{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T16:28:01Z","timestamp":1774283281899,"version":"3.50.1"},"reference-count":108,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T00:00:00Z","timestamp":1510531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2017,11,13]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Security has been a critical matter in the development of electronic services. The purpose of this research is to develop a new model to help e-service practitioners and researchers in the evaluation of e-service security and its effect on quality and intention to use e-services.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>According to the literature, 13 security dimensions are extracted. Then, exploratory factor analysis is applied to reduce the number of security dimensions. This step is implemented based on end-users\u2019 perception. Afterward, a hierarchical structure of e-service security is established to calculate the weights of security dimensions applying analytical hierarchy process method by contribution of e-service experts and providers. Finally, structural equation modeling using LISREL is applied to test the proposed theoretical model.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Results indicates that confidentiality, integrity, privacy, authentication, non-repudiation and availability are antecedents of consumers\u2019 perceived security in e-service. Considering the high significance of perceived security, it is concluded that enhanced feelings of security will result in improved perception of quality. Furthermore, it is found that users will intend to use e-service if they feel that the quality of e-service is high.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Few studies have been done on users\u2019 adoption behaviors of e-services and even those few have not investigated users\u2019 security perception as a major factor affecting users\u2019 intention to use e-services. Considering the increasing concerns of users about the security of their personal information and how it affects their adoption behaviors, there is a need to conduct more studies on the factors involved in this procedure. In this study, the concept of security from both perspective of objective security and subjective security is evaluated.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-09-2016-0074","type":"journal-article","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T19:12:43Z","timestamp":1507057963000},"page":"535-559","source":"Crossref","is-referenced-by-count":37,"title":["Understanding of e-service security dimensions and its effect on quality and intention to use"],"prefix":"10.1108","volume":"25","author":[{"given":"Hamed","family":"Taherdoost","sequence":"first","affiliation":[]}],"member":"140","reference":[{"issue":"4","key":"key2020120423525384300_ref001","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1080\/014492999119020","article-title":"Attitudes, satisfaction and usage: factors contributing to each in the acceptance of information technology","volume":"18","year":"1999","journal-title":"Behaviour and Information Technology Studies: Special Issue on Research Methodology"},{"issue":"1","key":"key2020120423525384300_ref002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2010.tb00283.x","article-title":"Factors influencing the adoption and usage of online services in Saudi Arabia","volume":"40","year":"2010","journal-title":"The Electronic Journal on Information Systems in Developing Countries"},{"key":"key2020120423525384300_ref003","first-page":"219","article-title":"The use of the UTAUT model in the adoption of e-government services in Kuwait","year":"2008"},{"issue":"1","key":"key2020120423525384300_ref004","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/BF02723327","article-title":"On the evaluation of structural equation models","volume":"16","year":"1988","journal-title":"Journal of the Academy of Marketing Science"},{"key":"key2020120423525384300_B4a","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0963-8687(02)00018-5","article-title":"Trustworthiness in electronic commerce: the role of privacy, security, and site attributes","volume":"11","year":"2002","journal-title":"Journal of Strategic Information Systems"},{"issue":"1","key":"key2020120423525384300_ref005","first-page":"1","article-title":"The effect of perceived risk on the intention to use E-commerce: the case of Algeria","volume":"14","year":"2009","journal-title":"Journal of internet Banking and Commerce"},{"issue":"2","key":"key2020120423525384300_ref006","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1037\/0033-2909.107.2.238","article-title":"Comparative fit indexes in structural models","volume":"107","year":"1990","journal-title":"Psychological Bulletin"},{"issue":"3","key":"key2020120423525384300_ref007","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1037\/0033-2909.88.3.588","article-title":"Significant tests and goodness of fit in the analysis of covariance structures","volume":"88","year":"1980","journal-title":"Psychological