24 research outputs found

    Pengaruh Persepsian Risiko, Kepuasan dan Citra Harga Terhadap Niat Membeli Ulang Menggunakan M-Commerce di Kalangan Masyarakat Kota Sungai Penuh, dengan Kepercayaan dan Sensitivitas Harga Sebagai Moderasi

    Get PDF
    The use of mobile devices such as smartphones and tablets, which is increasingly widespread throughout the world, is currently at an all-time high. This technological disruption makes mobile e-commerce or m-commerce a business channel that is considered more convenient and efficient for today's lifestyle compared to e-commerce or offline stores. This study aims to determine the effect of perceived risk, satisfaction and price image on repurchase intention using m-commerce among the people of Sungai Penuh City, with trust and price sensitivity as moderating. This study uses the Smart PLS software data analysis method. Research This research was conducted in the urban area of ​​Sungai Penuh City in 2021. The population in this study was the Sungai Penuh City Community who had shopped through m-commerce at least once. The results of this study state that perceived risk has no significant effect on repurchase intentions using m-commerce. Price image also has a positive and significant effect on repurchase intention using m-commerce. Whether consumer confidence in m-commerce is higher or lower, the perceived risk still has no impact on repurchase intentions using m-commerce. The second moderating effect of this study is the moderation of price sensitivity to the effect of price image on repurchase intention which results in no function

    Configuration and management of security procedures with dedicated ‘spa-lang’ domain language in security engineering

    Get PDF
    The security policy should contain all the information necessary to make proper security decisions. The rules and needs for specific security measures and methods should be explained in understandable way. None of the existing security mechanisms can guarantee complete protection against threats. In extreme cases, improperly used security mechanisms can lower the level of protection, giving the impression of security that is actually lacking. To enable simple and automated definition of security procedures for IT system of a company or organization, available not only to qualified IT professionals, e.g. system administrators, but also to the company\u27s management staff, it was decided to create an Intelligent System for Automation and Analysis of Security Procedures (iSPA). The paper presents the proposal of use the developed domain language, named \u27spa-lang\u27 for configuration and management of security procedures in security system engineering based on BPMN (Business Process Model and Notation) standard

    Exploring Information Privacy Concerns During the COVID-19 Pandemic: A Juxtaposition of Three Models

    Get PDF
    Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet users’ information privacy concerns (IUIPC). The results of an online survey administered to 209 citizens reveal that in all models trusting beliefs increase adoption intentions while risk decreases them. However, IUIPC is the only privacy construct that significantly reduces trusting beliefs

    The Impact of Trust in Technology on the Appraisal of Technostress Creators in a Work-Related Context

    Get PDF
    Research in technostress examines how and why the use of information and communication technologies causes individuals to experience an imbalance between demands and the ability to meet them. In this paper, the impact of system-like trust and human-like trust on the appraisal of technostress creators in a work-related setting is examined. In order to test the propositions, data on trust, technostress creators, the perception of distress and eustress, and job satisfaction were collected in a web-based survey from 210 employees. Structural equation modeling was performed for data analysis. The results confirm that both, system-like trust and human-like trust, significantly affect the appraisal of technostress creators. In particular, the higher the trust in technology is, the less harmful technostress creators are perceived, which positively impacts job satisfaction

    Trust or Consequences Replication: A Methodological Replication Study

    Get PDF
    This paper reinvestigates the theories of planned behavior and the technology acceptance model regarding the adoption of cloud-based services by conducting a methodological replication of a study by Ho, Ocasio-Velázquez, and Booth (2017). The improvement of cloud-based services and their adoption by individuals and organizations alike continue to rise. For some organizations, releasing control of their IT infrastructure relies in part on their perception of a cloud service provider’s trustworthiness. We found that the intent to trust cloud-computing firms relies on knowledge, perceived risk, and subjective norm. Also, perceived risk appears to moderate the interaction between knowledge and intent to trust. Future studies are encouraged to strengthen this study through construct validity, including the addition of relevant dimensions to intent to trust

    Mobile apps for SME business sustainability during COVID-19 and onwards

    Get PDF
    Small and Medium-Sized Enterprises (SMEs) are struggling to cope with the business uncertainty caused by the COVID-19 pandemic. This study examines how SMEs in developing economies have used mobile apps to improve their business efficiency during the pandemic. We aim to recognize effective measures and actions taken by SMEs that have turned to mobile-app-based business to improve their sustainability during the crisis. The study bridges a literature gap by extending the Theory of Consumption Values and the Theory of Planned Behavior to SMEs that incorporate mobile-app-based business. Data was collected from 343 SMEs from three Industrial Development Corporations (IDCs) in India. Using the covariance-based structural equation modeling method, we investigated the efficiency of a conceptual model of mobile-app-based business for SMEs. The results revealed that consumer choice behavior, perceived behavior control, subjective behavior control and attitude towards the mobile app all influence SMEs’ decision-making and business strategy. As such, SMEs need a powerful mobile-app-based business network to succeed in the entrepreneurial business process. Using instrumental variable analysis, we discovered that increased mobile app usage significantly improves SMEs’ long-term efficiency. The analysis provides several theoretical and managerial ramifications

