3,164 research outputs found

    Research on the Adoption Intention of Users\u27 Knowledge Payment: the Integrated Model of UGT and TAM

    Get PDF
    Knowledge payment based on social media has become a new business model. The research on adoption intention of users could help the users recognize the influence of knowledge payment. Meanwhile, the research is helpful for the suppliers to standard and develop this business model further. According to the social media nature of knowledge payment, use and gratification theory and technology acceptance model were chosen as the theory basis to build the research model of users\u27 adoption intention on knowledge payment. 315 valid samples were collected from questionnaire. Structural equation model was used as the model analysis tool. It is found that the main motivations and purposes of users\u27 adoption on knowledge payment are the willingness to get cognitive gratification, hedonic gratification, and convenience gratification of the users. Meanwhile, in order to increase the users\u27 adoption intentions, knowledge content represented by perceived usefulness is critical, operation process represented by perceived ease of use is the method, but perceived payment price is not the key factor

    An Examination of the Factors Impacting Student Satisfaction and Continuance Intention to Use Online Payments in Chengdu, China

    Get PDF
    Purpose: This research investigates factors impacting student satisfaction and continuance intention to use online payments in Chengdu, China. Quantitative research method serves as the foundation for the study. Service quality, privacy, confirmation, perceived usefulness, perceived security, satisfaction, and continuance intention are variables according to the Technology Acceptance Model (TAM), Information Systems Success Model (ISSM), and Expectation Confirmation Theory (ECT), which construct the conceptual framework of the research. Research design, data, and methodology: In a preliminary study, the Item Objective Congruence (IOC) Index and the Cronbach alpha statistic were used to assess content validity and internal consistency reliability. Additionally, 500 students from selected universities were analyzed by the application of confirmatory factor analysis (CFA) and structural equation modeling (SEM). Results: The results confirmed that service quality and privacy having the strongest effects on satisfaction. Continuance intention is directly influenced by satisfaction. Conclusions: The service quality of online payment systems must be improved, and user privacy must be better protected to increase students’ satisfaction with online payment and their desire to use it in the future. Managers need to take customer information protection very seriously. Moreover, the relevant agencies will adjust the policy to serve as a foundation

    Redesign and Content Creation for the New Lightsource Website — Internship Report

    Get PDF
    Every year the number of Internet users expands, and consequently, eCommerce has become part of our daily life. As a result, companies have held the digital transformation as an opportunity to gain visibility, credibility and approach targets that, without the magnitude of the online, couldn't be reached. And the United Kingdom is an impressive example of how online shopping has become a buying phenomenon, being named the most advanced eCommerce market in Europe. And to be successful in this highly competitive digital world, a humanised website that gathers valuable and relevant content for the user is imperative. The present report describes the six-month curricular internship performed at Lightsource, a lighting company based in Belfast, Northern Ireland. This project aimed to assist in the development of the new Lightsource website, focusing on the redesign and content creation for the new eCommerce platform. This involved using a combination of human-centred design methods to study the users' requirements, needs and obstacles that needed improvement in this new eCommerce solution. In line with the redesign process, new content was created for the platform to push the Content Marketing and SEO strategies of the website, always supported by the best practices described in the literature. The final result is a clear improvement on the Lightsource digital presence that integrates informed decisions and outputs compiled from exploring the users' needs.Todos os anos o número de utilizadores de Internet atinge consecutivamente novos valores recordes, fazendo, consequentemente, que fenómenos como o eCommerce se tornem hábitos cada vez mais comuns. Como resultado, as empresas têm vindo a agarrar a transformação digital como uma oportunidade para ganhar visibilidade e credibilidade, com a vantagem de alcançar mercados que sem a magnitude do digital seriam inalcançáveis. O Reino Unido é um exemplo prático de como as compras online são um fenómeno em expansão, sendo considerado o mais avançado mercado eCommerce na Europa. E para atingir o sucesso neste mundo digital incrivelmente competitivo, um website focado nas necessidades do utilizador que reúne conteúdo valioso e relevante é imperativo. O presente relatório descreve as atividades realizadas durante o estágio curricular de seis meses realizado na Lightsource, uma empresa do setor da iluminação sediada em Belfast, Irlanda do Norte. O projeto conduzido durante o estágio teve como objetivo a prestação de suporte no desenvolvimento do novo website da Lightsource, com especial foco no redesign e na criação de conteúdo para a nova plataforma de eCommerce da marca. Para isso, envolveu a aplicação de uma combinação de metodologias de design centrado no humano para identificação de requisitos, necessidades e obstáculos que exigiram melhoria nesta nova solução digital. Paralelamente, foi criado novo conteúdo para o website de forma a otimizar as estratégias de Marketing de Conteúdos e SEO, sempre suportado por aquilo que são as boas práticas salientadas pela literatura. O resultado final revela uma melhoria na presença digital da Lightsource que integra decisões informadas e validadas pelas conclusões obtidas no estudo conduzido sobre as necessidades do utilizador

