To see the other types of publications on this topic, follow the link: Vendor reputation.

Journal articles on the topic 'Vendor reputation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Vendor reputation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Oluwatosin Ilori, Nelly Tochi Nwosu, and Henry Nwapali Ndidi Naiho. "Third-party vendor risks in IT security: A comprehensive audit review and mitigation strategies." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 213–24. http://dx.doi.org/10.30574/wjarr.2024.22.3.1727.

Full text
Abstract:
In the increasingly interconnected digital landscape, third-party vendors play a critical role in providing essential services and capabilities to organizations. However, these external partnerships also introduce significant IT security risks, making it imperative for organizations to implement robust strategies for managing third-party vendor risks. This paper provides a comprehensive audit review of third-party vendor risks in IT security and outlines effective mitigation strategies. The audit review identifies key risk areas associated with third-party vendors, including data breaches, inadequate security controls, and compliance issues. Real-world case studies highlight the severe consequences of insufficient vendor risk management, such as substantial financial losses, reputational damage, and regulatory penalties. Through these examples, the review underscores the critical need for organizations to prioritize vendor risk management in their IT security frameworks. Recommended mitigation strategies are detailed, focusing on enhancing security controls, implementing regular security assessments, and establishing clear contractual agreements. Enhancing security controls involves rigorous vetting of vendors, enforcing strong authentication and encryption protocols, and ensuring vendors adhere to the organization's security policies. Regular security assessments, including audits and penetration testing, are crucial for identifying vulnerabilities and ensuring continuous compliance with security standards. Establishing clear contractual agreements with vendors helps define security expectations, responsibilities, and penalties for non-compliance, thereby creating a legal framework that supports robust risk management. The importance of continuous monitoring and oversight is emphasized, highlighting that effective third-party risk management is not a one-time activity but an ongoing process. Continuous monitoring involves real-time tracking of vendor performance and security posture, supported by automated tools and regular audits to promptly address emerging threats. This paper concludes by stressing the necessity for organizations to adopt a proactive approach to third-party vendor risk management, integrating it as a core component of their overall IT security strategy. By doing so, organizations can mitigate the risks associated with third-party vendors, protect sensitive data, and ensure compliance with regulatory requirements, ultimately safeguarding their operations and reputation in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
2

Oluwatosin, Ilori, Tochi Nwosu Nelly, and Nwapali Ndidi Naiho Henry. "Third-party vendor risks in IT security: A comprehensive audit review and mitigation strategies." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 213–24. https://doi.org/10.5281/zenodo.14725330.

Full text
Abstract:
In the increasingly interconnected digital landscape, third-party vendors play a critical role in providing essential services and capabilities to organizations. However, these external partnerships also introduce significant IT security risks, making it imperative for organizations to implement robust strategies for managing third-party vendor risks. This paper provides a comprehensive audit review of third-party vendor risks in IT security and outlines effective mitigation strategies. The audit review identifies key risk areas associated with third-party vendors, including data breaches, inadequate security controls, and compliance issues. Real-world case studies highlight the severe consequences of insufficient vendor risk management, such as substantial financial losses, reputational damage, and regulatory penalties. Through these examples, the review underscores the critical need for organizations to prioritize vendor risk management in their IT security frameworks. Recommended mitigation strategies are detailed, focusing on enhancing security controls, implementing regular security assessments, and establishing clear contractual agreements. Enhancing security controls involves rigorous vetting of vendors, enforcing strong authentication and encryption protocols, and ensuring vendors adhere to the organization's security policies. Regular security assessments, including audits and penetration testing, are crucial for identifying vulnerabilities and ensuring continuous compliance with security standards. Establishing clear contractual agreements with vendors helps define security expectations, responsibilities, and penalties for non-compliance, thereby creating a legal framework that supports robust risk management. The importance of continuous monitoring and oversight is emphasized, highlighting that effective third-party risk management is not a one-time activity but an ongoing process. Continuous monitoring involves real-time tracking of vendor performance and security posture, supported by automated tools and regular audits to promptly address emerging threats. This paper concludes by stressing the necessity for organizations to adopt a proactive approach to third-party vendor risk management, integrating it as a core component of their overall IT security strategy. By doing so, organizations can mitigate the risks associated with third-party vendors, protect sensitive data, and ensure compliance with regulatory requirements, ultimately safeguarding their operations and reputation in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
3

Herwin, Herwin, and Ferryal Abadi. "PENGARUH REPUTASI PERUSAHAAN DAN REPUTASI VENDOR TERHADAP KEPUTUSAN PEMBELIAN SECARA ONLINE DENGAN KEPERCAYAAN KONSUMEN SEBAGAI VARIABEL ANTARA." Jurnal Riset Manajemen dan Bisnis (JRMB) Fakultas Ekonomi UNIAT 3, no. 3 (2018): 353–64. http://dx.doi.org/10.36226/jrmb.v3i3.161.

Full text
Abstract:
This study aims to determine the effect of Corporate Reputation and Vendor Reputation of online purchasing decisions with consumer trust as a variable between. This is triggered from the phenomenon of the number of companies engaged in E-Commerce, but many are still failing. By looking at the big prospects in Indonesia, it is hoped that this research can find out what strategies can be done in order to succeed in E-Commerce. This research uses quantitative research method by conducting survey. Sampling method is purposive sampling. Validity and Reliability Test Results using SPSS v 20.0, and the results of hypothesis using path analysis. Corporate Reputation has a significant effect on Consumer Trust, as well as Vendor Reputation also has a significant effect on Consumer Trust. Then Consumer Trust also affects the Purchase Decision online.
 Keywords: Reputation, Company, Vendor, Trust, decision, buying
APA, Harvard, Vancouver, ISO, and other styles
4

Ramadhan, Fabian Kusuma, Agustinus Suryantoro, and Dyah Maya Nihayah. "IMPACT OF OVO DIGITAL WALLET ON MSME WELFARE IN SURAKARTA." Journal of Applied Economics in Developing Countries 8, no. 1 (2023): 16. http://dx.doi.org/10.20961/jaedc.v8i1.79447.

Full text
Abstract:
<p>This study examines the impact of using the OVO digital wallet on the turnover of street vendors in Surakarta. The informal economy, particularly street vendors, plays a significant role in Indonesia's economy. This research utilizes multiple linear regression analysis on questionnaire data to understand the influence of OVO usage. Findings indicate that OVO usage increases vendor welfare through higher income turnover, supported by the ease of use, mobility, reputation, trust, and security of the fintech product. Jebres, with its large number of vendors around Sebelas Maret University, shows significant influence.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Evensius, Petrus, and Fahrul Riza. "The Influence of Digital Innovation and Reputation on Buyer-Supplier Relationship Mediated by Supply Chain Flexibility." Journal of World Science 3, no. 2 (2024): 288–302. http://dx.doi.org/10.58344/jws.v3i2.555.

Full text
Abstract:
This research aims to determine and analyze the influence of digital innovation and reputation on the buyer-supplier relationship mediated by supply chain flexibility. Empirical study: PT vendors. Astra Daihatsu Motor. The method used in this research is quantitative research. The population in this research is the buyer-supplier of the Automotive Manufacturing Company Vendor PT. Astra Daihatsu Motor. The sample required for this research is around 222 respondents from 500 employees. So, the research results show that digital innovation positively impacts buyer-supplier relationships and supply chain flexibility. Likewise, company reputation also has a positive influence on these two variables. In addition, the results of the analysis show that supply chain flexibility mediates the relationship between digital innovation/reputation and buyer-supplier relationships. The practical implication of this research is the importance of investing in digital innovation and maintaining a company's reputation to strengthen business relationships and increase flexibility in dealing with changing markets and customer needs. This research provides insight for managers in managing supplier relationships, improving their supply chain performance through technology, and building a strong reputation.
APA, Harvard, Vancouver, ISO, and other styles
6

Pujastuti, Eli, Wing Wahyu Winarno, and Sudarmawan Sudarmawan. "Pengaruh E-Commerce Toko Online Fashion Terhadap Kepercayaan Konsumen." Creative Information Technology Journal 1, no. 2 (2015): 139. http://dx.doi.org/10.24076/citec.2014v1i2.17.

