30,892 research outputs found

    Accessing Antecedents and Outcomes of RFID Implementation in Health Care

    Get PDF
    This research first conceptualizes, develops, and validates four constructs for studying RFID in health care, including Drivers (Internal and External), Implementation Level (Clinical Focus and Administrative Focus), Barriers (Cost Issues, Lack of Understanding, Technical Issues, and Privacy and Security Concerns), and Benefits (Patient Care, Productivity, Security and Safety, Asset Management, and Communication). Data for the study were collected from 88 health care organizations and the measurement scales were validated using structural equation modeling. Second, a framework is developed to discuss the causal relationships among the above mentioned constructs. It is found that Internal Drivers are positively related to Implementation Level, which in turn is positively related to Benefits and Performance. In addition, Barriers are found to be positively related to Implementation Level, which is in contrast to the originally proposed negative relationship. The research also compares perception differences regarding RFID implementation among the non-implementers, future implementers, and current implementers of RFID. It is found that both future implementers and current implementers consider RFID barriers to be lower and benefits to be higher compared to the non-implementers. This paper ends with our research implications, limitations and future research

    The Importance of Transparency and Willingness to Share Personal Information

    Get PDF
    This study investigates the extent to which individuals are willing to share their sensitive personal information with companies. The study examines whether skepticism can influence willingness to share information. Additionally, it seeks to determine whether transparency can moderate the relationship between skepticism and willingness to share and whether 1) companies perceived motives, 2) individual’s prior privacy violations, 3) individuals’ propensity to take risks, and 4) individuals self-efficacy act as antecedents of skepticism. Partial Least Squares (PLS) regression is used to examine the relationships between all the factors. The findings indicate that skepticism does have a negative impact on willingness to share personal information and that transparency can reduce skepticis

    Critical review of the e-loyalty literature: a purchase-centred framework

    Get PDF
    Over the last few years, the concept of online loyalty has been examined extensively in the literature, and it remains a topic of constant inquiry for both academics and marketing managers. The tremendous development of the Internet for both marketing and e-commerce settings, in conjunction with the growing desire of consumers to purchase online, has promoted two main outcomes: (a) increasing numbers of Business-to-Customer companies running businesses online and (b) the development of a variety of different e-loyalty research models. However, current research lacks a systematic review of the literature that provides a general conceptual framework on e-loyalty, which would help managers to understand their customers better, to take advantage of industry-related factors, and to improve their service quality. The present study is an attempt to critically synthesize results from multiple empirical studies on e-loyalty. Our findings illustrate that 62 instruments for measuring e-loyalty are currently in use, influenced predominantly by Zeithaml et al. (J Marketing. 1996;60(2):31-46) and Oliver (1997; Satisfaction: a behavioral perspective on the consumer. New York: McGraw Hill). Additionally, we propose a new general conceptual framework, which leads to antecedents dividing e-loyalty on the basis of the action of purchase into pre-purchase, during-purchase and after-purchase factors. To conclude, a number of managerial implementations are suggested in order to help marketing managers increase their customers’ e-loyalty by making crucial changes in each purchase stage

    Familiarity with Big Data, Privacy Concerns, and Self-disclosure Accuracy in Social Networking Websites: An APCO Model

    Get PDF
    Social networking websites have not only become the most prevalent communication tools in today’s digital age but also one of the top big data sources. Big data advocates promote the promising benefits of big data applications to both users and practitioners. However, public polls show evidence of heightened privacy concerns among Internet and social media users. We review the privacy literature based on protection motivation theory and the theory of planned behavior to develop an APCO model that incorporates novel factors that reflect users’ familiarity with big data. Our results, which we obtained from using a cross-sectional survey design and structural equation modeling (SEM) techniques, support most of our proposed hypotheses. Specifically, we found that that awareness of big data had a negative impact on and awareness of big data implications had a positive impact on privacy concerns. In turn, privacy concerns impacted self-disclosure concerns positively and self-disclosure accuracy negatively. We also considered other antecedents of privacy concerns and tested other alternative models to examine the mediating role of privacy concerns, to control for demographic variables, and to investigate different roles of the trust construct. Finally, we discuss the results of our findings and the theoretical and practical implications

