SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

Developing a Framework for Exploring Factors Affecting
 on Trust in M-Commerce using Analytic Hierarchy Process
                                              Mehrbakhsh Nilashi
           Computer Engineering Department, Islamic Azad University of Roudsar and Amlash,Roudsar
                               PO box 1151-44815, Shohada Street, Roudsar, Iran
                          Tel: +98-911-344-3135 E-mail: nilashidotnet@yahoo.com


                                                Othman Ibrahim
           Faculty of Computer Science and Information Systems, University Teknologi Malaysia,Johor
               Alumni House, Universiti Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia
                            Tel: +60127477698     E-mail: othmanibrahim@utm.my


                                                Mousa Barisami
           Computer Engineering Department, Islamic Azad University of Roudsar and Amlash,Roudsar
                               PO box 1151-44815, Shohada Street, Roudsar, Iran
                        Tel: +98-911-243-8732     E-mail: barisamy.lahijan@gmail.com


                                                Nasim Janahmadi
           Computer Engineering Department, Islamic Azad University of Roudsar and Amlash,Roudsar
                               PO box 1151-44815, Shohada Street, Roudsar, Iran
                        Tel: +98-911-334-7032    E-mail: janahmadi.nasim@hotmail.com


                                                 Norafida Ithnin
           Faculty of Computer Science and Information Systems, University Teknologi Malaysia,Johor
               Alumni House, Universiti Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia
                                  Tel: +6075523291     E-mail: afida@utm.my
Received: 2011-10-18
Accepted: 20 11-10-27
Published: 2011-11-04


Abstract
Mobile Commerce is a developing and maturing area of electronic Commerce, where customers and
vendors can interact via the service providers through a wireless network and mobile devices for
information retrieval and transaction processing. In mobile transactions trust is an essential constituent in
mobile commerce transactions .This study aims to clarify the factors that affect on trust in mobile
commerce, and then evaluate and asses these factors by AHP method. This paper provides a theory based
framework that helps to customers to make a right decision while they would like to shop via mobile
facilities in mobile browsers. For this purpose the contribution of different scientific approaches is
examined. By combining these approaches a framework for the classification is derived for trust model.
Keywords: AHP method, Mobile Commerce, Trust, Security.

59 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

1. Introduction
The rapid evolution of mobile technology has intensified the enlargement of the mobile Internet as a
foundation for mobile commerce (m-commerce). M-commerce refers to “e-commerce activities via mobile
devices, such as mobile phones and Personal Digital Assistants (PDA’s)” [4].
Mobile Commerce is distributing at a remarkable speed. Along with mobile commerce popularity the
issues regarding the trust on mobile commerce is raising which it is a major issue for
customers and seller of mobile commerce. As general, many users usually do not browse an m-commerce
portal, which results in customer distrust, doubt and suspiciousness. Additionally, even experienced users
face immune problems. In the following sections we will briefly discuss the rapid development of
m-commerce and the trust problems of m-commerce. At this point, two definitions of mobile business
would be useful:
        Mobile Business or Mobile Commerce is any transaction with a monetary value that is conducted
         via a mobile telecommunications. [1]
        Mobile Business or Mobile Commerce is the purchase and the sale of goods and services using
         wireless mobile devices, such as mobile phones and personal digital assistants (PDAs) [2].
Mobile Commerce is also known as mobile electronic commerce or wireless E-commerce. It is conclude to
be the next gold scurry after electronic commerce. Business companies of different industries are scurrying
to stake a claim [3]. However, m-commerce is many things to many people. Some people deduce
m-commerce as an extension of e-commerce to mobile devices. Some people believe it is another new
channel after the Internet. Generally, m-commerce refers to any business deal with a fiscal value that is
managed through a mobile telecommunications network. According to this definition, m-commerce
represents a subset of all e- commerce, including both B2C and B2B. M- Commerce uses the internet for
purchasing goods and services as well as sending and receiving messages using hand- held wireless devices.
Wireless web applications will enable users with Internet enabled cell- phones.
Mobile phones are stabilized to significantly influence the way people shop. Looking ahead to 2014,
Gartner appraises that three billion adults around the world will be equipped to conduct transactions via
mobile or Internet technology. And mobile phones will overtake PCs as the most common web access
device worldwide by 20131.As consumers become increasingly connected – to each other and to brands - it
is critical that retailers develop a seamless cross-platform communication strategy and shopping experience.
They should leverage the mobile strengths of convenience and portability to build brand loyalty and
ultimately, drive sales [17].
During the last decades mobile networks and devices have been facing many developments. These progress
and maturities facilitate e-commerce conducted from a wired network to a wireless network [19, 20] with
the increasing developments in the wireless and mobile networks technologies more and more applications
are offered to the customers. Table 1 shows Mobile Communication Technologies Eras.
According to Nicholson, Compeau and Senthi [5], trust is a crucial concept in multiple system areas.
According to Morgan and Hunt, [6] and O’Malley and Tynan [5], trust is defined as a certainty between the
parties that the other party is trustworthy and that the parties will act with a level of trustfulness when
dealing with each other. Heffernan [7] summarized that within the realm of relationship marketing; trust has
been identified as an significant variable for the success of relationships in the supplier literature [8], the
channel literature [9], end consumer relationships literature [10] and lateral relationships literature [11]. In
the works of McKnight and Chervany [12], it is stated that trust opinions must exist from the consumers’
side in order for a transaction to transpire thereafter. Based on the opinions of McKnight and Chervany, [12]
and Poong, Eze and Talha [13], trust is when “one believes that the other party has one or more
characteristics beneficial to oneself” while trusting intention means “one is willing to depend on, or intends
to depend on, the other party even though one cannot control that party". However, one of the most
intimidates challenges to guarantee wide distribution of mobile commerce concerns trust in mobile
commerce. Lack of consumer trust is the most significant long-term barrier for e-commerce [21], as well as
for mobile commerce. Although mobile devices are more serviceable for “anytime shopping”, it has some
60 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011
exceptional features and characteristics that prevent the development of consumer trust. Mobile
commerce must overcome the problem of user distrust to become a viable means of performing business.
An in-depth understanding of the factors that constitute and can bring about consumer trust in mobile
commerce is necessary.
Indeed trust is significant challenge in the mobile commerce environment. Customers are concerned and
involved about the level of security when providing sensitive information online [14]. Also, they expect
that personal information will be secured from external access; there are two alterative security and privacy.
There are potential advantages in storing data, including personal and financial information, on mobile
devices for use in mobile commerce applications [15].
Trust plays a critical role in commercial relationships [22].Trust has been studied in various disciplines
ranging from social psychology to decision making. Recently, trust has been studied widely in the
e-commerce context [23].Table 1 provides some of frameworks and models regarding trust in e-commerce
and m-commerce.
In this study, we endeavor to highlight the potential factors that can improve the trust on mobile commerce
services based on experts' viewpoints.


