37 research outputs found

    Adoption of Mobile Service UpgradeL New and Current Users

    Get PDF
    The third generation (3G) mobile channels allow individuals to download digital content in anytime, at anywhere. The 3G mobile services include services like peer chatting, mobile games and movie download. While many studies explore why individuals adopt 3G mobile services, most of them consider 3G adoption to be a new technology adoption. Will users’ experience on older version of mobile services (e.g. 2G and 2.5G) influence their adoption decision on their 3G adoption? Hypotheses linking variables based on diffusion innovation technology and user’s mobile services usage background were developed. We conducted a survey and collected 175 responses. Our findings establish that different factors affecting users who have used the older version of mobile services and users’ decision to use or not to use 3G mobile services is a service upgrade decision, rather than an adoption decision

    Home Computer User Security Behavioral Intention: A Replication Study from Guam

    Get PDF
    This replication study is a methodological replication of Study 1 of Anderson and Agarwal (2010) (A&A) using data collected from Guam to investigate information security (InfoSec) behavioral intention. This study also extended the A&A Model by examining the effect of gender on each construct of the model. Our findings are very similar to those reported by A&A, and indicate that the model is generalizable to the population on Guam. We also observed the effect of gender on several constructs of the model. As this study cannot confirm whether the slight differences between the result of A&A and this study are related to cultural differences, we suggest future replication studies be conducted to examine how culture would affect our security behavior intention. We also suggest practitioners consider gender as an important factor when designing mechanisms to encourage people to practice information security behavior

    An Exploratory Study on the Impact of Trust on Different E-Payment Gateways: Octopus Card Vs. Credit Card

    Get PDF
    The study of trust of consumer on Business-to-Consumer (B2C) E-commerce is one of the key research interests of Information Systems (IS) researchers. In this research, we investigate the impact of trust on two different E-payment gateways, viz. online credit card payment system and the hypothetical online Octopus card (a stored-value smart card) payment system. Based on the model developed by Gefen et al. (2003) and McKnight et al. (2002a), we synthesize our own research model by incorporating disposition to trust, and trust and its antecedents with the Technology Acceptance Model (TAM). An online survey was conducted on the Government-to-Citizen (G2C) E-commerce portal of the Hong Kong Government and 2,481 usable responses were collected. The empirical result shows that consumers in Hong Kong are using different trust building processes to consider their adoption for E-payment gateways

    The Impacts of Information Privacy, Monetary Reward, and Buyers’ Protection Excess on Consumers’ Utility Using E-payment Gateways: A Conjoint Analysis

    Get PDF
    This paper reports our findings on the impacts of information privacy, financial reward, and buyers’ protection excess on consumers’ utility using E-payment Gateways. We invited users of the G2C E-government Portal of Hong Kong to participate in an online experiment and collected data from 1,795 subjects. From our conjoint analysis, we find that monetary reward has the most significant impact on consumers’ utility among the six design attributes of E-payment Gateways investigated in this study, i.e. monetary reward, online transfer of information, acceptability, buyers’ protection excess, anonymity, and physical control. We also observe that there is a gender impact on the relative importance of these attributes

    Unveiling Formations and Outcomes of Digital Consumer Frauds: An Expanded Routine Activity Theory Perspective

    Get PDF
    The rapid expansion of the Internet has spawned diverse business opportunities, reshaping sectors and fostering innovation. However, the intricate nature of underlying technologies and business models poses challenges, hindering adoption and creating opportunities for digital consumer fraud. This study explores digital consumer fraud using the case of JPEX, a Hong Kong cryptocurrency exchange under investigation since September 2023. The research aims to identify characteristics, external conditions, and outcomes, enhancing understanding and awareness of such frauds\u27 implications. Based on the Routine Activity Theory (RAT) perspective, our ongoing research suggested (1) a definition extension on guardianship as crime conditions, (2) the impact of market conditions on fostering crime opportunities, (3) unwitting collaborators as the 4th crime conditions and (4) characteristics and outcomes of digital consumer fraud businesses

    From a role-playing game (RPG) to a brand: Strategic implications from an over-two-decade case

    Get PDF
    By offering a delightful experience, role-playing games (RPGs) have attracted many players. However, their development has been challenged by issues such as the emergence of online/mobile games and the proliferation of pirate copies. Therefore, RPG developers should consider different strategies to sustain the RPG series. We conducted a case study on “Chinese Paladin,” an RPG series that has been successful for over two decades in the Greater China region. We identified four strategies for an RPG to sustain itself and develop into a brand, namely (1) timeline-moving strategy, (2) crossover strategy, (3) sublimation strategy, and (4) cross-media strategy. We also highlighted some theoretical and potential implications related to RPG and information systems (IS) brand development

    Consumers’ Online Brand Attacking and Defending Under Ideological Polarisation: A Case of Cantopop Group “Mirror”

    Get PDF
    This paper reports the preliminary findings of a netnographic case study that investigates how online brand defending and attacking behaviours are influenced by ideological polarisation. Mirror, a Cantopop group from Hong Kong that pro-Beijing Internet users have targeted, has been selected as the subject of this study. Our preliminary findings show that online brand defending and attacking behaviours for or against a brand may be explained by a modified, looped Belief-Action-Outcome (BAO) framework under ideological polarisation, which complements existing research on Internet users’ impact on brand management and sheds light on politically-driven online brand-attacking behaviours. Results also show that brand-attacking behaviours would further polarise, and thus de-stabilise society. We plan to collect and incorporate further data for more in-depth analyses for building a holistic model to explain the relationships of ideological polarisation on brand defending and attacking behaviours, and their impacts on business and organisation strategies

    Consumer E-Service Evaluation in Hong Kong Online Music Subscription Service Industry

    Get PDF
    This study investigates into factors affecting the success of E-service using a research model grounded on the Updated DeLone and McLean Information System Success Model (DeLone & McLean, 2003). Fourteen factors originated from four constructs, i.e., system quality, information quality, service quality, and vendor dimensions, are included in our research model. Using the online music subscription industry in Hong Kong as the platform of our investigation, we examine the associations between these four constructs and customer preference in the online music subscription service industry in Hong Kong. We collected data from 135 college students from Hong Kong to test our model using the Analytical Hierarchy Process (AHP). We show that each E-business success construct in our model has different levels of importance in E-service success in the online music subscription service industry. Our findings provide decision makers of E-business firms with useful insights to enhance their E-service quality

    The Use of Social Media for Engaging People with Environmentally Friendly Lifestyle: A Conceptual Model

    Get PDF
    Some recent research has investigated factors affecting household recycling and waste reduction behavior (Ho and So, 2017; Nishio and Takeuchi, 2005) in traditional media platforms like newspaper, radio, and television, but scant related to social media. In this study, we develop a conceptual model for comparing how traditional media and social media can be used as platforms for promoting and engaging young people in adopting an environmentally friendly lifestyle. We are particularly interested in the impact of social media on the engaging young people because: (i) there is huge population of young and active users on social media; and (ii) prior research reports that social media may contribute for value co-creation (See-To and Ho, 2014) in a marketing campaign through the interactions among the users and the owner of the social media, thus affecting the users’ behavior accordingly
    corecore