The Identification Level of Security, usability and Transparency Effects on Trust in B2C Commercial Websites Using Adaptive Neuro Fuzzy Inference System (ANFIS)
This paper presents an Expert E-Commerce Trust System (EECTS), showing a possibility to confidence e-business processes by Adaptive Neuro-Fuzzy Inference Systems. The research has empirically tested the critical factors that influence an individual’s decision in the process of buying products or services online. The proposed model applies Adaptive Neuro-Fuzzy model to converging business processes to get the desired results. The system is adaptive since it uses neural network learning ability for its adaptation. The results of this study show that the security, web site design and familiarity, directly influence user’s trust in e-businesses since these factors lie the closest to the user and are deciding factors for the users and influence their decisions regarding transactions in e-commerce. These results can be of importance for vendors since they show how the customers perceive trust and which factors can directly influence their trust in a vendor and their experience with e-commerce and that the factors can play a deciding role on whether or not a customer will make a purchase. The study also provides a device for sellers to improve their commercial websites. The data was collected via interviews, surveys and B2C websites. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was used to analyze the generated factors in the model. New method was compared with previous Expert E-Commerce Trust System (EECTS) that developed by Fuzzy Logic system too.
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...Waqas Tariq
The Internet and all other electronic means have changed our way of doing business.Today, many of our businesses and transactions are conducted online. Yet consumers' marketers fight for building trust between one other. In this Paper a new model would be suggested based on Fuzzy Logical System which depicts some of the hidden relationships between the critical factors such as security, familiarity, and designing in a B2C commercial website on one hand, and the competitive factor to other competitors on other hand. Then, the impacts of these factors on purchasing decision of consumers in B2C commercial websites are extracted. Also, the factor influence in B2C trading would be analyzed. We are going to find the impact of these factors on the decision-making process of people to buy through the B2C commercial websites, and we also will analyze how these factors influence the results of the B2C trading. The study also provides a device for sellers to improve their commercial websites; in addition, it provides a helping device for on-line customers to buy through the commercial websites. Two questionnaire were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was use to analyze the generated factors in the model.
The internet is being developed rapidly since last two decades, and with relevant digital economy that is driven by information technology also being developed worldwide. After a long term development of internet, which rapidly increased web users and highly speed internet connection, and some new technology also have been developed and used for web developing, those lead to firms can promote and enhance images of product and services through web site. Therefore, detailed product information and improved service attracts more and more people changed their consumer behaviour from the traditional mode to more rely on the internet shopping. On the other hand, more companies have realized that the consumer behaviour transformation is unavoidable trend, and thus change their marketing strategy. As the recent researches have indicated that, the internet shopping particularly in business to consumer (B2C) has risen and online shopping become more popular to many people. According to the report, The Emerging Digital Economy II, published by the US Department of Commerce, in some companies, the weight of e-commerce in total sales is quite high. For instance, the Dell computer company have reached 18 million dollars sales through the internet during the first quarter of 1999. As a result, about 30% of its 5.5 billion dollars total sales were achieved through the internet (Moon, 2004). Therefore, to understand internet shopping and its impact on consumer behaviour could help companies making use of it as a form of doing e-business.
There are many reasons for such a rapid developing of internet shopping, which mainly due to the benefits that internet provides. First of all, the internet offers different kind of convenience to consumers. Obviously, consumers do not need go out looking for product information as the internet can help them to search from online sites, and it also helps evaluate between each sites to get the cheapest price for purchase. Furthermore, the internet can enhance consumer use product more efficiently and effectively than other channels to satisfy their needs. Through the different search engines, consumers save time to access to the consumption related information, and which information with mixture of images, sound, and very detailed text description to help consumer learning and choosing the most suitable product (Moon, 2004). However, internet shopping has potential risks for the customers, such as payment safety, and after service. Due to the internet technology developed, internet payment recently becomes prevalent way for purchasing goods from the internet. Internet payment increase consumptive efficiency, at the same time, as its virtual property reduced internet security. After service is another way to stop customer shopping online. It is not like traditional retail, customer has risk that some after service should face to face serve, and especially in some complicated goods.
Factors Influencing the E-Shoppers Perception towards E-Shopping (A Study wit...Dr. Amarjeet Singh
Purpose: The study focuses on identifying and exploring the various factors influencing the e-shoppers perception towards e-shopping.
Design / methodology / approach: A research model is developed based on the literature. For the purpose of study data collected from 100 e-shoppers belonged to Wardha City of Maharashtra. By using in structured questionnaire, descriptive statistical measure like mean has been used for analyzing the data.
Findings: The results reveal that the seven key factors like convenience, time saving, home delivery, price advantage, more choice, reliability and security significantly influenced the e-shoppers perception on e-shopping.
Contribution of the study: The result of this study provides a valuable reference to the e-marketers to understand the factors influencing e-shoppers perception. They can further sharpen their marketing strategies to attract and retain their customers.
At present, generation Y represents the most population in the world and their
acceptance either as consumers, users or clients plays a significant and important role in
making the business world doomed or brighter. Therefore, their behaviour plays the most
important role in ensuring e-commerce does well and making the online business industry
grow tremendously. Yet, little is known about the intention among generation Y with
regards to e-commerce. This study aims to identify the online fraud and trust towards the
technology influencing the intention to use e-commerce among generation Y. A total of
one hundred and twenty respondents of generation Y were recruited in this study through
convenience sampling at Kota Bharu city. This quantitative study using survey as a
method of data collection and a questionnaire was distributed to the respondents to fill.
The respondents were asked for consent before proceeding with the survey, in order to
ensure that the ethical consideration was taken into account while conducting the study.
Data were analysed using Pearson correlation and multiple regression analysis. Findings
revealed that trust and online fraud had a positive and significant relationship with
consumer intention, and they were significantly affecting the intention of generation Y.
This study would suggest that the online business companies and e-commerce
technologies should consider focusing on these variables in the development and
implementation of a strategy to attract and retain buyers in the future.
A study of how application usage can help increase consumer satisfaction for ...Abeer Raza
This study uses regression analysis to determine the effects of mobile applications on consumer satisfaction. The paper focuses on the impact of mobile application usage on consumer behavior with regards to consumer engagement and brand loyalty. The author also looks into understanding the different factors within a mobile app that increases consumer satisfaction. This approach helps identify not just the factors themselves and their benefits but also their contribution in cultivating a long-term relationship between consumers and businesses.
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...Waqas Tariq
The Internet and all other electronic means have changed our way of doing business.Today, many of our businesses and transactions are conducted online. Yet consumers' marketers fight for building trust between one other. In this Paper a new model would be suggested based on Fuzzy Logical System which depicts some of the hidden relationships between the critical factors such as security, familiarity, and designing in a B2C commercial website on one hand, and the competitive factor to other competitors on other hand. Then, the impacts of these factors on purchasing decision of consumers in B2C commercial websites are extracted. Also, the factor influence in B2C trading would be analyzed. We are going to find the impact of these factors on the decision-making process of people to buy through the B2C commercial websites, and we also will analyze how these factors influence the results of the B2C trading. The study also provides a device for sellers to improve their commercial websites; in addition, it provides a helping device for on-line customers to buy through the commercial websites. Two questionnaire were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was use to analyze the generated factors in the model.
The internet is being developed rapidly since last two decades, and with relevant digital economy that is driven by information technology also being developed worldwide. After a long term development of internet, which rapidly increased web users and highly speed internet connection, and some new technology also have been developed and used for web developing, those lead to firms can promote and enhance images of product and services through web site. Therefore, detailed product information and improved service attracts more and more people changed their consumer behaviour from the traditional mode to more rely on the internet shopping. On the other hand, more companies have realized that the consumer behaviour transformation is unavoidable trend, and thus change their marketing strategy. As the recent researches have indicated that, the internet shopping particularly in business to consumer (B2C) has risen and online shopping become more popular to many people. According to the report, The Emerging Digital Economy II, published by the US Department of Commerce, in some companies, the weight of e-commerce in total sales is quite high. For instance, the Dell computer company have reached 18 million dollars sales through the internet during the first quarter of 1999. As a result, about 30% of its 5.5 billion dollars total sales were achieved through the internet (Moon, 2004). Therefore, to understand internet shopping and its impact on consumer behaviour could help companies making use of it as a form of doing e-business.
There are many reasons for such a rapid developing of internet shopping, which mainly due to the benefits that internet provides. First of all, the internet offers different kind of convenience to consumers. Obviously, consumers do not need go out looking for product information as the internet can help them to search from online sites, and it also helps evaluate between each sites to get the cheapest price for purchase. Furthermore, the internet can enhance consumer use product more efficiently and effectively than other channels to satisfy their needs. Through the different search engines, consumers save time to access to the consumption related information, and which information with mixture of images, sound, and very detailed text description to help consumer learning and choosing the most suitable product (Moon, 2004). However, internet shopping has potential risks for the customers, such as payment safety, and after service. Due to the internet technology developed, internet payment recently becomes prevalent way for purchasing goods from the internet. Internet payment increase consumptive efficiency, at the same time, as its virtual property reduced internet security. After service is another way to stop customer shopping online. It is not like traditional retail, customer has risk that some after service should face to face serve, and especially in some complicated goods.
Factors Influencing the E-Shoppers Perception towards E-Shopping (A Study wit...Dr. Amarjeet Singh
Purpose: The study focuses on identifying and exploring the various factors influencing the e-shoppers perception towards e-shopping.
Design / methodology / approach: A research model is developed based on the literature. For the purpose of study data collected from 100 e-shoppers belonged to Wardha City of Maharashtra. By using in structured questionnaire, descriptive statistical measure like mean has been used for analyzing the data.
Findings: The results reveal that the seven key factors like convenience, time saving, home delivery, price advantage, more choice, reliability and security significantly influenced the e-shoppers perception on e-shopping.
Contribution of the study: The result of this study provides a valuable reference to the e-marketers to understand the factors influencing e-shoppers perception. They can further sharpen their marketing strategies to attract and retain their customers.
At present, generation Y represents the most population in the world and their
acceptance either as consumers, users or clients plays a significant and important role in
making the business world doomed or brighter. Therefore, their behaviour plays the most
important role in ensuring e-commerce does well and making the online business industry
grow tremendously. Yet, little is known about the intention among generation Y with
regards to e-commerce. This study aims to identify the online fraud and trust towards the
technology influencing the intention to use e-commerce among generation Y. A total of
one hundred and twenty respondents of generation Y were recruited in this study through
convenience sampling at Kota Bharu city. This quantitative study using survey as a
method of data collection and a questionnaire was distributed to the respondents to fill.
The respondents were asked for consent before proceeding with the survey, in order to
ensure that the ethical consideration was taken into account while conducting the study.
Data were analysed using Pearson correlation and multiple regression analysis. Findings
revealed that trust and online fraud had a positive and significant relationship with
consumer intention, and they were significantly affecting the intention of generation Y.
This study would suggest that the online business companies and e-commerce
technologies should consider focusing on these variables in the development and
implementation of a strategy to attract and retain buyers in the future.
A study of how application usage can help increase consumer satisfaction for ...Abeer Raza
This study uses regression analysis to determine the effects of mobile applications on consumer satisfaction. The paper focuses on the impact of mobile application usage on consumer behavior with regards to consumer engagement and brand loyalty. The author also looks into understanding the different factors within a mobile app that increases consumer satisfaction. This approach helps identify not just the factors themselves and their benefits but also their contribution in cultivating a long-term relationship between consumers and businesses.
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...ijsptm
The Internet today connects about 40% of the world population. Half of these are living outside the
advanced economies, often in some countries that are quickly climbing the developmental ladder, with
diverse populations and inarguable economic potentialities including Saudi Arabia. There are 20 million
Internet users in Saudi Arabia by the end of 2016. This research examines the impact of the Internet,
innovation, disruption and the dynamics that affect adoption of electronic commerce (e-commerce) in
Saudi Arabia. The study further analyzes the influence of Internet security and its impact on the users’
decision-making process. The data have gathered through questionnaires that disseminated to 2,823 Saudi
Internet male and female users through email. The response rate was 23%. The important findings have
discussed in this study that shows that there are significant factors that are influencing the adoption of ecommerce,
including legal procedures to ease of doing business, ease of doing businesses and security
features and controls introduced by the online vendors.
