Antecedents of Security Pillars in E-Commerce Applications

This paper investigates the relationship between internet security and e-business competence at banking and exchange firms in Jordan. The proposed conceptual model examines the antecedents and consequences of e-business competence and tests its empirical validity. The sample of 152 banking and exchange firms tests the posited structural equation model. The results consistently support the validity of the proposed conceptual model, the results also found that organizations realize the importance of e-business and are willing to proceed further with e-business. Beyond concerns about internet security, their awareness of security hazards and internet performance is minimal. The author concludes that the public awareness of ICT in general is low. In light of the data collected, the author makes recommendations for the interested authorities to improve e-business in Jordan.

[1]  Sungjune Park,et al.  Understanding the Value of Countermeasure Portfolios in Information Systems Security , 2008, J. Manag. Inf. Syst..

[2]  Varun Grover,et al.  The Relationship of E-Commerce Competence to Customer Value and Firm Performance: An Empirical Investigation , 2005, J. Manag. Inf. Syst..

[3]  Ralf Steinmetz,et al.  Vulnerabilities and Security Limitations of current IP Telephony Systems , 2001, Communications and Multimedia Security.

[4]  C. Higgins,et al.  Work-family conflict in the dual-career family , 1992 .

[5]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[6]  John Hulland,et al.  Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .

[7]  L. L. Cummings,et al.  The Organizational Trust Inventory (OTI): Development and validation. , 1996 .

[8]  Chong-Sun Hwang,et al.  Wireless Data Broadcast Schemes for Location-Dependent Information Services Under a Geometric Location Model , 2005, Int. J. Bus. Data Commun. Netw..

[9]  P. Evans,et al.  Strategy and the new economics of information. , 1997, Harvard business review.

[10]  Janet R. McColl-Kennedy,et al.  The relationship between Internet use and perceived performance in retail and professional service firms , 2003 .

[11]  Samir Chatterjee,et al.  International Journal of Business Data Communications and Networking , 2010 .

[12]  Alan D. Smith,et al.  Linking the Popularity of Online Trading with Consumers' Concerns for Reputation and Identity Theft , 2011, Int. J. Bus. Data Commun. Netw..

[13]  J. Birkinshaw,et al.  Structural and competitive determinants of a global integration strategy , 1995 .

[14]  Jaume Ramis,et al.  Cross-Layer Design, Analysis, and Optimization of QoS-Constrained AMC/ARQ-Based Wireless Networks , 2012 .

[15]  Kenneth C. Laudon,et al.  E-Commerce: Business, Technology, Society (3rd Edition) , 2006 .

[16]  M. Zairi,et al.  Global benchmarking for internet and e‐commerce applications , 2006 .

[17]  Albert H. Segars,et al.  Assessing the unidimensionality of measurement : a paradigm and illustration within the context of information systems research , 1997 .

[18]  Paul J. Hart,et al.  Power and Trust: Critical Factors in the Adoption and Use of Electronic Data Interchange , 1997 .

[19]  Adrian B. Ryans,et al.  Entry Strategy and Long-Term Performance: Conceptualization and Empirical Examination , 1995 .

[20]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[21]  H. Wold Systems Analysis by Partial Least Squares , 1983 .

[22]  Alex Sheshunoff Internet Banking-An Update from the Frontlines , 2000 .

[23]  Ali Hussein Saleh Zolait,et al.  A Study on the Internet Security and its Implication for E-Commerce in Yemen , 2010, Int. J. Technol. Diffusion.

[24]  Charles Parker E‐mail use and abuse , 1999 .

[25]  Cesar Garcia Diaz,et al.  Business data communications and networking: A research perspective , 2007 .

[26]  Karen A. Forcht,et al.  Security considerations of doing business via the Internet: cautions to be considered , 1997, Internet Res..

[27]  Hossein Saiedian,et al.  Understanding and Reducing Web Delays , 2001, Computer.

[28]  Alexander Hars,et al.  Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..

[29]  Mark Ciampa,et al.  Security+ Guide to Networking Security Fundamentals, Second Edition , 2004 .

[30]  Dan Shoemaker,et al.  Information Assurance for the Enterprise: A Roadmap to Information Security , 2006 .

[31]  Eduardo B. Fernandez,et al.  The Authenticator Pattern , 1999 .

[32]  Karen A. Forcht,et al.  Security issues and concerns with the Internet , 1995, Internet Res..

[33]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[34]  Henri Barki,et al.  Explaining the Role of User Participation in Information System Use , 1994 .

[35]  Mohammad Shikh-Bahaei,et al.  Self-Organization and Green Applications in Cognitive Radio Networks , 2013 .