Bulletin"},{"issue":"4","key":"key2020120423525384300_ref008","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1108\/02652320210432945","article-title":"Modelling consumer choice of distribution channels: an illustration from financial services","volume":"20","year":"2002","journal-title":"The International Journal of Bank Marketing"},{"issue":"1","key":"key2020120423525384300_ref009","doi-asserted-by":"crossref","first-page":"27","DOI":"10.4085\/1947-380X-6.1.27","article-title":"Survey instrument validity part I: principles of survey instrument development and validation in athletic training education research","volume":"6","year":"2011","journal-title":"Athletic Training Education Journal"},{"issue":"2","key":"key2020120423525384300_ref010","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1207\/s15327906mbr0102_10","article-title":"The scree test for the number of factors","volume":"1","year":"1966","journal-title":"Multivariate Behavioral Research"},{"key":"key2020120423525384300_ref011","unstructured":"Charney, S. (2008), \u201cEstablishing end to end trust\u201d, [Online], Microsoft, available at: www.download.microsoft.com\/ (accessed)."},{"issue":"3","key":"key2020120423525384300_ref012","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4018\/jgim.2001070103","article-title":"Trust in internet shopping: instrument development and validation through classical and modern approaches","volume":"9","year":"2001","journal-title":"Journal of Global Information Management"},{"key":"key2020120423525384300_ref013","article-title":"Analysis of trust in internet and mobile commerce adoption","year":"2007"},{"issue":"4","key":"key2020120423525384300_ref014","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","article-title":"The DeLone and McLean model of information systems success: a ten-year update","volume":"19","year":"2003","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2020120423525384300_ref015","article-title":"A knowledge-based approach to security requirements for e-health applications","volume":"2","year":"2006","journal-title":"The Electronic Journal on Emerging Tools and Applications, in the Special Issue: Emerging Security Paradigms in the Knowledge Era"},{"issue":"5","key":"key2020120423525384300_ref016","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1108\/02635570610666458","article-title":"Development of a survey instrument to examine consumer adoption of broadband","volume":"106","year":"2006","journal-title":"Industrial Management & Data Systems"},{"issue":"3","key":"key2020120423525384300_ref017","first-page":"39","article-title":"Understanding factors affecting consumer adoption of broadband in India: a pilot study","volume":"10","year":"2008","journal-title":"Journal of Cases on Information Technology"},{"key":"key2020120423525384300_ref018","first-page":"297","article-title":"Security requirements and possibilities of risk evaluation in e-financial payment systems","volume-title":"The 10th International Conference \u201creliability and statistics in transportation and communication","year":"2010"},{"issue":"3","key":"key2020120423525384300_ref019","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1037\/1082-989X.4.3.272","article-title":"Evaluating the use of exploratory factor analysis in psychological research","volume":"4","year":"1999","journal-title":"Psychological Methods"},{"key":"key2020120423525384300_ref020","volume-title":"Discovering Statistics Using SPSS for Windows","year":"2000"},{"issue":"1","key":"key2020120423525384300_ref021","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"12","key":"key2020120423525384300_ref022","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/355112.355120","article-title":"Trust online","volume":"43","year":"2000","journal-title":"Communications of the ACM"},{"key":"key2020120423525384300_ref023","unstructured":"Gantz, S. (2008), \u201cLayered security architecture; establishing authentication, authorization, and accountability\u201d, [Online], Security Architecture, available at: www.securityarchitecture.com\/docs\/Layered_Security_Architecture.pdf [accessed]."},{"issue":"2","key":"key2020120423525384300_ref024","first-page":"132","article-title":"Evaluation of goodness-of-fit indeces for stractural equations models","volume":"21","year":"1993","journal-title":"Sociological Methods and Researchs"},{"key":"key2020120423525384300_ref025","article-title":"An alternative measure of consistency","volume-title":"Analytic Hierarchy Process: Applications and Studies","year":"1990"},{"issue":"3","key":"key2020120423525384300_ref026","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1108\/08876040410536486","article-title":"Customer loyalty to content-based Web sites: the case of an online healthcare service","volume":"18","year":"2004","journal-title":"Journal of Services Marketing"},{"key":"key2020120423525384300_ref027","volume-title":"Multivariate Data Analysis","year":"1995"},{"key":"key2020120423525384300_ref028","volume-title":"Multivariate Data Analysis","year":"1998"},{"key":"key2020120423525384300_ref029","first-page":"61","article-title":"Community