RANKING of the E-TRUST FACTORS in ELECTRONIC TRANSACTIONS in the CONTEXT of B2C E-COMMERCE (from the consumers point of view and by using Friedmans ranking method)
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 8
Abstract
Today, a considerable amount of commercial transactions have appertained to the electronic transactions and electronic markets, aside from or versus the traditional markets, have attracted and collected a large number of buyers, distributers and sellers with the aim of exploring commercial opportunities for trading interactions and gaining more profit. The environment of electronic markets has inherited the risks and vulnerability for its infrastructure, i.e. the internet. This high risk environment complicates the process of building trust in transactions for transaction parties. The virtual and online nature of the new environment emphasizes the importance of the term online trustĀ. The factors of online trust in different classes of e-commerce are different from each other depending on the type of transaction parties. In various studies the factors of trust in e-commerce transactions of type B2C have been identified and discussed. These factors can be classified in three groups of personal, corporate and trust context factors. In this research, after categorizing the electronic trust factors to five groups of personal, corporate, legal, contextual and infrastructural, and by collecting the necessary data from 10 e-commerce websites we have ranked the trust factors from the perspective of those websites customers. According to the opinions of the customers of those websites, the priority of electronic trust factors is mixed marketing factors and e-security and privacy policy factors.
Authors and Affiliations
Najafi Issa
Global Prediction algorithms and predictability of anomalous points in a time series
The Indian Ocean Dipole (IOD) event of 1997 had significant impacts on regional climate variability as it produced large Sea Surface Temperature (SST) anomalies in the Indian Ocean (IO). This dipole mode accounted for ab...
Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them
Biometrics is one of the evolving technologies widely used in different aspects of life today. Theuse of biometrics for identification is a system mainly established to recognize a certain person through authentication b...
An Effective Approach to Contention Based Bandwidth Request Mechanism in WiMAX Networks
In this paper the IEEE 802.16 standard based Mobile WiMAX (Worldwide Interoperability for Microwave Access) system is investigated for the purpose of Quality of Service provisioning. As a potential solution, scheduling...
IMPROVED ANT COLONY LOAD BALANCING ALGORITHM IN CLOUD COMPUTING
Cloud Computing is an emerging computing paradigm. It aims to share data, calculations, and service transparently over a scalable network of nodes. Since Cloud computing stores the data and disseminated resources in the...
ENHANCING JOB ALLOCATION USING NBST IN CLOUD ENVIRONMENT: A REVIEW
Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is...