The effect of online shopping orientation on perceived behavioural control Aida Santos
This study seeks to investigate the effect of nine constructs of online shopping orientation on perceived behavioural control and attitude toward purchase. The results suggest that in-home shopping tendency, convenience consciousness, and impulsive purchase are the most significant constructs in forming online shopping orientation.
Keywords: online purchasing orientations, online intention, TPB
Determinants Of Customer Participation In Online Shoppinginventionjournals
This research aims to examine and explain the determinants of customer participation in online shopping.The approach of Partial Least Square (PLS) with Smart PLS software is employed in this study to analyze cross section data and prove the hypotheses proposed in the research. The sample of the study includes students of Mulawarman University who used to do online shopping. The participants were recruited through snowball technique.This study shows that only five of the nine hypotheses are supported; the other four are not supported or accept Ha and reject H0. The construct of the ability of vendor has a positive effect on trust, but not significant. Furthermore, the ability has a significant negative effect on transaction-perceived risk. The ability to influence vendor participation in online shopping has no significant effect, while experience has a significant positive effect on trust. On the other hand, experience has a significant negative effect on transaction-perceived risk. Experience has a significant positive effect on online shopping participation. Trust has a significant negative effect on transaction-perceived risk; however, it has a positive influence on online shopping participation, yet not significant. Last, perceived-transaction risk has an insignificant positive effect on online shopping participation
In this presentation we will discuss the importance of internet marketing, How internet related to business, and many more interesting topic related to internet.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Influences of Website Quality on Online Purchase Intention of Air Ticketing S...IJRTEMJOURNAL
Business operation was more related with human contribution at end of 20th century. Rapid
development of internet technology has changed business environment. More than ever, consumers more like to
gather information about product or services and to make purchase using internet. For the reason, E-Commerce
website is integral part of business in order to increase profit. Research focused to investigate influences of
website quality factors (usability, website design, information quality, trust, perceived risk, empathy) on online
purchase intention of Mongolian consumers. Questionnaire design based on Barnes and Vidgen’s model and
data was collected from 265 respondents by online. Correlation and regression analysis was used to measure
relationship of variables. Research findings show website design, information quality, trust more positive
influence on online purchasing intention than usability, empathy, perceived
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approachIOSRJBM
Internet banking has emerged as one of the most profitable E-commerce applications over the last decade. Although several prior research projects have focused on the factors that impact on the adoption of information technology or Internet, there is limited empirical work which simultaneously captures the risk factors that help customers to adopt online banking. The aforementioned factors cause complexity, challenge, ambiguity and risk feeling in the customers who use electronic capabilities. The main goal in this paper is to study the major risk factors that influencing the customer’s intention to use of Internet Banking. Therefore, five groups of risk were identified as performance, security, time, social and financial categories. Based on an empirical study in the field of Internet Banking, the authors validated a measurement model used to explain customers’ intention to use of Internet Banking, based on the above risk factors. The results indicated that all the risk factors are significant to the intention to use of Internet Banking. The knowledge of these risks as major factors of customer’s adoption and perception in the internet provides banks as a useful tool for the establishment of an effective quality management for their e-businesses.
Prospective factors to involve in different e business models in bangladeshRizwan Rebate
Many Bangladeshi companies currently distribute their images through the Internet to clients all over the world, but the monetary transactions take place through conventional means. Some companies put messages on bulletin board, on ' internet yellow pages' with email links, and sometimes web pages, but there never is a place to submit a credit card. This is because currently the government does not permit credit card charges over the internet. However, the ISPs in Bangladesh do have the technology for e-business, e-business and are anticipating governmental approval in near future. In this circumstances, prospective factors will gain advantages for companies before involving in e-business. We have identified few questions to be answered-
1) What are different e-business models in Bangladesh?
2) What are the benefits behind involving in e-business in Bangladesh?
3) What are the prospects in current e-business models in Bangladesh?
Electronic Customer Relationship Management and Consumer Behaviour (A Study o...IJRTEMJOURNAL
The study focuses on electronic customer relationship management and consumer behavior with
special emphasis on diamond bank Plc. Retail financial services in all markets, including emerging markets, are
undergoing major transformation that is driven by change, deregulation and customer sophistication. Electronic
Customer service and specifically online customer relationship management in particular is crucial to attaining
a sustainable competitive advantage, in the market place. The main objective of the study is to examine the effect
of electronic customer relationship management on customer patronage. A survey design was adopted for the
study and one hundred and ninety copies of structured questionnaire were used as primary data collection
instrument which was distributed to customers of diamond bank in the study area. However, the postulated
hypotheses were tested by employing the Pearson product moment Correlation Coefficient (PPMCC) statistical
tool which was facilitated by the statistical packages for social sciences (SPSS). The study however showed that
a significant relationship exists between e-CRM and consumer behavior. Furthermore, it was found that amongst
the dimensions of e-CRM, e-commitment and e-satisfaction impacts more significantly on customer patronage.
The study therefore concludes that Nigerian money deposit banks should increase their electronic platform
strategies since they commensurably impact on their level of customer patronage. However, the study
recommended that the key to efficient performance of Nigeria banking industry is hinged on their ability to
identify, attract, retain and develop their customers better than competitors and could be achieved by improved
e-trust, e-commitment and e-satisfaction. Limitation and suggestion for further studies was given.
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
Customer Adoption of Internet Banking in MauritiusWaqas Tariq
Internet banking offers many benefits but little research has been done about its acceptance in Mauritius. This paper aims at assessing the factors that contribute to the adoption of internet banking in Mauritius. To support our arguments, we use a logistic regression model based on a sample survey to analyze the factors that influence internet banking in Mauritius. We conclude that factors such as age, income, service usefulness, risk factor, checking account frequency and internet location are the main determinants for a person to opt for online banking
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...IJMIT JOURNAL
Electronic businesses are witnessing enormous growth as more and more people are switching to online platforms. The widespread use of Internet has opened new channels to operate trade for many businesses. Also electronic marketing has become a proven channel of passing on the word to the customers. Legal and ethical issues quickly become an area of concern. In this research recommendations are made to harmonize IT and Internet Laws. A novel approach is proposed to promote legal risk management culture in organizations. It begins with revising current state of regulations surrounding e-Businesses and electronic marketing. The proposed approach offers risk management by considering risk mitigation strategy, educating people and use of information technology. Monitoring compliance requirements are met by reviewing the latest changes in regulations and rewarding the employees who ensures the successful implementation of the strategy.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
E-COMMERCE CREDIBILITY IN SAUDI ARABIA: CONSUMER PERSPECTIVEacijjournal
The purpose of this paper is to investigate the e-commerce credibility factors affecting the perception of
users in Saudi Arabia and, moreover, to investigate whether the variation of credibility factors in Saudi
Arabian e-commerce websites influence users' performance. Website credibility, which refers to the
believability of the website and its content, plays an important role in consumers’ successful online
shopping experience and satisfaction. This investigation is conducted by employing two credibility
evaluation methods: heuristic evaluation and performance measurement. This study adopts Fogg's 10
Stanford credibility guidelines as a starting point for the heuristic evaluation. In the performance
measurement method, two measurements are used: the amount of time needed to finish the task and the
total number of clicks taken to finish the task. A frequency analysis of the comments and a one-way ANOVA
test are used to establish the results. Three e-commerce websites in Saudi Arabia are selected. The findings
show that Fogg’s 10 Stanford credibility guidelines can be implemented in the Saudi Arabian e-commerce
context with minor modifications and expansions by adding reputation, endorsement, security, and service
diversity guidelines. Another important finding is that professional website design plays a vital role in
users' first impression of websites, while usability is the most important credibility factor investigated used
to evaluate the credulity of an e-commerce website. Lastly, the results of this study indicate a relationship
between the e-commerce credibility level and users’ performance. This paper contributes to the literature
by providing a set of credibility guidelines associated with specific criteria, which can be assessed to
improve the future of e-commerce in Saudi Arabia.
Bidirectional Bubble Sort Approach to Improving the Performance of Introsort ...Waqas Tariq
Quicksort has been described as the best practical choice for sorting. It is faster than many algorithms for sorting on most inputs and remarkably efficient on the average. However, it is not efficient in the worst case scenarios as it takes O(n2). Research efforts have been made to enhance this algorithm for the worst case scenarios by improving the way the algorithm chooses its pivot element for partitioning, but these approaches have the disadvantage of increasing the algorithm’s average computing time. Introsort was, however, developed to overcome this limitation. This paper presents an approach that uses Bidirectional Bubble Sort to improve the performance of Introsort. Instead of using Insertion Sort as the last step of the sorting algorithm for small lists, the approach uses Bidirectional Bubble Sort. The results of the implementation and experimentation of this algorithm compared with Introsort shows its better performance in the worst case scenario as the size of the list increases.
Forecasting Electric Energy Demand using a predictor model based on Liquid St...Waqas Tariq
Electricity demand forecasts are required by companies who need to predict their customers’ demand, and by those wishing to trade electricity as a commodity on financial markets. It is hard to find the right prediction method for a given application if not a prediction expert. Recent works show that Liquid State Machines (LSM’s) can be applied to the prediction of time series. The main advantage of the LSM is that it projects the input data in a high-dimensional dynamical space and therefore simple learning methods can be used to train the readout. In this paper we present an experimental investigation of an approach for the computation of time series prediction by employing Liquid State Machines (LSM) in the modeling of a predictor in a case study for short-term and long-term electricity demand forecasting. Results of this investigation are promising, considering the error to stop training the readout, the number of iterations of training of the readout and that no strategy of seasonal adjustment or preprocessing of data was achieved to extract non-correlated data out of the time series.
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...ijsptm
The Internet today connects about 40% of the world population. Half of these are living outside the
advanced economies, often in some countries that are quickly climbing the developmental ladder, with
diverse populations and inarguable economic potentialities including Saudi Arabia. There are 20 million
Internet users in Saudi Arabia by the end of 2016. This research examines the impact of the Internet,
innovation, disruption and the dynamics that affect adoption of electronic commerce (e-commerce) in
Saudi Arabia. The study further analyzes the influence of Internet security and its impact on the users’
decision-making process. The data have gathered through questionnaires that disseminated to 2,823 Saudi
Internet male and female users through email. The response rate was 23%. The important findings have
discussed in this study that shows that there are significant factors that are influencing the adoption of ecommerce,
including legal procedures to ease of doing business, ease of doing businesses and security
features and controls introduced by the online vendors.
The effect of online shopping orientation on perceived behavioural control Aida Santos
This study seeks to investigate the effect of nine constructs of online shopping orientation on perceived behavioural control and attitude toward purchase. The results suggest that in-home shopping tendency, convenience consciousness, and impulsive purchase are the most significant constructs in forming online shopping orientation.
Keywords: online purchasing orientations, online intention, TPB
Determinants Of Customer Participation In Online Shoppinginventionjournals
This research aims to examine and explain the determinants of customer participation in online shopping.The approach of Partial Least Square (PLS) with Smart PLS software is employed in this study to analyze cross section data and prove the hypotheses proposed in the research. The sample of the study includes students of Mulawarman University who used to do online shopping. The participants were recruited through snowball technique.This study shows that only five of the nine hypotheses are supported; the other four are not supported or accept Ha and reject H0. The construct of the ability of vendor has a positive effect on trust, but not significant. Furthermore, the ability has a significant negative effect on transaction-perceived risk. The ability to influence vendor participation in online shopping has no significant effect, while experience has a significant positive effect on trust. On the other hand, experience has a significant negative effect on transaction-perceived risk. Experience has a significant positive effect on online shopping participation. Trust has a significant negative effect on transaction-perceived risk; however, it has a positive influence on online shopping participation, yet not significant. Last, perceived-transaction risk has an insignificant positive effect on online shopping participation
In this presentation we will discuss the importance of internet marketing, How internet related to business, and many more interesting topic related to internet.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Influences of Website Quality on Online Purchase Intention of Air Ticketing S...IJRTEMJOURNAL
Business operation was more related with human contribution at end of 20th century. Rapid
development of internet technology has changed business environment. More than ever, consumers more like to
gather information about product or services and to make purchase using internet. For the reason, E-Commerce
website is integral part of business in order to increase profit. Research focused to investigate influences of
website quality factors (usability, website design, information quality, trust, perceived risk, empathy) on online
purchase intention of Mongolian consumers. Questionnaire design based on Barnes and Vidgen’s model and
data was collected from 265 respondents by online. Correlation and regression analysis was used to measure
relationship of variables. Research findings show website design, information quality, trust more positive
influence on online purchasing intention than usability, empathy, perceived
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approachIOSRJBM
Internet banking has emerged as one of the most profitable E-commerce applications over the last decade. Although several prior research projects have focused on the factors that impact on the adoption of information technology or Internet, there is limited empirical work which simultaneously captures the risk factors that help customers to adopt online banking. The aforementioned factors cause complexity, challenge, ambiguity and risk feeling in the customers who use electronic capabilities. The main goal in this paper is to study the major risk factors that influencing the customer’s intention to use of Internet Banking. Therefore, five groups of risk were identified as performance, security, time, social and financial categories. Based on an empirical study in the field of Internet Banking, the authors validated a measurement model used to explain customers’ intention to use of Internet Banking, based on the above risk factors. The results indicated that all the risk factors are significant to the intention to use of Internet Banking. The knowledge of these risks as major factors of customer’s adoption and perception in the internet provides banks as a useful tool for the establishment of an effective quality management for their e-businesses.