banks go online","year":"2000","journal-title":"ABA Banking Journal\u2019s 2000 White Paper\/Banking on the internet"},{"issue":"3","key":"key2020120423525384300_ref030","first-page":"41","article-title":"Consumer attitude and the usage and adoption of home -based banking in The United Kingdom","volume":"20","year":"2002","journal-title":"International Journal of Bank Marketing"},{"issue":"1","key":"key2020120423525384300_ref031","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10705519909540118","article-title":"Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives","volume":"6","year":"1999","journal-title":"Structural Equation Modeling"},{"issue":"3","key":"key2020120423525384300_ref032","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1080\/01449290701679361","article-title":"Perception of infor-mation security","volume":"29","year":"2010","journal-title":"Behaviour & Information Technology"},{"issue":"12","key":"key2020120423525384300_ref033","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1016\/j.ijhcs.2011.07.007","article-title":"Factors affecting perception of information security and their impacts on IT adoption and security practices","volume":"69","year":"2011","journal-title":"International Journal of Human-Computer Studies"},{"key":"key2020120423525384300_ref034","volume-title":"Reading Statistics and Research","year":"2007"},{"issue":"2","key":"key2020120423525384300_ref035","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.elerap.2006.07.002","article-title":"A new mobile payment scheme for roaming services","volume":"6","year":"2007","journal-title":"Electronic Commerce Research and Applications"},{"key":"key2020120423525384300_ref036","article-title":"Information processing systems \u2013 open systems interconnection \u2013 basic reference model \u2013 part 2: security architecture","author":"IS07498-2","year":"2004"},{"key":"key2020120423525384300_ref037","author":"ITU-T","year":"2004"},{"issue":"8","key":"key2020120423525384300_ref038","doi-asserted-by":"crossref","first-page":"912","DOI":"10.19026\/rjaset.8.1053","article-title":"Marketization of higher education institute; identifying a set of performance measurements based on analytic hierarchy process","volume":"8","year":"2014","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"key":"key2020120423525384300_ref039","volume-title":"LISREL 7: A Guide to the Program and Applications","year":"1989"},{"issue":"1","key":"key2020120423525384300_ref040","first-page":"38","article-title":"Malaysian electronic government adoption barriers","volume":"2","year":"2008","journal-title":"Public Sector ICT Management Review"},{"issue":"4","key":"key2020120423525384300_ref041","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1016\/j.dss.2007.11.007","article-title":"Revisiting the role of Web assurance seals in business-to-consumer electronic commerce","volume":"44","year":"2008","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2020120423525384300_ref042","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1108\/09604520610639964","article-title":"Online service attributes available on apparel retail Web sites: an E-S-QUAL approach","volume":"16","year":"2006","journal-title":"Managing Service Quality: An International Journal"},{"issue":"5","key":"key2020120423525384300_ref043","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/506218.506249","article-title":"Personalized hypermedia and international privacy","volume":"45","year":"2002","journal-title":"Communications of the ACM"},{"issue":"3","key":"key2020120423525384300_ref044","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/BF02289233","article-title":"The varimax criterion for analytic rotation in factor analysis","volume":"23","year":"1958","journal-title":"Psychometrika"},{"issue":"6","key":"key2020120423525384300_ref045","first-page":"1321","article-title":"User acceptance of mobile commerce: an empirical study in Macau","volume":"45","year":"2013","journal-title":"International Journal of Systems Science"},{"issue":"1","key":"key2020120423525384300_ref046","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.elerap.2010.07.001","article-title":"Trust factors influencing the adoption of internet-based interorganizational systems","volume":"10","year":"2011","journal-title":"Electronic Commerce Research and Applications"},{"issue":"6","key":"key2020120423525384300_ref047","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.ijinfomgt.2009.03.012","article-title":"Factors influencing intention to use e-government services among citizens in Malaysia","volume":"29","year":"2009","journal-title":"International Journal of Information Management"},{"key":"key2020120423525384300_ref048","article-title":"Securing enterprise Web applications at the source: an application security perspective","year":"2004"},{"issue":"2","key":"key2020120423525384300_ref049","first-page":"1","article-title":"Determining the number of factors to retain in EFA: an easy-to-use computer program for carrying out parallel analysis","volume":"12","year":"2007","journal-title":"Practical