Full text
Abstract:
E-commerce yang menawarkan banyak kemudahan terhadap konsumen belum tentu berhasil hanya dengan membuat website toko online, namun konsumen secara personal juga akan menilai dan menentukan perilaku apa yang akan diambil berdasarkan penilaian secara subyektif dari konsumen terhadap suatu situs e-commerce, apakah konsumen tersebut akan percaya dan selanjutnya dengan senang hati bertukar informasi pribadi dengan situs e-commerce, dan akhirnya mempunyai keinginan untuk bertransaksi atau tidak. Penelitian ini bermaksud menguji pengaruh 3 faktor dalam Trust Building Model (TBM) kaitannya dengan kepercayaan konsumen terhadap e-commerce toko online fashion di Indonesia. Benarkah kepercayaan konsumen di Indonesia disebabkan oleh faktor perceived site quality (kualitas situs yang dirasakan), faktor perceived vendor reputation (reputasi vendor yang dirasakan), dan structural assurance (susunan keamanan) khususnya untuk e-commerce bisnis ke konsumen. Penelitian ini menggunakan Structural Equation Modeling (SEM) untuk menganalisis masing-masing faktor tersebut dengan meneliti 200 responden yang sudah pernah bertransaksi dan belum pernah bertransaksi namun mempunyai keinginan di kemudian hari dan sudah pernah berkunjung ke situs toko online fashion. Hasil dari penelitian ini menunjukkan bahwa kepercayaan konsumen e-commerce toko online fashion di Indonesia sangat dipengaruhi oleh kualitas website dan susunan keamanan yang tersaji melalui website, sedangkan reputasi vendor melalui website tidak signifikan mempengaruhi konsumen untuk bisa lebih percaya pada suatu vendor toko online fashion.E-commerce that offers a lot of convenience to consumers uncertain of success simply by making the website an online store, but consumers will personally assess and determine what behavior that consumers will take based on consumer’s assessment of an e-commerce site, whether consumer will believe and subsequent gladly exchange personal information with an e-commerce website, and make the transaction or not. This study intends to examine the influence of three factors in the Trust Building Model (TBM) relation with consumer’s trust in e - commerce online store of fashion in Indonesia. Is it true that consumer’s trust in Indonesia is caused by those factors: perceived site quality, perceived vendor reputation, and structural assurance, especially for e-commerce business to consumer. This study used Structural Equation Modeling (SEM) to analyze each of these factors by examining the 200 respondents who had dealings and have never had trade but have willingness to trade later and had ever been to a fashion online store site. The results of this study indicate that consumer’s trust in ecommerce online store of fashion in Indonesia is strongly influenced by the quality of the website and structural assurance presented through the website, while the reputation of the vendor through the website does not significantly influence consumers to be more trust in an online fashion store vendors.
APA, Harvard, Vancouver, ISO, and other styles
7

Hadi, Mohammed Nasser, Ali N. Hadi, and Mohammed A. Abdulrab. "Effect of Vendor Characteristics and Relationship Quality on Consumer Re-Purchase Intention in the B2C E-Commerce in Yemen." International Journal of Research in Business and Social Science (2147-4478) 8, no. 4 (2019): 172–84. http://dx.doi.org/10.20525/ijrbs.v8i4.288.

Full text
Abstract:
This study attempted to establish the relationship between vendor characteristics and relationship quality on consumer B2B E-commerce in Yemen. E-commerce is gaining a lot of attention, especially in the Arabian world, as such we formulated and tested a model to explain B2C user repurchase intentions from the perspective of relationship quality. The model was empirically tested through a survey conducted in Yemen. Results showed that online relationship quality and perceived website usability positively impacted customer repurchase intention. Moreover, online relationship quality was positively influenced by perceived vendor expertise in order fulfillment, perceived vendor reputation, and perceived website usability. Trust in vendor behavior predominantly influenced online relationship quality and subsequent purchase intention. Implications of these findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Afandi, Yosi, Musthofa Hadi, and Rizky Kurniawan Murtiyanto. "VENDOR-CAPACITY, PERCEIVED-FAMILIARITY, PERCEIVED-REPUTATION, DAN PERSONAL-VALUES SEBAGAI FAKTOR PEMBEDA PADA KELOMPOK KONSUMEN BAGI TERCAPAINYA ONLINE CUSTOMERS’ TRUST (STUDI PADA PENGGUNA LAZADA DI INDONESIA)." Adbis: Jurnal Administrasi dan Bisnis 11, no. 2 (2017): 246. http://dx.doi.org/10.33795/j-adbis.v11i2.33.

Full text
Abstract:
The objectives are (1). Find the determinant variables that discriminate the consumers’ group on trusting or not to the online-transactions, among the dependent variables which consist of vendor-capacity, perceived-familiarity, perceived-reputation, and personal values. (2). Find the most differing variable from those determinant variables found, and (3). Find the effective strategy to overcoming the e-trust barriers in Indonesian Lazada user. The data collected from 85 samples of Indonesians that experiencing the e-commerce transactions. Many questioners were spread by mailed and also direct spreading to meet the data quota. The data analysis that used were Discriminant Analysis and Crosstab Analisis. Result of this study show that from four predicting variables, there are only two variables that determinant the consumers’ choise to trust or not to the online-transactions; vendor-capacity and perceived-familiarity,- which has significant influence for this case. The consumers’ perceived-familiarity was found as the most influencing variables that could discriminate the trust of the customers to online-transactions. So, the vendors’ strategy should be held to educate the customer and maximizing the customers’ relationship programs, beside continous improvement of the vendors’ capacities as well.
APA, Harvard, Vancouver, ISO, and other styles
9

Gryglewicz, Sebastian, and Aaron Kolb. "Dynamic signaling with stochastic stakes." Theoretical Economics 17, no. 2 (2022): 539–59. http://dx.doi.org/10.3982/te3710.

Full text
Abstract:
We study dynamic signaling in a game of stochastic stakes. Each period, a privately informed agent of binary type chooses whether to continue receiving a return that is an increasing function of both her reputation and an exogenous public stakes variable or to irreversibly exit the game. A strong type has a dominant strategy to continue. In the unique perfect Bayesian equilibrium, the weak type plays a mixed strategy that depends only on current stakes and her historical minimum and she builds a reputation by continuing when the stakes reach a new minimum. We discuss applications to corporate reputation management, online vendor reputation, and limit pricing with stochastic demand.
APA, Harvard, Vancouver, ISO, and other styles
10

Maschudah, Aniek, Romi Ilham, and Dewi Murdiawati. "Winning Hearts and Wallets: Investigating of Gamification and Reputation on Repurchases Intention on E-Commerce Platforms in Indonesia." International Journal of Research and Review 10, no. 4 (2023): 255–72. http://dx.doi.org/10.52403/ijrr.20230433.

Full text
Abstract:
This study investigates the effect of gamification and reputation on e-commerce purchase intention in Indonesia. This type of research uses a quantitative approach through survey methods. The population in this study were users of the five largest e-commerce platforms in Indonesia, with a minimum sample size of 520 respondents. Confirmatory factor analysis (CFA) using the SEM-PLS algorithm with WarpPLS software. The results of this study indicate that to win the hearts and wallets of consumers, the application of gamification can significantly increase repurchase intention and reputation can significantly increase vendor trust in shopping on the marketplace. Keywords: gamification, reputation, e-commerce, repurchase intention
APA, Harvard, Vancouver, ISO, and other styles
11

Ariqah Nabilla Ekasaputri. "Analisis Pemilihan Jasa Konsultan Non Konstruksi Menggunakan Metode AHP dan TOPSIS." Journal of Optimization System and Ergonomy Implementation 1, no. 1 (2024): 33–41. http://dx.doi.org/10.54378/joseon.v1i1.6913.

Full text
Abstract:
PT. XYZ membutuhkan jasa konsultan non konstruksi untuk melakukan analisis atau riset mengenai tren bisnis kepelabuhanan dan logistik yang akan digunakan untuk perencanaan bisnis perusahaan kedepannya. Terdapat delapan kriteria yang digunakan untuk menilai vendor yaitu quality, performance history, warranties & claim policies, price, communication system, reputation & position in industry, management & organization, dan administrasi perusahaan. Metode AHP dipergunakan pada pelaksanaan penentuan prioritas atau bobot pada masing-masing kriteria yang selanjutnya akan digunakan untuk pengambilan keputusan alternatif terbaik menggunakan metode TOPSIS. Berdasarkan hasil metode AHP didapatkan bahwa kriteria dengan prioritas tertinggi yaitu management & organization dengan bobot sebesar 21%, quality bobot sebesar 19%, reputation & position in industry bobot sebesar 19%, performance history bobot sebesar 12%, communication system bobot sebesar 10%, price bobot sebesar 8%, administrasi perusahaan bobot sebesar 6% dan kriteria dengan prioritas terendah yaitu warranties & claim policies bobot sebesar 5%. Pembobotan kriteria tersebut digunakan untuk melakukan pemilihan alternatif terbaik pada metode TOPSIS dan didapatkan bahwa vendor yang memiliki skor prioritas tertinggi sebesar 0,6400 adalah PT. A.
APA, Harvard, Vancouver, ISO, and other styles
12

Widyastuti Pratiwi, Sekar, Apsada Juhri, Nursery Alfaridi S. Nasution, Novembriani Irenita, and Tenaka Budiman. "Evaluating Analyses Trucking Vendor Performance in Covid-19 Vaccine Delivery: A Strategic Assessment Utilizing Analytic Hierarchy Process And Technic For Order Of Preference By Similarity To Ideal Solution Methodologies (Case Study: Indonesian Freight Forwarder’s Role In 2020 Vaccine Shipment)." Dinasti International Journal of Education Management And Social Science 5, no. 6 (2024): 2531–44. https://doi.org/10.38035/dijemss.v5i6.3186.

Full text
Abstract:
The purpose of this study was to determine the results of measurements of the priority vendors of the five vendors used by the company in the process of delivery COVID-19 vaccine shipment. This study uses the AHP-TOPSI (Analytic Hierarchy Process – Technic for Order of Preference by Similarity to Ideal Solution) method where the Likert scale is used as a comparison. Problem solving is done by making research using qualitative research methodology with descriptive elaboration. Data collection is done by giving or making questionnaires to get the weight of the assessment carried out by inferring with AHP and Likert from the data collected through questionnaires shared where the respondents came from respondents who have dedication and direct links as well as have the capability to provide vendor performance assessments. The results of the research that were tested from the level of consistency were divided into 5 criteria, namely, Price, Safety, Service, Reliability and Reputation and from the results of the qualitative calculation method by distributing questionnaires from 10 experts for Five existing vendors with adding quantitative approach in TOPSIS, V.2 out as priority vendors.
APA, Harvard, Vancouver, ISO, and other styles
13

CHEE, W. S. ADAM. "IT SECURITY IN BIOMEDICAL IMAGING INFORMATICS: THE HIDDEN VULNERABILITY." Journal of Mechanics in Medicine and Biology 07, no. 01 (2007): 101–6. http://dx.doi.org/10.1142/s0219519407002170.