Prospective factors to involve in different e business models in bangladeshRizwan Rebate
Many Bangladeshi companies currently distribute their images through the Internet to clients all over the world, but the monetary transactions take place through conventional means. Some companies put messages on bulletin board, on ' internet yellow pages' with email links, and sometimes web pages, but there never is a place to submit a credit card. This is because currently the government does not permit credit card charges over the internet. However, the ISPs in Bangladesh do have the technology for e-business, e-business and are anticipating governmental approval in near future. In this circumstances, prospective factors will gain advantages for companies before involving in e-business. We have identified few questions to be answered-
1) What are different e-business models in Bangladesh?
2) What are the benefits behind involving in e-business in Bangladesh?
3) What are the prospects in current e-business models in Bangladesh?
Electronic Customer Relationship Management and Consumer Behaviour (A Study o...IJRTEMJOURNAL
The study focuses on electronic customer relationship management and consumer behavior with
special emphasis on diamond bank Plc. Retail financial services in all markets, including emerging markets, are
undergoing major transformation that is driven by change, deregulation and customer sophistication. Electronic
Customer service and specifically online customer relationship management in particular is crucial to attaining
a sustainable competitive advantage, in the market place. The main objective of the study is to examine the effect
of electronic customer relationship management on customer patronage. A survey design was adopted for the
study and one hundred and ninety copies of structured questionnaire were used as primary data collection
instrument which was distributed to customers of diamond bank in the study area. However, the postulated
hypotheses were tested by employing the Pearson product moment Correlation Coefficient (PPMCC) statistical
tool which was facilitated by the statistical packages for social sciences (SPSS). The study however showed that
a significant relationship exists between e-CRM and consumer behavior. Furthermore, it was found that amongst
the dimensions of e-CRM, e-commitment and e-satisfaction impacts more significantly on customer patronage.
The study therefore concludes that Nigerian money deposit banks should increase their electronic platform
strategies since they commensurably impact on their level of customer patronage. However, the study
recommended that the key to efficient performance of Nigeria banking industry is hinged on their ability to
identify, attract, retain and develop their customers better than competitors and could be achieved by improved
e-trust, e-commitment and e-satisfaction. Limitation and suggestion for further studies was given.
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
Customer Adoption of Internet Banking in MauritiusWaqas Tariq
Internet banking offers many benefits but little research has been done about its acceptance in Mauritius. This paper aims at assessing the factors that contribute to the adoption of internet banking in Mauritius. To support our arguments, we use a logistic regression model based on a sample survey to analyze the factors that influence internet banking in Mauritius. We conclude that factors such as age, income, service usefulness, risk factor, checking account frequency and internet location are the main determinants for a person to opt for online banking
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...IJMIT JOURNAL
Electronic businesses are witnessing enormous growth as more and more people are switching to online platforms. The widespread use of Internet has opened new channels to operate trade for many businesses. Also electronic marketing has become a proven channel of passing on the word to the customers. Legal and ethical issues quickly become an area of concern. In this research recommendations are made to harmonize IT and Internet Laws. A novel approach is proposed to promote legal risk management culture in organizations. It begins with revising current state of regulations surrounding e-Businesses and electronic marketing. The proposed approach offers risk management by considering risk mitigation strategy, educating people and use of information technology. Monitoring compliance requirements are met by reviewing the latest changes in regulations and rewarding the employees who ensures the successful implementation of the strategy.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
E-COMMERCE CREDIBILITY IN SAUDI ARABIA: CONSUMER PERSPECTIVEacijjournal
The purpose of this paper is to investigate the e-commerce credibility factors affecting the perception of
users in Saudi Arabia and, moreover, to investigate whether the variation of credibility factors in Saudi
Arabian e-commerce websites influence users' performance. Website credibility, which refers to the
believability of the website and its content, plays an important role in consumers’ successful online
shopping experience and satisfaction. This investigation is conducted by employing two credibility
evaluation methods: heuristic evaluation and performance measurement. This study adopts Fogg's 10
Stanford credibility guidelines as a starting point for the heuristic evaluation. In the performance
measurement method, two measurements are used: the amount of time needed to finish the task and the
total number of clicks taken to finish the task. A frequency analysis of the comments and a one-way ANOVA
test are used to establish the results. Three e-commerce websites in Saudi Arabia are selected. The findings
show that Fogg’s 10 Stanford credibility guidelines can be implemented in the Saudi Arabian e-commerce
context with minor modifications and expansions by adding reputation, endorsement, security, and service
diversity guidelines. Another important finding is that professional website design plays a vital role in
users' first impression of websites, while usability is the most important credibility factor investigated used
to evaluate the credulity of an e-commerce website. Lastly, the results of this study indicate a relationship
between the e-commerce credibility level and users’ performance. This paper contributes to the literature
by providing a set of credibility guidelines associated with specific criteria, which can be assessed to
improve the future of e-commerce in Saudi Arabia.
Bidirectional Bubble Sort Approach to Improving the Performance of Introsort ...Waqas Tariq
Quicksort has been described as the best practical choice for sorting. It is faster than many algorithms for sorting on most inputs and remarkably efficient on the average. However, it is not efficient in the worst case scenarios as it takes O(n2). Research efforts have been made to enhance this algorithm for the worst case scenarios by improving the way the algorithm chooses its pivot element for partitioning, but these approaches have the disadvantage of increasing the algorithm’s average computing time. Introsort was, however, developed to overcome this limitation. This paper presents an approach that uses Bidirectional Bubble Sort to improve the performance of Introsort. Instead of using Insertion Sort as the last step of the sorting algorithm for small lists, the approach uses Bidirectional Bubble Sort. The results of the implementation and experimentation of this algorithm compared with Introsort shows its better performance in the worst case scenario as the size of the list increases.
Forecasting Electric Energy Demand using a predictor model based on Liquid St...Waqas Tariq
Electricity demand forecasts are required by companies who need to predict their customers’ demand, and by those wishing to trade electricity as a commodity on financial markets. It is hard to find the right prediction method for a given application if not a prediction expert. Recent works show that Liquid State Machines (LSM’s) can be applied to the prediction of time series. The main advantage of the LSM is that it projects the input data in a high-dimensional dynamical space and therefore simple learning methods can be used to train the readout. In this paper we present an experimental investigation of an approach for the computation of time series prediction by employing Liquid State Machines (LSM) in the modeling of a predictor in a case study for short-term and long-term electricity demand forecasting. Results of this investigation are promising, considering the error to stop training the readout, the number of iterations of training of the readout and that no strategy of seasonal adjustment or preprocessing of data was achieved to extract non-correlated data out of the time series.
Method for Estimation of Total Nitrogen and fiber Contents in Tealeaves With ...Waqas Tariq
Methods for estimation of total nitrogen and fiber contents in tealeaves with ground based network cameras are proposed. Due to a fact that Near Infrared: NIR camera data is proportional to total nitrogen while that shows negative correlation to fiber contents, it is possible to estimate nitrogen and fiber contents in tealeaves with ground based NIR camera data and remote sensing satellite data. Through regressive analysis between measured total nitrogen and fiber contents and NIR reflectance of tealeaves in tea estates, it is found that there is a good correlation between both then regressive equations are created. Also it is found that monitoring of total nitrogen and fiber contents in tealeaves measured with networks cameras is valid. Thus it is concluded that a monitoring of tea estates with network cameras of visible and NIR is appropriate.
Which type of Expert System – Rule Base, Fuzzy or Neural is Most Suited for E...Waqas Tariq
The scope of expert systems in different areas and different domains are increasing. We are working on development of the expert system for evaluating motivational strategy on human resources. From the literature review, we found that mainly there are three approaches used for development of the expert system: Rule base, Fuzzy and Neural network. In the first half of the case study, we explored the pros and cons of each approach and provided the comparison of applicability of which approach is most suited and when. In the second half of the case study, we explored the feasibility of the approach for our domain area of motivational strategy on human resources. At the end, we found that Neural Network approach is the most suited for our domain because of the flexibility, adaptability to the changing environment and generalisation.
One of the fundamental issues in computer science is ordering a list of items. Although there is a number of sorting algorithms, sorting problem has attracted a great deal of research, because efficient sorting is important to optimize the use of other algorithms. This paper presents a new sorting algorithm which sort the elements based on their average, which runs faster.. This algorithm was analyzed, implemented and tested and the results are promising for a random data
Design Co-creation and Performance in New Product Development ProcessWaqas Tariq
Co-creation is a kind of marketing strategy or business strategy that stresses the generation and continuing realization of mutual firm-customer value. Product design, marketing, and Innovation ought to be closely coordinated in companies. Most researchers have indicated that highly effective connection among innovation R&D, marketing activities, and design pushes products in to the marketplace and guarantees their success. However, empirical studies from the Co- creations among design, marketing, and innovation strategies in New Product Development (NPD) performance are intermittent. Within this study, enterprises through the Taiwan Electrical and Electronic Manufacturers’ Association (TEEMA) database were chosen randomly as subjects. Inside the first survey, the status from the marketing strategy, innovation strategy, and design strategy was determined. Following a new product was marketed for one year, another survey was conducted for NPD performance check. After repeated contact, 285 enterprises (21.11%) responded. Major findings in the study are listed below: (1) The Structural Equation Model (SEM) results demonstrate a good fit involving the theoretical model and observed data for innovation, marketing, and design strategies; (2) The NPD performance is influenced by an enterprise’s innovation, marketing, and design strategies. Moreover, innovation and marketing strategies also influence NPD performance through design strategy. For NPD performance, design strategy is both a completely independent variable and an intervening variable; (3) The NPD performance could be reinforced when enterprises struggle for design, innovation, and marketing strategies.
Interface on Usability Testing Indonesia Official Tourism WebsiteWaqas Tariq
Ministry of Tourism and Creative Economy of The Republic of Indonesia must meet the wide audience various needs and should reach people from all levels of society around the world to provide Indonesia tourism and travel information. This article will gives the details in the evolution of one important component of Indonesia Official Tourism Website as it has grown in functionality and usefulness over several years of use by a live, unrestricted community. We chose this website to see the website interface design and usability and to popularize Indonesia tourism and travel highlights. The analysis done by looking at the criteria specified for usability testing. Usability testing measures are the ease of use (effectiveness, efficiency, consistency and interface design), easy to learn, errors and syntax which is related to the human computer interaction. The purpose of this article is to test the usability level of the website, analyze the website interface design, and provide suggestions for improvements in Indonesia Official Tourism Website of analysis we have done before.
An Approach for Knowledge Extraction Using Ontology Construction and Machine ...Waqas Tariq
In recent research, Ontology construction plays a major role for transforming raw texts into useful knowledge. The proposed method supports efficient retrieval with the help of ontology and applies combined techniques to train the data before taking into testing process. The proposed approach used the phrase-pairs to extract useful knowledge and utilized data mining techniques and neural network approach to express the knowledge well and also it improves the search speed and accuracy of information retrieval. This method avoids noise generation by analyzing the relevancy of tags to the retrieval process and shows somewhat better recall value compared to other methods. In this approach an optimized reasoner applied to reduce complexity in the key inference problem. The formulated ontology can help clearly expressing its meaning for various concepts and relations. Due to the increasing size of ontology repository, the matching process may take more time. To avoid this, this method forms a hierarchical structure with semantic interpretation of data. The system designed to eliminate domain-dependency with the help of dynamic labeling scheme using ontology as a base. In this paper, our proposed models were presented with ontology description using Ontology Web Language (OWL).
