36 research outputs found

    Examining Police Officer Resistance To Change and Body-Worn Cameras

    Get PDF
    Police departments are adopting the body-worn camera as an important tool in the restoration of trust and accountability for police officers. Although body-worn cameras can be beneficial to their work, police officers might resist the use of cameras. The purpose of the current study was to examine whether experiences with technology or the perceived usefulness of body-worn cameras predict resistance to the cameras in order to determine where resistance to body-worn cameras possibly exists. The current study employed a quantitative design that examined 48 (n = 48) police officers’ responses about resistance to body-worn cameras in relationship to the following variables: experiences with technology, perceived usefulness (PU), and perceived ease of use of body-worn cameras (PEOU). A survey was delivered to participant police officers through a countywide email system. Data analysis included one-sample t-tests, correlational analyses, and multiple regressions. A statistically significant difference was found between officers’ levels of resistance to change and body-worn cameras in comparison to the scale midpoint. In relationship to resistance to body-worn cameras, statistically significant correlations existed between the variables of experiences with technology, PU, and PEOU. Additionally, the regression analyses showed experiences with technology, PU, and PEOU were statistically significant predictors of resistance to body-worn cameras. Police departments that invest in body-worn cameras should be aware that officers might resist cameras should deficiencies with technology experience, perceived usefulness, and perceived ease of use of the body-worn cameras exist

    Examining Police Officer Resistance To Change and Body-Worn Cameras

    Get PDF
    Police departments are adopting the body-worn camera as an important tool in the restoration of trust and accountability for police officers. Although body-worn cameras can be beneficial to their work, police officers might resist the use of cameras. The purpose of the current study was to examine whether experiences with technology or the perceived usefulness of body-worn cameras predict resistance to the cameras in order to determine where resistance to body-worn cameras possibly exists. The current study employed a quantitative design that examined 48 (n = 48) police officers’ responses about resistance to body-worn cameras in relationship to the following variables: experiences with technology, perceived usefulness (PU), and perceived ease of use of body-worn cameras (PEOU). A survey was delivered to participant police officers through a countywide email system. Data analysis included one-sample t-tests, correlational analyses, and multiple regressions. A statistically significant difference was found between officers’ levels of resistance to change and body-worn cameras in comparison to the scale midpoint. In relationship to resistance to body-worn cameras, statistically significant correlations existed between the variables of experiences with technology, PU, and PEOU. Additionally, the regression analyses showed experiences with technology, PU, and PEOU were statistically significant predictors of resistance to body-worn cameras. Police departments that invest in body-worn cameras should be aware that officers might resist cameras should deficiencies with technology experience, perceived usefulness, and perceived ease of use of the body-worn cameras exist

    Towards an Evaluation of Cyber Risks and Identity Information Sharing Practices in e-Learning, Social Networking, and Mobile Texting Apps

    Get PDF
    With the growing dependency for online connectivity, the use of Information and Communication Technologies (ICTs) to share identity information surged substantially. Students are constantly sharing where they go, how they feel, and even pieces of identity information such as their age, address, personal pictures, etc. Pieces of identity information are bits of information that, if combined, provide a larger picture of the identity of an individual. Such identity information may enable criminals to obtain financial benefits under the victims’ identity, or be utilized for stalking, bulling, or other harassments. The use of different ICTs such as mobile texting, social networking, and e -learning among students, while most of them are not aware that their digital communication is not encrypted, exposes them to increased risk of identity theft. Given that students spend majority of their connectivity time with school related contacts, the focus of this exploratory study is to measure if there are significant differences on the frequency of identity information pieces they share, who do they willing to allow access to their personal profiles, and what is the level of identity protection risks they report compared between three ICTs (e-learning systems, social networking sites, & mobile texting apps). Preliminary results and discussions are provided

    Three Types of IT Use

    Get PDF
    Existing research identifies multiple types of uses, ranging from initial adoption of technology to uses that have been described by terms like adaptive system use, enhanced use, etc. Additionally, literature shows that researchers have used different instruments when using similar terms. Together, the lack of understanding of different types of use and the lack of coherent measures for use leads to construct validity problems. In this paper we aim to distinguish between the different types of uses, followed by isolating the key measurement items for each use type. The paper uses a modified Q-sort method to classify the different use measurement items. Findings indicate that there are three types of uses and distinct measurements. This study lays important groundwork for future research into the three types of use and is a first step in creating scales for these use constructs

    Is checkout- free store a flash in the pan? Factors influencing Hong Kong people’s adoption intention of checkout-free stores

