29 research outputs found

    Do IoT Users Trade off their Information Privacy?

    Get PDF
    The advent of the Internet of Things (IoT) has not only improved people’s quality of life but also raised concerns about information privacy. Although several studies have been conducted regarding information privacy concerns, there has not been sufficient discussion of the information privacy trade-off behavior in the IoT environment. Because previous studies only indirectly measured the information privacy trade-off behavior, the understanding of the behavior itself or its cause is limited. To address this issue, this study explored information privacy trade-off behavior in more depth using a large-scale sample and two-step analysis. Both panel data (23,724 samples for three years) and cross-sectional data (350 samples) were used in the analysis. The analysis results confirmed the existence of the information privacy trade-off for IoT users. Furthermore, it was found that the trade-off is associated with the social value of IoT devices and that men with IoT experience predominantly have strong trade-off behavior

    Understanding Perceived Privacy: A Privacy Boundary Management Model

    Get PDF
    Consumer data is asset to organizations. Analysis of consumers’ transactional data helps organizations to understand customer behaviors and preferences. Before organizations could capitalize on these data, they ought to have effective plans to address consumers’ privacy concerns because violation of consumer privacy brings long-term reputational damage to organizations. This paper proposes and tests a Privacy Boundary Management Model that explains how consumers formulate and manage their privacy boundary. Survey data was collected from 98 users of online banking websites who have used the system for a minimum of six months. The PLS results showed that the model accounts for high variance in perceived privacy. Three elements of the FIPs (notice, access, and enforcement) have significant impact on perceived effectiveness of privacy policy. Perceived effectiveness in turns significantly influences privacy control and privacy risks. Privacy control affects perceived privacy and trust while privacy risk influences privacy concern and perceived privacy. Privacy concern has a negative relationship with perceived privacy and trust has a positive relationship with perceived privacy. The findings have novel implications for organizations and policy makers

    Determinants Of The Successful Usage Of A Firm’s Sns Page

    Get PDF
    This research-in-progress paper aims to investigate the determinants for the successful usage of social network services (SNS) from the perspective of a firm. A new type of commercial community operated by a firm in public SNS is defined as a firm’s SNS page and the success of encouraging users’ adoption and continued usage of a firm’s SNS page is further defined as SNS success. Based on solid theoretical foundation of communicative ecology theory, a conceptual research model of SNS success is proposed. It is composed of the content quality, service quality, and social interaction quality as antecedents. Among these elements, social interaction quality is newly developed to reflect the value of interaction among community members as a second-order variable which consists of exchange information, social support, and friendship. In addition, incentives and the network size are examined as moderating variables. After building the research model and hypotheses, the measurement scales and the results of a pilot study to verify the items are described. At the end of the paper, the conclusion and the expected contribution are discussed

    Free to Paid: Purchase and Dropout Behavior of Mobile Application Users

    Get PDF
    Since mobile application market was open, developers have been seeking for strategies to maximize their profit. However, there is little research on user behavior of mobile applications for its short history. In this study, we conducted an exploratory study on mobile application users with actual usage data of Weather On. The result indicates positive relation between the premium conversion rate and the logarithm of the market wealth. It is observed that most of the users take only a short time to make a purchase or dropout decisions. Also, we suggest that push message can induce user responses in a positive or negative way

    Understanding Emotion-focused and Problem-focused Threat Avoidance Behavior of Ride-sharing Service Users in China: A Focus on the Moderating Effects of Use Context

    Get PDF
    This study discusses the location-sharing services and safety features provided by China\u27s ride-sharing firm DiDi. It focuses on the customers\u27 response behaviors when dealing with heightening crime risk in relation to car ride-sharing services. To this end, this study introduces use contexts concept based on the perspectives of problem and emotion-focused coping and performs an empirical study on users’ threat avoidance behavior. Surveys are distributed to ride-sharing service users and location-sharing service users who lived in the Guangdong Province. The survey results provide a number of theoretical and practical implications

    IoT Smart Home Adoption: The Importance of Proper Level Automation

    No full text
    The word “smart” has been used in various fields and is widely accepted to mean intelligence. Smart home service, one of the representative emerging technologies in the IoT era, has changed house equipment into being more intelligent, remote controllable, and interconnected. However, the intelligence and controllability of a smart home service are contradictory concepts, under certain aspects. In addition, the level of intelligence or controllability of a smart home service that users want may differ according to the user. As potential users of smart home services have diversified in recent years, providing the appropriate functions and features is critical to the diffusion of the service. Thus, this study examines the smart home service features that current users require and empirically evaluates the relationship between the critical factors and the adoption behavior with 216 samples from Korea. The moderating effect of personal characteristics on behavior is also tested. The results of the analysis provide various theoretical and practical implications

    7S Model for Technology Protection of Organizations

    No full text
    Given the importance of technologies to organizations, technology leakages can cause considerable financial losses and threaten the survival of firms. Although organizations use technology protection diagnostic models to prevent such leakages, most diagnostic models focus on cybersecurity, and the evaluation system is complex, making it difficult for SMEs to use it. This makes them unsuitable for the general technology protection diagnosis of companies. Hence, this study proposes a diagnostic model that assesses these technology protection capabilities of organizations from personnel and administrative perspectives. Drawing upon the individual elements of the 7S model—shared values, strategy, structure, systems, staff, style, and skills—our model analyzes the influence of the elements on the technology protection capabilities of organizations. To determine this influence, the study conducts a questionnaire survey among 435 employees from large, larger medium-sized, and small and medium enterprises. Using the partial least squares and the artificial neural network methods, the study determines the ranking of the relative importance of the 7s elements. The results show that the shared values element most significantly influences these capabilities. The remaining elements influence the technology protection capabilities in the following order from the greatest to the least effect: staff, strategy, structure, systems, style, and skills. These findings highlight the significance of developing an awareness of the necessity of technology protection among all the members of an organization

    CONFIRMING THE EFFECT OF DEMOGRAPHIC CHARACTERISTICS ON INFORMATION PRIVACY CONCERNS

    Get PDF
    Existing studies on information privacy have largely discussed behavioral determinants of information privacy concerns (IPC). There has been a lack of direct examination on the relationship between demographic characteristics of consumers and IPC. The few studies that did report the linkage produced inconsistent findings. In this study, we aimed to investigate the relationship between consumers’ demographic characteristics and IPC with data from a large sample of 9,840 respondents provided by the Korea Information Society Development Institute (KISDI). The results demonstrated that educational attainment and income level exerted effects on IPC in line with existing studies. But the effects of gender and age are different from those identified in existing studies. This study is significant in that by confirming the results of previous studies, it enables generalization of empirical findings. Meanwhile, the results that contrasted previous findings facilitate the discovery of new research topics and discussion
    corecore