Information Technology Service Management (ITSM) Implementation Methodology B...Waqas Tariq
This paper is intended to cover the concept of IT Infrastructure Library (ITIL) v3 and how to implement it in order to increase the efficiency of any Egyptian IT corporate and to help the corporate employees to do their work easily and its clients to feel the quality of services provided to them. ITIL is considered now as the de facto standard for IT Service Management (ITSM) in organizations which operate their business based on IT infrastructure and services. ITIL v3 was implemented in western organizations but still it is a new framework for the Egyptian and Arabian environment. The best proof of the lack of ITSM in the Arab region and not Egypt alone is that the percentage of the companies which have ISO/IEC 20000 are less than 2% of the total certified companies in the whole world and in Egypt no company has it until now as stated on APMG ISO/IEC 20000 website[1]. Accordingly this paper investigates an implementation methodology of ITIL in an Egyptian organization taking into consideration the cultural factors and how it will affect the success of this implementation. We have already implemented this methodology in three Egyptian companies and it succeeded to increase the level of process maturity from level one to level four according the PMF
Pricing Strategies and Business Alliances – A Comparative Integrated Study of...Waqas Tariq
This paper aims to analyze the fruits and vegetables market landscape and reveal the major differences in this industry between Italy and Romania, and make a comparative review of the influence of several key business drivers (e.g. natural factors, farm structure, demographics, cultivated area, production and yield values) on price levels in the above mentioned countries. Assuming that the price level is a key purchasing driver and also that profitability of fruits and vegetables growers is a pending competitive issue in the European Union, especially at small and medium sized producers’ level, this paper concludes that producers should focus on obtaining higher yields, enlarging farm sizes, strengthening the actual producer organizations and establishing new associative forms, capable to increase their negotiation power with retail chains and local authorities. They should also focus their strategies in becoming more competitive by accessing the latest agro-food technologies and implementing stronger trade initiatives.
Design and Development of a Malayalam to English Translator- A Transfer Based...Waqas Tariq
This paper describes a transfer based scheme for translating Malayalam, a Dravidian language, to English. This system inputs Malayalam sentences and outputs equivalent English sentences. The system comprises of a preprocessor for splitting the compound words, a morphological parser for context disambiguation and chunking, a syntactic structure transfer module and a bilingual dictionary. All the modules are morpheme based to reduce dictionary size. The system does not rely on a stochastic approach and it is based on a rule-based architecture along with various linguistic knowledge components of both Malayalam and English. The system uses two sets of rules: rules for Malayalam morphology and rules for syntactic structure transfer from Malayalam to English. The system is designed using artificial intelligence techniques.
An Exploratory Study of Internal Control and Fraud Prevention Measures in SMEsWaqas Tariq
Small business and entrepreneurship has emerged as an important area of research over the past 40 years. This paper revolves around the issues of the internal controls, fraud and it prevention measures on SMEs performance. The level of fraud incidence as reported by owners is still at a very low level and the overall cost incurred is still within expectation. However, there is a question of whether the low reported rate of fraud is due to adequate preventive actions currently employed by owners, or whether the owners are reluctant to reveal the truth in order to portray their efficiency and effectiveness in running their businesses. This conceptual paper attempts to analyze relevant literature on internal control, fraud, current trends on fraud and business crime prevention measure. Based on the literature, a future research could be suggested in the context of Malaysia. It is hoped that future research on this aspect will uncover the relationship between the effectiveness of internal control and fraud on SMEs and to gauge the adequacy of fraud prevention measure taken by SMEs owners in Malaysia. It is expected that effective internal control and the presence of appropriate fraud preventive measures will help to improve SMEs performance. KEYWORDS: Internal Control; Fraud; Small and Medium Enterprises
Hand Written Character Recognition Using Neural Networks
Similar to The Identification Level of Security, usability and Transparency Effects on Trust in B2C Commercial Websites Using Adaptive Neuro Fuzzy Inference System (ANFIS)
Offering A Model Of Evaluation Of Trust Suggesting Between Customers And E-St...Waqas Tariq
to succeed in the e-commerce depends on lots of factors; one of the important and vital ones is trust. In this Paper, we will suggest a model of Fuzzy Logical System which depicts some of the hidden relationships between the critical factors such as security, familiarity, and designing in a B2C commercial website on the one hand, and the competitive factor to other competitors on the other hand. We are going to find the impact of these factors on the decision-making process of people to buy through the B2C commercial websites, and we also will analyze how these factors influence the results of the B2C trading. The study also provides a device to sellers in order to improve their commercial websites; in addition, it provides on-line customers a helping device to buy through the commercial websites. In the study, the sample in the first questionnaire was the investigation of experts of e-commerce, and in the second one was the customers of commercial websites. Also, we have used the Expert Choice software to determine the priority of factors in the first questionnaire, and the SPSS and Excel software for sampling and analysis procedures to find the Fuzzy rules. Finally, we used the Fuzzy logical kit in the MATLAB software to analyze the factors which generate the model.
Purpose: the objective of this study is to investigate how the impact of brand image, customer satisfaction,
usefulness, and convenience on trust and customer loyalty. Design/Methodology/Approach: this research is to
examine the factors that affect trust and customer loyalty by using secondary data analysis, archival study
approach. This study has been using three frameworks with combined from previous studies to create and
develop a new conceptual framework. F
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Trust is a big part of how well e-commerce works and it is also a big part of how people decide what to
buy. As more and more business is done online, companies that want to build customer loyalty and
involvement must understand the complex relationship between trust and e-commerce. This study paper
looks at the many distinct aspects of trust in e-commerce and how it affects people’s actions. By looking at
the various aspects and causes of trust and how to build and keep trust, this study shows how businesses
can create a trustworthy online environment that makes customers happier and leads to long-term success.
Trust is a big part of how well e-commerce works and it is also a big part of how people decide what to
buy. As more and more business is done online, companies that want to build customer loyalty and
involvement must understand the complex relationship between trust and e-commerce. This study paper
looks at the many distinct aspects of trust in e-commerce and how it affects people’s actions. By looking at
the various aspects and causes of trust and how to build and keep trust, this study shows how businesses
can create a trustworthy online environment that makes customers happier and leads to long-term success.
ANALYSIS THE ATTACK AND E-COMMERCE SECURITY
It is Secondary Base Term Paper . Do not copy it but you can use it for gathering information and it is well structure term paper as well as.
The growing use of Internet in India provides varied opportunities for online shopping from both customer and seller perspective. If Electronic marketers (E-Marketers) know the factors affecting online Indian behavior, the relationships between these factors and the type of online buyers, they can further develop their marketing strategies to convert potential buyers into active buyerswhile retainingits original customer base. This study focuses on the factors which online buyers takes into consideration while shopping online. This research will help in finding the impact of e-market on customers’ purchasing patterns and how their security and privacy concerns about online marketinginfluences their online buying behavior. The study will further encompass the various important inputs which will equip the marketers for creating online marketing more lucrative and assured by adding value to the existing services.
Effects of mediation of trust on effect of quality service e-commerce, servi...inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
E satisfaction e-loyalty of consumers shopping onlineAbu Bashar
With the advent of information technologies and emergence of online stores, the
online shopping has not been the same as it was in the past. Now in order to strive
in this cut throat competition it is of vital importance for the organizations to
understand the factors that matter for consumers when they shop online. As the
competition in e-commerce is intensified, it becomes more important for online
retailers to understand the antecedents of consumer acceptance of online
shopping. Such knowledge is essential to customer relationship management,
which has been recognized as an effective business strategy to achieve success
in the electronic market. The current research study is an effort to understand
the satisfaction and loyalty pattern for the consumers shopping online. The objective
of this research is to study the impact of emotional state and perceived risk of
remote purchase on e-satisfaction during the Internet shopping. As well, it aims
to study the influence of e-satisfaction on e-loyalty. The data gathering was carried
out by a questionnaire. The results show that three dimensions of the emotional
state during Internet shopping (the pleasure, stimulation and dominance) have a
significant positive impact on e-satisfaction. Dimensions of the perceived risk of
remote purchase, (the total risk, the financial risk, the social risk, the
psychological risk, the functional risk, and the physical risk) don't have a significant
impact on e-satisfaction, except the risk of loss of time has a negative impact.
Finally satisfaction influences positively and significantly the e-loyalty of the cyber
consumers.
The effects of the online customer experience on customer loyalty in e-retailersIJAEMSJORNAL
The modern world has seen significant growth in the e-commerce industry in terms of volume and acceptance among customers. E-commerce has changed the behavior of shoppers depending on various factors such as easy accessibility and availability of a wider range of products and services. Now, customer retention has become a challenge for any company because there is so much competition. This article seeks to further understand the online customer experience and examine the customer experience in online sales and its impact on customer loyalty. However, empirical research on online customer experience and loyalty is scarce. The aims of this study are unique to two cases. The first is to examine the effect of online customer experience on customer responses to e-commerce retailer Digikala in Iran, given that two dimensions of online customer experience including empirical and emotional states are considered as customer experience evaluation tools. Each of these two dimensions is about explaining customer loyalty. Customer Experience is a new field of competition for brands to create an effective customer experience. This is the key to distinguishing brand names from one another, and lacking appropriate solutions for managing the customer experience will affect all aspects of the business, given the importance of the online customer experience in loyalty and maintaining a competitive advantage. Research is important and can have beneficial implications for entrepreneurship and formulating organizational strategies.
Similar to The Identification Level of Security, usability and Transparency Effects on Trust in B2C Commercial Websites Using Adaptive Neuro Fuzzy Inference System (ANFIS) (20)
The Use of Java Swing’s Components to Develop a WidgetWaqas Tariq
Widget is a kind of application provides a single service such as a map, news feed, simple clock, battery-life indicators, etc. This kind of interactive software object has been developed to facilitate user interface (UI) design. A user interface (UI) function may be implemented using different widgets with the same function. In this article, we present the widget as a platform that is generally used in various applications, such as in desktop, web browser, and mobile phone. We also describe a visual menu of Java Swing’s components that will be used to establish widget. It will assume that we have successfully compiled and run a program that uses Swing components.
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
Camera mouse has been widely used for handicap person to interact with computer. The utmost important of the use of camera mouse is must be able to replace all roles of typical mouse and keyboard. It must be able to provide all mouse click events and keyboard functions (include all shortcut keys) when it is used by handicap person. Also, the use of camera mouse must allow users troubleshooting by themselves. Moreover, it must be able to eliminate neck fatigue effect when it is used during long period. In this paper, we propose camera mouse system with timer as left click event and blinking as right click event. Also, we modify original screen keyboard layout by add two additional buttons (button “drag/ drop” is used to do drag and drop of mouse events and another button is used to call task manager (for troubleshooting)) and change behavior of CTRL, ALT, SHIFT, and CAPS LOCK keys in order to provide shortcut keys of keyboard. Also, we develop recovery method which allows users go from camera and then come back again in order to eliminate neck fatigue effect. The experiments which involve several users have been done in our laboratory. The results show that the use of our camera mouse able to allow users do typing, left and right click events, drag and drop events, and troubleshooting without hand. By implement this system, handicap person can use computer more comfortable and reduce the dryness of eyes.
A Proposed Web Accessibility Framework for the Arab DisabledWaqas Tariq
The Web is providing unprecedented access to information and interaction for people with disabilities. This paper presents a Web accessibility framework which offers the ease of the Web accessing for the disabled Arab users and facilitates their lifelong learning as well. The proposed framework system provides the disabled Arab user with an easy means of access using their mother language so they don’t have to overcome the barrier of learning the target-spoken language. This framework is based on analyzing the web page meta-language, extracting its content and reformulating it in a suitable format for the disabled users. The basic objective of this framework is supporting the equal rights of the Arab disabled people for their access to the education and training with non disabled people. Key Words : Arabic Moon code, Arabic Sign Language, Deaf, Deaf-blind, E-learning Interactivity, Moon code, Web accessibility , Web framework , Web System, WWW.
Real Time Blinking Detection Based on Gabor FilterWaqas Tariq
New method of blinking detection is proposed. The utmost important of blinking detections method is robust against different users, noise, and also change of eye shape. In this paper, we propose blinking detections method by measuring of distance between two arcs of eye (upper part and lower part). We detect eye arcs by apply Gabor filter onto eye image. As we know that Gabor filter has advantage on image processing application since it able to extract spatial localized spectral features, such line, arch, and other shape are more easily detected. After two of eye arcs are detected, we measure the distance between both by using connected labeling method. The open eye is marked by the distance between two arcs is more than threshold and otherwise, the closed eye is marked by the distance less than threshold. The experiment result shows that our proposed method robust enough against different users, noise, and eye shape changes with perfectly accuracy.
