RANKING of the E-TRUST FACTORS in ELECTRONIC TRANSACTIONS in the CONTEXT of B2C E-COMMERCE (from the consumers point of view and by using Friedmans ranking method)

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 8

Abstract

Today, a considerable amount of commercial transactions have appertained to the electronic transactions and electronic markets, aside from or versus the traditional markets, have attracted and collected a large number of buyers, distributers and sellers with the aim of exploring commercial opportunities for trading interactions and gaining more profit. The environment of electronic markets has inherited the risks and vulnerability for its infrastructure, i.e. the internet. This high risk environment complicates the process of building trust in transactions for transaction parties. The virtual and online nature of the new environment emphasizes the importance of the term online trustĀ. The factors of online trust in different classes of e-commerce are different from each other depending on the type of transaction parties. In various studies the factors of trust in e-commerce transactions of type B2C have been identified and discussed. These factors can be classified in three groups of personal, corporate and trust context factors. In this research, after categorizing the electronic trust factors to five groups of personal, corporate, legal, contextual and infrastructural, and by collecting the necessary data from 10 e-commerce websites we have ranked the trust factors from the perspective of those websites customers. According to the opinions of the customers of those websites, the priority of electronic trust factors is mixed marketing factors and e-security and privacy policy factors.

Authors and Affiliations

Najafi Issa

Keywords

Related Articles

A Case study on Enterprise Collaboration and Interoperability in the Cloud

Increasingly, current software enables large and small companies to interact via cloud computing. Services offered in the cloud facilitate collaboration between databases and are a part of the information infrastructure...

HYBRID-CMOS LOGIC STYLE DESIGN FOR FAST SELF-CHECKING ADDERS DATA PATHS

In this paper we present an efficient design for self-checking fast adders data paths. We investigate the implementation of concurrent error detection fast adders: carry look-ahead, Carry skip, Carry-select and Condition...

Comparison of Various Window Functions Used in FIR Filter Designing

In this study, 2-parameter cosh window is modified to improve its spectral characteristic in terms of the ripple ratio by proposing a new additional parameter. It is observed that an increase in the new parameter results...

The ICM Approach as a Way for Improving Leaning Science Subjects in High Schools in Tanzania

This paper focuses on the design and trial of the Integrated Chemistry Modules (ICM). The objective was to design the approach, thereafter try it out. Observations show that teachers and students appreciated the approach...

IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM

Now days, every company is facing data leakage. That is very serious problem faced by company. An owner of enterprise has given confidential data to its employee but most of the time employee leaks the data. That leak...

Download PDF file
  • EP ID EP650591
  • DOI 10.24297/ijct.v13i8.7076
  • Views 75
  • Downloads 0

How To Cite

Najafi Issa (2014). RANKING of the E-TRUST FACTORS in ELECTRONIC TRANSACTIONS in the CONTEXT of B2C E-COMMERCE (from the consumers point of view and by using Friedmans ranking method). INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 13(8), 4767-4775. https://europub.co.uk/articles/-A-650591