The paper presents acceptance of the biometric identification techniques for authentication in the Internet. New model is described that combines the techniques used in the known methods such as TAM, DOI and UTAUT with the trust and privacy research fields. The model proved that the drivers which were previously used to explain the potential of the biometrics acceptance did not sufficiently pointed to the usefulness of these techniques and to their higher acceptance potential. Factors dealing with privacy, trust and risk acceptance have the highest influence regarding the acceptance of the biometric technology.
COBISS.SI-ID: 21705190
The paper presents a model that was developed as a response to the limited understanding of the role of users’ perceived risk in Internet banking adoption. The model that combines unified theory of acceptance and use of technology (UTAUT) with perceived risk explains behaviour intention and usage behaviour of Internet banking. The results support some relationships with the UTAUT parameters, such as performance expectancy, effort expectancy, and social influence. The empirical testing has confirmed the role of risk as a stronger predictor of the user intention.
COBISS.SI-ID: 21704934
The paper presents a broadband diffusion analysis of the European OECD member countries. The analysis shows that if the present trends continue in the same direction, broadband services will not reach the 100% penetration rate in the near future. Based on these findings, the question of a possible revitalization is discussed in the paper. The investigation about the obstacles that delay the adoption were focused on the population knowing to be slower in adopting broadband. A survey of households in rural areas of Slovenia has revealed that social habits and lack of both knowledge and interest in new technologies are the main reasons.
COBISS.SI-ID: 20383718
This paper presents a mathematical model for decision taking for an investment in the information security technology. The decision-making process is based on a quantitative analysis of the security risks and a digital-assets assessment in an organization. The model makes use of a quantitative analysis of different security measures that counteract individual risks by identifying the information-system processes in an enterprise and the potential threats. The model comprises the target security levels for all identified core business processes and the probability of a security accident together with the possible loss the organization may suffer. The model allows indepth analysis and computations providing quantitative assessments of different options for investments, which translate into recommendations that facilitate the selection of the best solution and the associated decision-making. The model was tested with data from a real business environment.
COBISS.SI-ID: 25578535
The publication identifies the main obstacles in the Future Internet evolution and the problems that have appeared with the enlargement and the complexity of the network. The evolution directions are discussed and four scenarios for development are presented. The scenarios are evaluated and the best model based on the user and service providers needs is selected and its future evolution recommended, as it preserves the main chaacteristics of the current internet: openess and accessibility.
COBISS.SI-ID: 25533991