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Waqas Tariq
A method for computer input with human eyes-only using two Purkinje images which works in a real time basis without calibration is proposed. Experimental results shows that cornea curvature can be estimated by using two light sources derived Purkinje images so that no calibration for reducing person-to-person difference of cornea curvature. It is found that the proposed system allows usersf movements of 30 degrees in roll direction and 15 degrees in pitch direction utilizing detected face attitude which is derived from the face plane consisting three feature points on the face, two eyes and nose or mouth. Also it is found that the proposed system does work in a real time basis.
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Waqas Tariq
Mobile multimedia service is relatively new but has quickly dominated people¡¯s lives, especially among young people. To explain this popularity, this study applies and modifies the Technology Acceptance Model (TAM) to propose a research model and conduct an empirical study. The goal of study is to examine the role of Perceived Enjoyment (PE) and what determinants can contribute to PE in the context of using mobile multimedia service. The result indicates that PE is influencing on Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) and directly Behavior Intention (BI). Aesthetics and flow are key determinants to explain Perceived Enjoyment (PE) in mobile multimedia usage.
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
This paper presents recent research into methods used in Australian Indigenous Knowledge sharing and looks at how these can support the creation of suitable collaborative envi- ronments for timely organisational learning. The protocols and practices as used today and in the past by Indigenous communities are presented and discussed in relation to their relevance to a personalised system of knowledge sharing in modern organisational cultures. This research focuses on user models, knowledge acquisition and integration of data for constructivist learning in a networked repository of or- ganisational knowledge. The data collected in the repository is searched to provide collections of up-to-date and relevant material for training in a work environment. The aim is to improve knowledge collection and sharing in a team envi- ronment. This knowledge can then be collated into a story or workflow that represents the present knowledge in the organisation.
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
The main aim of this paper is to build a system that is capable of detecting and recognizing the hand gesture in an image captured by using a camera. The system is built based on Altera’s FPGA DE2 board, which contains a Nios II soft core processor. Image processing techniques and a simple but effective algorithm are implemented to achieve this purpose. Image processing techniques are used to smooth the image in order to ease the subsequent processes in translating the hand sign signal. The algorithm is built for translating the numerical hand sign signal and the result are displayed on the seven segment display. Altera’s Quartus II, SOPC Builder and Nios II EDS software are used to construct the system. By using SOPC Builder, the related components on the DE2 board can be interconnected easily and orderly compared to traditional method that requires lengthy source code and time consuming. Quartus II is used to compile and download the design to the DE2 board. Then, under Nios II EDS, C programming language is used to code the hand sign translation algorithm. Being able to recognize the hand sign signal from images can helps human in controlling a robot and other applications which require only a simple set of instructions provided a CMOS sensor is included in the system.
An overview on Advanced Research Works on Brain-Computer InterfaceWaqas Tariq
A brain–computer interface (BCI) is a proficient result in the research field of human- computer synergy, where direct articulation between brain and an external device occurs resulting in augmenting, assisting and repairing human cognitive. Advanced works like generating brain-computer interface switch technologies for intermittent (or asynchronous) control in natural environments or developing brain-computer interface by Fuzzy logic Systems or by implementing wavelet theory to drive its efficacies are still going on and some useful results has also been found out. The requirements to develop this brain machine interface is also growing day by day i.e. like neuropsychological rehabilitation, emotion control, etc. An overview on the control theory and some advanced works on the field of brain machine interface are shown in this paper.
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Waqas Tariq
There is growing ageing phenomena with the rise of ageing population throughout the world. According to the World Health Organization (2002), the growing ageing population indicates 694 million, or 223% is expected for people aged 60 and over, since 1970 and 2025.The growth is especially significant in some advanced countries such as North America, Japan, Italy, Germany, United Kingdom and so forth. This growing older adult population has significantly impact the social-culture, lifestyle, healthcare system, economy, infrastructure and government policy of a nation. However, there are limited research studies on the perception and usage of a mobile phone and its service for senior citizens in a developing nation like Malaysia. This paper explores the relationship between mobile phones and senior citizens in Malaysia from the perspective of a developing country. We conducted an exploratory study using contextual interviews with 5 senior citizens of how they perceive their mobile phones. This paper reveals 4 interesting themes from this preliminary study, in addition to the findings of the desirable mobile requirements for local senior citizens with respect of health, safety and communication purposes. The findings of this study bring interesting insight to local telecommunication industries as a whole, and will also serve as groundwork for more in-depth study in the future.
Principles of Good Screen Design in WebsitesWaqas Tariq
Visual techniques for proper arrangement of the elements on the user screen have helped the designers to make the screen look good and attractive. Several visual techniques emphasize the arrangement and ordering of the screen elements based on particular criteria for best appearance of the screen. This paper investigates few significant visual techniques in various web user interfaces and showcases the results for better understanding and their presence.
Virtual teams are used more and more by companies and other organizations to receive benefits. They are a great way to enable teamwork in situations where people are not sitting in the same physical place at the same time. As companies seek to increase the use of virtual teams, a need exists to explore the context of these teams, the virtuality of a team and software that may help these teams working virtualy. Virtual teams have the same basic principles as traditional teams, but there is one big difference. This difference is the way the team members communicate. Instead of using the dynamics of in-office face-to-face exchange, they now rely on special communication channels enabled by modern technologies, such as e-mails, faxes, phone calls and teleconferences, virtual meetings etc. This is why this paper is focused on the issues regarding virtual teams, and how these teams are created and progressing in Albania.
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
It is a well established fact that the Web-Applications require frequent maintenance because of cutting– edge business competitions. The authors have worked on quality evaluation of web-site of Indian ecommerce domain. As a result of that work they have made a quality-wise ranking of these sites. According to their work and also the survey done by various other groups Futurebazaar web-site is considered to be one of the best Indian e-shopping sites. In this research paper the authors are assessing the maintenance of the same site by incorporating the problems incurred during this evaluation. This exercise gives a real world maintainability problem of web-sites. This work will give a clear picture of all the quality metrics which are directly or indirectly related with the maintainability of the web-site.
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...Waqas Tariq
A paradox has been observed whereby web site usability is proven to be an essential element in a web site, yet at the same time there exist an abundance of web pages with poor usability. This discrepancy is the result of limitations that are currently preventing web developers in the commercial sector from producing usable web sites. In this paper we propose a framework whose objective is to alleviate this problem by automating certain aspects of the usability evaluation process. Mainstreaming comes as a result of automation, therefore enabling a non-expert in the field of usability to conduct the evaluation. This results in reducing the costs associated with such evaluation. Additionally, the framework allows the flexibility of adding, modifying or deleting guidelines without altering the code that references them since the guidelines and the code are two separate components. A comparison of the evaluation results carried out using the framework against published evaluations of web sites carried out by web site usability professionals reveals that the framework is able to automatically identify the majority of usability violations. Due to the consistency with which it evaluates, it identified additional guideline-related violations that were not identified by the human evaluators.
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Waqas Tariq
A robot arm utilized having meal support system based on computer input by human eyes only is proposed. The proposed system is developed for handicap/disabled persons as well as elderly persons and tested with able persons with several shapes and size of eyes under a variety of illumination conditions. The test results with normal persons show the proposed system does work well for selection of the desired foods and for retrieve the foods as appropriate as usersf requirements. It is found that the proposed system is 21% much faster than the manually controlled robotics.
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorWaqas Tariq
In recent decades speech interactive systems have gained increasing importance. Performance of an ASR system mainly depends on the availability of large corpus of speech. The conventional method of building a large vocabulary speech recognizer for any language uses a top-down approach to speech. This approach requires large speech corpus with sentence or phoneme level transcription of the speech utterances. The transcriptions must also include different speech order so that the recognizer can build models for all the sounds present. But, for Telugu language, because of its complex nature, a very large, well annotated speech database is very difficult to build. It is very difficult, if not impossible, to cover all the words of any Indian language, where each word may have thousands and millions of word forms. A significant part of grammar that is handled by syntax in English (and other similar languages) is handled within morphology in Telugu. Phrases including several words (that is, tokens) in English would be mapped on to a single word in Telugu.Telugu language is phonetic in nature in addition to rich in morphology. That is why the speech technology developed for English cannot be applied to Telugu language. This paper highlights the work carried out in an attempt to build a voice enabled text editor with capability of automatic term suggestion. Main claim of the paper is the recognition enhancement process developed by us for suitability of highly inflecting, rich morphological languages. This method results in increased speech recognition accuracy with very much reduction in corpus size. It also adapts Telugu words to the database dynamically, resulting in growth of the corpus.
An Improved Approach for Word Ambiguity RemovalWaqas Tariq
Word ambiguity removal is a task of removing ambiguity from a word, i.e. correct sense of word is identified from ambiguous sentences. This paper describes a model that uses Part of Speech tagger and three categories for word sense disambiguation (WSD). Human Computer Interaction is very needful to improve interactions between users and computers. For this, the Supervised and Unsupervised methods are combined. The WSD algorithm is used to find the efficient and accurate sense of a word based on domain information. The accuracy of this work is evaluated with the aim of finding best suitable domain of word. Keywords: Human Computer Interaction, Supervised Training, Unsupervised Learning, Word Ambiguity, Word sense disambiguation
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
From the existing research it has been observed that many techniques and methodologies are available for performing every step of Automatic Speech Recognition (ASR) system, but the performance (Minimization of Word Error Recognition-WER and Maximization of Word Accuracy Rate- WAR) of the methodology is not dependent on the only technique applied in that method. The research work indicates that, performance mainly depends on the category of the noise, the level of the noise and the variable size of the window, frame, frame overlap etc is considered in the existing methods. The main aim of the work presented in this paper is to use variable size of parameters like window size, frame size and frame overlap percentage to observe the performance of algorithms for various categories of noise with different levels and also train the system for all size of parameters and category of real world noisy environment to improve the performance of the speech recognition system. This paper presents the results of Signal-to-Noise Ratio (SNR) and Accuracy test by applying variable size of parameters. It is observed that, it is really very hard to evaluate test results and decide parameter size for ASR performance improvement for its resultant optimization. Hence, this study further suggests the feasible and optimum parameter size using Fuzzy Inference System (FIS) for enhancing resultant accuracy in adverse real world noisy environmental conditions. This work will be helpful to give discriminative training of ubiquitous ASR system for better Human Computer Interaction (HCI). Keywords: ASR Performance, ASR Parameters Optimization, Multi-Environmental Training, Fuzzy Inference System for ASR, ubiquitous ASR system, Human Computer Interaction (HCI)
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
The Identification Level of Security, usability and Transparency Effects on Trust in B2C Commercial Websites Using Adaptive Neuro Fuzzy Inference System (ANFIS)
1. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 126
The Identification Level of Security, Usability and
Transparency Effects on Trust in B2C Commercial Websites
Using Adaptive Neuro Fuzzy Inference System (ANFIS)
Mehrbakhsh Nilashi Nilashidotnet@yahoo.com
Computer Engineering Department
Islamic Azad University of Roudsar and Amlash
Roudsar, Iran
Mohammad Fathian Fathian@iust.ac.ir
Associate Professor, School of Industrial Engineering
University of Science & Technology
Tehran, Iran
Mohammad Reza Gholamian Gholamian@iust.ac.ir
Assistant Professor, School of Industrial Engineering
University of Science & Technology
Tehran, Iran
Othman bin Ibrahim Othmanibrahim@utm.my
Faculty of Computer Science and Information Systems
Universiti Teknologi Malaysia
Johor, Malaysia
Alireza Khoshraftar Ali_samick@yahoo.com
Faculty of Computer Science and Information Systems
University Teknologi Malaysia
Johor, Malaysia
Abstract
With the rapid development of Internet, the number of online customers is growing fast. This
growth is supported by spreading of Internet usage around the globe. However, the question
of security and trust within e-commerce has always been in doubt. This study generates
general knowledge about e-commerce. This study specifically gives an overview to
understand different factors about security and trust between companies and their
consumers. In order to Three e-stores and their websites were examined based on the model
proposed .This study also mentions that security and trust work parallel and close to each
other. If a consumer feels that an online deal is secured and they can trust the seller, it leads
to a confident e-commerce’s trade. The main focus of this study is to find out a suitable way
to resolve security and trust issues that make e-commerce an uncertain market place for all
parties. The findings of this study indicate that, character of security is regarded as the most
important to building trust of B2C websites. The proposed model applies Adaptive Neuro-
Fuzzy model to get the desired results. Two questionnaires were used in this study. The first
questionnaire was developed for e-commerce experts, and the second one was designed for
the customers of commercial websites. Also, Expert Choice is used to determine the priority
of factors in the first questionnaire, and MATLAB and Excel are used for developing the
Fuzzy rules. Finally, the Fuzzy logical kit was used to analyze the generated factors in the
model.
2. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 127
Keywords: ANFIS, E-commerce, Trust, Security.
1. INTRODUCTION
These years many researchers have put eyes on this new academic area of online
environment because of the rapidly popularity of Internet. Some researchers examined
impact of online shopping environments on consumer choices and factors which influence
shopping online, some researchers have discussed the role of Internet shopping as a channel
of distribution, and some researchers pointed out impact of online shopping on price
sensitivity. There are also other researchers; they are interested in the people who are not
willing to shopping online. According to the findings of Sandra, Forsythe and Shi (2003),
Internet users are classified into Internet shoppers (those who have made purchases on the
Internet) and Internet browsers (those who have browsed online for product/service but not
made purchases on the Internet) [1, 12].
The Previous findings in e-commerce trust area has showed that trust is an interpersonal
determinant of behavior that deals with beliefs about the integrity, benevolence, ability and
predictability of other people [11].
The detailed information on trust and the security system that is implemented by companies
for secure transactions are important attributes in B2C e-commerce. According to Lightner the
rewards of B2C e-commerce are realized partially through well-designed websites, since they
act as the primary contact with customers. There are some factors for consumers trust in
online buying when they plan to buy, and also there are more factors and matter of
interactions when they are on the buying process in online and after one[13].So website
designers must consider factors, in a website allowing the emergence of confidence between
an online seller and a customer. A significant survey, which took place in United States
between educators and practitioner, was about the security issues in e-commerce. The
survey’s result showed that most of educators and practitioners were worried about their
online payment and personal information, because the lack of trust regarding the security
issues within the e-commerce. They were even unhappy to get unpleasant long mailing list
from different places, which could cause variants of virus attack, spreading of their
personal information and their credit card number. (Carr et al., 2010) Security and trust issues
could be found both within companies that engaged with small businesses and companies
doing broader businesses. Jonathan (2003) means that the criminals often try to crop
the information of the online consumers by establishing so called “spoof sites”, which are
fake Web sites. He means that such Web sites are being created by using the HTML code of
the Web sites that are legitimate. By doing this the criminals manage to create a site that
exactly looks like the legitimate businesses’ site[2,14].
Further the author means that the criminals could misuse the consumers of that Web site by
different ways, like sending them e-mails with false information in order to gain
consumers’ personal information. He means that the whole process could end up with
criminals tricking the consumers and get access to their financial accounts and so on.
Technical competence is a key factor when it comes to gaining the customers trust. It is
imperative that the e-commerce website is completely functional. Make sure all words are
spelled correctly, there are no broken links or dead images, search engines yield proper
results, etc. If the website does not function properly, it gives an unprofessional impression.
Customers will rather put their trust in a website that seems qualified [3,10].There are many
factors that are important within e-commerce, which should be improved. But
3. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 128
considering our limited resource we have chosen to focus on security within e-commerce.
The study is limited to only e-commerce companies, i.e. security issue and solutions for it
would be studied from business to consumers’ (B2C) perspective. This study will be about
finding ways to create trust for consumers while doing businesses within e-commerce. So a
key element in e-commerce is trust. Without trust it would be impossible to do business at all.
It is not easy for customers to know if an e-commerce site is trustworthy or not. Therefore, it is
essential to have a well structured site where the customer can find the information needed.
Security is also an important issue when developing an e-commerce site. The customers
should always know that the information they provide will not be sold or misused in any other
way. This is essential since the customers might provide sensitive information such as their
credit card number [4, 5, 6, and 8].Importance of trust makes it a critical success factor for
most suppliers/retailers to focus on it more, comparing other issues necessary for their
business. As the Internet develops and grows, its success will largely depend on gaining and
maintaining the trust of visitors. Such trust will be paramount to sites that depend on
consumer commerce. The concept of trust is crucial because it affects a number of factors
essential to online transactions, including security and privacy. Trust is also one of the most
important factors associated with branding. Without trust, development of e-commerce can
not reach its potential. In a joint research project conducted by Cheskin and Studio
Archetype/Sapient, released in January 1999, the factors that produce a sense of
trustworthiness on a website were identified [33].
In a follow-up study begun early in 2000, Cheskin probed the dimensions of online trust
across the Americas by linking the learning in both studies, understanding of the nature and
dynamics of website trust can be dramatically enhanced [33].
FIGURE 1: Attitudes impact customer internet to buy on the web.
In Figure 1, they have examined the relationship between online experience, closely
correlated with and reported here as skill and also the reasons for not shopping online [33].
4. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 129
They have examined only that combination of web users who have never shopped online and
never plan to. Overall, the most important reasons that non-buyers are uninterested in online
shopping and it’s not important for them not to shop online are not functional, but those are
related to issues of controlling their personal information.
It is apparent that negative perceptions regarding security and privacy increase with
increasing levels of online proficiency. The reverse is true for the functional reasons; web
users do not shop online, including no perceived need, no interest, no knowledge of how to
shop online and the belief that it is faster to shop in physical stores. In essence, the more
experience one acquires online, the less important are the functional barriers to online
shopping and the more important are concerns of control over personal information. Trust is
an essential component of all successful buyer-seller relationships; the emergence of online
business has brought about new challenges for building trust. On Business to customer
relations, trust is very hard to achieve because comparing to Business to Business relations,
it is for a short time and it is more transaction focused.
By developing the technology world, due to high investments, lack of a sudden shift for a
better transaction and safer one, always is noticed and considered.
2. BASIC CONCEPTS
2.1. BACKGROUND OF ANFIS
Fuzzy logic was introduced by Zadeh in 1965 to represent and manipulate data and
information in which there are various forms of uncertainty. Fuzzy rule-based systems use
linguistic variables to reason using a series of logical rules that contain IF-THEN rules which
connect antecedent(s) and consequent(s), respectively. An antecedent is a fuzzy clause with
certain degree of membership. Fuzzy rules can have multiple antecedents connected with
AND or OR operators, where all parts are calculated simultaneously and resolved into a
single number.
Consequents can also be comprised of multiple parts, which are then aggregated into a
single output of a fuzzy set [18].Fuzzy inference is a process of mapping from a given input to
an output using the fuzzy set methods.
ANFIS is the implementation of fuzzy inference system (FIS) to adaptive networks for
developing fuzzy rules with suitable membership functions to have required inputs and
outputs. FIS is a popular and cardinal computing tool to which fuzzy if-then rules and fuzzy
reasoning compose
bases that performs mapping from a given input know-ledge to desired output using
fuzzy theory. This popular fuzzy set theory based tool have been successfully applied to
many military and civilian areas of including decision analysis, forecasting, pattern
recognition, system control, inventory management, logistic systems, operations
management and so on. FIS basically consist of five subcomponents (Topçu and
Saridemir, 2008), a rule base (covers fuzzy rules), a database (portrays the
membership functions of the selected fuzzy rules in the rule base), a decision making
unit (performs inference on selected fuzzy rules), fuzzification inference and
defuzzification inference. The first two subcomponents generally referred knowledge base
and the last three are referred to as reasoning mechanism (which derives the output or
conclusion) [34].
5. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 130
An adaptive network is a feed-forward multi-layer Artificial Neural Network (ANN)
with; partially or completely, adaptive nodes in which the outputs are predicated on the
parameters of the adaptive nodes and the adjustment of parameters due to error term is
specified by the learning rules. Generally learning type in adaptive ANFIS is hybrid learning
(Jang, 1993). General structure of the ANFIS is illustrated in Figure 2 [35].
FIGURE 2: Schematic diagram of Fuzzy building blocks
The ANFIS is a multilayer feed-forward network which uses neural network learning
algorithms and fuzzy reasoning to map inputs into an output. Indeed, it is a fuzzy inference
system (FIS) implemented in the framework of adaptive neural networks. For simplicity, a
typical ANFIS architecture with only two inputs leading to four rules and one output for the
first order Sugeno fuzzy model is expressed [15, 16, 17, 18, 22, 23, and 24].
The ANFIS architecture is shown in figure3.
FIGURE 3: A typical ANFIS architecture for a two-input Sugeno model with four rules
Using a given input/output data set, the ANFIS method constructs a fuzzy inference system
(FIS) whose membership function parameters are tuned (adjusted) using either a
Input Output
6. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 131
backpropagation algorithm alone, or in combination with a least squares type of method. This
allows fuzzy systems to learn from the data they are modeling. FIS Structure is a network-
type structure similar to that of a neural network, which maps inputs through input
membership functions and associated parameters, and then through output membership
functions and associated parameters to outputs.
In our case ANFIS is a four-layer neural network that simulates the working principle of a
fuzzy inference system. The linguistic nodes in layers one and four represent the input and
output linguistic Variables, respectively. Nodes in layers two are term nodes acting as
membership functions for input variables. Each neuron in the third layer represents one
fuzzy rule, with input connections representing preconditions of the rule and the output
connection representing consequences of the rules. Initially, all these layers are fully
connected, representing all possible rules.
The suggested ANFIS has several properties:
• The output is zero
the
order Sugeno-type system.
• It has a single output, obtained using weighted average defuzzification. All output
membership functions are constant.
• It has no rule sharing. Different rules do not share. The same output membership
function, namely the number of output membership functions must be equal to the
number of rules.
• It has unity weight for each rule.
Three feature variables are selected as inputs of the ANFIS. Three membership functions
(Mfs) are assigned to each linguistic variable. The suggested ANFIS model is shown in Fig. 4.
It shows the fuzzy rule architecture of ANFIS consists of 27 fuzzy rules. In this study for
space trust problem, the cross sectional areas of the structures are selected as ANFIS inputs
and nodal displacements, element stresses and ultimate load factor can be separately
considered as ANFIS output. For each input two Gaussian membership functions are adopted
and the maximum number of epochs in training mode is set to 250. Figure 5 shows the flow
chart for trust model via ANFIS.
FIGURE 4: The ANFIS structure for research model
7. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 132
Start
Input Training data into ANFIS system
Training
Finished?
Get results after training
Input Testing data into ANFIS system
Training
Finished?
• View FIS structure,
• output surface of FIS,
• generated rules and
• adjusted membership functions
No
• Set initial input parameters and membership
function
• Chose FIS model optimization method
(Hybrid method)
• Define training and testing parameters
(Number of training/testing epochs)
End
No
FIGURE 5: Flowchart of force prediction of ANFIS system
8. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 133
2.2 ANALYTIC HIERARCHY PROCESS (AHP)
Fundamentally, AHP provides a “ratio scale” of relative magnitudes expressed in dominance
objects to represent judgments in the form of paired comparisons. An overall ratio scale is
then synthesized to obtain a ranking of the objects, and thus ratio transitivity is also implied in
the process of deriving the relative weight for objects.
Saaty developed the following steps for applying the AHP:
1. Define the problem and determine its goal.
2. Structure the hierarchy from the top (the objectives from a decision-maker's viewpoint)
through the intermediate levels (criteria on which sub-sequent levels depend) to the lowest
level which usually contains the list of alternatives.
3. Construct a set of pair-wise comparison matrices (size n n) for each of the lower
levels with one matrix for each element in the level immediately above by using the relative
scale measurement shown in Table 1. The pair-wise comparisons are done in terms of which
element dominates the other.
4. There are n(n-1)/judgments required to develop the set of matrices in step 3.
Reciprocals are auto- magically assigned in each pair-wise comparison.
5. Hierarchical synthesis is now used to weight the eigenvectors by the weights of the
criteria and the sum is taken over all weighted eigenvector entries corresponding to those in
the next lower level of the hierarchy.