Full text
Abstract:
The convergence of biomedical instruments and computing platforms has resulted in medical imaging equipment being subjected to the threats of malicious software (Malware) which have traditionally plagued the computing industry. Vulnerabilities increase several-fold with implementations of Clinical Information Systems like the Picture Archival & Communication Systems (PACS), where computer-based biomedical equipment work hand in glove with computer servers. With the increasing complexity of modern Malware, proactive monitoring and reviews of known vulnerabilities are no longer sufficient. An institute faced with an IT security attack on their medical networks will still experience extended downtime, performance degradation and increased service costs, even if equipped with an adequate security system and recovery plans. Biomedical equipment vendors usually need more time than computing vendors to validate the security updates required for vulnerabilities before they can recommend changes for installation to their systems. This includes all system changes, patches, updates, and enhancements. However, the interval between the launch of a new Malware attack and the availability of a solution from the vendor can result in the medical network being compromised and rendered totally crippled. In view of such new challenges, it is crucial to redesign your medical network and operating procedures to ensure continuous operation with minimum performance degradation even under a Malware attack until the biomedical equipment vendor can provide the software updates to resolve security vulnerabilities. Such strategic implementation is not only necessary to ensure integrity and confidentiality of patient's data but also to protect the healthcare institute's reputation and business continuity.
APA, Harvard, Vancouver, ISO, and other styles
14

Faisal, Mohd Nishat, and Syed Asif Raza. "IT outsourcing intent in academic institutions in GCC countries." Journal of Enterprise Information Management 29, no. 3 (2016): 432–53. http://dx.doi.org/10.1108/jeim-05-2015-0042.

Full text
Abstract:
Purpose – The purpose of this paper is to understand the reasons behind the intent for information technology (IT) outsourcing in academic institutions in GCC countries. It also aims to develop a multi-criteria decision model (MCDM) to aid the critical decision of IT outsourcing vendor selection. Design/methodology/approach – The research utilizes a questionnaire-based survey to investigate reasons of IT outsourcing intent and the factors considered important for IT outsourcing vendor selection in academic institutions. The results of questionnaire-based study were utilized to develop a grey theory-based MCDM for vendor selection. Findings – The results show that facilitating access to new technology, focus on core-competence, saving staff costs, and improved customer service are the most important factors for IT outsourcing intent while reputation of vendor, access to the state of art technology, quality of service, and knowledge of industry were considered as the most important factors for IT outsourcing vendor selection. Grey theory-based decision model was applied to a real case to facilitate the decision of selection of an IT outsourcing vendor. Practical implications – Academic institutions that plan to outsource IT in future would be the major beneficiaries of this study. They can utilize the multi-criteria model to select the best vendor. The model facilitates a more rational decision making as it incorporates several criteria considered important for IT outsourcing vendor selection. Originality/value – This study contributes to the body of research on IT outsourcing. It is first of its kind with its focus on academic institutions in GCC countries where currently education is a priority and IT is a backbone for its delivery. Another novelty of this research is that it propose a MCDM for IT outsourcing vendor selection. The findings of this study would serve as a guide to those institutions that intend to outsource IT functions to meet the ever growing needs of managing IT effectively.
APA, Harvard, Vancouver, ISO, and other styles
15

Pramesti, Rahmah Ambar, Marsha Aulia Hakim, and Shafira Sidratul Muntaha Siswanda. "ANALISIS STRATEGI PARTNERSHIP DALAM MENCAPAI OKR PADA PERUSAHAAN PT. GITS INDONESIA." JURNAL LENTERA BISNIS 12, no. 3 (2023): 966. http://dx.doi.org/10.34127/jrlab.v12i3.978.

Full text
Abstract:
This research explores the partnership strategy implemented by PT GITS Indonesia, a digital agency and IT consulting company, to achieve measurable goals through the Objective and Key Results (OKR) framework. This research uses a qualitative descriptive method to understand how PT GITS Indonesia implements partnerships with external partners, vendors, and IT education institutions to create synergies, increase innovation, and access new resources. The results showed that PT GITS Indonesia successfully utilized OKRs and partnership strategies with a measured and structured approach. They identified potential partners, monitored vendors, analyzed partner products, carefully drafted documents, searched for cooperation partners, and initiated new ideas. With this approach, PT GITS Indonesia increased sales, expanded market share, and improved customer experience, gaining a competitive advantage in the market. Practical suggestions include optimizing OKRs, strengthening partner collaboration, developing team skills, and maintaining an accurate database. Academically, PT GITS is advised to continue engaging in research and collaboration with universities and monitor legal changes to strengthen their reputation as a reliable and innovative business partner.
 
 Key words: Strategic Partnership, OKR, Marketing, Vendor
APA, Harvard, Vancouver, ISO, and other styles
16

Djunaedi, Laely Nur, Rizka Lidiawan Angga, and Riyanto Putro Dita. "Policy Strategy for Transaction Speed, Data Security and Regulation in the Banking Industry: A Case Study on Bank Jatim Karesidenan Kediri and the Impact of its Contribution to Bank Performance." International Journal of Social Science And Human Research 06, no. 12 (2023): 8000–8013. https://doi.org/10.5281/zenodo.10447415.

Full text
Abstract:
Bank Jatim Karesidenan Kediri needs to improve customer data security by developing the right policy strategy. Policies that need to be implemented include multi clouds with homomorphic encryption, managerial security awareness with Big Data Solution vendor reputation, and the use of holistic data warehouses in data privacy health architectures. In addition, Bank Jatim needs to pay attention to banking regulations and restrictions on access to activities between countries to minimize data security risks and increase customer trust. This study uses quantitative design and interview and observation instruments to obtain reviews on delay conditions in transactions, customer data security, banking regulations, and benefits for Bank Jatim Karesidenan Kediri. implement appropriate policy strategies such as multi clouds with homomorphic encryption, managerial security awareness with Big Data Solution vendor reputation, and using holistic data warehouses in data privacy health architectures. In addition, Bank Jatim also needs to pay attention to banking regulations and limit access to activities between countries to minimize data security risks and increase customer trust. Through the implementation of the right policy strategy, it can improve financial performance, expand the reach of customer services, and maintain its position in the midst of today's banking industry competition. The implementation of policy strategies must be carried out accurately and agilely in order to optimize bank performance and performance.
APA, Harvard, Vancouver, ISO, and other styles
17

EFİLOĞLU KURT, Özlem, and Tuğrul AKTAŞ. "FACTORS AFFECTING SOCIAL COMMERCE INTENTION: AN EMPIRICAL STUDY ON SOCIAL MEDIA PLATFORMS." PRIZREN SOCIAL SCIENCE JOURNAL 7, no. 2 (2023): 62–74. http://dx.doi.org/10.32936/pssj.v7i2.444.

Full text
Abstract:
Recently, there has been a significant increase in the use of social media, especially among the new generation of users. In parallel with this increase, social media platforms have highlighted the concept of social commerce - an extension of e-commerce - and put it on the current agenda. In social commerce, social media platforms are used to share, create, and request product information, perceptions, and views, with customers also making purchases. The social commerce intention of the new generation via social media platforms is the focus of this study. This study investigates the social commerce intention of students at a public university in Yalova, Turkey, to purchase products via Instagram and the factors that affect this intention. 296 students participated in the study. Findings suggest that the price and reputation of social commerce vendors positively affect user trust. Also, habit, perceived ease of use, and hedonic motivation also positively affect social commerce intention. Trust in the social vendor positively affects social commerce intention. Other hypotheses are rejected. This study contributes to the literature by analysing the role of different factors in social commerce intention.
APA, Harvard, Vancouver, ISO, and other styles
18

Vimala, Dhulepalla. "Detection of Fake Online Reviews Using Semi Supervised and Supervised Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31613.

Full text
Abstract:
Consumers reviews on ecommerce websites, online services, ratings and experience stories are useful for the user as well as the vendor. The reviewer can increase their brand’s loyalty and help other customers understand their experience with the product. Similarly reviews help the vendors gain more profiles by increasing their sale of products, if consumers leave positive feedback on their product review. But unfortunately, these review mechanisms can be misused by vendors. For example, one may create fake positive reviews to promote brand’s reputation or try to demote competitor’s products by leaving fake negative reviews on their product. Existing solutions with supervised include application of different machine learning algorithms and different tools like Weka. Unlike the existing work, instead of using a constrained dataset I chose to have a wide variety of vocabulary to work on such as different subjects of datasets combined as one big data set. Sentiment analysis has been incorporated based on emojis and text content in the reviews. Fake reviews are detected and categorized. The testing results are obtained through the application of Naïve Bayes, Linear SVC, Support Vector Machine and Random forest algorithms. The implemented (proposed) solution is to classify these reviews into fake or genuine. The highest accuracy is obtained by using Naïve Bayes by including sentiment classifier.
APA, Harvard, Vancouver, ISO, and other styles
19

Acheampong, Patrick, Kofi Baah Boamah, Nana Agyeman-Prempeh, Frank Boateng, Isaac Asare Bediako, and Ruhiya Abubakar. "Trust and Continuance of Mobile Payment Use Intention." Information Resources Management Journal 34, no. 1 (2021): 19–42. http://dx.doi.org/10.4018/irmj.2021010102.