2. The rationale of AHP
Thomas L.Saaty in the 1970s developed analytic hierarchy process (AHP) method depending on
mathematics and psychology, it is a decision making technique of fragmenting the elements related to the
decision into goal, criteria and alternatives, and then making both qualitative and quantitative analysis. AHP
is also a widely used technique to help decision-makers choose the best suited one among various
alternatives [16].Figure.1 shows a primary of AHP structure.
There are mainly four steps that AHP does for working on models:
        Define the decision object.
        Group the factors which influence the decision, and build a multi-level structure: the top level
         is the goal of this decision, the mediatory levels are criteria and sub-criteria of comparing
         distinct alternatives, and the lowest level is alternatives;
        Make comparisons between each criterion in an upper level and the same criterion in its below
         level in terms of relative importance, that is, make a set of pair wise comparison matrix. In
         addition, in order to make a contrast that how much a criterion is more important than another one;
         a scale of numbers is settled .Table 3 shows the essential scale of absolute numbers.
        Examining the matrix consistency through calculation, adjust it if necessary so that to obtain
         an acceptable consistency; In line with the premise of the consistency test, calculate the
         eigenvector corresponding to the maximum eigenvalue of the pair wise comparison
         matrix, define the weight between each criterion and that in its upper level; figure out the
         overall ranking weight between each criterion and the goal, and finally make the decision.
The consistency test process is:
                 Calculate CI which stands for the consistency index λmax is     the   maximum eigenvalue
                  of the pair wise comparison matrix, n is the size of matrix;




                 Find the corresponding RI which stands for the random index from the existing average
                  consistencies of random matrices;




61 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011




        Table 4. The average consistencies of random matrices (The Random Index-RI-Values)




                 Calculate CR which stands for the consistency ratio.
                                                        CI
                                                 CR 
                                                        RI
If CR< 0.10, the consistency of matrix is tolerant, otherwise the matrix should be modified.
AHP processes provides a set of methodical analysis method         and   provides    scientific    management
and decision with a persuasive basis;
Furthermore, AHP method is a simple approximation to help make decisions concerning rather
complicated and obscure problems, since it could aggregate various opinions from many
experts and even those in different groups[18]; Particularly it is suitable for those problems which
are not easy to make absolute quantitative analysis, since AHP combines quantitative and qualitative
elements together; Furthermore, all the stakeholders’ feelings and opinions could be converted into a
numerical scale, especially for laymen’s feeling, this method plays a vital role in taking
unstructured feelings into consideration[16];And checking the consistency ratio is extreme and critical
when it comes to make assessments and decisions, AHP provides feasibility and flexibility to modify
the judgment if it turns out to be incompatible.


3. Research Objectives
The primary objective of this research is to develop a valid framework for the comparison trust factors on
mobile commerce. The framework was based primarily on subjective trust factors assessments using
questionnaires.


4. Overall Theoretical Framework
For presenting a research framework of trust on mobile commerce for users a conceptual framework was
created that employs the factors obtained of prior researches. Figure 2 presents a diagrammatic
representation of our proposed framework along with the grouped factors.


5. Evaluation of trust factors through AHP
An online questionnaire was constructed using the method of pairwise comparison in which respondents
constantly had to choose between three statements in order to get a priority list. In this study ten different
experts for Judging were selected. The questionnaire was sent to a random sample of the mobile commerce
service providers, academic experts and professional executives of about 100 contacts and 80 respondents
completed the questionnaire, a response rate of 80%.
The most of respondents aged between 35-50 years old, while 82.1% of the respondents were male. The
respondents of the study also indicated that they were employed in many different businesses. 69.7% of the
respondents had a job related to the specialist, technical, and related occupations, and about 20.9% had a
job related to executive and managerial occupations, as well as administrative support occupations.



62 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011
5.1. Pair-wise comparison
By comparing the trust factors in each groups, affecting weight of all factors were determined. Quantitative
qualitative judgments, obtain the scale ratio of every factors, namely Comparison Matrix. Generally,
comparison matrix is obtained through filling in a questionnaire form by 80 numbers of experts and
managers in the field and results processing. The comparison Matrix form is shown in table 5.
mij is a numerical representation of relative importance that factor Mi to Mj that at the same layer for one
element at the upper layer. When mij> 1, factor i is more important than factor j to the expressed goal. The
number size means degree of relative importance. While mji = (1/mij) <1, factor j is less important than
factor i , the number size means relative less important. The form of Comparative judgment matrix of
support is shown in Table 6. Similarly A1, A2, A3 can be of similar structure.


5.2. Reorganization of main criteria affecting on trust in mobile commerce
After forming the model in Expert Choice Software and entering the matrix of pair wise comparison,
weight of dimensions, criteria and sub-criteria was calculated as shown below. Figure 3 shows prioritization
main factors affecting on trust in mobile commerce with Expert Choice Software. As shown in Figure 3,
priorities of main factors are 0.396, 0.264, 0.194 and 0.146 respectively .Inconsistency rate of the pairwise
comparison is 0.03 which is acceptable; because it is lower than 0.10.


5.3. Calculation of relative weight of criteria regarding each of the main factors
In this research, referring to the literature review and expert views, 4 main factors and 29 sub-criteria was
recognized. For prioritization of sub-criteria expert choice was used for all Pairwise Comparison matrixes.
Figure 4 shows Relative Weight of all sub-criteria of customer desires factor.
According to the results of the software, security criterion is of the most importance, weighted 0.285 and so
it is in the top priority. Privacy policy and reputatione are in the second and third priority weighted 0.180
and 0.176. Inconsistency rate of pairwise comparison is equal to 0.03 which is acceptable; because it is
lower than 0.10.
Figure 5 show Relative Weight of all sub-criteria of mobile and wireless technology factor.
As shown in Figure 5, wireless connection speed of criteria is of the most importance, weighted 0.176 and
so it is in the top priority. Accessibility of wireless and encryption of wireless transaction data criteria
are in the second priority (weighted 0.161),third(weighted 0.152) and wireless coverage area are in
the fourth priority (weighted 0.136). Inconsistency rate of pairwise comparison is 0.04 and since it is
lower than 0.10 these comparisons is acceptable.


6. Conclusion
In this study a framework for trust in mobile commerce was developed and AHP method was applied to
identify factors influencing trust in mobile commerce although some of the trust factors identified in this
study have been presented in the e-commerce literature, our framework identifies new antecedents that are
unique to trust in mobile commerce. Results of the survey show that among factors affecting trust in mobile
commerce, customer desires is the most important factor and it is considered as the significant factor for
trust a customers to mobile commerce.
In summary, we believe that M-Commerce has enormous potential. However, to achieve this potential,
the trust issue needs to be more fully comprehended and directly addressed by vendors and providers of
M-commerce technologies and services. The framework of trust in mobile commerce developed in this
research is an important step in this direction and future research should make several extensions of the
current study.