6. Having made all the pair-wise comparisons, the consistency is determined by using the
igenvalue, λmax, to calculate the consistency index, CI as follows: )1/()( max −−= nnCI λ ,
here n is the matrix size. Judgment consistency can be checked by taking the consistency
ratio (CR) of CI with the appropriate value in Table 1. The CR is acceptable, if it does not
exceed 0.10. If it is more, the judgment matrix is inconsistent. To obtain a consistent matrix,
judgments should be reviewed and improved.
7. Steps 3-6 are performed for all levels in the hierarchy [25, 26, 27, and 28].
Numerical rating Verbal judgments of preferences Numerical rating Verbal judgments of preferences
Extremely preferred 1
Very strongly preferred 2
Strongly preferred 3
Moderately preferred 4
Equally preferred 5
Very strongly to extremely 6
Strongly to very strongly 7
Moderately to strongly 8
Equally to moderately 9
TABLE 1. Pair-wise comparison scale for AHP preferences
Fortunately, there is no need to implement the steps manually. Professional commercial
software, Expert Choice, developed by Expert Choice, Inc., is available on the market which
simplifies the implementation of the AHP's steps and automates many of its computations.
3. THE METHODOLOGY OF RESEARCH
9. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 134
Figure 6 shows the research methodology of ANFIS trust model.
FIGURE 6. The schematic form of research methodology of this research
Step1: Find out as many
as possible different
parameters that affect on
B2C website Trust.
Step2: polling from experts and Gathering experts' judgments
based on linguistic scale to establish pairwise comparison
matrix for sub factors through pairwise comparisons
questionnaire and grouping factors in three major groups to
determine the trust model for B2C e-commerce websites. In
this step the priority of sub factors was determined by expert
choice software.
Step5: Input clustered data into ANFIS to generate
rules and membership functions.
Step6: Performing sensitivity analysis and
compression with fuzzy model.
Clustered
Data
THE METHODOLOGY OF
RESEARCH
Step3: Designing the second questionnaire based on factors
derived from first questionnaire and polling of 150 online users
in review from 3 suggested websites for discovering fuzzy
rules.
Step4: required computations by the Excel software
and clustering collected data by FCM clustering
method in MATLAB software.
Data
Collection
10. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 135
4. CONCEPTUAL FRAMEWORK
The proposed model has been established based on this principle that trust in B2C websites
includes three factors as follows:
Transparency: what we say is what we do". To all participants it must be clear,
understandable, and logical and, if possible, verifiable with whom they are dealing
and about what, subject to what conditions, and what information is relevant or
being used for that purpose. Transparency forms the basis of trust.
Usability:" Usability is defined as a set of attributes that bear on the effort needed
for the use and on the individual assessment of such use by a stated or implied set
of users. According to ISO 9126, usability’s sub-characteristics are
understandability, learn ability and operability. Based on the definition, it is obvious
that the quality factor of us-ability is related to characteristics of e-commerce
systems, such as provision of accurate informative texts about products and
services offered, as well as provision of thumbnails, photographs and videos
presenting the services and products available [31].
Security: Different threats in e-commerce, like data transaction attacks and misuse
of financial and personal information, generate security threats. Thus, security is
protection against such threats [32].
The level of trust obtains of these three parameters performance. Figure 7 Presents a model
based on our which illustrates the relationships between the different concepts.
FIGURE 7. Relationships between Trust, Security, Transparency and Usability
Factors of perceived trustworthiness
Security
B2C Web
Features
Transparency
Usability
Increasing Trust of
Customer On
E-transactions
Purchase intentions
11. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 136
4.1. DATA COLLECTION AND ANALYSIS
This study used a web-based survey because of its advantages such as convenience; viable,
effective way to access difficult-to-reach respondents [7].
Questionnaire method was used for collecting data: the questionnaire was prepared by using
51 parameters that was shown in the table 3. All the affected parameters on website quality
were mentioned in previous findings.
It had also five options (index) ranked by 0-4 for the raised questions could be found as
follows:
very low (1) low (2) moderate (3) high (4) very high
The selected population in this study was included in two groups. The first group was
included ten experts in the field of e-commerce and the Second group was included 150
numbers of E-Commerce and IT students.
The first group completed the first questionnaire and after obtaining results from the first
questionnaire and the second group completed the second.
After collecting data of first questionnaire and finding factors with higher priority, the second
questionnaire was designed .it involves 3 major groups. The method of scoring was chosen
based on the likert scale of 5 degrees and 13 given questions in questionnaire were scored
like 5 selections.
In this questionnaire 12 questions are relative to 3 major groups, and 1 question has been
observed relative to the trust level of website.
Cronbach’s Alpha method is applied to calculate the reliability of measurement tool e.g.
questionnaire or tests which measure different characteristics. According to Jamal & Naser
(2002:154) [29] a tool with Cronbach’s Alpha greater than the minimum quantity level 0.7
suggested by Nunnally [30] (1987) is considered reasonable from reliability aspect.
To assess the reliability of the questionnaires in this research, Cronbach’s Alpha was used.
The results of reliability test by using SPSS have been presented in table 2:
Table 2. The counted credit coefficient of second questionnaire
The inserted credit trust in table 1 shows the acceptance of second questionnaire credit.
After that customers referred to special website for experimental buying, it was asked the
respondents to analyze three websites as parsim.com, Tobuy.ir, irshop.ir
During this process, they should answer some questions in security groups, usability groups,
transparency groups, and trust level.
The order of answering the questions is that first of all the respondents should analyze the
website and answer the questions in security groups, usability, transparency and then they
kronbach's alpha coefficient for each website
Parsim.comTobuy.irIrshop.ir
0.830.830.85
12. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 137
were asked to count the trust level and after that the it was weighted respondents were asked
to evaluate the selective website for b2c dealings based on their expectation level of trust.
4.2. COUNTING THE LEVEL OF SECURITY
To count the level of security sheet1 was created in EXCEL (security sheet) and linguistic
values questionnaire were changed to numerical values. Actually it was related numerical
value to each linguistic value (0, 1, 2, 3 and 4) in order to count the level of security the
counted level of security is made by adding these values for each factor whose maximum for
four factors is number 16.Also, its percent for level of security was counted that has been in
table 2, and in general second equation has been used for level of security .Table 3 shows
the linguistic scales to evaluate security level.
∑=
=
4
1i ixeveldSecurityLAccumulate
=OfMaximumPercentage 100*)16
)( eveldSecurityLAccumulate
Table 3. Linguistic and numeric values for security level
Linguistic valuedomain of values percent
low0-33
moderate34-66
high66-100
Some Pseudo code for counting the level of factors was written with VBA programming in
excel software. The sample Pseudo code for counting the level of security is shown in
following:
(9)
Sub Security_Ind_Prot_Auth ()
Dim i as Integer
Dim col As Integer
Dim x as String
Worksheets ("security").Activate
For col = 2 To 6 Step 2
For i = 4 To 153 Step 1
Cells (i, col).Select
ActiveCell.Value = Trim ((ActiveCell.Value))
If StrComp (ActiveCell.Value, "very low", vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 0
End If
If StrComp (ActiveCell.Value, "low", vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 1
End If
If StrComp (ActiveCell.Value, "moderate", vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 2
End If
If StrComp (ActiveCell.Value, "high", vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 3
End If
If StrComp (ActiveCell.Value, "very high", vbTextCompare) = 0 Then
ActiveCell.Offset (0, 1).Value = 4
End If
Next i
Next col
End Sub
13. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 138
4.3 THE PRIORITIZED FACTOR RESULTED THROUGH AHP METHOD
In this study the priority of Sub-Criteria in security, Usability and Transparency groups was
counted by expert choice software that uses ahp method. Thus Rank and Weight of Criteria,
Sub-Criteria Counted by Expert Choice has been noted in Table 4.
TABLE 4: Sixteen of most important parameters that affect on website trust ranked by their weight via
Expert Choice
Objective:
Assessment and prioritizing affective criteria of Security, Usability and Transparency
CriteriaCR.
PrioritiesofCriteria
Sub-Criteria Ranking And Their Weighs Counted By Experts.
12345678910
Security
Secure Payment
Systems
0.03
0.2240.230.2060.240.2570.1840.2380.2240.2920.2160.24
privacy0.2040.1720.2430.2290.1630.1660.2270.2060.170.2260.179
Policies to ensure0.1890.1840.1640.2010.1980.1660.1450.1660.2260.1890.177
Security
protocols
0.1180.1460.1330.1090.1360.1420.1210.1060.0880.1090.121
Usability
Direct delivery of
the products
0.03
0.2660.2490.2660.2410.2290.2510.3040.20.2240.2720.263
Notification by
E-mail
0.1870.230.1520.190.30.2970.1840.2410.2130.2150.212
Possibility to
returning the
product
0.2070.2540.1790.1360.120.1490.1320.2610.1910.1550.148
Thanking
message after
each purchase
0.1290.1030.1640.150.1260.1140.1690.1190.1660.1420.17
Transparency
description of the
product
0.04
0.250.2850.2740.1910.2860.2880.1360.1890.1750.220.197
Information
concerning our
company
0.1980.1610.2320.160.2330.2010.190.2240.2070.2110.237
sales conditions0.140.1450.1410.2030.1390.1410.2120.1680.2520.160.131
the way in which
the Customer
can record
transaction data
0.1550.1370.120.1560.1270.1130.2060.150.1380.1280.145
4.4. DEVELOPING EXPERT SYSTEM
4.4.1. FCM CLUSTEING AND FUZZY RULES FOR INDICATING TRUST
LEVEL
The most important step of structure identification is the rule generation. Clustering of the
input-output data is an intuitive approach to rule generation. The idea of clustering is to
produce a concise representation of a system’s behavior by dividing the output data into a
certain number of fuzzy partitions. The fuzzy C-Means (FCM) clustering algorithm (Bezdek
1981, Bezdek et al. 1987) has been widely studied and applied in many applications.
14. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 139
The number of rules is an important parameter of the FIS. Clearly, the appropriate number of
rules depends on the complexity of the system. According to Sugeno and Yasukawa (1993),
the number of fuzzy rules corresponds to the order of a conventional model where an optimal
model minimizes both the order and the output error. A statistical analysis for evaluating the
optimal order of a model is discussed by Akaike (1974). A large number of rules, similar to a
high order of a model, will bias the model towards specific data that can be imprecise or even
erroneous. On the other hand, less number of rules will likely increase the output error, which
is essentially equivalent to disregarding the effect of some of the data points containing
valuable information.
Thus, the optimal number of rules n can be obtained from a tradeoff between the numbers of
rules and the output error.
The number of rules will be automatically determined through clustering the input and output
spaces. Each cluster center is used as the basis of a rule that describes the system behavior.
For refining and finding the rules of fuzzy model, it has been the clustering technique, and the
kind of clustering has been chosen the fuzzy C-means (FCM) clustering in MATLAB software.
Equation 1 is as a major function in clustering k-means.
Where m is any real number greater than 1, uij is the degree of membership of Xj in the
cluster i, Xj is the jth of d-dimensional measured data, Vi is the d-dimension center of the
cluster, and ||*|| is any norm expressed the similarity between any measured data and the
center.
Fuzzy partition is carried out through an iterative optimization of Equation 8 with the update of
membership uij and the cluster centers VI by Equation 2 and 3:
The criteria in this iteration will stop when ε<
−
−
ijijij uumax , where ε is a termination
criterion between 0 and 1 [21].
All clustering activities were done in MATLAB software. For example 27 centers of clusters for
counting the level of trust is shown in figure 8.after obtain the centers of clusters and save
into DAT files, the centers of cluster were loaded into ANFIS. In fact this data is used as
training data in ANFIS model.
(1)
(2)
(3)
15. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 140
FIGURE 8. Centers of clusters for counting the level of security
After clustering, ANFIS was proposed in an effort to formalize a systematic approach to
generating fuzzy rules from an input-output data set.
In ANFIS model 27 rules for trust level is used. The rules describing the trust level are based
on the degree of security, usability, and transparency that these degrees have been
formulated like linguistic variable .similarly, the degree for trust level has been graded from
very low to very high in 5 distinctive fuzzy,collections .these rules have been reached from the
users ' answers after ordering ,analyzing ,and clustering. Figure 9 shows some of the rules
from ANFIS after raining data.
One of the collection rules of confidence level can be like following:
If (security = high and usability = low and transparency = moderate) then (trust =moderate).