    Get PDF
    Last year, two checkout-free flash stores made their debut in Hong Kong. After the initial try, several companies followed up, and opened their own checkout-free stores or exhibitions, e.g., Sinopec’s easy joy, Watsons, and AlipayHK Futureland. The trial of these stores has aroused wide attentions and discussions on the possibility of new retailing format and experience in Hong Kong. From the consumers’ perspective, this study aims to understand whether the concept of checkout-free store is welcomed by the local people, and what are the factors influencing Hongkongers’ adoption intention toward checkout-free technologies and stores. To realize the above research objectives, we used theory of technology acceptance, UTAUT2, and their extension to build a theoretical model, and empirically tested it by focus groups. The qualitative study shows some initial results to address the research questions

    Acceptance and Use of the \u27Digital Measures\u27 System in an Organized Anarchy

    Get PDF
    The literature reveals that researchers have examined the adoption of different types of systems, both voluntary and mandatory, by different groups of individuals affiliated with different types of organizations. Adoption studies may exhibit the following characteristics: a) the research participants are drawn from multiple levels of the organization’s hierarchy, and b) the research participants attach similar interpretations regarding the adoption of the information system. It is not inconceivable that individuals within the same group attach different interpretations of voluntariness to the same information system. This may be applicable in Colleges and Universities in which faculty, in particular, comprise an “organized anarchy”. Taking the case of “Activity Insight”, a commercially-available software product (hereafter referred to as Digital Measures) meant for employees in colleges and universities to report their activities. This study provides a scenario for research on whether interpretations regarding voluntariness may result in findings that stray from the norm

    Consumer Learning to Promote Behavioral Intention Toward IT Innovation: Is Word of Mouth Needed?

    Get PDF
    Adoption of innovation is an on-going process involving persuasive communication and learning. However, the idea of marketing of IT innovation from consumer learning perspective has long been neglected. Based on consumer learning theory, we develop a model suggesting that word of mouth (WOM) stimulates individual consumers’ learning and in turn affect their intention to adopt mobile payment. Data about users and potential users of mobile payment was collected from China through a questionnaire survey. The results indicate that consumers first sense the WOM and obtain relevant information from the surrounding environment. Their information searching will affect their perceived knowledge and self-efficacy about mobile payment. Then attitude about mobile payment is formed, which in turn, affects their behavioral intention toward mobile payment. Differences of model path coefficients between users and potential users of mobile payment are explored, and implications and limitations are also discussed

    Who are the Operational Users of Enterprise Systems: Does One Size Fit All?

    Get PDF
    Suicide prevention is a major concern for railway operators internationally. This paper reports research in progress examining how information systems can facilitate passenger/organisational co-created value in terms of reducing the incidence of railway suicide. Thus, the objectives of this research are to: (1) explore and evaluate the effectiveness of using information systems interventions in a passenger railway servicescape, and (2) explore the relationship between these servicescape interventions and customer experience, and assess their impact on railway suicide prevention from a value co-creation perspective. While the focus of this research is preventing railway suicide, the information systems developed would also lend themselves to a wide range of additional railway security issues such as the detection and prevention of crime, terrorism, and potential misadventure incidents

    UNDERSTANDING POST-ADOPTION OF ONLINE SHOPPING CONTINUANCE USAGE THROUGH THE SOCIAL EXCHANGE THEORY

    Get PDF
    Electronic commerce researchers have retention of Consumers post-adoption continuance behavior attendees induce deep trust and service quality of online shopping behavior, thereby contributing to higher revenue and marketing strategy based on social exchange theory. This study provides additional information about the path from the service quality and trust to continuous usage. Also, this study investigates the different tendencies to continuance behavior by habit as a moderating effect within the conceptual model. According to the structural invariance test across moderating effect, it showed that: First, most of main effect paths showed significant positive signs only habit as moderator on trust in service provider is negative support. Second, the habit was supported as a moderator except for the trust in shopping-site to online shopping continuance interaction path. Unexpectedly, the positive moderating effect of habit tendency towards the path of trust in shopping-site to online shopping continuance in not significant. The theoretical and practical implications are discussed

    THE ANTECEDENTS OF AN INDIVIDUAL\u27S COMMITMENTS TOWARD CONTINUOUSLY USING SOCIAL NETWORK SITE

    Get PDF
    The Social network sites (SNS) has been rapid diffusion around the world. With the increasing importance of SNS, continuance intention also becomes a popular issue in the SNS context. SNS providers have to maintain better relationships with users and make individuals continue to use their sites. Based on this phenomenon, the objective of this study is to gain a better understanding of the continuance intention of SNS through examining the effects of commitments. Specifically, followed Meyer and Allen’s three-component model of commitment, we develop a theoretical model to understand the factors that influence normative, affective and continued commitment and investigate the effects of commitments on continuance intention in the SNS context. Through a survey-based empirical investigation, we anticipate the results to enhance our existing knowledge on continuance intention in the SNS context
    corecore