    Katz on a Hot Tin Roof: Saving the Fourth Amendment from Commercial Conditioning by Reviving Voluntariness in Disclosures to Third Parties

    Get PDF
    In a world in which Americans are tracked on the Internet, tracked through their cell phones, tracked through the apps they purchase, and monitored by hundreds of traffic cameras, privacy is quickly becoming nothing more than a quaint vestige of the past. In a previous article discussing the intersection of technology and the Fourth Amendment, I proposed reframing the issue away from conventional commentary. The Missed Opportunity of United States v. Jones: Commercial Erosion of Fourth Amendment Protection in a Post-Google Earth World, 15 PENN. J. CON. L. 331, 333 (2012). That article posits that society has reached the point about which Justice Blackmun cautioned - the point at which privacy “expectations [have] been ‘conditioned’ by influences alien to well-recognized Fourth Amendment freedoms.” Society finds itself at this juncture not because of governmental conditioning, as Justice Blackmun warned, but because of a concept the article defined as “commercial conditioning.” That proposal called for a legislative requirement that an individual opt into such information disclosure before such a disclosure could be made. This article further develops the concept of “commercial conditioning,” and explores not a legislative solution, but possible judicial responses to the growing reality of private commercial entities eroding privacy expectations and thereby expanding governmental power. This article seeks to guide the judiciary in analyzing evidence containing certain private information obtained by the government from these commercial entities. Such evidence should be afforded some of the procedural protections of the Fourth Amendment when the government accesses it - a protection not currently available to this private information. The Fourth Amendment is designed to protect individuals from government intrusion into private aspects of their lives. The Third Party and Assumption of Risk doctrines are designed to preclude individuals who never intended their actions to be private from claiming, after the fact, that they were private. However, as technology has developed, commercial entities have created a world in which the Fourth Amendment cannot protect individuals from government intrusion into their lives. Through their commercial conditioning of society, commercial entities have made it impossible to assert a Fourth Amendment claim in two ways. First they remove information from individuals without their knowledge or voluntary consent. By doing so, these entities preclude individuals from demonstrating subjective expectations of privacy, or expectation that society will find reasonable. Second, when the government later obtains this information, the government hides behind the Third Party Doctrine to justify its possession of the information. In essence the government has successfully circumvented Fourth Amendment protections. The pathway, however, was laid by the commercial entities that facilitate this reality through commercial conditioning. This article explores the implications of commercial conditioning. It further argues that restoration of the protections intended by the Fourth Amendment can be achieved by re-invigorating the voluntary consent aspect to privacy protection found in both the privacy cases as well as the Third Party Doctrine cases. These make clear that information obtained from an individual can come in two forms. The first is that which is voluntarily shared by him. The second is that taken from him. This article argues that courts must recognize that when the government systematically accesses information that was taken from an individual without knowledge or voluntary consent, that individual must be protected

    Katz on a Hot Tin Roof: Saving the Fourth Amendment from Commercial Conditioning by Reviving Voluntariness in Disclosures to Third Parties