FIGURE 9. Shows the GUI for the rule editor
4.4.2. EXPERT ANFIS SYSTEM
The ANFIS system based on Expert knowledge contains 27 rules, 3 inputs and one single
output for trust level. The structure of expert ANFIS is shown in figure 10.
The fuzzy logic toolbox using the MATLAB software is employed to create the ANFIS model.
In fuzzy logic tool box, relevant FIS for trust model is created. In this model type of FIS is
selected Sugeno type.
16. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 141
FIGURE 10. ANFIS trust structure
4.4.3. MEMBERSHIP FUNCTION FOR EXPERT ANFIS
Gaussmf are used to build the expert ANFIS model. The shape of membership functions after
training the AFNIS for 100 epochs is shown figure 11.
FIGURE 11. Membership function editor
4.4.4. TRAINING DATA FOR TRUST LEVEL
The entire data set of trust level is 27 samples. They are referred to as training data, testing
data and checking data. Upon training, the ANFIS shows the training error which reflects the
how good the mapping function is. To validate the model, we further apply the testing data to
see how the ANFIS behaves for known data. ANFIS maps the function onto the testing data
as per the training.
17. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 142
Having created the data set the next step is to train the network. This means we create a new
FIS to fit the data into membership functions. Using the grid partitioning method, the ANFIS
automatically selects the membership function and also generates the new FIS.
Figure 12 shows training and testing data in ANFIS network that is loaded.
FIGURE 12. ANFIS editor: Training the rules
In figure 13, the course of error during the training of adaptive network is shown.
Figure 13. Course of error during the training of adaptive network
At the end of 100 training epochs, the network error (mean square error) convergence course
of each ANFIS was derived. From the curve, the final convergence value is 3.6671e−007.
The rule viewer for the 3 inputs and 1 output can be observed pictorially in the Figure 14.
18. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 143
FIGURE 14. Rule viewer window
5. DEVELOPMENT AND ANALYZING FUZZY SYSTEM
After discovering the rules related to trust level, relevant inputs and outputs for earning trust
level in fuzzy tool box to be organized and were created relevant membership for input and
output figure 15 shows the fuzzy system that can be used to derive the trust level.
FIGURE 15. The ecommerce ANFIS trust model
5.1. ANALYSIS OF TRUST VERSUS SECURITY FACTOR
For complete understanding of participation needed in trust level, it is necessary to separately
test the participation of each factor.
The Figure 16 shows contribution to Trust of a given Website originating from the Security.
Therefore, the contribution from Usability and Transparency has been kept constant at high
19. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 144
level corresponding to numeric value for Usability and Transparency of (15). When T&U is
high, then Trust remains high and is rather constant (at a value of about 0.9) with increasing
security .Figure 12 shows that Trust level is monotonically increasing for increasing perceived
security of a website for any given level of Usability and Transparency (However when both U
and T is ‘High’ (numeric value of 15) the Trust level is at its maximum for maximum Security.
Figure 16.Trust versus security factor
5.2. ANALYSIS OF TRUST VERSUS TRANSPARENCY FACTOR
Figure 17 shows how Trust is contributed from transparency for constant values of Security
and usability. The values for high has the same interpretations as explained in the previous
section. This figure is considerably different from the previous one. One stunning point to note
is that trust levels remain low for any value of transparency when S&U is low. When S&U is
high, then Trust remains high and is rather constant (at a value of about 0.7) with increasing
transparency. This tends to suggest that Trust is positively related to transparency for high
S&U. Also, Trust is high for S&U levels being high with increasing transparency. This means
that, although increasing transparency has a positive affect on Trust, the relative increase is
more visible for moderate values of S&U.
20. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 145
FIGURE 17.Trust versus Transparency factor
5.3. ANALYSIS OF TRUST VERSUS USABILITY FACTOR
Figure 18 is noticeably identical to the figure in the previous section on Trust as a function of
transparency. This means that for all intentions and purposes, we can substitute transparency
with usability.
FIGURE 18. Plot of trust vs. usability
21. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 146
5.4. ANALYSIS OF TRUST VERSUS SECURITY AND USABILITY FACTOR
In this section Trust level is depicted as a continuous function of its input parameters as
security and usability. Figure 18 intends to depicture variation of Trust as encapsulated in the
rules for Trust. The highest gradient for Trust is when Usability is ‘moderate’ and Security is
‘moderate’ to ‘high’. This suggest that when people are somewhat familiar with a website then
a small increase in security levels from between moderate to high security will boost their
trust in a significant way. Looking at Figure 18 diagonally from (low, low) to (high, high) levels
of Security and Usability one observes three plateaus where the last one is around 0.966, and
remains at that level even when the input factors are increased further.
One interesting point to note, however, is that for maximum usability and transparency, the
Trust level is never higher than 0.695. This plateau also is reached fairly rapidly with high
gradients from both sides of the input variables .figure 20 shows Trust level as a function of
usability and transparency.
FIGURE 19.Trust level is positively related to levels of security and usability
22. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 147
FIGURE 20.Trust level as a function of usability and transparency
6. CONCLUSION
This paper present a new conceptual model for online trust, which three important factors that
affect on quality and trust B2C website were clarified completely. The proposed Model
depends on fuzzy rules generated by ANFIS method in an e-Commerce support.
The case study was three B2C website in Iran. By using AHP method and completing
questionnaire through face to face meeting we finally were able to provide ranking of all
factors and sub-factors. This ranking shows the relative importance of success factors with
comparison to each other. For the future growth of B2C electronic commerce, barriers such
as security concerns must be torn down. There are many methods that can be employed to
help engender this trust among online consumers. Security provided by vendor is just one
such method.
The main purpose of this research is to tell the readers specially the managers of the B2C
websites to understand how these B2C website to build trust, how the consumers’ attitude to
the issue of information security and how they influent the web trust during shopping. In this
study, the connection of trustworthiness and security is disclosed.
This survey can be used to follow step by step the instructions and, based on actual level of a
feature, decide its contribution in a category and consequently derive a total value of a factor,
say Security. In addition, the vendor can use the survey data to ascertain the Trust level of
the site as per the user’s perception and rectify, if needed, if this is not obvious or if it is
having a negative impact on the Trust level.
Finally in This study respondents mentioned that trust and security both have a high important
relationship between them in strengthen the customer purchases with E-story so that he or
she can use the buying online services.
23. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 148
REFERENCES
[1] Sandra, M.; Forsythe* & Shi Bo (2003), Consumer patronage and risk perceptions in
Internet shopping, Journal of Business Research, 56, 867-875 .
[2] Carr, D. L. et al. (2010) The impact of instructor attire on college student
satisfaction,Collage Student Journal Vol. 44 , No. 1 March 2010, p. 101-111.
[3] Kong, W., and Hung Y. C., “Modeling Initial and Repeat Online Trust in B2C E-
commerce,” in Proceedings of the 39th Hawaii International Conference on System
Sciences, 04-07 Jan. 2006, vol.6, pp. 120b-120b.
[4] P Lanford & R Hübscher. “Trustworthiness in E-commerce.” ACMSE, 2004.
[5] L.Jo, Lisa .M. “How Does Personality Affect Trust in B2C c-Commerce?” ICEC’06,
August [4-16 2006, Fredericton, Canada.
[6] B.Shneiderman., “Designing Trust into Online Experiences”, Communications of the
ACM, 43(12), 2000, 57 -59.
[7] A.Fahim, “Trust in Electronic Commerce: Social, Personal, and Technical Perspective”,
In Proceedings of the International Conference of the Information Resources
Management Association: Innovations through Information Technology, New Orleans,
USA.
[8] Allen C. Johnston , Merrill Warkentin "The online consumer trust construct: a web
merchant practitioner perspective" , Proceedings of the 7th Annual Conference of the
Southern Association for Information Systems.
[9] Fukuyama, F. (1995). Trust: the social virtues and the creation of prosperity, the free
press,New York.
[10] Gefen, David. & Detmar W, Straub. (2004). Consumer trust in B2C e-commerce and
the importance of social presence: experiments in e-products and services. The
international journal of management science. Omega 32, pp. 407-424.
[11] Mayer, R.C., Davis, J. H. & Schoorman, F.D. (1995). An integration model of
organizational trust. Academy of management review, 20(3), pp. 709-734.
[12] Reichheld, F.F. & Schefter, P. (2000). ‘E-loyalty: your secret weapon on the web,’
Harvard business review,78. pp.105-113.
[13] Lightner, Nancy. J. (2004). Evaluating e-Commerce functionality with a focus on
customer Service. Communications of the ACM, Vol. 47 Issue 10, p.88, 5p; (AN
14523142).
[14] Singh, M.,Costtabile, A., Paull, S. (2001). E-commerce and customer relationship
management (eCRM), heidelberg press, Melbourne, pp.95-108.
[15] Ciji Pearl Kurian , V.I.George, Jayadev Bhat & Radhakrishna S Aithal Manipal Institute
of Technology Manipal – 576104, India"Anfis Model For The Time Series Prediction Of
Interior Daylight Illuminance"
[16] Sengur, A. (2008a). Wavelet transform and adaptive neuro-fuzzy inference system for
color texture classification. Expert Systems with Applications, 34, 2120–2128.
[17] Buragohain, M., & Mahanta, C. (2008). A novel approach for ANFIS modeling based on
full factorial design. Applied Soft Computing, 8, 609–625.
[18] Avci, E. (2008). Comparison of wavelet families for texture classification by using
wavelet packet entropy adaptive network based fuzzy inference system. Applied Soft
Computing, 8, 225–231.
24. Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman bin Ibrahim & Alireza Khoshraftar
International Journal of Artificial Intelligence And Expert Systems (IJAE), Volume (2) : Issue (3) : 2011 149
[19] Ying, L. C., & Pan, M. C. (2008). Using adaptive network based fuzzy inferencesystem
to forecast regional electricity loads. Energy Conversation and Management, 49, 205–
211.
[20] Kosko, B., (1992). Neural Networks and Fuzzy systems: A Dynamical Systems
Approach to Machine Intelligence. Prentice-Hall, Englewood Cliffs, NJ.
[21] Bezdek, J.C., 1981. Pattern Recognition with Fuzzy Objective Function Algorithms.
Plenum, New York.
[22] Wang, Y.M. and Elhag, T. ″An adaptive neuro-fuzzy inference system for bridge risk
assessment. Expert Systems with Applications, 34(4), pp 3099-3106 (2008).(17)
[23] Sugeno, M. ″Industrial applications of fuzzy control″, Elsevier Science Pub. Co,
(1985).(18)
[24] Jang, J.S.R. ″ANFIS: Adaptive-network-based fuzzy inference systems″, IEEE
Transactions on Systems Man and Cybernetics, 23 (3), pp 665–685 (1993).(19)
[25] Saaty, T.L. (1977). A scaling method for priorities in hierarchical structures. J Math
Psychol 15: 234-281.
[26] Saaty, T.L.(1980). The Analytic Hierarchy Process. McGraw-Hill: New York.
[27] Saaty TL (1986). Axiomatic foundation of the analytic hierarchy process. Management
Sci. 32:841-855.
[28] Saaty, T.L. (1994). Highlights and critical points in the theory and application of the
analytic hierarchy process. Eur J Opl Res 74: 426-447.
[29] Jamal, A. & Naser, K. (2002). Customer satisfaction and retail banking: an assessment
of some of the key antecedents of customer satisfaction in retail banking.International
Journal of Bank Marketing, 146-160.
[30] Nunnally, J. (1967). Psychometric Theory, McGraw Hill, New York, NY.
[31] Roy, M.C., Dewit, O., Aubert, B.A. (2001). The Impact of Interface Usability on Trust in
Web Retailers. Internet Research: Electronic Networking Applications and Policy,
11(5), 388-398.
[32] Moorman, C., Deshpande, R. and Zaltman, G. (1993). Factors Affecting Trust in
Market Research Relationships. Journal of Marketing, 57, January, 81-101.
[33] Cheskin and Studio Archetype/Sapient, released in January 1999,”the factors that
produce a sense of trustworthiness on a website”
[34] T. Takagi andM. Sugeno, “Fuzzy identification of systems and its application to
modeling and control,” IEEE Trans. Syst., Man, Cybern., vol. SMC-15, pp. 116–132,
1985.
[35] ang, J.S. (1993). ANFIS: Adaptive-Network-Based Fuzzy Inference Systems. IEEE
Transactions on Systems, Man, and Cybernetics, Vol. 23(3), 665-685.