63 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011
References
[1] Muller-Veerse, F., “Mobile Commerce Report ”, Durlacher, 1999.
[2] Http://www.whatis.com.
[3] Stafford, T., Gillenson, M. (2003) “MOBILE COMMERCE: What It Is and What It Could Be,”
Communications of the ACM, December, Vol. 46 Issue 12, pp. 33-34.
[4] Mennecke, B., and Strader, T. (eds.). Mobile Commerce: Technology, Theory and Applications. Hershey,
PA: Idea-Group Publishing, 2002.
[5] L. O’Malley and C. Tynan, “A reappraisal of the relationship marketing construct of commitment and
trust” in New and Evolving Paradigms: The emerging future of marketing, Three American marketing
association special conferences, T. Meenaghan, Eds. 1997, pp. 486 – 503.
[6] R.M. Morgan, and S.D. Hunt, “The commitment-trust theory of relationship marketing”, Journal of
Marketing, vol. 58, 1994, pp. 20 –38.
[7] T. Heffernan, “Trust formation in cross-cultural business-to-business relationships”, Qualitative market
research: An international Journal, vol. 7, 2004, pp. 114 – 125.
[8] S. Ganesan, “Determinants of long-term orientation in buyer-seller relationships”, Journal of   arketing,
vol. 58, 1994, pp. 1 – 19.
[9] B.A. Weitz and S.D. Jap, “Relationship marketing and distribution channels”, Journal of the Academy
of Marketing Science, vol. 23, 1995, pp. 305 – 320.
[10] L.L. Berry and A. Parasuraman, Marketing services: Competing through quality, New York, NY: Free
Press, 1991.
[11] F.E. Webster, “The changing role      of marketing in the corporation”, Journal fo Marketing, vol. 56,
1992, pp. 1 – 17.
[12] D.H. McKnight and N.L. Chervany, “What trust means in e-commerce customer relationships: An
interdiciplinary conceptual typology”, International Journal of Electronic Commerce, vol.6, 2001-2002,
pp.3 – 59.
[13] Y.S. Poong, U.C. Eze, M.Talha, “B2C e-commerce in Malaysia:Perceived characteristics of innovating
and trust perspective”,International Journal of Electronic Commerce, vol. 7, 2009, pp. 392 – 427.
[14] Warrington, T. B., Abgrab, N. J., & Caldwell, H. M. (2000),"Building trust to develop competitive
advantage in e-business relationships." Competitiveness Review, 10(2), 160-168.
[15] Andreou, A. S., Leonidou, C., Chrysostomou, C., Pitsillides, A., Samaras, G.,Schizas, C. N., &
Mavromous, S. M. (2005). Key issues for the design and development of mobile commerce services and
applications. International Journal of Mobile Communications, 3(3), 303-323.
[16] Ramanathan, R., 2001.A note on the use of the analytic hierarchy process for environmental       impact
assessment. Journal of Environmental Management, 63(1), p.27-35.
[17] Media Post News, Online Media Daily.     Gartner: Mobile to Outpace Desktop Web by 2013.       January
13, 2010
[18] Raman than, R., 2003. An Introduction to Data Envelopment Analysis: A Tool for Performance
Measurement. [E-book]. New Delhi: Sage Publications India Pvt Ltd.
[19] Gunsaekaran, A. and Ngai, E. W. T. (2003),’Special issue on mobile commerce:Strategies,
technologies and applications’, Decision Support Systems, Vol. 35, PP.187–188.
[20] Gunasekaran, A. and Ngai, E. W. T. (2007),’Managing digital enterprise’, IJBIS, Vol. 2,No.3, PP.
266-275.
[21] Keen, P.G.W. (1997). Are you ready for “Trust” Economy, Computerworld, 31(16), p. 80.
[22] Nah, F. and S. Davis (2002). HCI Research Issues in Electronic Commerce.         Journal of Electronic
Commerce Research, 3(3), pp. 98-113

64 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                               www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011
[23] S.L., N. Tractinsky, L. Saarinen, and M. Vitale (1999). Consumer Trust in an Internet Store:
a cross-cultural validation. Journal of Computer-Mediated Communication, 5(2), pp. 44-71




65 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011
                   Table 1. Mobile Communication Technologies Eras
 No.     Generation           Decade                Features
                                                  Simplest communication networks
                                                  Voice service only
                                                  Analog frequency
   1     1st Generation       80-Mid 90s
                                                  Inconsistent
                                                  Loss of signal
                                                  Limited customer base
                                                  Digital frequency
                                                  High quality and secure mobile voice
   2     2nd Generation       Mid 90s-2000s
                                                  Fax and messaging services
                                                  Worldwide roaming service
                                                  Include GPRS & EDGE Services
                                                  Visual & multimedia messaging
                                                  Location based services
   3     2.5 Generation       Early 2000s
                                                  Colored internet browsing
                                                High Speed Circuit Switched Date (28.8
                                               kbps speed)
                                                  Extortionate fees
                                                Will be a stepping-stone towards global
   4     3rd Generation       Early 2000s
                                               mobile convergence
                                                  Bases and IP-Core network infrastructure
                                                Promises high rate data transfer (about 10
                              Expected
         3.5 Generation                        Mbps and higher)
                              around 2010
                                                  Will be the basis for 4th generation
                                                  Voice data integration
                                                  Support for mobile and fixed networking
                                                Enhanced services through the            use of
                              Expected
   5     4th Generation                        simple networks
                              2010-2015
                                                  with intelligent terminal devices
                                                Flexible method of payment for network
                                               connectivity
                                                Ubiquitous access to voice and data services
                                               anywhere in the world
                                                    Accurate positioning information used to
         Mobile Satellite     Launch is not
   6                                           provide
         Networks             mentioned yet
                                                  location sensitive information
                                                Access to IP-based networks including
                                               internet and corporate data networks




66 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

                           Table 2.Some of Trust Frameworks and Models
     Decade                    Features
       Siau and Shen       Trust in mobile commerce can be differentiated into two categories:
           (2003)         trust in mobile technology and trust in mobile vendors.
                           Website characteristics (e.g., navigation and user friendliness, advice,
                          error free)
     Shankar, Urban and    User characteristics (e.g., Internet savvy, past Internet shopping
        Sultan(2002)      behavior, feeling of control)
                           Other characteristics (e.g., online medium, trustworthiness of firm,
                          perceived size of firm)
       Pavlou and Ba         Seller’s reputation Appropriate feedback
          (2000)             mechanisms
                             Content of website
       Nah and Davis
                             Design of website
          (2002)
                             External certifications and references
                             Disposition to trust (faith in humanity, trusting stance)
                           Institution-based trust (situational normality: general, competence,
        McKnight,
                          integrity and benevolence, structural assurance)
        Choudhury
                           Trusting beliefs (competence beliefs, benevolence beliefs, and integrity
        and Kacmar
                          beliefs)
          (2002b)
                           Trusting intentions (willingness to depend, subjective probability of
                          depending)
        McKnight,            Perceived vendor reputation
        Choudhury
                             Perceived site quality
        and Kacmar
          (2002a)            Structural assurance of the web

