70,324 research outputs found

    Modeling inertia causatives:validating in the password manager adoption context

    Get PDF
    Cyber criminals are benefiting from the fact that people do not take the required precautions to protect their devices and communications. It is the equivalent of leaving their home’s front door unlocked and unguarded, something no one would do. Many efforts are made by governments and other bodies to raise awareness, but this often seems to fall on deaf ears. People seem to resist changing their existing cyber security practices: they demonstrate inertia. Here, we propose a model and instrument for investigating the factors that contribute towards this phenomenon

    Effects of user experience on user resistance to change to the voice user interface of an in‑vehicle infotainment system: Implications for platform and standards competition

    Get PDF
    This study examines the effects of user experience on user resistance to change—particularly, on the relationship between user resistance to change and its antecedents (i.e. switching costs and perceived value) in the context of the voice user interface of an in-vehicle infotainment (IVI) system. This research offers several salient findings. First, it shows that user experience positively moderates the relationship between uncertainty costs (one type of switching cost) and user resistance. It also negatively moderates the association between perceived value and user resistance. Second, the research test results demonstrate that users with a high degree of prior experience with the voice user interface of other smart devices exhibit low user resistance to change to the voice user interface in an IVI system. Third, we show that three types of switching costs (transition costs, in particular) may directly influence users to resist a change to the voice user interface. Fourth, our test results empirically demonstrate that both switching costs and perceived value affect user resistance to change in the context of an IVI system, which differs from the traditional IS research setting (i.e. enterprise systems). These findings may guide not only platform leaders in designing user interfaces, user experiences, and marketing strategies, but also firms that want to defend themselves from platform envelopment while devising defensive strategies in platform and standards competition

    Critical review of the e-loyalty literature: a purchase-centred framework

    Get PDF
    Over the last few years, the concept of online loyalty has been examined extensively in the literature, and it remains a topic of constant inquiry for both academics and marketing managers. The tremendous development of the Internet for both marketing and e-commerce settings, in conjunction with the growing desire of consumers to purchase online, has promoted two main outcomes: (a) increasing numbers of Business-to-Customer companies running businesses online and (b) the development of a variety of different e-loyalty research models. However, current research lacks a systematic review of the literature that provides a general conceptual framework on e-loyalty, which would help managers to understand their customers better, to take advantage of industry-related factors, and to improve their service quality. The present study is an attempt to critically synthesize results from multiple empirical studies on e-loyalty. Our findings illustrate that 62 instruments for measuring e-loyalty are currently in use, influenced predominantly by Zeithaml et al. (J Marketing. 1996;60(2):31-46) and Oliver (1997; Satisfaction: a behavioral perspective on the consumer. New York: McGraw Hill). Additionally, we propose a new general conceptual framework, which leads to antecedents dividing e-loyalty on the basis of the action of purchase into pre-purchase, during-purchase and after-purchase factors. To conclude, a number of managerial implementations are suggested in order to help marketing managers increase their customers’ e-loyalty by making crucial changes in each purchase stage

    The Impacts of Privacy Rules on Users' Perception on Internet of Things (IoT) Applications: Focusing on Smart Home Security Service

    Get PDF
    Department of Management EngineeringAs communication and information technologies advance, the Internet of Things (IoT) has changed the way people live. In particular, as smart home security services have been widely commercialized, it is necessary to examine consumer perception. However, there is little research that explains the general perception of IoT and smart home services. This article will utilize communication privacy management theory and privacy calculus theory to investigate how options to protect privacy affect how users perceive benefits and costs and how those perceptions affect individuals??? intentions to use of smart home service. Scenario-based experiments were conducted, and perceived benefits and costs were treated as formative second-order constructs. The results of PLS analysis in the study showed that smart home options to protect privacy decreased perceived benefits and increased perceived costs. In addition, the perceived benefits and perceived costs significantly affected the intention to use smart home security services. This research contributes to the field of IoT and smart home research and gives practitioners notable guidelines.ope

