21 research outputs found

    Anteseden Sikap Konsumen terhadap Perilaku Pembelian Online

    Get PDF
    The purpose of this research is to explore the things that influence consumer attitudes in shopping online, as well as the influence of these attitudes on their behavior in making online purchases. This research was conducted through the perspective of the technology acceptance model (TAM), which is based on consumer value theory. This study uses SEM (structural equation modeling) analysis on primary data based on the results of a questionnaire that has been distributed to 289 respondents. The results show that there is a significant effect of perceived ease of use on attitude, and attitude has a significant effect on online buying behavior. However, perceived usefulness, perceived enjoyment, information availability, and perceived price separately proved to have no effect on attitude. The managerial implications of the findings identify the companies that issue e-commerce must be able to guarantee the convenience available in these applications, so that customer attitudes towards applications will be more positive

    How to Increase Smart Home Security and Privacy Risk Perception

    Get PDF
    With continuous technological advancements, our homes become smarter by interconnecting more and more devices. Smart homes provide many advantages. However, they also introduce new privacy and security risks. Recent studies show that only a few people are aware of abstract risks, and most people are not aware of specific negative consequences. We developed a privacy and security awareness intervention for people who want to inform themselves about risks in the smart home context. Our intervention is based on research literature on risk perception and feedback from both lay users and security and privacy experts. We evaluated our intervention regarding its influence on participants’ perceived threat, privacy attitude, motivation to avoid threats, willingness to pay, and time commitment to configure protective measures. The results of this evaluation show a significant increase for all these aspects. We also compared our intervention to information that users could obtain during an Internet search on the topic. In this comparison, our intervention evokes a significantly higher perceived threat and privacy attitude. It showed no significant difference for the other three scales. We discuss our findings in light of related work

    Informing the Design of Privacy-Empowering Tools for the Connected Home

    Full text link
    Connected devices in the home represent a potentially grave new privacy threat due to their unfettered access to the most personal spaces in people's lives. Prior work has shown that despite concerns about such devices, people often lack sufficient awareness, understanding, or means of taking effective action. To explore the potential for new tools that support such needs directly we developed Aretha, a privacy assistant technology probe that combines a network disaggregator, personal tutor, and firewall, to empower end-users with both the knowledge and mechanisms to control disclosures from their homes. We deployed Aretha in three households over six weeks, with the aim of understanding how this combination of capabilities might enable users to gain awareness of data disclosures by their devices, form educated privacy preferences, and to block unwanted data flows. The probe, with its novel affordances-and its limitations-prompted users to co-adapt, finding new control mechanisms and suggesting new approaches to address the challenge of regaining privacy in the connected home.Comment: 10 pages, 2 figures. To appear in the Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20

    SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization

    Full text link
    Users of Internet of Things (IoT) devices are often unaware of their security risks and cannot sufficiently factor security considerations into their device selection. This puts networks, infrastructure and users at risk. We developed and evaluated SAFER, an IoT device risk assessment framework designed to improve users' ability to assess the security of connected devices. We deployed SAFER in a large multinational organization that permits use of private devices. To evaluate the framework, we conducted a mixed-method study with 20 employees. Our findings suggest that SAFER increases users' awareness of security issues. It provides valuable advice and impacts device selection. Based on our findings, we discuss implications for the design of device risk assessment tools, with particular regard to the relationship between risk communication and user perceptions of device complexity

    Inarticulate devices: Critical encounters with network technology in research through design

    Get PDF
    Research through design (RTD) is commonly conceived as a material and discursive practice of articulating knowledge. This paper contributes to the understanding of RTD as a form of critical inquiry by considering how inarticulacy can also be a productive element of this process. We present two reflective accounts of critically-engaged RTD practices in which our attempts to articulate concerns or questions were met with resistance from technology that was both the subject and medium of our investigation. We argue that encountering inarticulacy is not a failure of RTD but instead points to how material exploration can sensitise us to how network technology resists articulating certain values or concerns. Encountering inarticulacy led us to formulate new problems and new lines of inquiry. We conclude by suggesting that the central role given to ambiguity in RTD prepares us to witness and respond to inarticulacy in our practices, design outcomes and critical understandings

    You, Me, and IoT: How Internet-Connected Consumer Devices Affect Interpersonal Relationships

    Full text link
    Internet-connected consumer devices have rapidly increased in popularity; however, relatively little is known about how these technologies are affecting interpersonal relationships in multi-occupant households. In this study, we conduct 13 semi-structured interviews and survey 508 individuals from a variety of backgrounds to discover and categorize how consumer IoT devices are affecting interpersonal relationships in the United States. We highlight several themes, providing large-scale exploratory data about the pervasiveness of interpersonal costs and benefits of consumer IoT devices. These results also inform follow-up studies and design priorities for future IoT technologies to amplify positive and reduce negative interpersonal effects.Comment: 26 pages, 5 figures, 5 tables. Updated version with additional examples and minor revisions. Original title: "You, Me, and IoT: How Internet-Connected Home Devices Affect Interpersonal Relationships
    corecore