                             Trustworthiness of Internet merchant (ability, integrity, benevolence)
                           Trustworthiness of Internet shopping medium (technical competence,
                          reliability, medium understanding)
       Lee and Turban
                           Contextual factors (effectiveness           of   third   party   certification,
           (2001)
                          effectiveness of security infrastructure)
                             Individual trust propensity
                             Other factors
                             Calculative-based
                             Institution-based structural assurance
     Gefen, Karahanna
                             Institution-based situational normality
     and Straub (2003)
                             Knowledge-based familiarity
                             Perceived ease of use




67 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                    www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011
                   Table 3. Scale of preference between two attributes




                                   Table 5 .Comparison Matrix M




                          Table 6. Comparative Judgments Matrix of Support

                     A4                   S24    S25     S26      S27    S28   S29
                    S24                  m11     m12     m13      m14    m15   m16
                    S25                  m21     m22     m23      m24    m25   m26
                    S26                  m31     m32     m33      m34    m35   m36
                    S27                  m41     m42     m43      m44    m45   m46
                    S28                  m51     m52     m53      m54    m55   m56
                    S29                  m61     m62     m63      m64    m56   m66




68 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011




                               Figure 1. A primary structure of AHP


                               Trust in mobile commerce



     A1                      A2                        A3                      A4
     Customer               Website and            Mobile and Wireless            Support
      Desires             System Quality                Technology

     Reputation           Online Response                Wireless              Tracking Order
                               Time                  connection speed               Status
  Brand reputation
     of product               24-hour                 Accessibility of            Account
                            Availability                 wireless               Maintenance
      Physical
                                                         services
    availability           Page Loading                  Wireless                 Payment
                               Speed                  coverage area             Alternatives
   Privacy policy
                               Visual                 Encryption of           Frequently Asked
      Security
                            Appearance                   wireless                Question
 Recommendation                                       transaction data
                           Website design                                      Study on Low
     Polices to                                      Authentication /          Cost Transport
                            Accuracy of
     Insurance                                              log in
                            information                                           Product
                                                     User interface of         Customization
                           Readability of
                                                          mobile
                               display
                                                          device
                                                     Ease of input and
                          Ease of input and
                                                     navigation device
                             navigation
                                                      Readability of
                                                          display


                     Figure 2 . Proposed Framework for Trust in M- Commerce
69 | P a g e
www.iiste.org
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011




 Figure 3. Prioritization of main factors affecting on trust in M-commerce Using Expert Choice Software




         Figure 4. Prioritization of sub-criteria of customer desires Using Expert Choice software




  Figure 5. Prioritization of sub-criteria of mobile and wireless technology using Expert Choice software




70 | P a g e
www.iiste.org

Más contenido relacionado

La actualidad más candente

Dominate Data With Social Media Mining
Dominate Data With Social Media MiningDominate Data With Social Media Mining
Dominate Data With Social Media MiningaNumak & Company
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionIOSR Journals
 
Internet Banking in Malaysia
Internet Banking in MalaysiaInternet Banking in Malaysia
Internet Banking in Malaysiayun6098
 
customer perception towards internet banking final report
customer perception towards internet banking final reportcustomer perception towards internet banking final report
customer perception towards internet banking final reportjay prakash tyagi
 
The Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingThe Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingCSCJournals
 
Presentation Banking
Presentation BankingPresentation Banking
Presentation BankingRia Tandon
 
Impact of E-Banking User Behavior to Loyalty
Impact of E-Banking User Behavior to LoyaltyImpact of E-Banking User Behavior to Loyalty
Impact of E-Banking User Behavior to Loyaltyinventionjournals
 
An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...TELKOMNIKA JOURNAL
 
Customer service
Customer serviceCustomer service
Customer serviceBedan Chege
 
Study of online banking in india
Study of online banking in indiaStudy of online banking in india
Study of online banking in indiaRaghu Roy
 
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESE-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESVinit Varma
 

La actualidad más candente (18)

Dominate Data With Social Media Mining
Dominate Data With Social Media MiningDominate Data With Social Media Mining
Dominate Data With Social Media Mining
 
Project Report on e banking
Project Report on e bankingProject Report on e banking
Project Report on e banking
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 
Internet Banking in Malaysia
Internet Banking in MalaysiaInternet Banking in Malaysia
Internet Banking in Malaysia
 
customer perception towards internet banking final report
customer perception towards internet banking final reportcustomer perception towards internet banking final report
customer perception towards internet banking final report
 
The Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingThe Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-Banking
 
Presentation Banking
Presentation BankingPresentation Banking
Presentation Banking
 
E banking
E bankingE banking
E banking
 
E Banking
E BankingE Banking
E Banking
 
Impact of E-Banking User Behavior to Loyalty
Impact of E-Banking User Behavior to LoyaltyImpact of E-Banking User Behavior to Loyalty
Impact of E-Banking User Behavior to Loyalty
 
ROLE OF E- BANKING IN CURRENT SCENARIO
ROLE OF E- BANKING IN CURRENT SCENARIOROLE OF E- BANKING IN CURRENT SCENARIO
ROLE OF E- BANKING IN CURRENT SCENARIO
 
online banking
online bankingonline banking
online banking
 
An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...
 
Customer service
Customer serviceCustomer service
Customer service
 
Study of online banking in india
Study of online banking in indiaStudy of online banking in india
Study of online banking in india
 
Introduction (1) ME ppt
Introduction (1) ME pptIntroduction (1) ME ppt
Introduction (1) ME ppt
 
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESE-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
 

Destacado

8 Trends in Content Marketing
8 Trends in Content Marketing8 Trends in Content Marketing
8 Trends in Content MarketingChuck Frey
 
8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...
8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...
8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...Solid Rock Wealth Management
 
8 Distribueret programming - web services
8 Distribueret programming - web services8 Distribueret programming - web services
8 Distribueret programming - web servicesjeanette89
 
8 vetrina base n1 es1
8 vetrina base n1 es18 vetrina base n1 es1
8 vetrina base n1 es1Cheidy Cdm
 
8 Ways To Get You More Subscribers Fast With Very Little Effort!
8 Ways To Get You More Subscribers Fast With Very Little Effort!8 Ways To Get You More Subscribers Fast With Very Little Effort!
8 Ways To Get You More Subscribers Fast With Very Little Effort!doryharvey
 
8 True Stories about JavaFX - Kansai Edition -
8 True Stories about JavaFX  - Kansai Edition -8 True Stories about JavaFX  - Kansai Edition -
8 True Stories about JavaFX - Kansai Edition -Yuichi Sakuraba
 

Destacado (11)

8x4-red
8x4-red8x4-red
8x4-red
 
8 web design facts that we know
8 web design facts that we know8 web design facts that we know
8 web design facts that we know
 
8unit2pt3
8unit2pt38unit2pt3
8unit2pt3
 
8 Trends in Content Marketing
8 Trends in Content Marketing8 Trends in Content Marketing
8 Trends in Content Marketing
 
8UVCTC
8UVCTC8UVCTC
8UVCTC
 
8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...
8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...
8 Threats To Portfolio Performance | A Series Of Wealth Guide by Solid Rock W...
 