    ELICA: An Automated Tool for Dynamic Extraction of Requirements Relevant Information

    Full text link
    Requirements elicitation requires extensive knowledge and deep understanding of the problem domain where the final system will be situated. However, in many software development projects, analysts are required to elicit the requirements from an unfamiliar domain, which often causes communication barriers between analysts and stakeholders. In this paper, we propose a requirements ELICitation Aid tool (ELICA) to help analysts better understand the target application domain by dynamic extraction and labeling of requirements-relevant knowledge. To extract the relevant terms, we leverage the flexibility and power of Weighted Finite State Transducers (WFSTs) in dynamic modeling of natural language processing tasks. In addition to the information conveyed through text, ELICA captures and processes non-linguistic information about the intention of speakers such as their confidence level, analytical tone, and emotions. The extracted information is made available to the analysts as a set of labeled snippets with highlighted relevant terms which can also be exported as an artifact of the Requirements Engineering (RE) process. The application and usefulness of ELICA are demonstrated through a case study. This study shows how pre-existing relevant information about the application domain and the information captured during an elicitation meeting, such as the conversation and stakeholders' intentions, can be captured and used to support analysts achieving their tasks.Comment: 2018 IEEE 26th International Requirements Engineering Conference Workshop

    Driving online shopping: Spending and behavioral differences among women in Saudi Arabia

    Get PDF
    This study proposes a revised technology acceptance model that integrates expectation confirmation theory to measure gender differences with regard to continuance online shopping intentions in Saudi Arabia. The sample consists of 650 female respondents. A structural equation model confirms model fit. Perceived enjoyment, usefulness, and subjective norms are determinants of online shopping continuance in Saudi Arabia. High and low online spenders among women in Saudi Arabia are equivalent. The structural weights are also largely equivalent, but the regression paths from perceived site quality to perceived usefulness is not invariant between high and low e-shoppers in Saudi Arabia. This research moves beyond online shopping intentions and includes factors affecting online shopping continuance. The research model explains 60% of the female respondents’ intention to continue shopping online. Online strategies cannot ignore either the direct and indirect spending differences on continuance intentions, and the model can be generalized across Saudi Arabia

    Can ubiquity moderate m-banking resource-related negative effects?

    Get PDF
    El objetivo de este estudio es explorar la influencia de los inconvenientes de la banca móvil relacionados con la falta de recursos en la satisfacción de los clientes, su disposición a recibir marketing móvil de permiso y la emisión de boca-oreja. Analizando una muestra de 1429 usuarios de banca móvil, determinamos que la satisfacción de los clientes influye en su disposición a recibir marketing móvil de permiso y emitir boca-oreja, mientras que la disposición a recibir marketing móvil de permiso tiene un efecto positivo sobre la emisión de boca-oreja. Siendo la ubicuidad un atributo distintivo de la banca móvil, observamos su papel moderador, identificando que hay clientes que consideran la ubicuidad como una característica importante de la banca móvil, mientras que otros no la consideran relevante. Este estudio propone recomendaciones para mejorar el uso de los servicios de la banca móvil, evitando o disminuyendo los efectos negativos de sus inconvenientes.The objective of this study is to explore the influence of m-banking resource-related inadequacies on clients’ satisfaction with the banking services, their permission-based mobile marketing tendencies and word-of-mouth emission actions. Analysing a sample of 1429 users of mobile banking services, we determined that clients’ satisfaction influences their willingness to receive permission-based mobile marketing and to emit word-of-mouth, while the willingness to receive permission-based mobile marketing has a positive effect on the word-of-mouth emission. In order not to overlook the ubiquity as a distinguishing attribute of m-banking services, we observe its moderating role, identifying clients who consider ubiquity as an important m-banking characteristic and others who do not consider it relevant. Hence, attending the opinion of actual m-banking clients, this study proposes suggestions for improving the use of m-banking services by avoiding or lessening the negative effects of m-banking resource-related inadequacies
    corecore