    Get PDF
    In a world in which Americans are tracked on the Internet, tracked through their cell phones, tracked through the apps they purchase, and monitored by hundreds of traffic cameras, privacy is quickly becoming nothing more than a quaint vestige of the past. In a previous article discussing the intersection of technology and the Fourth Amendment, I proposed reframing the issue away from conventional commentary. The Missed Opportunity of United States v. Jones: Commercial Erosion of Fourth Amendment Protection in a Post-Google Earth World, 15 PENN. J. CON. L. 331, 333 (2012). That article posits that society has reached the point about which Justice Blackmun cautioned - the point at which privacy “expectations [have] been ‘conditioned’ by influences alien to well-recognized Fourth Amendment freedoms.” Society finds itself at this juncture not because of governmental conditioning, as Justice Blackmun warned, but because of a concept the article defined as “commercial conditioning.” That proposal called for a legislative requirement that an individual opt into such information disclosure before such a disclosure could be made. This article further develops the concept of “commercial conditioning,” and explores not a legislative solution, but possible judicial responses to the growing reality of private commercial entities eroding privacy expectations and thereby expanding governmental power. This article seeks to guide the judiciary in analyzing evidence containing certain private information obtained by the government from these commercial entities. Such evidence should be afforded some of the procedural protections of the Fourth Amendment when the government accesses it - a protection not currently available to this private information. The Fourth Amendment is designed to protect individuals from government intrusion into private aspects of their lives. The Third Party and Assumption of Risk doctrines are designed to preclude individuals who never intended their actions to be private from claiming, after the fact, that they were private. However, as technology has developed, commercial entities have created a world in which the Fourth Amendment cannot protect individuals from government intrusion into their lives. Through their commercial conditioning of society, commercial entities have made it impossible to assert a Fourth Amendment claim in two ways. First they remove information from individuals without their knowledge or voluntary consent. By doing so, these entities preclude individuals from demonstrating subjective expectations of privacy, or expectation that society will find reasonable. Second, when the government later obtains this information, the government hides behind the Third Party Doctrine to justify its possession of the information. In essence the government has successfully circumvented Fourth Amendment protections. The pathway, however, was laid by the commercial entities that facilitate this reality through commercial conditioning. This article explores the implications of commercial conditioning. It further argues that restoration of the protections intended by the Fourth Amendment can be achieved by re-invigorating the voluntary consent aspect to privacy protection found in both the privacy cases as well as the Third Party Doctrine cases. These make clear that information obtained from an individual can come in two forms. The first is that which is voluntarily shared by him. The second is that taken from him. This article argues that courts must recognize that when the government systematically accesses information that was taken from an individual without knowledge or voluntary consent, that individual must be protected

    Location-based Social Network for Cities & Neighbourhood Sustainable Development

    Get PDF
    Online Social Network (OSN) is categorized as Web 2.0 which is defined by O'Reilly in 2004, is the idea of mutually maximizing collective intelligence and added value for each participant by dynamic information sharing and creation. Current trend sbows that the next big thing in OSN is Location-based Social Networking (LBSN) which is the composite of OSN and Location-based Service (LBS). The goal of this paper is to study on Malaysian online social behaviour and to explore what are the key technologies of LBSN to support the development of neighbourhoods where residents feel a sense of connection to their local community and ability to engage in that community. Problems and opportunities identified are: I) Lack of research has been done to nnderstand Malaysian online social behavior in the context of cities & neighbourhood development, 2) Modem societies are said to lives in a condition of individualism and 3) Malaysia has strong networked community and there are a number of social Application Programming Interface (API) which provide a great opportunities for developers to create an application which can support the idea of smart, liveable and sustainable cities. The objectives of the research are: 1) To study on Malaysian social behavior in using Location-based Social Network (LBSN) , motivation for participation and pattern of use, 2) To identifY and understand key technologies of LBSN, and 3) To design an engaging LBSN which leverage on key technologies for neighbourhood and cities' sustainable development. Survey instrument is used as data collection tool to investigate the Malaysian online social behaviour and gauge their views on civil issues such as crime in their residential. Interview also is carried out to the owner of existing crime mapping system to identifY the gaps and opportunities for improvements. This research discovers that Malaysians are socially active in online community network and have strong civic conscious to make our neighbourhood works better. Govermnent shonld look forward into open data for beneficial of public. With proper neighbourhood planning, it will contribute to sustainable community which can help country's development

    Uncovering the Facebook Experience: Insights into Users’ Behavior and Motivations