8 Distribueret programming - web services
8 Distribueret programming - web services8 Distribueret programming - web services
8 Distribueret programming - web services
 
8 th nov b
8 th nov b8 th nov b
8 th nov b
 
8 vetrina base n1 es1
8 vetrina base n1 es18 vetrina base n1 es1
8 vetrina base n1 es1
 
8 Ways To Get You More Subscribers Fast With Very Little Effort!
8 Ways To Get You More Subscribers Fast With Very Little Effort!8 Ways To Get You More Subscribers Fast With Very Little Effort!
8 Ways To Get You More Subscribers Fast With Very Little Effort!
 
8 True Stories about JavaFX - Kansai Edition -
8 True Stories about JavaFX  - Kansai Edition -8 True Stories about JavaFX  - Kansai Edition -
8 True Stories about JavaFX - Kansai Edition -
 

Similar a 8. trust final paper1---59-70

MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...IJMIT JOURNAL
 
Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...IAEME Publication
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Effects of mediation of trust on effect of quality service e-commerce, servi...
	Effects of mediation of trust on effect of quality service e-commerce, servi...	Effects of mediation of trust on effect of quality service e-commerce, servi...
Effects of mediation of trust on effect of quality service e-commerce, servi...inventionjournals
 
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for  Mobile PhonesMobile Agents: An Intelligent Multi-Agent System for  Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for Mobile PhonesIOSR Journals
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
Mobile commerce full
Mobile commerce fullMobile commerce full
Mobile commerce fullSonu Rai
 
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGYSYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGYPARAMASIVANCHELLIAH
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applicationstheijes
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
An Exploration of the Factors Affecting User's Satisfaction with Mobile Payments
An Exploration of the Factors Affecting User's Satisfaction with Mobile PaymentsAn Exploration of the Factors Affecting User's Satisfaction with Mobile Payments
An Exploration of the Factors Affecting User's Satisfaction with Mobile PaymentsAIRCC Publishing Corporation
 
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYM...
AN EXPLORATION OF THE FACTORS AFFECTING  USERS’ SATISFACTION WITH MOBILE PAYM...AN EXPLORATION OF THE FACTORS AFFECTING  USERS’ SATISFACTION WITH MOBILE PAYM...
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYM...AIRCC Publishing Corporation
 
The Identification Level of Security, usability and Transparency Effects on T...
The Identification Level of Security, usability and Transparency Effects on T...The Identification Level of Security, usability and Transparency Effects on T...
The Identification Level of Security, usability and Transparency Effects on T...Waqas Tariq
 
Problem and Prospects of E-Commerce
Problem and Prospects of E-CommerceProblem and Prospects of E-Commerce
Problem and Prospects of E-CommerceOsama Yousaf
 
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...CSCJournals
 
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...Waqas Tariq
 
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic CommerceIRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET - Data Privacy,Trust Issues and Solutions in Electronic CommerceIRJET Journal
 

Similar a 8. trust final paper1---59-70 (20)

MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
 
Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Effects of mediation of trust on effect of quality service e-commerce, servi...
	Effects of mediation of trust on effect of quality service e-commerce, servi...	Effects of mediation of trust on effect of quality service e-commerce, servi...
Effects of mediation of trust on effect of quality service e-commerce, servi...
 
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for  Mobile PhonesMobile Agents: An Intelligent Multi-Agent System for  Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Mobile commerce full
Mobile commerce fullMobile commerce full
Mobile commerce full
 
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGYSYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGY
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An Exploration of the Factors Affecting User's Satisfaction with Mobile Payments
An Exploration of the Factors Affecting User's Satisfaction with Mobile PaymentsAn Exploration of the Factors Affecting User's Satisfaction with Mobile Payments
An Exploration of the Factors Affecting User's Satisfaction with Mobile Payments
 
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYM...
AN EXPLORATION OF THE FACTORS AFFECTING  USERS’ SATISFACTION WITH MOBILE PAYM...AN EXPLORATION OF THE FACTORS AFFECTING  USERS’ SATISFACTION WITH MOBILE PAYM...
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYM...
 
Blockchain Factors for Consumer Acceptance
Blockchain Factors for Consumer AcceptanceBlockchain Factors for Consumer Acceptance
Blockchain Factors for Consumer Acceptance
 
The Identification Level of Security, usability and Transparency Effects on T...
The Identification Level of Security, usability and Transparency Effects on T...The Identification Level of Security, usability and Transparency Effects on T...
The Identification Level of Security, usability and Transparency Effects on T...
 
Problem and Prospects of E-Commerce
Problem and Prospects of E-CommerceProblem and Prospects of E-Commerce
Problem and Prospects of E-Commerce
 
Mobile Payment A Review.pdf
Mobile Payment A Review.pdfMobile Payment A Review.pdf
Mobile Payment A Review.pdf
 
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
 
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
Investigation into the Impact of the Usability Factor on the Acceptance of Mo...
 
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic CommerceIRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
 

Más de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Más de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 