Full text
Abstract:
The interactive nature of the internet has created many opportunities for mobile payment usage. In certain age groups and geographies, mobile payments have already unseated traditional means of effecting payment. In this study, 1,351 mobile payment users in Ghana were sampled using a structured questionnaire to investigate their intention to continue to use mobile payments technologies. The results showed that vendor reputation, word-of-mouth, and structural assurance significantly contribute to imbuing trust in mobile payment technology customers. When high levels of trust become identified with a brand, high numbers of customers choose to continue to use their current choice of mobile payment technology.
APA, Harvard, Vancouver, ISO, and other styles
20

Huang, Shiu-Li, and Ya-Chu Chang. "Cross-border e-commerce: consumers’ intention to shop on foreign websites." Internet Research 29, no. 6 (2019): 1256–79. http://dx.doi.org/10.1108/intr-11-2017-0428.

Full text
Abstract:
Purpose Little research has been done to investigate how consumers decide to shop across national borders. The purpose of this paper is to explore the factors that impact consumers’ intention to shop on foreign websites. Design/methodology/approach A conceptual model is developed from the perspectives of consumer perceived trustworthiness and value. The authors also examine how vendor signaling and consumers’ attachment styles affect perceived trustworthiness, as well as how benefits and costs affect perceived value. This study conducts an online survey to test the research model. Findings Perceptions of the vendor’s trustworthiness can increase or decrease depending on consumers’ perceptions of the level of legal structure and national integrity in the vendor’s country, as well as the vendor’s website policy and reputation. Consumers with low levels of attachment avoidance or anxiety also perceive a foreign vendor as being more trustworthy. Price competitiveness, product uniqueness, communication cost and waiting cost determine the perceived value of shopping on a foreign vendor’s website. Originality/value This study advances our understanding of cross-border e-commerce in the business-to-consumer context. The findings can help researchers and practitioners understand the barriers to cross-border e-commerce, and devise strategies to overcome these barriers.
APA, Harvard, Vancouver, ISO, and other styles
21

Rasool, Shahid, Erum Shaikh, Iffat Sabir Chaudhry, and Muhammad Nawaz Tunio. "CONTROVERSIAL DISAPPEARANCE AND UNETHICAL BUSINESS PRACTICES: A CASE OF X-MOBILE." NUST Business Review 6, no. 1 (2024): 1–25. http://dx.doi.org/10.37435/nbr.v6i1.72.

Full text
Abstract:
Learning Outcomes On completion of case reading the student will be able to: (1) To recognize the significance of business ethics on its market reputation; (2) To interpret the strategic implications of bad decisions on company reputation; (3) To identify the legal and administrative lapses in the governance system that fail to nip fraudulent operations as smuggling, and tax envisions in the bud; (4) To evaluate the professional and ethical attitude towards regulatory laws and corporate structures related to local and international business. Case overview/synopsis In this case, the unethical business practices, and decisions of X-Mobile company (distinguished name) are analyzed that led the emerging market leader among local mobile vendors to a bad reputation and loss of market shares in no time. In Pakistan, the smartphone penetration remained at 36% in the year 2021, almost 3 times higher compared to the year 2014 (PACRA, 2021). The global manufacturing companies are the key suppliers of mobile phones to the local market as the domestic mobile market is largely imported drive. The major suppliers include Apple, Samsung, Oppo, Huawei, Xiaomi, and other Chinese brands. X-Mobile took advantage of the gap and started its operations in Pakistan by establishing its mobile assembling unit and distribution network in the region. In less than a decade, the company grabbed a larger chunk of the market shares of rural Pakistan’s smartphone industry. As the X-Mobile smartphone demand increased, the company was unable to cope with the supply of its products to the customer due to its unethical business practices of tax evasion (scandal of 2017), the bankruptcy of its vendor (ABC), over advertising budget, and mismanagement of its brand reputation. This resulted in the temporary ban of the company by the Pakistan Telecom Authority (PTA) from conducting its operations in Pakistan which pushed the company into shambles, tax shaming, reduction of market share, and the influx of several smartphone brands from China to fill in the market gap. Now outstanding smartphones from Xiaomi, Oppo, Vivo, and Infinix are easily available in the far-flung areas of the country. The case discusses the company's initial tactics to become a leading smartphone brand in a short span of ten years and its current struggle to reposition itself and reclaim its lost market shares subsequent to its involvement in unethical business practices and tax evasion. Supplement materials Supporting materials are available for the student (Teaching Notes). Complexity/ Academic level Undergraduate Level - This case is ideally suited for classroom discussions for students of management sciences undertaking courses on Business Ethics, Brand Management, Strategic Marketing, International Business, and Corporate Governance.
APA, Harvard, Vancouver, ISO, and other styles
22

Jenab, Kouroush, and Ahmad Sarfaraz. "Selecting Cell Phone Service Using Hybrid Decision Making Methodology." International Journal of Enterprise Information Systems 9, no. 1 (2013): 49–61. http://dx.doi.org/10.4018/jeis.2013010103.

Full text
Abstract:
In an ever expanding connected world, mobile connectivity is essential in both commercial and private use. Selecting the best option has become increasingly difficult due to the many factors surrounding the selection of the best cell phone service providing company. Quantitative factors such as monthly price, total cell phone minutes, and phone cost are easily comparable. However, other qualitative factors such as signal coverage, vendor reputation, and customer support are not as easily analyzed. The need to make the correct decision when qualitative factors need to be considered has caused multi-criteria decision methodologies such as Analytical Hierarchy Process (AHP) to be applied in case studies. In this paper, the authors apply Fuzzy AHP to phone survey results and compare them to the original results. The multi-criteria decision methodology TOPSIS is used to demonstrate the differences between all decision methodologies.
APA, Harvard, Vancouver, ISO, and other styles
23

Tamunobarafiri, Amavey, Shaun Aghili, and Sergey Butakov. "Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers." International Journal of Monitoring and Surveillance Technologies Research 5, no. 4 (2017): 1–22. http://dx.doi.org/10.4018/ijmstr.2017100101.

Full text
Abstract:
Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.
APA, Harvard, Vancouver, ISO, and other styles
24

Ilyas, Muhammad, Niyu Niyu, and Herman Purba. "Strategi Komunikasi Pemasaran Digital dalam Membangun Customer Trust @Ricellystore Via Instagram." Jurnal Ilmu Komunikasi dan Bisnis 8, no. 2 (2023): 172–85. http://dx.doi.org/10.36914/jikb.v8i2.898.

Full text
Abstract:
Apart from being used to socialize, Instagram social media is also used as a medium for promotions, buying and selling transactions. The occurrence of various frauds in online transactions sets a precedent that can be detrimental to these online business actors. In online transactions, building trust is an important step that must be taken by business actors, especially for business actors who are just starting their business. @Ricellystore is a new online business actor engaged in the used gadget sector, but they are able to build trust in a relatively short time with sales figures increasing significantly every month. This study aims to find out how the digital marketing communication strategy carried out by @Ricellystore on Instagram builds customer trust. This study uses a descriptive qualitative approach, where data is obtained through interviews, observation, and documentation. The results of the research show that the @Ricellystore digital marketing communication strategy starts with strengthening Perceived web vendor reputation and Perceived web quality, making their store reachable and available, having added value, and maximizing unpaid promotion with the power of word of mouth (WOM) and resellers from their customers. 
 
 Abstrak
 
 Selain digunakan untuk bersosialisasi saat ini media sosial Instagram juga digunakan sebagai media untuk promosi dan transaksi jual beli. Terjadinya berbagai penipuan dalam transaksi online menjadikan preseden yang dapat merugikan para pelaku usaha online tersebut. Dalam bertransaksi online membangun trust menjadi salah satu langkah penting yang harus dilakukan oleh pelaku usaha, terlebih bagi pelaku usaha yang baru merintis usahanya. @Ricellystore merupakan pelaku usaha online baru yang bergerak pada sektor gawai bekas, namun mereka mampu membangun kepercayaan dalam waktu relatif singkat dengan angka penjualan yang meningkat signifikan setiap bulannya. Penelitian ini bertujuan untuk mengetahui bagaimana strategi komunikasi pemasaran digital yang dilakukan @Ricellystore di Instagram dalam membangun customer trust. Penelitian ini menggunakan pendekatan kualitatif deskriptif, dimana data diperoleh melalui metode wawancara, observasi, dan dokumentasi. Strategi komunikasi @Ricellystore dimulai dengan memperkuat Perceived web vendor reputation dan Perceived web quality, menjadikan toko mereka reachable and available, mempunyai adding value, dan memaksimalkan unpaid promotion dengan kekuatan word of mouth (WOM) dan reseller dari customer mereka.
APA, Harvard, Vancouver, ISO, and other styles
25

Ladegaard, Isak. "Instantly Hooked? Freebies and Samples of Opioids, Cannabis, MDMA, and Other Drugs in an Illicit E-Commerce Market." Journal of Drug Issues 48, no. 2 (2017): 226–45. http://dx.doi.org/10.1177/0022042617746975.

Full text
Abstract:
Do drug dealers entice nonusers with free samples? Police, the popular press, and social media users say so, but crime researchers have found little support for this theory and argue instead that sample distribution is an unsound strategy for illegal market business. But what about in digital drug markets, where operational logics are based on sophisticated anonymization technology and reputation systems? The author collected data from a large e-commerce website for drugs over 305 days in 2014 and 2015 and documents that (a) drug dealers give away samples of all major substance categories and (b) sample distribution increases vendor sales for prescription drugs and opioid-based painkillers. To explore possible explanations of these findings, the author collected data from the market’s online forum and analyzed 175 discussions (2,218 posts) about samples. Among the findings is that samples are preferably given to reputable review writers, or “drug critics.”
APA, Harvard, Vancouver, ISO, and other styles
26

. Dukare, Gangadhar D. "To Study & Analyze Supplier Selection of Saurabh Flexipack Systems PVT. LTD." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41396.

