CHAPTER 2 LITERATURE REVIEW 2.0 INTRODUCTION Within the internet banking services, researcher has indicated various determinants or drivers that had a positive effect on factor influences the acceptance the decision. Three widely used models or theories are reviewed and discussed in relation to internet banking services. These are theory of Theory of Reasoned Action (TRA), Theory of Planned Behaviour (TPB), Diffusion of Innovation Theory (DOI) and Technology Acceptance Model (TAM). In the chapter
CHAPTER 2 LITERATURE REVIEW 2.0 INTRODUCTION Within the internet banking services, researcher has indicated various determinants or drivers that have a positive effect on factor influences the acceptance the decision. Four widely used models or theories are reviewed and discussed in relation to internet banking services. These are theory of Theory of Reasoned Action (TRA), Theory of Planned Behaviour (TPB), Diffusion of Innovation Theory (DOI) and Technology Acceptance Model (TAM). In the
Online social network are currently one of the most popular Internet activities among the upcoming generation. Online social network services were changed the communicate way to each other’s, entertained and actually live. In past few years, social networks have undergone with a dramatic changes which make people have become more avid internet users. From those changes more than two third of the global population were visit and actively involved in social networks, confirming its worldwide popularity
Crime is where a computer is the target or the means adopted to commit a crime. Criminals use different ways to commit criminal activities such as fraud, theft, blackmail and forgery by using the Internet. The Bank NSP
unreasonableness in search and seizure has been given a wide interpretation. However the decision of what is considered reasonable or not remains subjective. It depends on such considerations as situations wherein the individual has a reasonable expectation of privacy. Thus standard of reasonableness is generally only fulfilled when a search is conducted after obtaining a warrant. This measure serves to protect the interests of the individual searched because the magistrate is presumed to be an impartial observer
online especially through social media, for example Instagram and Twitter. They may think that had actually made their account private, but how far do they think it is actually private? Do they think that they can hide their information and personal privacy from everyone? Chareonwongsak (2002) actually questioned about this. He said that some sectors sometimes violate peoples’ personal rights and freedoms through various methods in order to obtain the personal data. Some of the methods use are by electronic
comfortable and helpful, while a man who never uses it may try to make it become beautiful but useless for woman. Then Ariel states that some schools begin to accept students’ creativity rather than just stifled them. With the fast developing of Internet and technology, people keep seeking a more convenient way to study or getting information. Under this situation, universities should try to make their information system helpful for students in case of out of style. And as students are those who
someone’s reputation, by propounding negative propaganda (Thomas & Hersen, 2002). It can be applied to individual or groups but common targets are public officials, politicians, political candidates, activists or even ex-spouses. Nowadays, the growth of Internet and use of social media helped smear campaigns to be more powerful in damaging a public figure’s reputation. Smears often consist of ad hominem attacks in the form of unverifiable rumors and outright lies that are often propagated by the social media
The beginning of social networking on the Internet stem from an individual’s desire to instantly and easily keep in touch and share information with other people which includes friends, family, co-workers, and even the world at large. Since the introduction of social networking, it has drawn millions of Internet users where most of them have incorporated these websites into their daily routines. Most of the social networking websites are offered without any charge which includes a quick and simple
Some providers contend that releasing information might somehow compromise patient privacy and confidentiality concerns laid out in the Health Insurance Portability and Accountability Act of 1996 or HIPAA. That legislation was created at the dawn of the Internet era, when there were worries that sensitive health information that could humiliate patients or leave them easily exposed to discrimination. Internet security systems have significantly improved and it is unlawful for insurers to reject