Último (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 

8. trust final paper1---59-70

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Developing a Framework for Exploring Factors Affecting on Trust in M-Commerce using Analytic Hierarchy Process Mehrbakhsh Nilashi Computer Engineering Department, Islamic Azad University of Roudsar and Amlash,Roudsar PO box 1151-44815, Shohada Street, Roudsar, Iran Tel: +98-911-344-3135 E-mail: nilashidotnet@yahoo.com Othman Ibrahim Faculty of Computer Science and Information Systems, University Teknologi Malaysia,Johor Alumni House, Universiti Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia Tel: +60127477698 E-mail: othmanibrahim@utm.my Mousa Barisami Computer Engineering Department, Islamic Azad University of Roudsar and Amlash,Roudsar PO box 1151-44815, Shohada Street, Roudsar, Iran Tel: +98-911-243-8732 E-mail: barisamy.lahijan@gmail.com Nasim Janahmadi Computer Engineering Department, Islamic Azad University of Roudsar and Amlash,Roudsar PO box 1151-44815, Shohada Street, Roudsar, Iran Tel: +98-911-334-7032 E-mail: janahmadi.nasim@hotmail.com Norafida Ithnin Faculty of Computer Science and Information Systems, University Teknologi Malaysia,Johor Alumni House, Universiti Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia Tel: +6075523291 E-mail: afida@utm.my Received: 2011-10-18 Accepted: 20 11-10-27 Published: 2011-11-04 Abstract Mobile Commerce is a developing and maturing area of electronic Commerce, where customers and vendors can interact via the service providers through a wireless network and mobile devices for information retrieval and transaction processing. In mobile transactions trust is an essential constituent in mobile commerce transactions .This study aims to clarify the factors that affect on trust in mobile commerce, and then evaluate and asses these factors by AHP method. This paper provides a theory based framework that helps to customers to make a right decision while they would like to shop via mobile facilities in mobile browsers. For this purpose the contribution of different scientific approaches is examined. By combining these approaches a framework for the classification is derived for trust model. Keywords: AHP method, Mobile Commerce, Trust, Security. 59 | P a g e www.iiste.org
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 1. Introduction The rapid evolution of mobile technology has intensified the enlargement of the mobile Internet as a foundation for mobile commerce (m-commerce). M-commerce refers to “e-commerce activities via mobile devices, such as mobile phones and Personal Digital Assistants (PDA’s)” [4]. Mobile Commerce is distributing at a remarkable speed. Along with mobile commerce popularity the issues regarding the trust on mobile commerce is raising which it is a major issue for customers and seller of mobile commerce. As general, many users usually do not browse an m-commerce portal, which results in customer distrust, doubt and suspiciousness. Additionally, even experienced users face immune problems. In the following sections we will briefly discuss the rapid development of m-commerce and the trust problems of m-commerce. At this point, two definitions of mobile business would be useful:  Mobile Business or Mobile Commerce is any transaction with a monetary value that is conducted via a mobile telecommunications. [1]  Mobile Business or Mobile Commerce is the purchase and the sale of goods and services using wireless mobile devices, such as mobile phones and personal digital assistants (PDAs) [2]. Mobile Commerce is also known as mobile electronic commerce or wireless E-commerce. It is conclude to be the next gold scurry after electronic commerce. Business companies of different industries are scurrying to stake a claim [3]. However, m-commerce is many things to many people. Some people deduce m-commerce as an extension of e-commerce to mobile devices. Some people believe it is another new channel after the Internet. Generally, m-commerce refers to any business deal with a fiscal value that is managed through a mobile telecommunications network. According to this definition, m-commerce represents a subset of all e- commerce, including both B2C and B2B. M- Commerce uses the internet for purchasing goods and services as well as sending and receiving messages using hand- held wireless devices. Wireless web applications will enable users with Internet enabled cell- phones. Mobile phones are stabilized to significantly influence the way people shop. Looking ahead to 2014, Gartner appraises that three billion adults around the world will be equipped to conduct transactions via mobile or Internet technology. And mobile phones will overtake PCs as the most common web access device worldwide by 20131.As consumers become increasingly connected – to each other and to brands - it is critical that retailers develop a seamless cross-platform communication strategy and shopping experience. They should leverage the mobile strengths of convenience and portability to build brand loyalty and ultimately, drive sales [17]. During the last decades mobile networks and devices have been facing many developments. These progress and maturities facilitate e-commerce conducted from a wired network to a wireless network [19, 20] with the increasing developments in the wireless and mobile networks technologies more and more applications are offered to the customers. Table 1 shows Mobile Communication Technologies Eras. According to Nicholson, Compeau and Senthi [5], trust is a crucial concept in multiple system areas. According to Morgan and Hunt, [6] and O’Malley and Tynan [5], trust is defined as a certainty between the parties that the other party is trustworthy and that the parties will act with a level of trustfulness when dealing with each other. Heffernan [7] summarized that within the realm of relationship marketing; trust has been identified as an significant variable for the success of relationships in the supplier literature [8], the channel literature [9], end consumer relationships literature [10] and lateral relationships literature [11]. In the works of McKnight and Chervany [12], it is stated that trust opinions must exist from the consumers’ side in order for a transaction to transpire thereafter. Based on the opinions of McKnight and Chervany, [12] and Poong, Eze and Talha [13], trust is when “one believes that the other party has one or more characteristics beneficial to oneself” while trusting intention means “one is willing to depend on, or intends to depend on, the other party even though one cannot control that party". However, one of the most intimidates challenges to guarantee wide distribution of mobile commerce concerns trust in mobile commerce. Lack of consumer trust is the most significant long-term barrier for e-commerce [21], as well as for mobile commerce. Although mobile devices are more serviceable for “anytime shopping”, it has some 60 | P a g e www.iiste.org
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 exceptional features and characteristics that prevent the development of consumer trust. Mobile commerce must overcome the problem of user distrust to become a viable means of performing business. An in-depth understanding of the factors that constitute and can bring about consumer trust in mobile commerce is necessary. Indeed trust is significant challenge in the mobile commerce environment. Customers are concerned and involved about the level of security when providing sensitive information online [14]. Also, they expect that personal information will be secured from external access; there are two alterative security and privacy. There are potential advantages in storing data, including personal and financial information, on mobile devices for use in mobile commerce applications [15]. Trust plays a critical role in commercial relationships [22].Trust has been studied in various disciplines ranging from social psychology to decision making. Recently, trust has been studied widely in the e-commerce context [23].Table 1 provides some of frameworks and models regarding trust in e-commerce and m-commerce. In this study, we endeavor to highlight the potential factors that can improve the trust on mobile commerce services based on experts' viewpoints. 