Full text
Abstract:
The many researches have been analyzing the purchasing concepts and modern terminology. Moreover, it is obvious that there are differences between all companies. No one can follow same strategy, has same financial status and reputation among its customers even by producing product of same specifications and quality. That is why many companies are ready to pay much more money, put more effort and time to improve the purchasing process, evaluate in advance suppliers and all possible risks. In addition, in different companies the actual supplier selection can run in a different way. While for some product it can be a simple record of actions where every step of the formal process may not be required, for another product it can change into a highly complex framework where every step is regulated by professionals. The actual process of supplier selection belongs to procurement strategic decision but in simpler way it can be also performed by purchasing department as automated steps. Keywords: Supplier,Selection,Satisfaction,Customer,Vendor, Quality ,Product
APA, Harvard, Vancouver, ISO, and other styles
27

Ramalingam, Shobha. "Subcontractor Selection Process Through Vendor Bids: A Case of An Outsourcing Service in Construction." IIM Kozhikode Society & Management Review 9, no. 2 (2020): 129–42. http://dx.doi.org/10.1177/2277975220942078.

Full text
Abstract:
Subcontractors handle a large portion of the work in construction projects. The ability of the general contractor to deliver projects on time, within budget and with the expected level of quality are significantly dependent on the performance of subcontractors. Thus, selecting the right subcontractor for the right task is a determining factor for project success. Literature has identified several criteria for subcontractor selection that predominantly includes financial capacity, ability to complete on time and reputation and quality of workmanship. However, as projects are becoming more global and complex, ensuring selection and award through a fair and competitive formal process becomes imperative. Nevertheless, an understanding of a formal process, backing the selection criteria, seems to be lacking; more so in the context of engineering outsourcing services. Vendor bid analysis is one such service, wherein the general contractor packages the bids received from several subcontractors to a team in a different country who evaluate and enable the general contractor to select and award the subcontractors for project tasks. To this end, an exploratory case study was conducted in an outsourcing firm in India that provide services to general contractors in the USA to understand the formal process of subcontractor selection across organizational boundaries along with its inherent risks and challenges. Data was collected through a participatory research approach, supplemented with participant observation and team interviews which were analysed through inductive reasoning and cross-case comparison methods. The findings showed a formalized 5-phase process across the organizational interface that included assess, identify, evaluate, negotiate and optimize phases. Further, delving into the evaluate, negotiate and optimize phases, the nuances in outsourced projects and the firms strategy to overcome them were evident, such as selection criteria and negotiation strategy adopted in the case of a single bidder with high pricing to mitigate probable bid-rigging practices or ensuring constant training to overcome the challenges due to lack of trade and country specific know-how. In addition, through a reflective approach, the value addition services provided to the general contractor aimed to optimize the process and improve project governance. These findings are expected to provide practical implication for firms in similar business and act as a steppingstone to conduct further robust research.
APA, Harvard, Vancouver, ISO, and other styles
28

Elia, Ivano Alessandro, Nuno Laranjeiro, and Marco Vieira. "A Practical Approach Towards Automatic Testing of Web Services Interoperability." International Journal of Web Services Research 12, no. 3 (2015): 78–103. http://dx.doi.org/10.4018/ijwsr.2015070104.

Full text
Abstract:
Web Services are a technology designed to support the invocation of remote elements by client applications, with the goal of providing interoperable application-to-application interaction while assuring vendor and platform independence. In business-critical environments, the occurrence of interoperability issues can have disastrous consequences, including direct financial costs, reputation, and client fidelity losses. Despite this, experience shows that services interoperability is still quite difficult to achieve. The goal of this paper is to propose a practical testing process to understand the real level of interoperability provided by web services platforms. An extensible tool, that implements the proposed approach, has been used to run a large campaign during which we have tested the interoperability of a large number of web services, comprising both home-implemented and publicly available services, deployed on top of several web service platforms and against 11 client-side web service platforms. Numerous issues have been disclosed, showing the effectiveness of the proposed approach and the importance of having an automatic tool for testing web services for interoperability.
APA, Harvard, Vancouver, ISO, and other styles
29

Abdelhafeez, Ahmed, Ahmed Abdel-Rahim EI-Douh, and Ayman H. Abdel-aziem. "An Integrated Framework for Selecting Best Cloud Service Provider with Multi-Criteria Decision Making Methodology." Multicriteria Algorithms with Applications 1 (May 30, 2023): 11–18. http://dx.doi.org/10.61356/j.mawa.2023.15961.

Full text
Abstract:
Choosing a cloud service provider is an essential choice for businesses looking to take advantage of cloud computing. A review of the most important considerations when selecting a cloud service provider is given in this study. Several criteria are considered when evaluating cloud service providers: performance and dependability, security and compliance, scalability and flexibility, cost and pricing, service and support, compliance and data location, integration and interoperability, vendor lock-in, reputation and references, and future roadmap and innovation. Organizations may choose a provider that satisfies their unique requirements, fits with their business goals, and guarantees a safe and effective cloud environment by carefully evaluating these factors. A well-chosen cloud service provider may improve security, promote scalability, encourage innovation, and increase business operational efficiency. We used the multi-criteria decision-making (MCDM) methodology to rank the criteria and select the best cloud service provider. We used the VIKOR method as an MCDM methodology to compute the criteria weights and rank the alternatives. We show that performance is the best criterion. We analysed changes in the parameters of the VIKOR method to show different ranks. We conclude the results are stable.
APA, Harvard, Vancouver, ISO, and other styles
30

Hossain, Mohammad Alamgir, Shams Rahman, Tamgid Ahmed Chowdhury, Caroline Chan, Xiaoyan Yang, and Qingxin Su. "How signaling mechanisms reduce “lemons” from online group buying (OGB) markets? A study of China." International Journal of Physical Distribution & Logistics Management 48, no. 7 (2018): 658–81. http://dx.doi.org/10.1108/ijpdlm-02-2017-0113.

Full text
Abstract:
PurposeA major transformation in retail logistics over the few years is backed by enormous improvements in internet technologies. It is now easy for e-retailers to entertain delivery progression, or consumers can share use-experience with future customers and thereby reducing information asymmetry. The purpose of this paper is to investigate the effect of different signals on consumer behavior in the presence of information asymmetry, in the context of online group buying (OGB) markets in China.Design/methodology/approachBased on the lemon market theory (LMT) and signaling theory, the study develops a research model of the OGB consumers’ context in China, which is validated using data from an online survey. A total of 528 responses are used for data analysis applying structural equation modeling technique.FindingsThe findings of the study show that perceived vendor quality (PVQ) and perceived product quality (PPQ) have significantly positive effects on intention to purchase from OGB websites. PVQ is associated with perceived reputation and perceived trustworthiness (PT) of vendor, and the determinants of PPQ are quality assurance information of products, and information about mer-chants. Further, PT has a mediating effect, while asymmetry of information has a moderating effect.Research limitations/implicationsThe research model is valid as a generic OGB model that can be investigated in other contexts to understand the generalizability of the findings. Future research is needed to incorporate additional relevant factors (e.g. price, advertising activity/investments) that may help increase the acceptability of the model to a wide range of e-commerce contexts. Two of the control variables (gender and prior internet experience) were found to be significant; this could be further examined in future studies to determine the relative impact on each causal relationship.Originality/valueWhereas prior studies in the domain of consumer service proposed different signaling mechanisms that were believed to eliminate information asymmetry from a market, the study sheds light on the effectiveness of the signals in the OGB context. This is a unique effort that applies and extends LMT and signaling theory in OGB context by theorizing the associated dimensions and their causal effects.
APA, Harvard, Vancouver, ISO, and other styles
31

Lelo, John Meku, and Baraka Israel. "Supply Chain Innovative Practices and Customer Satisfaction: Insights from Manufacturing SMEs." Management Dynamics in the Knowledge Economy 12, no. 1 (2024): 54–69. http://dx.doi.org/10.2478/mdke-2024-0004.

Full text
Abstract:
Abstract In today’s highly competitive business landscape, SMEs face the challenges of meeting customer demands and expectations. To remain competitive, attract and satisfy customers, manufacturing SMEs must adopt innovative practices within their supply chain. This research investigates the influence of supply chain innovative practices (SCIPs) on customer satisfaction within the context of manufacturing SMEs. A cross-sectional questionnaire survey was utilised to collect the data from 172 customers of manufacturing SMEs in Mwanza, Tanzania to gain comprehensive insights into the influence of SCIPs on customer satisfaction. Descriptive statistics and binary logistic regression (BLR) were used for data analysis. The research findings revealed that manufacturing SMEs adopt SCIPs, including digitalization and IoT integration, vendor-managed inventory, customisation, Just-In-Time, collaborative relationships, and lean manufacturing to a moderate extent. Moreover, the findings demonstrate a significant and positive correlation between SCIPs and customer satisfaction. We conclude that SMEs that successfully adopt SCIPs experience higher levels of customer satisfaction, which, in turn, positively influences customer loyalty and brand reputation. Therefore, manufacturing SMEs can capitalise on customer satisfaction, loyalty, and sustainable growth by strategizing SCIPs along their supply chain. The study contributes to the existing knowledge by providing valuable insights into the importance of SCIPs in improving customer satisfaction in manufacturing SMEs.
APA, Harvard, Vancouver, ISO, and other styles
32

Divina, Rosiline D'silva, and Balasubramanian P. "Librarians' Perspectives on the Procurement of Electronic Resources." Journal of Advances in Library and Information Science 13, no. 2 (2024): 98–104. https://doi.org/10.5281/zenodo.12698931.