    Why do consumers adopt smart voice assistants for shopping purposes? A perspective from complexity theory

    Get PDF
    The widespread appeal of Smart Voice Assistants (SVAs) stems from their ability to enhance the everyday lives of consumers in a practical, enjoyable, and meaningful manner. Despite their popularity, the factors that shape consumer adoption of SVAs remain largely unexplored. To address this research gap, we utilized complexity theory to construct an integrated model that sheds light on the determinants of consumer decision-making in regard to SVA adoption. Furthermore, we applied fuzzy-set Qualitative Comparative Analysis (fsQCA) to examine the proposed model and uncover the causal recipes associated with SVA adoption. Our necessary condition analysis highlights that perceived ease of use, perceived usefulness, perceived humanness, and perceived social presence are necessary predictors for consumers' intentions to adopt SVA. This study constitutes a significant addition to the existing literature by providing a comprehensive and nuanced understanding of the drivers of SVA adoption. Moreover, it offers crucial implications for online service provider managers to improve the adoption of SVAs among their customers

    Role of shared identity and agency trust in online voting among Finnish citizens

    Get PDF
    This study examined the impact of shared identity and agency trust, governmental vs. third party, on Finnish citizens' intention to vote online. Using the integrated model of shared identity and trust as a theoretical lens, a within-subject quasi-experiment was conducted to understand the impact of agency trust on intention to vote online. The model was tested using data from 248 Finnish citizens using PLS-SEM. We found that citizens’ perceptions of shared identity with online voting agencies significantly contribute to agency trust. This trust in agencies, then directly and indirectly through perceived usefulness, affects online voting intention. Perceived usefulness directly and perceived ease of use indirectly increase the intention to vote online. However, the perceived usefulness of online voting is contingent upon the voting administering agency being the government. This study contributes to the understanding of agency trust in online voting adoption in the Finnish context and highlights the role of shared identity in building citizen trust in online voting. It also emphasizes the effect of voting agency type on the perceived usefulness of online voting

    Investigating the effect of gamification on the adoption of fitness apps on mobile devices in South Africa

    Get PDF
    Despite the large number of downloads of mobile apps and the growth of the fitness mobile app industry, research shows that fitness mobile apps are faced with the issue of having a low adoption rate. This thesis focusses on fitness mobile apps and attempts to understand this issue of adoption or continuous fitness mobile app usage in a South African context and specifically looks at the role of gamification in fitness mobile app adoption. The research is conducted to better understand how gamification affects and can improve fitness mobile app adoption. Gamification can be defined as the addition of points, badges, leaderboards and other elements found in games to other non-game related areas such as fitness apps. A survey was administered to three cohorts of students at the University of Cape Town in South Africa to assess this. The cohorts focused on MyFitnessPal, Nike+ or Strava gamified fitness mobile apps, respectively, in order to allow for comparisons of survey responses across the three fitness mobile apps. The survey design used an extension of the Technology Acceptance Model (TAM) to quantitatively measure the relationship between gamification in fitness mobile apps and the behavioural intention to adopt the fitness mobile app. User perspectives on how gamification affects adoption of fitness mobile apps was also gathered in the survey. Perceived usefulness (PU), perceived ease of use (PEU) and perceived enjoyment (PE) were found to have a positive relationship to the behavioural intention (BI) to adopt a fitness mobile app in the sample. Across the cohort’s subjective norm didn't significantly contribute to the BI to adopt a fitness mobile app. Interestingly it was found to correlate negatively with the variable BI when analyzing the responses from the Nike+ cohort. In the cohorts for MyFitnessPal and Strava this was not the case as these two variables were found to be positively correlated. The progress bar was perceived to be the most useful gamification element in a fitness mobile app in all three cohorts when compared with leaderboards, badges, levels and points. When looking at how gamification improves adoption motivations the following popular reasons were provided by participants: progress tracking and achievement (encourage improvement). This was followed by the common themes PEU, PE, award/incentive, competitive aspect and goal setting assistance. The findings from this study contribute to better understanding how gamification improves fitness app adoption in a South African context

    Internet of Things (IoT) implementation in learning institutions: a systematic literature review

    Get PDF
    Internet of Things (IoT) is a computing concept facilitating the management of collaborative activities from one central area. Millennial learners, growth in enrolment numbers in universities, and the need for equity and quality learning necessitate the use of IoT technologies in education. The focus of this paper is to examine IoT implementations in learning institutes, their application areas, the themes presented, the models and methodologies used, and the benefits. This study concentrated on publications from 2008 to 2017. The outcomes revealed that the utilization of IoT for tracking and tracing a learner’s attendance had been one of the application areas of IoT in education. This study further categorized the papers and presents novel research opportunities based on concentrated themes and areas that had not been fully exhausted. Most research studies employed qualitative methods, with a few utilizing a quantitative approach with surveys. Research themes exhibited a shortcoming in other important themes, such as the models and methodologies used for implementing IoT. Finally, the results of this study agree that IoT implementation could help solve some issues in learning institutions like equity and quality learning. The results from this research also provide a base for future research works on the successful implementation of IoT in learning institutions
    corecore