    Digital Health Innovation: Exploring Adoption of COVID-19 Digital Contact Tracing Apps

    Get PDF
    With the outbreak of COVID-19, contact tracing is becoming a used intervention to control the spread of this highly infectious disease. This article explores an individual's intention to adopt COVID-19 digital contact tracing (DCT) apps. A conceptual framework developed for this article combines the procedural fairness theory, dual calculus theory, protection motivation theory, theory of planned behavior, and Hofstede's cultural dimension theory. The study adopts a quantitative approach collecting data from 714 respondents using a random sampling technique. The proposed model is tested using structural equation modeling. Empirical results found that the perceived effectiveness of privacy policy negatively influenced privacy concerns, whereas perceived vulnerability had a positive influence. Expected personal and community-related outcomes of sharing information positively influenced attitudes toward DCT apps, while privacy concerns had a negative effect. The intention to adopt DCT apps were positively influenced by attitude, subjective norms, and privacy self-efficacy. This article is the first to empirically test the adoption of DCT apps of the COVID-19 pandemic and contributes both theoretically and practically toward understanding factors influencing its widespread adoption

    Antecedents of acceptance of social networking sites in retail franchise and restaurant businesses

    Get PDF
    The paper examines the antecedents of acceptance of social networking sites in retail franchise and restaurant businesses. The success of retail franchise and restaurant business oper-ators via social networking sites depends not only on organiza-tional benefits but also on their behavioral intentions of using it. Three hundred and twenty four samples collected from South Korean retail franchise and restaurant employees are analyzed using factor analysis, structural equation model techniques and one-way analysis of variance. The results of the study identify the three constructs of organizational benefits, perceived tangible assets and perceived intangible assets as for important ante-cedents to accept social networking sites for their business use. Moreover, higher position employees tend to have more favor-able perception of tangible assets and acceptance of social net-working sites for their business use

    The effects of loyalty programs on customer satisfaction, trust, and loyalty toward high- and low-end fashion retailers

    Get PDF
    This study examines the differential effects of the benefits customers receive from a loyalty program (LP) on satisfaction with the LP, trust in the LP, and store loyalty for high- and low-end fashion retailers. With survey data from U.S. LP subscribers, the study tests the relationships using multiple regressions and analysis of covariance. The results show that symbolic benefits are more important for high-end fashion store consumers' satisfaction with the LP; conversely, utilitarian benefits increase consumers' satisfaction with the LP more in low-end fashion retailing, whereas hedonic benefits increase consumers' satisfaction with the LP in both types of retailers. All benefits in both types of retailers affect trust in the LP. Finally, satisfaction with and trust in the LP are important drivers of loyalty to the retailer. The findings have important implications on how managers of high- and low-end fashion retailing can effectively design their LP rewards to maximize loyalty

    Privacy Concerns regarding Wearable IoT Devices: How it is Influenced by GDPR?

    Get PDF
    Internet of Things (IoT) devices have implications for health and fitness. Fitness wearables can promote healthy behavior and improve an individual’s overall health and quality of life. Even though fitness wearables have various benefits, privacy concerns regarding the data collected remain as a major barrier to adoption of fitness wearables. Intrinsic factors like disposition to value privacy and extrinsic factors like privacy policies and General Data Protection Regulation (GDPR) can influence users’ privacy concerns. This research uses experimental design to understand how these factors influence privacy concerns. The results suggest that GDPR reduces the average privacy concerns of users. The study also shows that higher perception of effectiveness of privacy policy reduces the perception of privacy risks and increases the perception of privacy control. This study illustrates the effect of users’ perceptions on factors like privacy policy, privacy control and GDPR on mitigating privacy concerns
    corecore