Assessment, Research & Evaluation"},{"issue":"1\/2","key":"key2020120423525384300_ref050","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1504\/IJTM.2007.013444","article-title":"Performance measurement systems for knowledge management in high technology industries: a balanced scorecard framework","volume":"39","year":"2007","journal-title":"International Journal of Technology Management"},{"issue":"2","key":"key2020120423525384300_ref051","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1108\/09590550510581485","article-title":"Customer perceptions of e-service quality in online shopping","volume":"33","year":"2005","journal-title":"International Journal of Retail & Distribution Management"},{"key":"key2020120423525384300_ref052","volume-title":"SPSS for Intermediate Statistics: Use and Interpretation","year":"2005"},{"key":"key2020120423525384300_ref053","first-page":"1","article-title":"Security issues in mobile payment from the customer viewpoint","year":"2006"},{"issue":"7","key":"key2020120423525384300_ref054","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1108\/02634500810916708","article-title":"Exploring e-service quality: a study of Irish online banking","volume":"26","year":"2008","journal-title":"Marketing Intelligence & Planning"},{"issue":"3","key":"key2020120423525384300_ref055","first-page":"1","article-title":"Distributors\u2019 knowledge sharing competency (DKSC): scale generation and development process","volume":"3","year":"2013","journal-title":"Journal of Knowledge Management, Economics and Information Technology"},{"key":"key2020120423525384300_ref056","volume-title":"E-Commerce Und E-Business: Marktmodelle, Anwendungen Und Technologien","year":"2002"},{"issue":"1","key":"key2020120423525384300_ref057","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1509\/jppm.19.1.54.16942","article-title":"internet privacy and security: an examination of online retailer disclosures","volume":"19","year":"2000","journal-title":"Journal of Public Policy & Marketing"},{"issue":"1","key":"key2020120423525384300_ref058","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1111\/j.1365-2575.2005.00185.x","article-title":"Does managerial orientation matter? The adoption of reinventing government and e-government at the municipal level","volume":"15","year":"2005","journal-title":"Information Systems Journal"},{"key":"key2020120423525384300_ref059","volume-title":"How to Do Research: A Practical Guide to Designing and Managing Research Projects","year":"2006"},{"key":"key2020120423525384300_ref060","volume-title":"Psychometric Theory","year":"1978"},{"issue":"3","key":"key2020120423525384300_ref061","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1108\/10662240410542652","article-title":"Consumer acceptance of online banking: an extension of the technology acceptance model","volume":"14","year":"2004","journal-title":"Internet Research"},{"issue":"4","key":"key2020120423525384300_ref062","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1108\/02652320110392527","article-title":"An empirical investigation of the Turkish consumers\u2019 acceptance of internet banking services","volume":"19","year":"2001","journal-title":"International Journal of Bank Marketing"},{"issue":"3","key":"key2020120423525384300_ref063","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/272657.272690","article-title":"Development of a measure to assess the quality of user-developed applications","volume":"28","year":"1997","journal-title":"ACM Sigmis Database"},{"key":"key2020120423525384300_ref064","unstructured":"Robinson, J. (2009), \u201cTriandis theory of interpersonal behaviour in understanding software privace behaviour in the South African context\u201d, Masters degree, University of the Witwatersrand."},{"key":"key2020120423525384300_ref065","article-title":"The era of e-service","volume-title":"e-Service, New Directions in Theory and Practice","year":"2002"},{"key":"key2020120423525384300_ref066","volume-title":"The Analytic Hierarchy Process: Planning, Priority Setting, Resources Allocation","year":"1980"},{"key":"key2020120423525384300_ref067","article-title":"Success of government e-service delivery: does satisfaction matter?","volume-title":"EGOV 2010 LNCS IFIP International Federation for Information Processing","year":"2010"},{"issue":"4","key":"key2020120423525384300_ref068","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1108\/02635570110390071","article-title":"Perceived security and world wide Web purchase intention","volume":"101","year":"2001","journal-title":"Industrial Management & Data Systems"},{"issue":"3","key":"key2020120423525384300_ref069","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1108\/09604520310476490","article-title":"E-service quality: a model of virtual service quality dimensions","volume":"13","year":"2003","journal-title":"Managing Service Quality: An International Journal"},{"issue":"7","key":"key2020120423525384300_ref070","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1108\/02652329910305689","article-title":"Adoption of