Full text
Abstract:
<em>This study investigates the perspectives of librarians in procuring electronic resources from thirteen Tamil Nadu universities. It focuses on the criteria librarians use for selecting e-resources and their perceptions of acquisition methods. A Google Form questionnaire was distributed to 65 library professionals, with 62 completing the questionnaire. The findings will inform future strategies to enhance the availability and accessibility of e-resources in academic libraries, improving the overall educational experience for students. Understanding librarians' perspectives and criteria can lead to more effective acquisition strategies and improved library services..</em>
APA, Harvard, Vancouver, ISO, and other styles
33

Sulistyowati, Tussi, and Nur Elfi Husda. "THE TRUST FACTOR: A COMPREHENSIVE REVIEW OF ANTECEDENTS AND THEIR ROLE IN SHAPING ONLINE PURCHASE INTENTIONS." Jurnal Ekonomi dan Bisnis Airlangga 33, no. 2 (2023): 229–44. http://dx.doi.org/10.20473/jeba.v33i22023.229-244.

Full text
Abstract:
Introduction: This study investigates trust's impact on consumer buying decisions and trust levels within e-commerce, shedding light on trust antecedents and their role in shaping purchase intentions. Methods: This qualitative study, conducted on September 21, 2023, employed a systematic literature review approach. Using the Scopus database in conjunction with Harzing's Publish or Perish 8 tool, the study focused on 23 articles concerning trust and online purchases. These articles were meticulously selected from a pool of 775 papers published between 2019 and 2023. Results: E-commerce trust research reveals recurring themes like reputation, risk, information quality, and utility, along with social support, subjective norms, fulfillment, trustworthiness, and vendor reliability. Trust plays a central role by mitigating risk, mediating relationships, and predicting purchase intent, influenced by content quality and social presence. These findings emphasize trust's significance in shaping online purchase intentions. Conclusion and suggestion: Understanding trust's complexity and its various antecedents is vital for businesses to tailor effective strategies, influencing online sales and consumer decisions in e-commerce. This research enhances trust comprehension in e-commerce, especially in emerging markets, by identifying key antecedents and providing a comprehensive framework. However, limitations include potential exclusions based on title format criteria and reliance on specific titles from 2019-2023. Future research should incorporate current publications and explore broader dynamics of consumer behavior in e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
34

WU, ZHENGPING, and HAO WU. "AN AGENT-BASED FUZZY RECOMMENDATION SYSTEM USING SHOPPERS' PREFERENCES FOR E-COMMERCE APPLICATIONS." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 18, no. 04 (2010): 471–92. http://dx.doi.org/10.1142/s0218488510006659.

Full text
Abstract:
In e-commerce applications, the magnitude of products and the diversity of venders cause confusion and difficulty for the common consumer to choose the right product from a trustworthy vender. Although people have recognized the importance of feedback and reputation for the trustworthiness of individual venders and products, they still have difficulty when they have to make a shopping decision from a massive number of options. This paper introduces fuzzy logic into rule definition for users' preferences and designs a novel agent-based decision system using fuzzy rules. This system can help users to find the right product recommendation from a trustworthy vender following users' own preferences.
APA, Harvard, Vancouver, ISO, and other styles
35

Dasanayaka, S. W. S. B., Omar Al Serhan, Mina Glambosky, and Kimberly Gleason. "The business-to-business relationship: examining Sri Lankan telecommunication operators and vendors." Journal of Business & Industrial Marketing 35, no. 6 (2020): 1069–87. http://dx.doi.org/10.1108/jbim-06-2019-0303.

Full text
Abstract:
Purpose This study aims to identify and analyze factors affecting the business-to-business (B2B) relationship between Sri Lankan telecommunication operators and vendors. The authors conduct a survey and develop models to explain relationship strength and satisfaction. The authors find that telecommunication operators and vendors value trust, commitment, adaptation and communication. Operator satisfaction varies by perception of product quality, service support, delivery performance, supplier know-how and value for money. The vendor’s relationship strength is impacted by trust and commitment; vendor satisfaction is affected by economic factors and referencing. The authors suggest formulating management strategies using these results to strengthen business relationships. Design/methodology/approach The authors develop two conceptual models to analyze the supplier and customer perspectives. This study’s drafted models were drawn from established models and were presented to experts in the industry, both telecommunication operators and vendors. Models were modified based on experts’ feedback, and hypotheses were developed from the conceptual models, developed separately for the two perspectives. Data collection was done via questionnaires; 150 questionnaires were sent via email to identified telecommunication operators and 100 questionnaires were sent via email to identified telecommunication vendors, with follow-up emails and telephone calls to improve response rates. Findings This study’s findings show that employees in the telecommunication industry recognize the importance of B2B relationships. Employees of both telecommunication operators and vendors agree that stronger relationships are advantageous. The correlation and regression analysis results identify factors that affect the B2B relationship. The following factors impact the strength of B2B relationships irrespective of view point: trust, commitment and satisfaction. The following factors were found to significantly affect the strength of B2B relationships between telecommunication operators and vendors from the operator perspective: adaptation and communication. Practical implications To enhance relationship strength, the management of operator organizations should take action to improve trust, commitment and satisfaction. Demonstrating honesty and integrity when dealing with vendors and exhibiting concern for the other party’s interests can help establish trust or enhance trust in existing relationships. Displaying commitment toward the vendor will also facilitate stronger relationships. Reasonable profits for both parties and sizeable business volume will also help satisfy vendors, increasing relationship strength. Positive referencing of the vendor in industrial and public forums will improve vendor satisfaction, enhancing relationship strength. Reputational capital can be built and maintained for both operators and vendors by keeping promises and defending the other party to outsiders. For managers of telecommunications operators and vendors in other emerging markets, this study’s results are important and can inform internal business practices to support trust, commitment and satisfaction. Originality/value This study contributes to the existing literature in two ways, a focus on the telecommunication industry and a previously unexplored emerging market, Sri Lanka. In addition, this study includes an analysis of the relationship from both the operator and vendor perspectives.
APA, Harvard, Vancouver, ISO, and other styles
36

Maisarah Hamizan, Noor Hidayah Abu, Mohd Fitri Mansor, and Mohd Azian Zaidi. "An Analysis of the Effect of Price and Quality on Customer Buying Patterns: An Empirical Study of iPhone Buyers." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 18 (2023): 118–28. http://dx.doi.org/10.3991/ijim.v17i18.42917.

Full text
Abstract:
Companies make use of various strategies in order to attract new customers, retain existing customers, and differentiate their products from those of their competitors. Apple Inc. is a multinational technology company headquartered in Cupertino, California. The company specializes in consumer devices, software, and online services. Apple is the most valuable firm in the world, the fourth-largest vendor of personal computers by unit sales, and the second-largest producer of mobile phones as of May 2022. The iPhone is a product with a strong reputation. Apple has always maintained product quality and continuously made innovations. The iPhone has a unique design, and in view of that, the model is too expensive compared to other mobile phones. Although the price is expensive, demand for the iPhone still increases from time to time. The aim of this research is to understand the factors behind iPhone purchase decisions. An investigation has been conducted to evaluate the relationship between price and quality on customer buying patterns for an iPhone. This study will adopt quantitative methods, and data collection has been conducted through online questionnaire distribution. The target respondents in this study are STML students, and the overall population of STML was 1645 students; thus, the sample size for the study should be 310 respondents. The cluster sampling technique has been used in this study. In this study, a total of 340 respondents were received, and there are 27 missing values in the data set. However, only 313 respondents are valid for the data analysis. Findings revealed that price and quality have a significant effect on the buying pattern of an iPhone. Lastly, this study discusses the limitations of the study and its conclusion.
APA, Harvard, Vancouver, ISO, and other styles
37

Ratkevičius, Donatas, Česlovas Ratkevičius, and Rimvydas Skyrius. "ERP SELECTION CRITERIA: THEORETICAL AND PRACTICAL VIEWS." Ekonomika 91, no. 2 (2012): 97–116. http://dx.doi.org/10.15388/ekon.2012.0.893.

Full text
Abstract:
This article deals with the problems of Enterprise Resource Planning (ERP) system selection as the initial and vital phase of ERP system implementation.Firstly, the paper presents an analysis of different classifications of the fundamental criteria for the ERP system selection process, published in scholar sources, and defines two main groups – software-related, and implementation-related ERP selection criteria. Secondly, combining theoretical and practical approaches, the most significant ERP system selection criteria of both groups are identified and reviewed by analyzing and interpreting their definitions and differences. The study is complemented by adding practical/statistical findings produced by different consultancies.The paper concludes that there is no standard classification of ERP selection criteria. They are classified mostly on the basis of scientists’ research interests.The significance of ERP system functionality as the principal software-related ERP selection criterion is emphasized. Eleven other criteria were defined as important to consider, such as the total costs of the ERP implementation project, vendor reputation, ERP reliability, ease of integration with other systems, technology advance, scalability, upgrading ability, customization / parameterization possibilities; ease of use; flexibility and modularity.The importance of all-round knowledge for a successful ERP implementation is emphasized, including ERP software functionality, project and change management, business processes, organization of training etc. All these areas are closely connected with implementation-related ERP selection factors: organisational fit, end-user readiness, training, system support quality, and the overall ERP implementation success which is predefined by the complexity of business environment as well as the level of business transformation, defined by technological changes.Finally, it is stated that for creating a decision support system which would automate the ERP selection process, the quantitative analysis of ERP selection criteria would be required.
APA, Harvard, Vancouver, ISO, and other styles
38

Fredson, Gracetiti, Babatunde Adebisi, Olushola Babatunde Ayorinde, Ekene Cynthia Onukwulu, Olugbenga Adediwin, and Alexsandra Ogadimma Ihechere. "Maximizing Business Efficiency through Strategic Contracting: Aligning Procurement Practices with Organizational Goals." International Journal of Social Science Exceptional Research 1, no. 1 (2022): 55–72. https://doi.org/10.54660/ijsser.2022.1.1.55-72.

