Virtual World as an electronic artificial environment, enables users to have an identity while in... more Virtual World as an electronic artificial environment, enables users to have an identity while interacting with others is one of the new instances of Computer-Mediated Communications environment. Our study aims to elaborate the two types of presence in virtual world and their effects on users’ satisfaction and loyalty in second life. In addition we try to elaborate the factors that affect virtual and social presence. We used survey in order to collect data from a student sample frame. Our samples are students who at least have three weeks experience with second life in order to measure our model. Results of the research suggested that cognitive absorption positively influence virtual presence and sense of belonging positively influence social presence. In addition our results suggested that sense of presence in virtual world increase satisfaction and loyalty among virtual world users.
Data breaches are adversely affecting organizations’ reputation and market value (Cavusoglu et al... more Data breaches are adversely affecting organizations’ reputation and market value (Cavusoglu et al. 2004; Mukhopadhyay et al. 2013). According to a Forbes report, 46 percent of companies have suffered reputational damage due to a data breach (Forbes 2014). In addition, a recent survey of 2,000 consumers found that nearly 87 percent are unlikely to do business with organizations impacted by data breach (NCI 2016). Ponemon (2015) notes that the average cost of each stolen record is $217. The cost of data breaches include notification of individuals impacted by the breach, legal fees, regulatory fines, and the cost of recovery. These costs can be damaging and difficult to recover from, especially for small and medium sized organizations. This is perhaps why it is argued that 60 percent of small businesses close their businesses within half a year of being impacted by cybercrime (Aguilar 2015). These costs are also one of the reasons organizations are driven to protect their businesses f...
Despite constant reminders, warnings on avoidance techniques, information security policies, and ... more Despite constant reminders, warnings on avoidance techniques, information security policies, and anti-virus software reminders, individuals still fall prey to malware attacks. This paper looks at the role that familiarity and trust play on the individual’s intention to click-through web based malware. Hypotheses are developed to suggest that click-through intention is influenced by trust and familiarity. Two scenarios to test the hypotheses are described. Expected contributions and limitations are noted.
The purpose of this research is to develop a theoretical multi-dimensional model of trust for on-... more The purpose of this research is to develop a theoretical multi-dimensional model of trust for on-line exchanges in B-to-C e-commerce. The overall objective of this study to investigate the determinants of the trust in on-line exchanges that lead to the success of transactions using content analysis, a relatively novel methodology in the MIS research area.
Virtual World as an electronic artificial environment, enables users to have an identity while in... more Virtual World as an electronic artificial environment, enables users to have an identity while interacting with others is one of the new instances of Computer-Mediated Communications environment. Our study aims to elaborate the two types of presence in virtual world and their effects on users’ satisfaction and loyalty in second life. In addition we try to elaborate the factors that affect virtual and social presence. We used survey in order to collect data from a student sample frame. Our samples are students who at least have three weeks experience with second life in order to measure our model. Results of the research suggested that cognitive absorption positively influence virtual presence and sense of belonging positively influence social presence. In addition our results suggested that sense of presence in virtual world increase satisfaction and loyalty among virtual world users.
Data breaches are adversely affecting organizations’ reputation and market value (Cavusoglu et al... more Data breaches are adversely affecting organizations’ reputation and market value (Cavusoglu et al. 2004; Mukhopadhyay et al. 2013). According to a Forbes report, 46 percent of companies have suffered reputational damage due to a data breach (Forbes 2014). In addition, a recent survey of 2,000 consumers found that nearly 87 percent are unlikely to do business with organizations impacted by data breach (NCI 2016). Ponemon (2015) notes that the average cost of each stolen record is $217. The cost of data breaches include notification of individuals impacted by the breach, legal fees, regulatory fines, and the cost of recovery. These costs can be damaging and difficult to recover from, especially for small and medium sized organizations. This is perhaps why it is argued that 60 percent of small businesses close their businesses within half a year of being impacted by cybercrime (Aguilar 2015). These costs are also one of the reasons organizations are driven to protect their businesses f...
Despite constant reminders, warnings on avoidance techniques, information security policies, and ... more Despite constant reminders, warnings on avoidance techniques, information security policies, and anti-virus software reminders, individuals still fall prey to malware attacks. This paper looks at the role that familiarity and trust play on the individual’s intention to click-through web based malware. Hypotheses are developed to suggest that click-through intention is influenced by trust and familiarity. Two scenarios to test the hypotheses are described. Expected contributions and limitations are noted.
The purpose of this research is to develop a theoretical multi-dimensional model of trust for on-... more The purpose of this research is to develop a theoretical multi-dimensional model of trust for on-line exchanges in B-to-C e-commerce. The overall objective of this study to investigate the determinants of the trust in on-line exchanges that lead to the success of transactions using content analysis, a relatively novel methodology in the MIS research area.
Uploads