In order to have full access of this Article, please email us on thedocumentco@hotmail.co.uk
Abstract
The current research Evaluating Factors that Affect Users aims to identify and evaluate the factors that affect users’ level of trust and sense of security in E-commerce applications of government services in Saudi Arabia. It has been analysed that there is little research done on the same research title and this specific area so there is a research gap that has been fulfilled by this research.
The research approach is inductive research with exploratory cum explanatory approach considering the aims and objectives of the research. The data has been collected through a survey questionnaire and it has been analysed through a statistical tool namely SPSS. Different statistical tests have been applied to the data. The statistical tests applied include reliability analysis, frequency analysis, One-Way ANOVA, correlation analysis and regression analysis with every test serving the different purpose. It has been found that the there is a statistically significant impact of confidentiality and availability on the level of trust and sense of security in the E-commerce applications of government services in Saudi Arabia.
It is also found by the course of research that there is a statistically significant impact of the integrity on the trust level in the E-commerce applications of government services in Saudi Arabia. However, the impact of integrity on the security of the E-commerce applications of government services in Saudi Arabia is not statistically significant.
Table of Contents
Chapter 1 – Introduction 4
1.1 Introduction to the Chapter 4
1.2 Background of the Research 4
1.3 Problem Statement 5
1.4 Research Aims and Objectives 5
1.5 Motivation to the Researcher 6
1.6 Significance of the Research 6
1.7 Application and Relevance of Research in the Modern Era 6
1.8 Research Outline 7
1.9 Chapter Summary and Introduction to Next Chapter 7
2.1 Introduction 9
2.2 The Information Systems and their Role in the Emergence of E-commerce 9
2.3 Background to E-commerce Applications and Security in E-commerce Application Defined 10
2.4 The Development and Importance of Trust in E-Commerce Applications 11
2.5 The Determinants and Importance of Security in E-commerce Applications 13
2.6 The Relationship between sense of Security and User’s Trust in E-commerce Applications 14
2.7 Models Related to Security in E-commerce Applications and User’s Level of Trust 14
2.8 Different Types of Attacks in E-commerce Applications and Ways to Secure Applications 16
2.9 The Role and Importance of Confidentiality in Determining the Security and Level of Trust in E-commerce Applications 18
2.10 The Role and Importance of Availability in Determining the Security and Level of Trust in E-commerce Applications 250 18
2.11 The Role and Importance of Integrity in Determining the Security and Level of Trust in E-commerce Applications 250 19
2.12 Research Gaps 19
2.13 Chapter Summary 20
Chapter – 3: Research Methodology 21
3.1 Introduction to the Chapter 21
3.2 Research Framework 21
3.3 Research Hypotheses 22
3.4 Research Design 23
3.5 Research Approach 23
3.6 Research Philosophy 23
3.7 Research Strategy 24
3.8 Sampling and Sample Size 24
3.9 Data Analysis 24
3.10 Practical Limitations of the Research 25
3.11 Ethical Considerations of the Research 25
Chapter Four – Data Analysis 26
4.1 Introduction to the Chapter 26
4.2 Summary of Data Collected 26
4.3 Statistical Tools Applied 26
4.4 Data Analysis 27
4.4.1 Reliability analysis 27
4.4.2 Demographics of the Respondents 28
4.4.2.1 Gender 28
4.4.2.2 Age 29
4.4.2.3 Cross-Tabs for Demographics 31
4.4.3 Frequency Analysis 32
4.4.3.1 Responses by Developers 32
4.4.3.2 Responses by Users 37
4.4.4 One-Way ANOVA Analysis 40
4.4.4.1 One-Way ANOVA for Developers’ data based on Genders 41
4.4.4.2 One-Way ANOVA for Developers’ data based on Role as a Developer 41
4.4.4.3 One-Way ANOVA for Users’ Responses based on Gender 42
4.4.4.4 One-Way ANOVA for Users’ Responses based on their Awareness towards E-commerce Applications 43
4.4.5 Correlation Analysis 44
4.4.5.1 From Developer’s Questionnaire 45
4.4.5.2 From User’s Questionnaire 46
4.4.6 Regression Analysis 47
4.4.6.1 Regression Analysis from Developer’s Responses 47
4.4.6.2 Regression Models from the Developers’ Responses 49
4.4.6.3 Regression Analysis from Users’ Responses 50
4.4.6.4 Regression Models from the users’ Responses 52
4.5 Hypotheses Assessment 53
4.6 Discussion 54
4.7 Chapter Summary 55
Chapter Five – Conclusion and Recommendations 57
5.1 Summarized findings 57
5.2 Conclusion 58
5.3 Recommendations 59
5.4 Areas for Future Research 60
References 62
Recent Comments