15,622 research outputs found

    Understanding donation intention in live-streaming from dedication and constraint perspectives

    Get PDF
    The pervasiveness of live-streaming, especially in the period of Covid-19, has brought ample monetizing opportunities for content creators through viewers’ donation. Given that donation is commonly driven by the gained benefits to the donors, voluntary donation in live-streaming is still unstable due to the lack of constraints. Drawing on the dedication-constraint framework, we examined how streamer-viewer interactions, motivational feedback and self-regulation deficiency affect viewers’ donation intention in live-streaming. A survey was conducted among live-streaming users in Taiwan, and the collected data were analyzed by partial least squares. The findings show that the motivational feedback (dedication-based mechanism) has a stronger influence than self-regulation deficiency (constraint-based mechanism) in determining viewers’ donation intention. Responsiveness is proven as the most important interaction-based antecedent of motivation feedback and self-regulation deficiency, beside personalization and entertainment. In sum, our empirical findings have significant implications for research and practice to deepen the understanding of donation, encourage viewers to donate and maintain the relationship with content creators in live-streaming communities

    The Difference Of Determinants Of Mobile Data Services’ Adoption And Continuance – A Longitudinal Study

    Get PDF
    The diffusion of mobile data services (MDS) has been growing tremendously since 2007. Owing to the ubiquity and usability of multipurpose information appliances (MIA) such as smartphones, MDS have permeated every walk of life of many people. Using MIA allow users to access MDS anytime and anywhere to satisfy utilitarian, hedonic, and social needs. Hence, MDS can provide both instrumental (e.g., productivity) and inherent (e.g., entertainment) value. To date little research exists about the changes in adoption and usage behavior over time and the differences in the factors influencing people in the pre- or post-adoption stage. The present study addresses these gaps. To validate the research model the paper builds upon data collected from 1,342 students in 2008 which will be questioned again in the course of the present study. It is expected that the findings will help refining researchers’ understanding regarding the differences of determinants influencing users and non-users

    THE ANTECEDENTS OF AN INDIVIDUAL\u27S COMMITMENTS TOWARD CONTINUOUSLY USING SOCIAL NETWORK SITE

    Get PDF
    The Social network sites (SNS) has been rapid diffusion around the world. With the increasing importance of SNS, continuance intention also becomes a popular issue in the SNS context. SNS providers have to maintain better relationships with users and make individuals continue to use their sites. Based on this phenomenon, the objective of this study is to gain a better understanding of the continuance intention of SNS through examining the effects of commitments. Specifically, followed Meyer and Allen’s three-component model of commitment, we develop a theoretical model to understand the factors that influence normative, affective and continued commitment and investigate the effects of commitments on continuance intention in the SNS context. Through a survey-based empirical investigation, we anticipate the results to enhance our existing knowledge on continuance intention in the SNS context

    The Effect of Design Characteristics of Mobile Applications on User Retention: An Environmental Psychology Perspective

    Get PDF
    As many people have adopted mobile applications for their hand-held devices, mobile applications are becoming widely used in everyday life. Nonetheless, some applications are used only few times and then abandoned. Particular since many firms have launched mobile applications for communicating with and delivering their products or services to customers, user retentions toward mobile applications can be critical. To address this challenge, we identify how design characteristics of mobile application enhance user retention toward mobile applications, particularly in the context of cross-channel commerce. Drawing on an environmental psychology, we address that user beliefs stimulated by environmental cues (e.g., design characteristics) affect users’ cognitive and affective internal states, which in turn lead to their retention toward mobile applications. Contributions of this study include 1) theoretically, a suggested theoretical framework for effective mobile application design as an extension of website design, and (2) practically, helping practitioners to articulate effective mobile applications or the Internet strategy in mobile-based online markets

    Post-adoption model of mobile payment in Indonesia: Integration of UTAUT2 and the dedication-constraint perspective

    Get PDF
    Heading towards a cashless society, consumers have undergone a significant shift toward mobile payment services after COVID-19. The proliferation of various mobile payment applications has resulted in low consumer loyalty to mobile payment providers. Thus, continuance intention of mobile payments becomes crucial for mobile payment providers. The integration of UTAUT2 and the dedication-constraint-based mechanism are adopted to elaborate approach in retaining customers. The dedication mechanism is built by examining antecedents of satisfaction. Meanwhile, the constraint mechanism is driven by switching costs, preceded by habit and economic incentives. A total of 297 mobile payment users participated by filling out questionnaires in a field survey. The results show that the dedication mechanism dominates in creating satisfaction by increasing perceived usefulness, while the constraint mechanism is more influenced by habit than economic incentives. This research provides insights for mobile payment providers to enhance satisfaction by understanding consumers' needs in using mobile payments and to increase switching costs by fostering habit, thereby encouraging continuance intention of mobile payments in the future

    IS Continuance in Experiential Computing Contexts: Linking Rational and Non-rational Behaviors through Technology Associability

