User acceptance of security technologies is crucial for security provision in Internet systems and networks. In this paper we examined acceptance of biometric identification techniques in the Internet. Drawing on elements of technology acceptance model (TAM), diffusion of innovations (DOI) and unified theory of acceptance and use of technology (UTAUT) along with the trust-privacy research field, we proposed a novel integrated approach. We proved that the most important drivers to explain biometrics acceptance and recommendation are concern for privacy, trust in technology and perceived risk, and not the renowned technology acceptance variables from the mentioned traditional adoption models (TAM, DOI, and UTAUT), for example compatibility or perceived usefulness.
COBISS.SI-ID: 21705190
This paper presents a mathematical model for an optimal security-technology investment evaluation and decision-making processes based on a quantitative analysis of the security risks and a digital-assets assessment in an organization. The model makes use of a quantitative analysis of different security measures that counteract individual risks by identifying the information-system processes in an enterprise and the potential threats. The model comprises the target security levels for all the identified core business processes and the probability of a security accident together with the possible loss the organization may suffer. The model allows in-depth analyses and computations providing quantitative assessments of different options for investments, which translate into recommendations that facilitate the selection of the best solution and the associated decision-making. The model was tested with data from a real business environment.
COBISS.SI-ID: 26755879
Understanding the main determinants of Internet service adoption is important both for service providers and users. In response to the limited understanding of the role of users’ perceived risk in Internet banking adoption, we developed a new model that combines unified theory of acceptance and use of technology (UTAUT) with perceived risk to explain behaviour intention and usage behaviour of Internet banking. Our results support some relationships of UTAUT, such as performance expectancy, effort expectancy, and social influence, and also the role of risk as a stronger predictor of intention.
COBISS.SI-ID: 21704934
Online trust systems aim to translate the role that trust has in the traditional world onto the virtual platforms. Establishing the inter-dependence between these systems and the human-factor is essential for reducing and understanding the inherent complexity of the open social platforms running on the Internet, and for improving the user-experience and system-performance. This work determines the systemic features of trust and introduces a novel framework of design-properties based on the principles of General Systems Theory. We determine the systemic properties, which are missing in the current technical solutions, and incorporate social factors into the design-guidelines of trust systems. We introduce four influence-factors and demonstrate that accounting for those factors leads to compliance with the generic system-principles. This is the first study applying fundamental social science principles from General Systems Theory and case-study research for the purpose of theory-building and evaluation of technical human-centric solutions.
COBISS.SI-ID: 21257190
Group decision-making becomes an unavoidable issue in many fields of telecommunication and Internet systems engineering, design and planning. In this paper we examined a new method for supporting group decision-making in the field of HCI (Human Computer Interaction), based on the combined use of methods from two different areas; MCDM (Multi-Criteria Decision Making and SCT (Social Choice Theory). We proposed an approach that maximizes the group satisfaction with the group solution where real decision making experts acting in one instance as the decision makers, in another instance as voters and in a third instance as virtual (synergized) decision makers/voters. The comparison of results obtained for all three settings shows that the MCDM methods and the SCT methods can be used not only separately, but can also be merged, thus creating a convenient and stimulating environment for making group decisions. The case study demonstrates its capabilities and the feasibility in group decision-making. It possesses the potential for use in various sectors of the information society.
COBISS.SI-ID: 27229735