    Get PDF
    Academic literature on Facebook in the fields of management, economics and psychology is reviewed in this article, where we focus on users of this social network to understand why they signed up, how they form networks and how they engage, and how companies can exploit and benefit from Facebook. Although many interesting topics have been covered, the study clearly reveals that much of the work done so far has been limited to certain situations, it analyzes the strengths and weaknesses of the studies, and suggests avenues of research for the future

    Fighting the dark side:a scoping review of dark pattern mitigation

    Get PDF
    Abstract. As technology plays an ever-greater role in the everyday life of people, during the last decade there has been a rising concern about designers using their knowledge of human behaviour to design interfaces that trick users into doing things against their best interest. These design patterns are known as dark patterns, and the human-computer interaction and design communities have condemned their use. Informed by research, lawmakers have also started to form regulations against them. This thesis aimed to first introduce what the current state of dark pattern research is, and then answer the research question of how the usage of dark patterns could be mitigated. To answer the research question, a literature review in the form of scoping review was conducted. In scoping review, 28 articles that considered dark pattern mitigation were found to be relevant to the research question. Thematic analysis was used as a qualitative analysis method to identify common themes in articles. As a result, dark pattern mitigation tactics could be divided into seven different themes: company actions and economic value, regulating dark patterns, raising public awareness, tools for users, designing for the well-being of users, educating designers and developers, and enhancing dark pattern research. Mitigation tactics or propositions were then introduced in more detail under these themes. The results of the scoping review demonstrate that there is no one specific weapon to be used in the fight against dark patterns. On the contrary, different techniques from different fields need to be used together to effectively identify and mitigate dark patterns

    Tagging amongst friends: an exploration of social media exchange on mobile devices

    Get PDF
    Mobile social software tools have great potential in transforming the way users communicate on the move, by augmenting their everyday environment with pertinent information from their online social networks. A fundamental aspect to the success of these tools is in developing an understanding of their emergent real-world use and also the aspirations of users; this thesis focuses on investigating one facet of this: the exchange of social media. To facilitate this investigation, three mobile social tools have been developed for use on locationaware smartphone handsets. The first is an exploratory social game, 'Gophers' that utilises task oriented gameplay, social agents and GSM cell positioning to create an engaging ecosystem in which users create and exchange geotagged social media. Supplementing this is a pair of social awareness and tagging services that integrate with a user's existing online social network; the 'ItchyFeet' service uses GPS positioning to allow the user and their social network peers to collaboratively build a landscape of socially important geotagged locations, which are used as indicators of a user's context on their Facebook profile; likewise 'MobiClouds' revisits this concept by exploring the novel concept of Bluetooth 'people tagging' to facilitate the creation of tags that are more indicative of users' social surroundings. The thesis reports on findings from formal trials of these technologies, using groups of volunteer social network users based around the city of Lincoln, UK, where the incorporation of daily diaries, interviews and automated logging precisely monitored application use. Through analysis of trial data, a guide for designers of future mobile social tools has been devised and the factors that typically influence users when creating tags are identified. The thesis makes a number of further contributions to the area. Firstly, it identifies the natural desire of users to update their status whilst mobile; a practice recently popularised by commercial 'check in' services. It also explores the overarching narratives that developed over time, which formed an integral part of the tagging process and augmented social media with a higher level meaning. Finally, it reveals how social media is affected by the tag positioning method selected and also by personal circumstances, such as the proximity of social peers

    Learning For Life: The Opportunity For Technology To Transform Adult Education - Part II: The Supplier Ecosystem

    Get PDF
    In fall 2014, Tyton Partners (formerly Education Growth Advisors), with support from the Joyce Foundation, conducted national research on the role and potential of instructional technology in the US adult education field. The objective was to understand the current state of the field with respect to technology readiness and the opportunities and challenges for increasing the use of technology-based instructional models within adult education. The initial publication in the series, "Part I: Interest in and Aptitude for Technology," focused on demand-side dynamics and addressed adult education administrators' and practitioners' perspectives on the role and potential of technology to support their students' needs and objectives. This second publication, "Part 2: The Supplier Ecosystem," highlights market composition and supply-side dynamics, instructional resource use, and opportunities for innovation
    corecore