internet banking by Australian consumers: an empirical investigation","volume":"17","year":"1999","journal-title":"International Journal of Bank Marketing"},{"key":"key2020120423525384300_ref071","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.ijinfomgt.2013.10.001","article-title":"The determinants of individuals\u2019 perceived e-security: evidence from Malaysia","volume":"34","year":"2014","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2020120423525384300_ref072","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.giq.2010.05.006","article-title":"E-government adoption model (GAM): differing service maturity levels","volume":"28","year":"2011","journal-title":"Government Information Quarterly"},{"issue":"3","key":"key2020120423525384300_ref073","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1080\/00913367.1999.10673588","article-title":"Flaming, complaining, abstaining: how online users respond to privacy concerns","volume":"28","year":"1999","journal-title":"Journal of Advertising"},{"issue":"5","key":"key2020120423525384300_ref074","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.intcom.2010.05.001","article-title":"The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption","volume":"22","year":"2010","journal-title":"Interacting with Computers"},{"issue":"12","key":"key2020120423525384300_ref075","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/355112.355124","article-title":"Designing trust into online experiences","volume":"43","year":"2000","journal-title":"Communications of the ACM"},{"key":"key2020120423525384300_ref076","volume-title":"Security and Privacy Issues in E-Banking: An Empirical Study of Customers\u2019 Perception","year":"2013"},{"issue":"24","key":"key2020120423525384300_ref077","first-page":"380","article-title":"Validation guidelines for IS positivist research","volume":"13","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"issue":"2","key":"key2020120423525384300_ref078","first-page":"74","article-title":"Smart card security; technology and adoption","volume":"5","year":"2011","journal-title":"International Journal of Security"},{"issue":"1","key":"key2020120423525384300_ref079","first-page":"10","article-title":"E-services usage evaluation; applications\u2019 level of co-creation and digitalization","volume":"2","year":"2013","journal-title":"International Journal of Academic Research in Management"},{"key":"key2020120423525384300_ref080","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.protcy.2013.12.476","article-title":"Features\u2019 evaluation of goods, services and E-services; electronic service characteristics exploration","volume":"12","year":"2014","journal-title":"Procedia Technology, Elsevier"},{"key":"key2020120423525384300_ref081","first-page":"34","article-title":"Perceived barriers and benefits of Web based services","year":"2014"},{"key":"key2020120423525384300_ref082","first-page":"117","article-title":"Evaluation of security factors effecting on Web based service adoption","volume-title":"Recent Advances in Telecommunications, Informatics and Educational Technologies","year":"2014"},{"key":"key2020120423525384300_ref083","first-page":"310","article-title":"How security issues can influence on usage of electronic services","year":"2014","journal-title":"Advances in Information Science and Computer Engineering, WSEAS"},{"key":"key2020120423525384300_ref084","first-page":"73","volume-title":"Examination of Electronic Service Definitions International Conference on Advanced Computer Science Applications and Technologies (ACSAT)","year":"2012"},{"issue":"3","key":"key2020120423525384300_ref085","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1108\/09544780310469262","article-title":"A service quality framework for Web-based information systems","volume":"15","year":"2003","journal-title":"The TQM Magazine"},{"key":"key2020120423525384300_ref086","unstructured":"Todorov, D. (2011), \u201cAuthentication, authorization, and accounting\u201d, [Online], Information Systems Security, available at: www.infosectoday.com\/Articles\/Authentication.htm [Accessed]."},{"key":"key2020120423525384300_ref087","article-title":"Conceptual model for B2E portal user satisfaction","year":"2006"},{"issue":"1","key":"key2020120423525384300_ref088","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.cose.2004.11.001","article-title":"The concept of security and trust in electronic payments","volume":"24","year":"2005","journal-title":"Computers and Security"},{"key":"key2020120423525384300_ref089","volume-title":"Mobile Commerce, Grundlagen Und Techniken","year":"2004"},{"issue":"3","key":"key2020120423525384300_ref090","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.giq.2007.09.006","article-title":"Explaining the acceptance and use of government internet services: a multivariate analysis of 2006 survey data in The Netherlands","volume":"25","year":"2008","journal-title":"Government Information Quarterly"},{"issue":"1","key":"key2020120423525384300_ref091","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1108\/10662240610642514","article-title":"Task