2. The rationale of AHP Thomas L.Saaty in the 1970s developed analytic hierarchy process (AHP) method depending on mathematics and psychology, it is a decision making technique of fragmenting the elements related to the decision into goal, criteria and alternatives, and then making both qualitative and quantitative analysis. AHP is also a widely used technique to help decision-makers choose the best suited one among various alternatives [16].Figure.1 shows a primary of AHP structure. There are mainly four steps that AHP does for working on models:  Define the decision object.  Group the factors which influence the decision, and build a multi-level structure: the top level is the goal of this decision, the mediatory levels are criteria and sub-criteria of comparing distinct alternatives, and the lowest level is alternatives;  Make comparisons between each criterion in an upper level and the same criterion in its below level in terms of relative importance, that is, make a set of pair wise comparison matrix. In addition, in order to make a contrast that how much a criterion is more important than another one; a scale of numbers is settled .Table 3 shows the essential scale of absolute numbers.  Examining the matrix consistency through calculation, adjust it if necessary so that to obtain an acceptable consistency; In line with the premise of the consistency test, calculate the eigenvector corresponding to the maximum eigenvalue of the pair wise comparison matrix, define the weight between each criterion and that in its upper level; figure out the overall ranking weight between each criterion and the goal, and finally make the decision. The consistency test process is:  Calculate CI which stands for the consistency index λmax is the maximum eigenvalue of the pair wise comparison matrix, n is the size of matrix;  Find the corresponding RI which stands for the random index from the existing average consistencies of random matrices; 61 | P a g e www.iiste.org
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Table 4. The average consistencies of random matrices (The Random Index-RI-Values)  Calculate CR which stands for the consistency ratio. CI CR  RI If CR< 0.10, the consistency of matrix is tolerant, otherwise the matrix should be modified. AHP processes provides a set of methodical analysis method and provides scientific management and decision with a persuasive basis; Furthermore, AHP method is a simple approximation to help make decisions concerning rather complicated and obscure problems, since it could aggregate various opinions from many experts and even those in different groups[18]; Particularly it is suitable for those problems which are not easy to make absolute quantitative analysis, since AHP combines quantitative and qualitative elements together; Furthermore, all the stakeholders’ feelings and opinions could be converted into a numerical scale, especially for laymen’s feeling, this method plays a vital role in taking unstructured feelings into consideration[16];And checking the consistency ratio is extreme and critical when it comes to make assessments and decisions, AHP provides feasibility and flexibility to modify the judgment if it turns out to be incompatible. 3. Research Objectives The primary objective of this research is to develop a valid framework for the comparison trust factors on mobile commerce. The framework was based primarily on subjective trust factors assessments using questionnaires. 4. Overall Theoretical Framework For presenting a research framework of trust on mobile commerce for users a conceptual framework was created that employs the factors obtained of prior researches. Figure 2 presents a diagrammatic representation of our proposed framework along with the grouped factors. 5. Evaluation of trust factors through AHP An online questionnaire was constructed using the method of pairwise comparison in which respondents constantly had to choose between three statements in order to get a priority list. In this study ten different experts for Judging were selected. The questionnaire was sent to a random sample of the mobile commerce service providers, academic experts and professional executives of about 100 contacts and 80 respondents completed the questionnaire, a response rate of 80%. The most of respondents aged between 35-50 years old, while 82.1% of the respondents were male. The respondents of the study also indicated that they were employed in many different businesses. 69.7% of the respondents had a job related to the specialist, technical, and related occupations, and about 20.9% had a job related to executive and managerial occupations, as well as administrative support occupations. 62 | P a g e www.iiste.org
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 5.1. Pair-wise comparison By comparing the trust factors in each groups, affecting weight of all factors were determined. Quantitative qualitative judgments, obtain the scale ratio of every factors, namely Comparison Matrix. Generally, comparison matrix is obtained through filling in a questionnaire form by 80 numbers of experts and managers in the field and results processing. The comparison Matrix form is shown in table 5. mij is a numerical representation of relative importance that factor Mi to Mj that at the same layer for one element at the upper layer. When mij> 1, factor i is more important than factor j to the expressed goal. The number size means degree of relative importance. While mji = (1/mij) <1, factor j is less important than factor i , the number size means relative less important. The form of Comparative judgment matrix of support is shown in Table 6. Similarly A1, A2, A3 can be of similar structure. 5.2. Reorganization of main criteria affecting on trust in mobile commerce After forming the model in Expert Choice Software and entering the matrix of pair wise comparison, weight of dimensions, criteria and sub-criteria was calculated as shown below. Figure 3 shows prioritization main factors affecting on trust in mobile commerce with Expert Choice Software. As shown in Figure 3, priorities of main factors are 0.396, 0.264, 0.194 and 0.146 respectively .Inconsistency rate of the pairwise comparison is 0.03 which is acceptable; because it is lower than 0.10. 5.3. Calculation of relative weight of criteria regarding each of the main factors In this research, referring to the literature review and expert views, 4 main factors and 29 sub-criteria was recognized. For prioritization of sub-criteria expert choice was used for all Pairwise Comparison matrixes. Figure 4 shows Relative Weight of all sub-criteria of customer desires factor. According to the results of the software, security criterion is of the most importance, weighted 0.285 and so it is in the top priority. Privacy policy and reputatione are in the second and third priority weighted 0.180 and 0.176. Inconsistency rate of pairwise comparison is equal to 0.03 which is acceptable; because it is lower than 0.10. Figure 5 show Relative Weight of all sub-criteria of mobile and wireless technology factor. As shown in Figure 5, wireless connection speed of criteria is of the most importance, weighted 0.176 and so it is in the top priority. Accessibility of wireless and encryption of wireless transaction data criteria are in the second priority (weighted 0.161),third(weighted 0.152) and wireless coverage area are in the fourth priority (weighted 0.136). Inconsistency rate of pairwise comparison is 0.04 and since it is lower than 0.10 these comparisons is acceptable. 6. Conclusion In this study a framework for trust in mobile commerce was developed and AHP method was applied to identify factors influencing trust in mobile commerce although some of the trust factors identified in this study have been presented in the e-commerce literature, our framework identifies new antecedents that are unique to trust in mobile commerce. Results of the survey show that among factors affecting trust in mobile commerce, customer desires is the most important factor and it is considered as the significant factor for trust a customers to mobile commerce. In summary, we believe that M-Commerce has enormous potential. However, to achieve this potential, the trust issue needs to be more fully comprehended and directly addressed by vendors and providers of M-commerce technologies and services. The framework of trust in mobile commerce developed in this research is an important step in this direction and future research should make several extensions of the current study. 63 | P a g e www.iiste.org
