind the features and conveniences offered by QR Code, it turns that the QR Code can be utilized to perform QRishing. This study proposes a model based on Technology Acceptance Model (TAM) combined with Perceived Security, Trust, Perceived Behavioral Control, Self-Efficacy and Perceived Risk based on previous research. Data obtained from 300 respondents are then analyzed with Structural Equation Modeling (SEM). The results show that Attitude, Perceive Security and Perceived Risk affect the individual to scan QR Code.
Authors and Affiliations
Ari Kusyanti, Ali Arifin
A Non-Linear Regression Modeling is used for Asymmetry Co-Integration and Managerial Economics in Iraqi Firms
This paper analyzes the cost asymmetry through managerial expectations in a nonlinear regression function. Two development determinants, asymmetry co-integration and managerial expectations are also considered. The resul...
Generic Packing Detection Using Several Complexity Analysis for Accurate Malware Detection
The attackers do not want their Malicious software (or malwares) to be reviled by anti-virus analyzer. In order to conceal their malware, malware programmers are getting utilize the anti reverse engineering techniques an...
Reducing the Calculations of Quality-Aware Web Services Composition Based on Parallel Skyline Service
The perfect composition of atomic services to provide users with services through applying qualitative parameters is very important. As expected, web services with similar features lead to competition among the service p...
Mobility Management Using the IP Protocol
Time critical applications, such as VoIP and video conferencing require Internet connectivity all of the time for better performance. Moreover, in case of vehicular networks, it is very common for mobile devices to move...
L-Bit to M-Bit Code Mapping
We investigate codes that map L bits to m bits to achieve a set of codewords which contain no consecutive n “0”s. Such codes are desirable in the design of line codes which, in the absence of clock information in data, p...