Full text
Abstract:
In today’s dynamic business environment, strategic contracting has emerged as a critical component of procurement practices, enabling organizations to maximize efficiency while aligning operations with overarching corporate goals. This paper explores the transformative role of strategic contracting in modern procurement, emphasizing its potential to enhance operational performance, mitigate risks, and drive sustainable value creation. By adopting advanced tools such as contract lifecycle management (CLM) systems, artificial intelligence (AI), and data analytics, organizations can streamline procurement processes, improve supplier relationships, and achieve greater cost efficiency. The study identifies key elements of strategic contracting, including comprehensive supplier evaluation, contract standardization, and real-time performance monitoring. A particular focus is placed on aligning procurement activities with organizational objectives such as compliance, risk management, and sustainability. Leveraging AI-driven insights, procurement teams can predict market trends, optimize vendor negotiations, and ensure adherence to regulatory frameworks. Additionally, digital contract management platforms provide centralized repositories for storing, tracking, and analyzing contracts, reducing administrative overhead and enabling informed decision-making. The integration of strategic contracting with Environmental, Social, and Governance (ESG) criteria is also explored. By embedding ESG principles into contracting practices, organizations can foster ethical supply chains, promote environmental sustainability, and enhance their reputation in global markets. Practical examples from industries such as construction, healthcare, and retail are presented to demonstrate the tangible benefits of strategic contracting in driving business efficiency. This paper concludes that strategic contracting is no longer a supplementary procurement activity but a core driver of organizational success. By aligning procurement practices with corporate goals, businesses can achieve operational excellence, ensure compliance, and sustain long-term competitiveness. Future research directions include exploring the role of emerging technologies, such as blockchain and machine learning, in further enhancing strategic contracting practices.
APA, Harvard, Vancouver, ISO, and other styles
39

Isanovic, Sejla, Edward Frongillo, Shilpa Constantinides, et al. "Perspectives about Food Safety in Diverse Low- and Middle-income Countries." Current Developments in Nutrition 6, Supplement_1 (2022): 488. http://dx.doi.org/10.1093/cdn/nzac059.016.

Full text
Abstract:
Abstract Objectives Concerns about unsafe food influence food choice and consumption of unsafe foods increase morbidity and mortality, particularly in low- and middle-income countries. Addressing unsafe food is dominated by mitigation of biological and chemical hazards through supply-side risk management, with less emphasis on individuals’ experiences and perspectives of food safety. We aimed to identify and categorize perspectives about food safety in five countries. Methods Five studies designed to address drivers of food choice in low- and middle-income countries provided transcripts from 17 focus groups discussions and 303 interviews in Kenya, Ghana, India, Guinea, and Vietnam. We analyzed transcripts using a priori and emergent coding techniques that involved a constant comparative method. Results Individuals constructed meaning about food safety through personal experience and social influences. Community and family members contributed knowledge about food safety. Concerns about food safety were influenced by reputations of and relationships with vendors. Concerns were amplified by mistrust of vendors’ purposeful adulteration, unsafe selling practices, and new methods to produce food. Individuals were reassured of food safety by positive relationships with vendors; home-cooked meals; implementation of policies and regulations being followed; vendor adherence to environmental sanitation and food hygiene practices; cleanliness of vendors’ appearance; vendors’ or producers’ agency to use risk mitigation strategies; and transparency in production, processing, and distribution of food. Conclusions Individuals’ perspectives about food safety influence food choice behaviors. The success of food-safety policies hinges on consideration of these perspectives. Funding Sources The Drivers of Food Choice (DFC) Competitive Grants Program, funded by the Bill &amp; Melinda Gates Foundation and the UK Government's Foreign, Commonwealth &amp; Development Office.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Shijie. "Internationalization of Enterprise Resource Planning Vendors." International Journal of Business Strategy and Automation 4, no. 1 (2023): 1–14. http://dx.doi.org/10.4018/ijbsa.326515.

Full text
Abstract:
International business theory suggests that multinational corporations are usually disadvantaged compared to local firms when competing in a host market. However, we find that foreign enterprise resource planning (ERP) vendors in the Chinese high-end ERP market perform significantly better than local vendors. To understand this gap, the authors first analyze the ERP business model and its four characteristics as a service and use Dunning's OLI paradigm to specify the ownership-specific, internalization-incentive, and location-specific advantages (O-, I-, and L-advantages) required for foreign ERP vendors to compete in the host country's high-end market. Then, after conducting case studies of the two foreign vendors with the highest share in the Chinese high-end ERP market, SAP and Oracle, they confirm that the O-advantages from strong brand and reputation, high research and development capabilities, professional partners, I-advantages from wholly owned subsidiaries, and L-advantages from economically developed regions cause SAP and Oracle to excel in the Chinese high-end ERP market.
APA, Harvard, Vancouver, ISO, and other styles
41

Afiah, Nur. "PENGARUH KEAMANAN, REPUTASI DAN PENGALAMAN TERHADAP TRUST PENGGUNA INTERNET UNTUK BERTRANSAKSI SECARA ONLINE." JEKPEND: Jurnal Ekonomi dan Pendidikan 1, no. 2 (2018): 58. http://dx.doi.org/10.26858/jekpend.v1i2.7256.

Full text
Abstract:
The aims of the research are to analyze to what extent the influence of security, reputation and experience on the trust of internet users for online interaction. The samples of the research were e-commerce users in Indonesia by taking the customers of one of the vendors of online shops, i.e. Lazada.co.id. The main instrument to collect the data was questionnaire measured by likert scale. The respondents consisted of 100 people. All questionnaires were given directly to respondents. Only 73 questionnaires were processed since 19 of them were not returned and 8 were not completed. The data were analyzed by using multiple regression analysis. The result reveal that independent variablest consisting of security, reputation, and experience have influence on customers’ trust. Security and reputation are the only variables which have a positive and significant influence on customers’ trust, while experience variable has a positive but insignificant influence. Thus, good security and reputation are very important variables in influencing the trust of e-commerce customers in Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
42

Yang, Rong, and Dianhua Wang. "Hierarchical Aggregation for Reputation Feedback of Services Networks." Mathematical Problems in Engineering 2020 (May 7, 2020): 1–12. http://dx.doi.org/10.1155/2020/3748383.

Full text
Abstract:
Product ratings are popular tools to support buying decisions of consumers, which are also valuable for online retailers. In online marketplaces, vendors can use rating systems to build trust and reputation. To build trust, it is really important to evaluate the aggregate score for an item or a service. An accurate aggregation of ratings can embody the true quality of offerings, which is not only beneficial for providers in adjusting operation and sales tactics, but also helpful for consumers in discovery and purchase decisions. In this paper, we propose a hierarchical aggregation model for reputation feedback, where the state-of-the-art feature-based matrix factorization models are used. We first present our motivation. Then, we propose feature-based matrix factorization models. Finally, we address how to utilize the above modes to formulate the hierarchical aggregation model. Through a set of experiments, we can get that the aggregate score calculated by our model is greater than the corresponding value obtained by the state-of-the-art IRURe; i.e., the outputs of our models can better match the true rank orders.
APA, Harvard, Vancouver, ISO, and other styles
43

Tangmanee, Chatpong, and Chayanin Rawsena. "Direct and Indirect Effects of Perceived Risk and Website Reputation on Purchase Intention." International Journal of Research in Business and Social Science (2147-4478) 5, no. 6 (2016): 1–11. http://dx.doi.org/10.20525/ijrbs.v5i6.539.

Full text
Abstract:
Success in electronic commerce relies greatly on customer trust. While other studies have examined various factors affecting online customer trust, few have investigated the joint effects of perceived risk and website reputation on purchase intention using online trust as a mediator. The current study attempts to fill this gap. 300 online shoppers participated via web-based questionnaires using a quota sampling technique. Based on confirmatory factor analysis (CFA), our measurements were found to be valid and reliable. Using structural equation modeling (SEM), we confirmed significant direct effects of perceived risk and website reputation on customer purchase intentions. Furthermore, both factors had significant indirect effects on purchase intention through online trust. In addition to extending theoretical insight into online trust as a mediator for the effects of perceived risk and website reputation on purchase intention, web-based vendors may adopt the findings to adjust their online stores to raise customer trust and ultimately increase the possibility of online purchases.
APA, Harvard, Vancouver, ISO, and other styles
44

Ganesan, Shankar. "Determinants of Long-Term Orientation in Buyer-Seller Relationships." Journal of Marketing 58, no. 2 (1994): 1–19. http://dx.doi.org/10.1177/002224299405800201.

