Preliminary study for customer’s online shopping satisfaction from security perspective
The objective of this paper is to present the results of preliminary study that has been performed to measure the reliability of the ques-tionnaire for collecting the quantitative data for the proposed security model of online shopping satisfaction. This paper is endeavours of our previous paper, in...
| Main Authors: | Imtiaz Ali, Najma, Samsuri, Suhaila, Abu Seman, Muhamad Sadry, Brohi, Imtiaz Ali, Shah, Asadullah |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
cience Publishing Corporation Inc
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/64345/ http://irep.iium.edu.my/64345/1/64345_Preliminary%20Study%20for%20Customer%E2%80%99s%20Online.pdf http://irep.iium.edu.my/64345/2/64345_Preliminary%20Study%20for%20Customer%E2%80%99s%20Online_SCOPUS.pdf |
Similar Items
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Approach for successful knowledge management system deployment for organizations
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation
by: Khosravi, Mohsen, et al.
Published: (2018)
by: Khosravi, Mohsen, et al.
Published: (2018)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Unstructured source artifacts ontology for requirement validation in GDSD
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Visualization representation benefits of pre-requirement specification tractability
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Integration social media technology and ethical collaborative learning
by: Ataie, Fariba, et al.
Published: (2018)
by: Ataie, Fariba, et al.
Published: (2018)
An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies
by: Ataie, Farib, et al.
Published: (2018)
by: Ataie, Farib, et al.
Published: (2018)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
A hybrid method using kinect depth and color data stream for hand blobs segmentation
by: Karbasi, Mostafa, et al.
Published: (2017)
by: Karbasi, Mostafa, et al.
Published: (2017)
A review of near field communication process: how do it works?
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan
by: Rind, M. M., et al.
Published: (2016)
by: Rind, M. M., et al.
Published: (2016)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
A review of programming code assessment approaches
by: Ul Qayyum, Noor, et al.
Published: (2019)
by: Ul Qayyum, Noor, et al.
Published: (2019)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Library online database system for undergraduate students
by: Azlan, Nor Athira, et al.
Published: (2016)
by: Azlan, Nor Athira, et al.
Published: (2016)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
Competitive algorithms for online conversion problems with interrelated prices
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
A security-based survey and classification of cloud architectures, state of the art and future directions
by: Waqas, Ahmad, et al.
Published: (2013)
by: Waqas, Ahmad, et al.
Published: (2013)
Template based procedural rigging of quadrupeds with custom manipulators
by: Bhatti, Zeeshan, et al.
Published: (2013)
by: Bhatti, Zeeshan, et al.
Published: (2013)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
Factors effecting fixed-line telecom services customer retention: A study of Pakistan
by: Rind, M. Malook, et al.
Published: (2016)
by: Rind, M. Malook, et al.
Published: (2016)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
Web 2.0-based collaborative learning framework promoting lifelong learning: developing sustainability competencies
by: Ataie, Farib, et al.
Published: (2018)
by: Ataie, Farib, et al.
Published: (2018)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
Effects of socioeconomic characteristics on online purchase intention among Malaysians
by: Imtiaz Ali, Najma, et al.
Published: (2019)
by: Imtiaz Ali, Najma, et al.
Published: (2019)
Similar Items
-
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016) -
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018) -
Approach for successful knowledge management system deployment for organizations
by: Gharamah, Abdulrahman, et al.
Published: (2018) -
Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation
by: Khosravi, Mohsen, et al.
Published: (2018) -
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)