QRishing: A User Perspective

Abstract

QR Code offers more benefits and features than its predecessor, Barcode, which make it more popular. However, there is no doubt that behind the features and conveniences offered by QR Code, it turns that the QR Code can be utilized to perform QRishing. This study proposes a model based on Technology Acceptance Model (TAM) combined with Perceived Security, Trust, Perceived Behavioral Control, Self-Efficacy and Perceived Risk based on previous research. Data obtained from 300 respondents are then analyzed with Structural Equation Modeling (SEM). The results show that Attitude, Perceive Security and Perceived Risk affect the individual to scan QR Code.

Authors and Affiliations

Ari Kusyanti, Ali Arifin

Keywords

Related Articles

A Non-Linear Regression Modeling is used for Asymmetry Co-Integration and Managerial Economics in Iraqi Firms

This paper analyzes the cost asymmetry through managerial expectations in a nonlinear regression function. Two development determinants, asymmetry co-integration and managerial expectations are also considered. The resul...

Generic Packing Detection Using Several Complexity Analysis for Accurate Malware Detection

The attackers do not want their Malicious software (or malwares) to be reviled by anti-virus analyzer. In order to conceal their malware, malware programmers are getting utilize the anti reverse engineering techniques an...

Reducing the Calculations of Quality-Aware Web Services Composition Based on Parallel Skyline Service

The perfect composition of atomic services to provide users with services through applying qualitative parameters is very important. As expected, web services with similar features lead to competition among the service p...

Mobility Management Using the IP Protocol

Time critical applications, such as VoIP and video conferencing require Internet connectivity all of the time for better performance. Moreover, in case of vehicular networks, it is very common for mobile devices to move...

L-Bit to M-Bit Code Mapping

We investigate codes that map L bits to m bits to achieve a set of codewords which contain no consecutive n “0”s. Such codes are desirable in the design of line codes which, in the absence of clock information in data, p...

Download PDF file
  • EP ID EP262256
  • DOI 10.14569/IJACSA.2017.081039
  • Views 101
  • Downloads 0

How To Cite

Ari Kusyanti, Ali Arifin (2017). QRishing: A User Perspective. International Journal of Advanced Computer Science & Applications, 8(10), 301-309. https://europub.co.uk/articles/-A-262256