فهرست مطالب

International Journal of Information Science and Management
Volume:11 Issue: 1, Apr 2013

  • Special issue
  • تاریخ انتشار: 1392/03/20
  • تعداد عناوین: 9
|
  • Prof. D. Khalil Nor, Wan Nurfazni Wan Mohammad Nazarie, A. Al Ajamrosman Yusoff Pages 1-16
    Internet is integrated into nearly all aspects of activities including businesses. It is a medium that can be accessed anywhere. The advancement of Internet has contributed to the development of electronic commerce and trust has been suggested in the literature to play an essential role in the development of e-commerce. Lately, e-commerce has also taken placed in a new platform, Social Networking Sites (SNSs). As in e-commerce, individuals’ trust is also important in using SNSs as the medium of commerce. Based on literature review, we found limited number of studies investigating factors that affect individuals’ trust in this medium. Examining factors that influence individuals’ trust in online purchase using SNSs was the primary concern of this research. In this study, four factors were examined which are propensity to trust, experience in online purchase, testimonial, and monetary risk. The samples of this research were 129 Facebook users. Questionnaires were distributed through email and a posting on the researcher’s Facebook. Multiple regression analysis was used to test the relationships proposed in the study. The study revealed that propensity to trust and testimonial were two significant factors that influence individuals’ trust in online purchase through SNSs.
  • Prof. Dr. M. E. Mohammadpourzarandi, R. Tamimi Pages 17-23
    Nowadays, World Wide Web has become a popular medium to search information, business, trading and so on. Various organizations and companies are also employing the web in order to introduce their products or services around the world. Therefore E-commerce or electronic commerce is formed. E-commerce is any type of business or commercial transaction that involves the transfer of information across the internet. In this situation a huge amount of information is generated and stored in the web services. This information overhead leads to difficulty in finding relevant and useful knowledge, therefore web mining is used as a tool to discover and extract the knowledge from the web. Beside, the security issues are the most precious problems in every electronic commercial process. This massive increase in the uptake of ecommerce has led to a new generation of associated security threats. In this paper we use web mining techniques for security purposes, in detecting, preventing and predicting cyber attacks on virtual space.
  • Prof. A. Sanayei, Dr. A. Shaemi, P. Ahadi Pages 25-37
    The aims of this paper are to measure the brand equity of e-banking services, and to improve the conceptualization of customer-based e-service brand equity. A pilot and a main study were conducted. The findings in this study support the model of customer-based brand equity in e-service. A pilot and a main study were conducted. This study used a sample of 130e-banking customers. From the interrelationships among the organization''s presented brand, external brand communications, customer experience with organization, brand image, brand awareness and perceived quality emergebrand association and brand loyalty and ultimately, brand equity. Finally, Partial least squares (PLS) modeling offers diagnostic information about a conceptual framework forunderstanding of customer-based brand equityin e-services.
  • M. Hajli, M. Hajli, F. Khani Pages 39-53
    Social commerce, a new stream in e-commerce, enables hyper-informed consumers to support the businesses in new product development. Hyper-informed consumers are the results of online communication provided by social media. These consumers have been empowered by Web 2.0 technologies to have online communication, which drives value for the companies in new product development. Trust is one the values that might be provided by the online communication of individuals through sharing the knowledge and experience of a new product. The paper sheds on new product development and trust concepts along with social commerce construct theory in order to develop a research model for investigating the impact of online communication of consumers, which produce social word of mouth on trust building mechanisms. The results from a survey reveal that social word of mouth, offered by social media, increases the level of trust on new products. The conclusion, discussion, and future research suggestion in the end of the paper support its contribution to the track of marketing and innovation.
