22,472 research outputs found

    SOCIAL CAPITAL, TRUST, AND THE AGRIBUSINESS OF ECONOMICS

    Get PDF
    Economists, including agricultural economists, have a long history of recognizing the importance of the behavioral foundations in decision making while ignoring these observable human dimensions in their economic models. The economics of social capital and trust, two important human characteristics influencing decisions, have captured the attention of economists in recent years. Recent empirical work demonstrates that social capital and trust considerations are prevalent and economically significant, especially in business. Trust alters the terms of trade, generates decision flexibility, reduces transaction costs, and creates additional time resources for management.Institutional and Behavioral Economics,

    Extending Classical Technology Acceptance Models, A Review of Potential Mobile Device and Consumer Individual Factors to Better Explain Mobile Commerce Acceptance

    Get PDF
    Purpose - Technology adoption theories are very general, however the factors influencing acceptance could vary on the specific technology and the segments of consumers with their individual traits. This study accomplishes a comprehensive review of literature and to find potential variables to extend classical technology acceptance models specifically in the contexts of mobile technology and mobile commerce with consumer individual traits in mind. Methodology - 1. Methodical Review of key journal articles on Technology Acceptance across multiple key publishers, 2. Review of popular extant models in the context of general technology, 3. Elicit Mobile and Consumer specific considerations 4. Identify theories relevant to mobile devices and consumers as individuals Result - The result showed that the three were multiple mobile device/ commerce and consumer related theories including convenience, perceived risk, trust and deal proneness Study Implications - The theories and the constructs identified in this review could be used by future researchers working to further the acceptance science in the context of mobile devices taking consumer individual factors into consideratio

    I�ve Got to Play That Game - An Analysis of Embedded Persuasion in Game Design

    Get PDF
    We explore the role of persuasion in game design through a combination of cognitive biases, the roles of the individual and society in persuasive game design and game play. We examine the role of scarce player resources in the areas of monetary, temporal, spatial and cognitive spheres on the persuasive nature of a game. We argue that a persuasive game contains three distinct elements: the element of surprise and attention, the element of alignment with cultural norms and the element of tradeoff between player resources and incentives to play the game. We also present the ethical implications of persuasive game design

    Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study

    Get PDF
    This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives
    • …
    corecore