337 research outputs found

    Factors Driving Mobile App Users to Pay for Freemium Services

    Get PDF
    With the popularity of smart mobile devices, mobile applications (most commonly referred to as an App) have gradually grown up to be a huge commercial market. Therefore, as the variety and download counts of Apps in the application stores of the two biggest operating systems increase, how to make a profit from Apps has become the most concerned issue for developers. Today the freemium strategy is widely observed in mobile App markets. Freemium is a business model by which an App is offered free of charge, but a premium is charged for advanced features. Hence, the purpose of this study is to explore the factors driving mobile App users to pay for freemium services based on value-based adoption model. An online survey was conducted to collect empirical data in order to test the research model. The results of PLS analysis indicate that an App user’s intention to pay is determined by perceived value, a thorough comparison of benefits and sacrifices, and trust of developer. Furthermore, perceived value will be affected by perceived effort and perceived usefulness while the App user has no experience on premium service. Finally, the implications for practitioners and researchers are discussed

    Detection of Gray Hole Attack in Software Defined Networks

    Get PDF
    Gray Hole Attack is an advanced transformation of black hole attack. Both of them are a common type of attack in Wireless Sensor Network (WSN). Malicious nodes may constantly or randomly drop packets and therefore reduce the efficiency of the networking system. Furthermore Software Define Network (SDN) has been highly developed in recent years. In this type of networks switch/router functionality is separated into the control plane and data plane. Network managers can select control policies and build operating rules according to their own preferences. In addition, network protocols and packet fields are also programmable. Because the switch/router only implements the data transmission and executes the switching/routing decisions based on commends coming from control plane. Compromised switches/routers themselves or malicious control instructions both can result in selectively dropped packets. This makes a gray hole attack possible in the infrastructure of SDN. Therefore, this paper would like to discuss time-base and random-base gray hole attack in SDN, and then propose a useful detection method based on weighted K-Nearest Neighbor (KNN) and Genetic Algorithm (GA). The simulation data collected from switches/routers indicate that our method does demonstrate pretty good performance

    DIFFUSION OF THE INTERNET HOSTS

    Get PDF

    The Effects Of Persuasive Messages On System Acceptance

    Get PDF
    Firms have to invest millions of dollars to introduce a new system. If firms cannot persuade employees to accept and implement a system effectively, such investments are wasted. Since a given influence process may lead to differential outcomes, managers need to deliver influencing strategies to motivate employees and shape their behavior intentions related to system acceptance. This study integrates TAM, flow theory, and extends ELM to understand employees’ system acceptance. The findings indicate that two persuasive messages result in different influencing routes on employees’ emotional, functional, and utilitarian responses. Source credibility of persuasive messages has positive influence on playfulness, while argument quality of persuasive messages has positive influence on perceived ease of use and perceived usefulness. Attitude may play mediating roles in the relationship of playfulness-behavior intention and perceived usefulness-behavior intention

    OE-6 Building a Personal Brand on Social Media from Experiential Marketing Perspective - A Case Study on Indonesia’s Fashion Instagrammers

    Get PDF
    Instagram enhances online presence and identity, and allows more effective interaction not only for personal reasons, but also for business purposes. Experiential marketing is a new marketing concept that focusing on creative and innovative ways to appeal customers' senses, feelings, intellect, curiousity and self image rather than to rational, utilitarian notions of value. This paper aims to study about how the certain personality could build up their personal brand with Instagram as their main media from the experiential marketing view with the Analytical Hierarchy Process. Instagram fashion personal brands in Indonesia were the main source of the data collection. By the research, Sense factor is the most important strategic experiential module factor as in its relation with notable visual strength of Instagram. To be able to apply the Sense as a strategic experiential module, the consideration about tactical and practical factors are required. The 5 most important tactical factor is the Visual Elements factor, in which is about producing vivid content, Personality, a factor in terms of showing one true self, Relationship factor related to things about managing and maintaining relationships between stakeholders on Instagram environment, Signature, the factor about showing their own brand DNA, and Verbal Elements, the factor about communication in form of words. For practical factors are Image, by the image processing results and image taking directions, Apparel, with clothing combinations, style and brands, Authenticity, by being one true self, Caption, with the wording on every posts, and Brand and Followers, as brand to create a link or connection. As the implications, the fashion personal brands as the influencers could apply the key to draw attention from the audiences and make an impact to fashion enterprises in Indonesia

    WILL STOCK INVESTORS USE MOBILE STOCK TRADING? A BENEFIT-RISK ASSESSMENT BASED ON A MODIFIED UTAUT MODEL

    Get PDF
    ABSTRACT The purpose of this study is to investigate the determinants of stock investors' intention towards using mobile stock trading. Based on a modified UTAUT (unified theory of acceptance and use of technology) with risk perceptions, a comprehensive research model was proposed. An empirical survey with a valid sample of 329 stock investors was conducted in Taiwan to test the research model. The analysis results of PLS reveal three positive determinants (i.e., performance expectancy, effort expectancy, and social influence) and three negative determinants (i.e., security risk, economic risk, and functional risk) that significantly influence stock investors' behavioral intention to use mobile stock trading. Furthermore, the results of moderating effect analysis indicate that gender differences moderate the effects of social influence on behavioral intention to use mobile stock trading, while age differences moderate the impact of effort expectancy on mobile stock trading use intention. This implies that to facilitate the intention to use mobile stock trading, securities firms need to consider stock investors' technological perceptions and risk perceptions of this type of trading. The findings of this study not only have important implications for m-commerce research, but also provide insights for securities firms and developers of mobile stock trading systems

    Building Ubiquitous Computing Environment by Using RFID in Aircraft MRO Process

    Get PDF
    The implementation of RFID had aroused discussion in every area. Experts believe that the emergence of RFID will cause another business revolution. Many industries had deployed RFID, like aviation industry, in which RFID is used in maintenance materials and baggage management. This paper discusses the implementation of RFID in MRO process and the building of a ubiquitous computing environment. We believe that our proposal has three merits to MRO (1) anti-counterfeit parts (2) MRO liability (3) efficient and effective inspection. The architecture can address the competition pressure that aviation industry faces and consequently enhance competition advantages

    Special Issue in Honor of Prof. Ting-Peng Liang’s Lifetime Contribution to the Service Innovation Discipline

    Get PDF
    This special issue is dedicated to the reminiscences of TP for his significant contributions to the global IS discipline. This PAJAIS special issue solicits research submissions that are related to the Service Innovation discipline, one of TP’s key areas of research. Since service-oriented economy is evolving into experience economy, the research topics regarding how to design products, services, information systems, and mobile services to increase users’ experience value are becoming more and more important. From a service logic perspective, innovative service design focus on how they change customer thinking, participation, and capabilities to co-create value rather than new features in order to enhance user experience. Hence, this special issue focuses on issues related to service innovation, service quality & user experience (UX)
    • …
    corecore