  • Dr. R. Shafei Pages 55-65
    The increasing use of internet leads to the expansion of electronic exchange. Customers are trying to take advantage of this situation in different ways. One of their main concerns is the lack of sufficient trust toward the other side. In other words, they are afraid of the probable damage of these kinds of online bargains. For example their potential fears of fraud. Maybe the perceived fraud is their greatest anxiety that hinders the continuance of their shopping. So the way the customers feel before entering the virtual world has a very important role in conveying the sense of probable existence of deception or vice versa. In this paper, we try to study the impact of customers’ emotions on the perceived damages in online shopping in which the clients are the probable victims. Our statistical population in this research includes university and higher education members in the west of Iran (provinces of Kurdistan). The examined sample according to relative classification method consists of 148 persons. In order to study the relationship between variables, descriptive research methods & structural equation modeling were used. According to results, customers’ sentiments have a considerable effect on the kind of perceived fraud. In this model negative feelings such as fear, shame, and stress have an important role in the intensity of technological deception. The most common non-technological frauds perceived by customers are online robbery; swindle & being exposed to compromise & willingness have the greatest role in decreasing the fear of victimization & increasing the tendency for online shopping.
  • Dr. A. Ansari, A. Kheirabadi, S. Ghalamkari, A. R. Khanjari Pages 67-84
    Understanding the antecedents and consequences of customer satisfaction in the mobile communications market is important. This study explores the effects of service quality, trust and perceived value on customer satisfaction, which, in turn, affects continuance intention of mobile services. Service quality and customer satisfaction were measured by multiple dimensions. A research model was developed based on this multidimensional approach and was empirically examined with data collected from about one 237 users of mobile value-added services in Tehran university. Results show that all two dimensions of service quality (interaction quality and outcome quality) and perceived value have significant and positive effects on customer satisfaction while only one dimension of service quality (environment quality) and trust have no effect on customer satisfaction.
  • B. Yahid, Dr. A. Shahbahrami, Dr. M. B. Nobakht Pages 85-96
    Payment is one of the main parts in businesses. Different types of software, hardware and methods for paying electronically have been presented. Different types of banking cards, E-wallet, internet web pages for payment make it possible to pay both online and offline. However, in most payment tools, exchanging money is anonymously and untraceably. Therefore, although most security techniques within payment tools are considered to restrict abuse, if it is stolen, it makes possible to be abuse. Furthermore, anonymous characteristics of E-money make it possible for money laundering. E-cheque includes both sides name in a business, and also it is traceable. By using E-cheque techniques in payment tools instead of E-money, it is possible to increase payment tools security.
  • Dr. A. Safari, M. Hashemi Fesharaki, H. Hashemi Fesharaki Pages 97-110
    Taking advantage of the new technology, supply chain has already created a chain of cooperation among its own Companies, and, in a larger scale, within a universal environment. Superior to these technologies is RFID which is an abbreviation for Radio Frequency Identification. RFID is one of the most advanced technologies in the contemporary world. Perishable products and hose with short time expiry particularly food products bring about many challenges and problems for the supply chain managers. Such challenges are mostly due to variety in the number of products, especial need for keeping track of the products during the supply chain process, their short term expiry; need to control their temperature during the supply chain process, and their high quantity. Using RFID is one of the best possible ways that can help managers deal with logistical problems of perishable products. In food industry, storage level is generally low because of a high possibility of expiry. Today, changes in methods of production, distribution, maintenance and sale of food products have led to some changes in the demand of consumers for higher quality as well as greater longevity of food products. In order for more confidence in desirable packing in supply chain of food products, such innovations as smart packaging or active packaging have achieved popularity.
  • A. Asosheh, P. Hajinazari, H. Khodkari Pages 111-126
    Nowadays, access to reliable information has become an essential factor leading to success in business. In this regard, adequate security of information and systems that process it is critical to the operation of all organizations. Therefore organizations must understand and improve the current status of their information security in order to ensure business continuity and increase rate of return on investments. Since, information security has a very important role in supporting the activities of the organization and for this reason; it is needed to have a standard or benchmark which controls governance over information security. Hence, this paper discusses some of Information Security Management System (ISMS) standards in order to determine their strengths and challenges. Then, based on most appropriate standards in the field, a method is proposed to allow information technology-related or based enterprises to implement their ISMS. This method helps identifying critical assets and related threats and vulnerabilities, assessing assets risks and providing necessary risk treatment plans. The proposed method makes it possible and structured to establish information security management system in IT related large-scale enterprises.