Full text
Abstract:
Marketing managers must know the time orientation of a customer to select and use marketing tools that correspond to the time horizons of the customer. Insufficient understanding of a customer's time orientation can lead to problems, such as attempting a relationship marketing when transaction marketing is more appropriate. The author suggests that long-term orientation in a buyer/seller relationship is a function of two main factors: mutual dependence and the extent to which they trust one another. Dependence and trust are related to environmental uncertainty, transaction-specific investments, reputation, and satisfaction in a buyer/seller relationship. The framework presented here is tested with 124 retail buyers and 52 vendors supplying to those retailers. The results indicate that trust and dependence play key roles in determining the long-term orientation of both retail buyers and their vendors. The results also indicate that both similarities and differences exist across retailers and vendors with respect to the effects of several variables on long-term orientation, dependence, and trust.
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Xiaonuo. "Application and Impact of Cloud Computing in Business Development." Highlights in Business, Economics and Management 37 (July 18, 2024): 365–69. http://dx.doi.org/10.54097/ct6kzm23.

Full text
Abstract:
With the rapid development of China's economy and technology at this stage, cloud computing technology has become an important way for most enterprises to develop and innovate. Big data products developed by enterprises using cloud computing occupy a very important role in the sales profitability of cloud vendors as well as in the technical reputation of enterprises. At the present stage, Alibaba Cloud is one of the leading cloud vendors in China. Alibaba Cloud has strong technical strength in the innovation of technology, such as, database capacity increase, acceleration of cloud servers and so on. China has been strengthening the development of cloud vendors, but in the society where cloud computing products are popularized, it faces many problems, for example the leakage of security information affects the development and profitability of enterprises, the lack of cloud computing platform construction makes the process of automation and informatization and intelligent construction slow, which is not conducive to the full play of the functional value of the cloud computing platform.
APA, Harvard, Vancouver, ISO, and other styles
46

Madjdian, Dónya S., Vera Dankwah Badu, Guy Ilboudo, et al. "Fast food over safe food? A qualitative evaluation of a food safety training intervention for street vendors applying the COM-B model in Ouagadougou, Burkina Faso." PLOS ONE 19, no. 11 (2024): e0313635. http://dx.doi.org/10.1371/journal.pone.0313635.

Full text
Abstract:
The safety of ready-to-eat food sold in urban informal markets in low and middle-income countries is a pressing public health challenge, that needs to be addressed if we are to establish healthy food systems. Guided by the Capability, Opportunity, and Motivation model for Behavior change (COM-B), this qualitative study aimed to explore perceptions of street vendors on their participation in a food safety capacity building intervention, consisting of training and provision of food safety equipment. The intervention aimed to improve food safety behavior of vendors of ready-to-eat chicken in informal markets in Ouagadougou, Burkina Faso. A total of 24 vendors selling ready-to-eat chicken at street restaurants participated in semi-structured interviews after training, which focused on vendors’ stories of change related to food safety capabilities, opportunities, motivation, and behaviors. Data were thematically analyzed following COM-B components. Vendors noted improvements in psychological (i.e., knowledge, awareness, self-efficacy, perceptions) and physical capabilities (i.e., equipment useability and applicability), and motivations (perceived responsibility, reputation, client satisfaction, profits, consumer demand). Moreover, training and provision of equipment, spill-over effects to employees or neighboring outlets, and social support were perceived as key social and physical opportunities, while structural challenges such as market infrastructure, regulations, financial resources, cost of living, and outlet culture were physical barriers to implement lessons learnt. This study provides insights into the impact of engaging vendors in improving food safety behavior through training and equipment provision. Improvements in vendors’ perceived capabilities and motivation contributed to improved food safety behavior, while contextual barriers hindered the perceived adoption of food safety behaviors.
APA, Harvard, Vancouver, ISO, and other styles
47

Hung, Chia-Liang. "Building the Business Platform by Modularization Strategies: Cases of Taiwan Social Networking Vendors." Journal of Open Innovation: Technology, Market, and Complexity 8, no. 1 (2022): 13. http://dx.doi.org/10.3390/joitmc8010013.

Full text
Abstract:
Firms achieve their competitive advantage quickly through the concept framework of open innovation by integrating external inspiration with internal endowment when facing hyper-competition in the digital era. This paper deploys open innovation into building platform blocks by modular operators. These eight modular operators are splitting, augmenting, deleting, substituting, inversing, porting, configuring, and integrating. By means of case studies of two Taiwan Internet vendors, the results depict the manipulation strategies between eight modular operators to fit seven functional requirements for weaving social media, which are presence, identity, sharing, reputation, groups, conversations, and relationship. Finally, this paper advances propositions about the deployment of modularization strategies to develop a competitive platform.
APA, Harvard, Vancouver, ISO, and other styles
48

Abidemi Adeleye Alabi, Olukunle Oladipupo Amoo, Christian Chukwuemeka Ike, and Adebimpe Bolatito Ige. "Developing a vendor risk assessment model to secure supply chains in U.S. and Canadian Markets." International Journal of Science and Research Archive 3, no. 2 (2021): 230–47. https://doi.org/10.30574/ijsra.2021.3.2.0122.

Full text
Abstract:
In an era of increasing global interconnectivity, securing supply chains has become a critical priority for organizations operating in the U.S. and Canadian markets. This study proposes a comprehensive vendor risk assessment model tailored to address vulnerabilities in supply chains while enhancing resilience and operational security. The model integrates qualitative and quantitative methodologies, leveraging data analytics, machine learning, and risk management frameworks to evaluate vendor reliability, financial stability, compliance with regulations, and cybersecurity preparedness. It incorporates a multi-dimensional approach, encompassing risk identification, assessment, mitigation strategies, and continuous monitoring to address dynamic market challenges. The research identifies key factors influencing vendor risk, including geopolitical instability, regulatory changes, and technological advancements, while emphasizing the importance of collaboration and information sharing between stakeholders. A comparative analysis of the U.S. and Canadian regulatory environments highlights similarities and differences that shape risk assessment practices, providing a basis for localized implementation strategies. The proposed model aims to mitigate risks such as supply chain disruptions, data breaches, and reputational damage by integrating predictive analytics and scenario planning. It emphasizes the role of advanced tools, such as blockchain for transparency, and artificial intelligence for early warning systems, to enable proactive decision-making. By fostering adaptability, the model supports businesses in navigating uncertainties while maintaining compliance with national and international standards. This study contributes to the discourse on supply chain security by offering a robust framework that enhances vendor selection and performance evaluation processes. The findings underscore the necessity of embedding risk assessment as a core element of supply chain management, ensuring sustainability and competitiveness in increasingly complex markets.
APA, Harvard, Vancouver, ISO, and other styles
49

O'Leary, Daniel E., and Scott Spangler. "Continuously Monitoring Bank Risk, Reputation, and Opportunity." Journal of Emerging Technologies in Accounting 15, no. 2 (2018): 151–63. http://dx.doi.org/10.2308/jeta-52234.

Full text
Abstract:
ABSTRACT The explosion of social and other digital media now provides virtually a continuous stream of information about organizations, their people, and their products. Although CEOs and others see the use of that social and digital information as a potential opportunity for creating value, they also recently have noted that one of the biggest risks organizations face is the potential threat to organizational and brand reputations from those same digital media. Accordingly, organizations are seeking out systems that allow them to continuously review and monitor social and other digital media in time to respond to both threats and opportunities. This paper presents a case study that investigates a system that is designed to monitor and mine the rapidly growing amounts of digital data to help banks better understand changes taking place in their worlds—regarding their products, reputations, clients, vendors, competitors, and others. Critical decisions must be made on what issues, people, and products to monitor, what digital sources to monitor, and what to do whenever some potential problem is found. The purpose of this paper is to investigate issues associated with implementing continuous monitoring systems for brand and reputation in financial organizations, with a particular focus on the “information behavior” (Feldman and March 1981) of such systems. In particular, the computer science in continuous monitoring systems seems to be ahead of actual use of such systems in organizations. As a result, although continuous monitoring systems can help companies address the mechanics of “how to do continuous monitoring,” there are many open questions and implementation issues in the actual use of such systems. As a result, this paper first provides a brief background of digital disruption, some digital risks, and continuous monitoring systems. Second, the paper examines the structure and design of a system in a banking context, investigating the key system design capabilities associated with such systems. In particular, we page through different screen artifacts to gain an understanding of how the system works. Third, we examine some of the issues facing a CIO as she seeks a system to meet the bank's digital needs.
APA, Harvard, Vancouver, ISO, and other styles
50

Xiong, Qiang, Yifei Zhu, Zhangying Zeng, and Xinqi Yang. "Signal Game Analysis between Software Vendors and Third-Party Platforms in Collaborative Disclosure of Network Security Vulnerabilities." Complexity 2023 (March 31, 2023): 1–11. http://dx.doi.org/10.1155/2023/1027215.

Full text
Abstract:
The global network threat is becoming more and more serious, and network security vulnerability management has become one of the critical areas in the national information security emergency system construction. To guide the third-party sharing platforms regarding network security vulnerability management, this work constructs a signal game model comprising third-party vulnerability sharing platforms and software vendors for vulnerability collaborative disclosures. In addition, we analyze the game strategy selection and its influencing factors. The results show that there are two perfect Bayesian equilibria, including separation equilibrium and mixed equilibrium, due to the incomplete lines of information disclosure. The equilibrium state is mainly based on the compression time of the protection period and the existence ratio of the software vendors who develop the patches in the market. This work puts forward some suggestions in terms of the protection period, reputation loss, and relevant laws and regulations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography