2,048 research outputs found

    Continued Usage and Location Disclosure of Location-Based Applications: A Necessity for Location Intelligence

    Get PDF
    Location-based applications (LBA) have been widely accepted and used for different purposes ranging from navigation to dating or gaming. Most LBAs ask users to provide access to location data for more efficient and personalized location-based services. Location intelligence as an emerging area of business intelligence relies heavily on disclosing location information by users. This research builds a continuance usage and location disclosure model from the expectation-confirmation perspective. The effect of benefit expectations on usefulness and satisfaction is hypothesized. In addition, the positive effect of usefulness on satisfaction and continuance intention is postulated. After collecting survey data from main LBA users, the results of the analysis support the proposed model. Findings contribute to the current literature in business intelligence by focusing on location disclosure behavior in the context of LBAs and the necessity of this type of information for location intelligence

    Smartphone App Usage Analysis : Datasets, Methods, and Applications

    Get PDF
    As smartphones have become indispensable personal devices, the number of smartphone users has increased dramatically over the last decade. These personal devices, which are supported by a variety of smartphone apps, allow people to access Internet services in a convenient and ubiquitous manner. App developers and service providers can collect fine-grained app usage traces, revealing connections between users, apps, and smartphones. We present a comprehensive review of the most recent research on smartphone app usage analysis in this survey. Our survey summarizes advanced technologies and key patterns in smartphone app usage behaviors, all of which have significant implications for all relevant stakeholders, including academia and industry. We begin by describing four data collection methods: surveys, monitoring apps, network operators, and app stores, as well as nine publicly available app usage datasets. We then systematically summarize the related studies of app usage analysis in three domains: app domain, user domain, and smartphone domain. We make a detailed taxonomy of the problem studied, the datasets used, the methods used, and the significant results obtained in each domain. Finally, we discuss future directions in this exciting field by highlighting research challenges.Peer reviewe

    How religion influences the use of social media : the impact of the online user’s religiosity on perceived online privacy and the use of technology in Saudi Arabia.

    Get PDF
    Religion has a significant effect on people’s lives. It impacts human behaviour, thoughts, morale standards, attitudes and values. The literature shows that religiosity has an effect also on consumer behaviour. However, the concept of religiosity has been under-researched due to the sensitivity of religion (Swimberghe, Flurry, & Parker, 2011). According to Vitell (2009) there is still a need to develop a vigorous theoretical understanding of the impact of religiosity on the consumer behaviour. This thesis contributes to that knowledge by developing a model to explain the effect of the religiosity of the online user on their use of social media. Current research does not fully explain the specifics of religious influences on online user behaviours. This thesis main goal is to build a model that can measure the effect of intrinsic religiosity on the use of social media. The proposed model uses the unified theory of acceptance and use of technology (UTAUT2) along with Privacy concern to measure the effect of religiosity on the use of social media. This thesis empirically tests the proposed model linking religiosity, privacy concerns, technology acceptance and the use of social media. Allport and Ross' (1967) religious orientation scale (ROS) is used to measure the intrinsic religiosity. Xu et al's., (2011a) model of privacy concern is used to measure privacy concerns when using social media. Venkatesh, Thong and Xu's (2012) unified theory of acceptance and use of technology (UTAUT2) is used to measure the user acceptance of social media. Using partial least square structural equation modelling, intrinsic religiosity (ROS), and privacy concerns along with technology acceptance are shown to influence the use of social media. The results show that religion has an indirect effect on the use of social media through privacy concerns and technology acceptance. The results also show that the model can predict the effect of intrinsic religiosity on the use of social media to share and disclose information. The implications from this study are significant both for policy and practice for social media companies as well as users. Information from this study will help social media companies to maximize users’ involvement with social media. It will also benefit the industry and the literature by providing a sound model that can measure the impact of religion on the behaviour of users

    Determinants of Users Intention to Adopt Mobile Fitness Applications: an Extended Technology Acceptance Model Approach

    Get PDF
    The present research was motivated by the recognition that the use of mobile fitness applications (MFA) is increasingly popular among sports and exercise participants in recent years. Using an extended Technology Acceptance Model (TAM) perspective, this study explored potential predictors of behavioral intention toward MFAs such as perceived ease of use, perceived usefulness, personalization, personal innovativeness in information technology (PIIT), perceived enjoyment, mobile application self-efficacy, involvement in sports and exercise participation, and social influences (interpersonal and external influences). A theoretical model was developed and tested against the empirical data collected from 385 collegiate students enrolled in physical activity classes at a large university in the United States. The result of descriptive statistics indicated that the samples are active sports and exercise participants with their weekly exercise and sports participation of 5.41 hours. A measurement model and structural equation model were tested using AMOS 22.0 and confirmed eight out of eleven hypothesized relationships. In particular, personalization and PIIT were found to have significant effects on perceived usefulness and perceived ease of use, which in turn, affected behavioral intention toward using MFAs. Interpersonal influence and involvement in sports and exercise participation were also found to have significant effects on intention whereas no significant effects of mobile application self-efficacy, perceived enjoyment, and external influence were observed. The analyses demonstrated that perceived usefulness was the most powerful determinants of behavioral intention followed by interpersonal influence in terms of the path coefficient values. The construct of PIIT and personalization accounted for 43.4% variances in perceived ease of use and 48.9% variances in perceived usefulness variance. All the constructs within the structural model except external influence, perceived enjoyment, and mobile application self-efficacy, collectively explained the 75.1 % variances in intention to use MFAs, suggesting that the examined model has a strong explanatory power regarding MFA users decision making process.\u2

    User Experience of Virtual Reality-Based Digital Sports: A Topic Modeling Approach

    Get PDF
    Digital technologies have been found to transform our society. During and after the COVID-19 pandemic, more and more people have started their usage of digital sports. However, little research has provided a deep understanding of the user experience of digital sports at the individual participant level. To address the research gap, this study explores how virtual reality (VR)-based digital sports satisfy users’ innate needs based on the psychological needs of humans and self-determination theory. By conducting a topic modeling with 11,676 tweets generated by VR-based digital golf participation users from Twitter, we identified some elements within VR-based digital golf to explain how VR-based digital golf satisfies participation users’ three psychological needs, including the need of autonomy, the need of relatedness, and the need of competence

    Factors Influencing User’s Attitude to Secondary Information Sharing and Usage

    Get PDF
    The increasing availability of enormous data about users online, along with availability of sophisticated tools and technology to store, aggregate, and analyze data for secondary use has raised concerns about how to balance the opportunity for secondary use of data with the need to protect the user privacy that may result from harmful use. To develop a privacy protection mechanism that is useful and meets the expectations and needs of the user, it is important to understand user’s attitude to privacy and secondary information sharing and usage of his/her data. While several studies have investigated factors influencing user’s attitude to privacy in primary data collection context, none of the existing studies have provided an understanding of user perception and attitude to privacy in secondary context. To fill this gap, this work has identified five factors that are important in a secondary usage context and carried out a study on their influence on user’s perception with respect to how their data is shared for secondary use. The main contribution of this paper is an understanding of factors influencing user decisions about privacy in secondary context, which can assist both technology designers and policy makers in the development of appropriate privacy protection that meets the needs and expectations of the user.</p

    CSMA Local Area Networking under Dynamic Altruism

    Full text link
    In this paper, we consider medium access control of local area networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "by rule" conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), we begin with a non-cooperative game framework and build a dynamic altruism term into the net utility. The effects of altruism are analyzed at Nash equilibrium for both the ALOHA and CSMA frameworks in the quasistationary (fictitious play) regime. We consider either power or throughput based costs of networking, and the cases of identical or heterogeneous (independent) users/players. In a numerical study we consider diverse players, and we see that the effects of altruism for similar players can be beneficial in the presence of significant congestion, but excessive altruism may lead to underuse of the channel when demand is low

    Examining E-readiness In Libraries of Public Sector Universities Khyber Pakhtunkhwa-Pakistan

    Get PDF
    This research has investigated the level of e-readiness in public sector university libraries located in Khyber Pakhtunkhwa-Pakistan. The study aimed to assess the presence of human resources, electronic infrastructure, network services, and programs in these libraries. The target population consisted of twenty-seven public sector university libraries in the region. The research utilized a quantitative approach and employed a questionnaire-based survey to gather data from the librarians or individuals in charge of these libraries. The collected data were analyzed using Statistical Package for Social Sciences version 22 (SPSS). The findings revealed that the respondents\u27 satisfaction regarding their knowledge of libraries was low or moderate, as indicated by mean scores below 3. Similarly, the satisfaction levels concerning electronic infrastructure, network services, and programs, as well as the role of libraries in the digital world, were rated as average or below. Based on the results, the study recommended significant transformations in various aspects of public-sector university libraries. To achieve this, the government should allocate necessary resources and provide facilities to meet the informational and recreational needs of the population. Improvements are required in the Information Communication Technology (ICT) infrastructure of these libraries, including the availability of computer equipment, databases, network servers, multimedia projectors, digital cameras, uninterruptible power supply, scanners, and backup devices such as hard discs and Digital Video Disc/compact Dis

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
    • 

    corecore