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 References [1] Muller-Veerse, F., “Mobile Commerce Report ”, Durlacher, 1999. [2] Http://www.whatis.com. [3] Stafford, T., Gillenson, M. (2003) “MOBILE COMMERCE: What It Is and What It Could Be,” Communications of the ACM, December, Vol. 46 Issue 12, pp. 33-34. [4] Mennecke, B., and Strader, T. (eds.). Mobile Commerce: Technology, Theory and Applications. Hershey, PA: Idea-Group Publishing, 2002. [5] L. O’Malley and C. Tynan, “A reappraisal of the relationship marketing construct of commitment and trust” in New and Evolving Paradigms: The emerging future of marketing, Three American marketing association special conferences, T. Meenaghan, Eds. 1997, pp. 486 – 503. [6] R.M. Morgan, and S.D. Hunt, “The commitment-trust theory of relationship marketing”, Journal of Marketing, vol. 58, 1994, pp. 20 –38. [7] T. Heffernan, “Trust formation in cross-cultural business-to-business relationships”, Qualitative market research: An international Journal, vol. 7, 2004, pp. 114 – 125. [8] S. Ganesan, “Determinants of long-term orientation in buyer-seller relationships”, Journal of arketing, vol. 58, 1994, pp. 1 – 19. [9] B.A. Weitz and S.D. Jap, “Relationship marketing and distribution channels”, Journal of the Academy of Marketing Science, vol. 23, 1995, pp. 305 – 320. [10] L.L. Berry and A. Parasuraman, Marketing services: Competing through quality, New York, NY: Free Press, 1991. [11] F.E. Webster, “The changing role of marketing in the corporation”, Journal fo Marketing, vol. 56, 1992, pp. 1 – 17. [12] D.H. McKnight and N.L. Chervany, “What trust means in e-commerce customer relationships: An interdiciplinary conceptual typology”, International Journal of Electronic Commerce, vol.6, 2001-2002, pp.3 – 59. [13] Y.S. Poong, U.C. Eze, M.Talha, “B2C e-commerce in Malaysia:Perceived characteristics of innovating and trust perspective”,International Journal of Electronic Commerce, vol. 7, 2009, pp. 392 – 427. [14] Warrington, T. B., Abgrab, N. J., & Caldwell, H. M. (2000),"Building trust to develop competitive advantage in e-business relationships." Competitiveness Review, 10(2), 160-168. [15] Andreou, A. S., Leonidou, C., Chrysostomou, C., Pitsillides, A., Samaras, G.,Schizas, C. N., & Mavromous, S. M. (2005). Key issues for the design and development of mobile commerce services and applications. International Journal of Mobile Communications, 3(3), 303-323. [16] Ramanathan, R., 2001.A note on the use of the analytic hierarchy process for environmental impact assessment. Journal of Environmental Management, 63(1), p.27-35. [17] Media Post News, Online Media Daily. Gartner: Mobile to Outpace Desktop Web by 2013. January 13, 2010 [18] Raman than, R., 2003. An Introduction to Data Envelopment Analysis: A Tool for Performance Measurement. [E-book]. New Delhi: Sage Publications India Pvt Ltd. [19] Gunsaekaran, A. and Ngai, E. W. T. (2003),’Special issue on mobile commerce:Strategies, technologies and applications’, Decision Support Systems, Vol. 35, PP.187–188. [20] Gunasekaran, A. and Ngai, E. W. T. (2007),’Managing digital enterprise’, IJBIS, Vol. 2,No.3, PP. 266-275. [21] Keen, P.G.W. (1997). Are you ready for “Trust” Economy, Computerworld, 31(16), p. 80. [22] Nah, F. and S. Davis (2002). HCI Research Issues in Electronic Commerce. Journal of Electronic Commerce Research, 3(3), pp. 98-113 64 | P a g e www.iiste.org
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 [23] S.L., N. Tractinsky, L. Saarinen, and M. Vitale (1999). Consumer Trust in an Internet Store: a cross-cultural validation. Journal of Computer-Mediated Communication, 5(2), pp. 44-71 65 | P a g e www.iiste.org
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Table 1. Mobile Communication Technologies Eras No. Generation Decade Features  Simplest communication networks  Voice service only  Analog frequency 1 1st Generation 80-Mid 90s  Inconsistent  Loss of signal  Limited customer base  Digital frequency  High quality and secure mobile voice 2 2nd Generation Mid 90s-2000s  Fax and messaging services  Worldwide roaming service  Include GPRS & EDGE Services  Visual & multimedia messaging  Location based services 3 2.5 Generation Early 2000s  Colored internet browsing  High Speed Circuit Switched Date (28.8 kbps speed)  Extortionate fees  Will be a stepping-stone towards global 4 3rd Generation Early 2000s mobile convergence  Bases and IP-Core network infrastructure  Promises high rate data transfer (about 10 Expected 3.5 Generation Mbps and higher) around 2010  Will be the basis for 4th generation  Voice data integration  Support for mobile and fixed networking  Enhanced services through the use of Expected 5 4th Generation simple networks 2010-2015  with intelligent terminal devices  Flexible method of payment for network connectivity  Ubiquitous access to voice and data services anywhere in the world  Accurate positioning information used to Mobile Satellite Launch is not 6 provide Networks mentioned yet  location sensitive information  Access to IP-based networks including internet and corporate data networks 66 | P a g e www.iiste.org
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Table 2.Some of Trust Frameworks and Models Decade Features Siau and Shen  Trust in mobile commerce can be differentiated into two categories: (2003) trust in mobile technology and trust in mobile vendors.  Website characteristics (e.g., navigation and user friendliness, advice, error free) Shankar, Urban and  User characteristics (e.g., Internet savvy, past Internet shopping Sultan(2002) behavior, feeling of control)  Other characteristics (e.g., online medium, trustworthiness of firm, perceived size of firm) Pavlou and Ba  Seller’s reputation Appropriate feedback (2000)  mechanisms  Content of website Nah and Davis  Design of website (2002)  External certifications and references  Disposition to trust (faith in humanity, trusting stance)  Institution-based trust (situational normality: general, competence, McKnight, integrity and benevolence, structural assurance) Choudhury  Trusting beliefs (competence beliefs, benevolence beliefs, and integrity and Kacmar beliefs) (2002b)  Trusting intentions (willingness to depend, subjective probability of depending) McKnight,  Perceived vendor reputation Choudhury  Perceived site quality and Kacmar (2002a)  Structural assurance of the web  Trustworthiness of Internet merchant (ability, integrity, benevolence)  Trustworthiness of Internet shopping medium (technical competence, reliability, medium understanding) Lee and Turban  Contextual factors (effectiveness of third party certification, (2001) effectiveness of security infrastructure)  Individual trust propensity  Other factors  Calculative-based  Institution-based structural assurance Gefen, Karahanna  Institution-based situational normality and Straub (2003)  Knowledge-based familiarity  Perceived ease of use 67 | P a g e www.iiste.org
  • 10. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Table 3. Scale of preference between two attributes Table 5 .Comparison Matrix M Table 6. Comparative Judgments Matrix of Support A4 S24 S25 S26 S27 S28 S29 S24 m11 m12 m13 m14 m15 m16 S25 m21 m22 m23 m24 m25 m26 S26 m31 m32 m33 m34 m35 m36 S27 m41 m42 m43 m44 m45 m46 S28 m51 m52 m53 m54 m55 m56 S29 m61 m62 m63 m64 m56 m66 68 | P a g e www.iiste.org
  • 11. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Figure 1. A primary structure of AHP Trust in mobile commerce A1 A2 A3 A4 Customer Website and Mobile and Wireless Support Desires System Quality Technology Reputation Online Response Wireless Tracking Order Time connection speed Status Brand reputation of product 24-hour Accessibility of Account Availability wireless Maintenance Physical services availability Page Loading Wireless Payment Speed coverage area Alternatives Privacy policy Visual Encryption of Frequently Asked Security Appearance wireless Question Recommendation transaction data Website design Study on Low Polices to Authentication / Cost Transport Accuracy of Insurance log in information Product User interface of Customization Readability of mobile display device Ease of input and Ease of input and navigation device navigation Readability of display Figure 2 . Proposed Framework for Trust in M- Commerce 69 | P a g e www.iiste.org
  • 12. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Figure 3. Prioritization of main factors affecting on trust in M-commerce Using Expert Choice Software Figure 4. Prioritization of sub-criteria of customer desires Using Expert Choice software Figure 5. Prioritization of sub-criteria of mobile and wireless technology using Expert Choice software 70 | P a g e www.iiste.org