    Get PDF
    The IS literature currently explains continuous-use of IT as a post-adoptive behavior driven by rational cognitive beliefs or non-rational affective/automatic responses. Yet the use contexts, IT artifact characteristics, and the notion of the IT user, underlying the current thinking have evolved. We are in a so-called experiential computing paradigm where computing capabilities have become so deeply embedded in everyday life experiences that IT artifacts have become an extension of the human self, closely tied to the personal behaviors and preferences of users. In this empirical context, new continuance behaviors are emerging for which the current literature falls short in explanation. We have just begun a program of study to address this issue. In the summer paper reported here, we build on previous work in IS and draw from theories of self-identity and stereotypes in social psychology to introduce the concept of IT Associability, and argue that it plays a central role in explaining and predicting continuous-use in experiential computing contexts. Our concept of IT associability taps the social and relational characteristics of an IT to theorize how user attachment to an IT they currently use may significantly influence their decisions concerning future versions of the IT. We attempt, through this perspective, to bridge the gap between rational and non-rational theories by offering a novel yet complementary lens for exploring other processes shaping continuous-use of everyday IT artifacts. We present preliminary validated items for measuring IT associability. Some implications for managing the blurring lines between organizational and personal IT use at the workplace are also discussed

    The Role of Habit in Post-Adoption Switching of Personal Information Technologies: An Empirical Investigation

    Get PDF
    Unlike technology users in business organizations, users of personal information technologies are usually not bound to specific products and have the freedom to switch from one product to a substitute. As a unique and widespread product level post-adoption behavior, IT user switching has not garnered sufficient attention in the current literature. Prior research has suggested that a consumer’s decision to switch follows careful reasoning on three distinct groups of factors: push, pull, and mooring. Given the highly routinized nature of post-adoption IT use, we draw from research on habit in social psychology and post-adoption user behavior literatures, and argue that users’ habit plays a critical role in post-adoption IT switching. Specifically, we posit that the habit of using the incumbent product both contributes to the mooring effects during the formation of intention to switch, and moderates the relationship between intention and switching. We tested our hypotheses on a sample of 414 users presented with a choice of switching their Web browsers. Our findings confirm the direct influence of potential switchers’ habit on switching intention, and the interaction between habit and switching intention on switching. Our overall model explains 55 percent of total variance in users’ intention to switch and 23 percent of total variance in user switching. This study advances the theoretical and empirical understanding of post-adoption technology switching, valuable to both researchers and practitioners

    Gains and Losses in Functionality – An Experimental Investigation of the Effect of Software Updates on Users’ Continuance Intentions

    Get PDF
    Although software updates are ubiquitous in professional and private IS usage, their impact on user behaviors has received little attention in post-adoption research. Based on expectation-confirmation-theory and the IS continuance model, we investigate the effects of gaining and loosing features through updates on expert and novice users’ continuance intentions (CI). In a vignette based experiment, we find that updates which add features to software after its release increase novices’ CI above and beyond a level generated by a monolithic software package that contains the entire feature set from the beginning. With diminished CI, experts show a contrary reaction to the same update. Losing features through an update, on the other hand, severely diminishes CI for experts and novices alike. Mediation analysis reveals positive disconfirmation of previous expectations as psychological mechanism behind novices’ counter-intuitive and somewhat non-rational responses to gaining features through an update. Implications for research and practice are derived

    Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions

    Get PDF
    IT users often make information security-related decisions in complex and multidimensional environments, which could lead to phenomena like behavioral anomalies. For instance, under uncertain circumstances, users may discount their own limited information about a security technology and make their adoption decisions based on what the majority of users’ decisions are in this regard. In this context, imitation can become a legitimate and rational strategy for making security-related decisions. Current behavioral security theories generally assume that users possess sufficient information about security technologies before making security-related decisions. This theory assumption limits our understanding of how security decisions are made in various real-world circumstances. Our research is focused on security behaviors under uncertain circumstances. We investigate how providing popularity information can trigger herd behavior and can subsequently influence security behaviors. We also provide insights into security-related decisions that are influenced by herd mentality and investigate whether they persist over time. Additionally, we conceptualize and operationalize two constructs that can be used in future research to better examine post-adoption security behaviors. The findings of this multistage experiment show that in uncertain circumstances, when users are aware of the widespread use of a certain security technology, they develop a significantly higher intention to engage in protection-motivated behaviors. Furthermore, the results show that at the post-adoption stage, users rely more heavily on their own information about their continuous use of security technologies and put less emphasis on herd-related factors

    Antecedents Of Information Systems Habit In Sporadic Use Of Learning Systems: Personalization And Peer Effects

    Get PDF
    Research on Information Systems (IS) habit formation has been focused mostly on IS habit’s effect on IS continuance. Antecedents of IS habit formation, as reported in the literature, are primarily on users’ prior behavior and comprehensiveness of usage. Most of the literature focus on analyzing the relationship between users’ IS usage behavior and IS habit. Limited work has been reported to investigate genuine and practical ways to develop IS habit, as well as to address the issue of sporadic IS usage, which leads to different interpretations on IS habit and continuance. This study purports to address the theoretical gap on issues related to IS habit antecedents and sporadic IS usage habit in the educational context. Adopting an empirical survey in universities’ (sub-degree and postgraduate settings) learning systems usage, data from cross-sectional survey on learning systems usage on per-course basis is analyzed. Theoretically, our results suggest that IT functionality design (personalization) and social factor (peer effect) have strong and positive relationship on IS habit with respect to the sporadic usage nature of course based learning systems. Practically, we suggest some dimensions for teachers on curriculum design that facilitate IS habit development, e.g., maintaining an online community with substantial student peer input at the early stage of a course
    • …
    corecore