scenario effects on bank Web site expectations","volume":"16","year":"2006","journal-title":"internet Research"},{"issue":"3","key":"key2020120423525384300_ref092","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1070939.1070943","article-title":"In-depth tutorials: security in e-learning","volume":"2005","year":"2005","journal-title":"eLearn Magazine"},{"issue":"1","key":"key2020120423525384300_ref093","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1057\/palgrave.fsm.4770140","article-title":"internet banking in the UK: why are there not more customers?","volume":"9","year":"2004","journal-title":"Journal of Financial Services Marketing"},{"issue":"3","key":"key2020120423525384300_ref094","article-title":"Exploratory factor analysis: a five-step guide for novices","volume":"8","year":"2010","journal-title":"Australasian Journal of Paramedicine"},{"key":"key2020120423525384300_ref095","article-title":"User acceptance of emergency alert technology: a case study","year":"2009"},{"issue":"4","key":"key2020120423525384300_ref096","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1016\/S0378-7206(04)00073-4","article-title":"Development and validation of an instrument to measure user perceived service quality of information presenting Web portals","volume":"42","year":"2005","journal-title":"Information & Management"},{"key":"key2020120423525384300_ref097","article-title":"Personalized Security for E-Services","year":"2006"},{"issue":"5","key":"key2020120423525384300_ref098","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1111\/j.1559-1816.2010.00615.x","article-title":"Explaining internet banking behavior: theory of reasoned action, theory of planned behavior, or technology acceptance model?","volume":"40","year":"2010","journal-title":"Journal of Applied Social Psychology"},{"key":"key2020120423525384300_ref099","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1016\/j.sbspro.2013.07.169","article-title":"Student perception on security requirement of e-learning services","volume":"90","year":"2013","journal-title":"Procedia - Social and Behavioral Sciences, Elsevier"},{"key":"key2020120423525384300_ref100","unstructured":"Zeithaml, V.A., Parasuraman, A. and Malhotra, A. (2000), A Conceptual Framework for Understanding E-Service Quality: Implications for Future Research and Managerial Practice, MSI Working Paper Series, Report No. 00-115, Cambridge, pp. 1-49."},{"issue":"4","key":"key2020120423525384300_ref101","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1177\/009207002236911","article-title":"Service quality delivery through Web sites: a critical review of extant knowledge","volume":"30","year":"2002","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"2006","key":"key2020120423525384300_ref102","first-page":"279","article-title":"An empirical study of factors affecting e-service satisfaction","volume":"25","year":"2006","journal-title":"Human Systems Management"},{"issue":"3","key":"key2020120423525384300_ref103","doi-asserted-by":"crossref","first-page":"3611","DOI":"10.1016\/j.eswa.2011.09.051","article-title":"Assessment of E-commerce security using AHP and evidential reasoning","volume":"39","year":"2012","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"key2020120423525384300_ref104","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1108\/02635571111115146","article-title":"The impact of privacy concern on user adoption of location-based services","volume":"111","year":"2011","journal-title":"Industrial Management & Data Systems"},{"issue":"3","key":"key2020120423525384300_ref105","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1037\/0033-2909.99.3.432","article-title":"Comparison of five rules for determining the number of components to retain","volume":"99","year":"1986","journal-title":"Psychological Bulletin"},{"key":"key2020120423525384300_ref106","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1037\/0033-2909.99.3.432","article-title":"Factors influencing five rules for determining the number of components to retain","volume":"99","year":"1986","journal-title":"Psychological Bulletin"},{"issue":"8","key":"key2020120423525384300_ref107","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1108\/02656710410551728","article-title":"Customers\u2019 perceptions of online retailing service quality and their satisfaction","volume":"21","year":"2004","journal-title":"International Journal of Quality & Reliability Management"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-09-2016-0074\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-09-2016-0074\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:11Z","timestamp":1753406591000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/25\/5\/535-559\/189051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,13]]},"references-count":108,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,11,13]]}},"alternative-id":["10.1108\/ICS-09-2016-0074"],"URL":"https:\/\/doi.org\/10.1108\/ics-09-2016-0074","relation":{},"ISSN":["2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2017,11,13]]}}}