88 research outputs found
Mobile Applications and Access to Personal Information: A Discussion of Users\u27 Privacy Concerns
Mobile applications (apps) have become highly popular and are creating new economic opportunities for app providers, developers, software companies, and advertisers. Due to the access to personal information, mobile apps may pose a threat to usersâ privacy, which can incite users not to install or to uninstall mobile apps. In the last twenty years, concerns for information privacy (CFIP) have been investigated by several studies, which adapted CFIP to an online and to a mobile context. Our extended approach for mobile usersâ information privacy concerns (MUIPC) analyzes four dimensions of access to personal information, i.e., personal identity, location, device content, and system and network settings. By conducting an online survey with 474 participants, we test the influence of these dimensions on MUIPC with a structural equation model (SEM). Three dimensions are found to be significantly influential. The results are discussed and implications for research and practice are given
Successful Mobile Application Development: Towards a Taxonomy of Domain-Specific Process Models and Methodologies
Mobile applications and mobile application development issues receive an increasing attention for practitioners and academics. The development of mobile applications is connected with a number of domain-specific issues and challenges (e.g., fulfilment of customer requirements or the prevention of high development costs). Consequently, the decision of the most effective process model to develop a mobile application plays a crucial role for software and mobile application development teams. With the help of a structured taxonomy-building methodology, we contribute to the extant literature by creating and presenting a taxonomy for process models and methodologies in software engineering and the mobile application development domain. The taxonomy enrich the existing knowledge base and can help mobile application developers to choose the most suitable process model or methodology. Based on our examination, our results indicate new directions for mobile application research and implications for mobile application development
Empirical studies on technology acceptance of mobile services and information security management
[no abstract
Moderation of Enterprise Social Networks â A Literature Review from a Corporate Perspective
The implementation of internal social collaboration technologies confronts corporations with new challenges. Former unidirectional information flows become multidirectional and user-content driven networks. Prior research describes the successful implementation as a challenging management task with employeesâ usage at the center of attention. Consequently, corporations need to select a moderation style to encourage the usage. The degree of corporate engagement might have repercussions on the contribution behavior. We conduct a structured literature review to identify pre-existing IS contributions to the moderation phenomenon in social media tools, which help to explain on how to moderate these communication platforms in the enterprise context. We reviewed over 150 articles on the subject and assessed 31 articles in depth on the degree of corporate engagement and user content encouragement. We analyze the identified literature for gaps in understanding the phenomenon and provide a first assessment of three different moderation approaches and give implication for future research
Technology Readiness in Customersâ Perception and Acceptance of M(obile)-Payment: An Empirical Study in Finland, Germany, the USA and Japan
In today`s mobile world there is a high potential for m(obile)-payment services, but the mere existence of such services does not mean that the market is ready for them. M-payment services must add value to attract new users. After years of research regarding technology acceptance (TA) of m-payment, the aim of this paper is to examine how technology readiness (TR) influences customersâ perception and acceptance of m-payment. TA of consumers in combination with TR is investigated for m-payment in Finland, Germany, the USA and Japan. We conduct an online survey to collect data in those four countries. We use that data to carry out a TA analysis using a structural equation model (SEM). The research model arises from the findings of a priori explorative study and a comprehensive literature review. Evaluation results based on an extended TA model (TAM) show that user acceptance of m-payment differs influenced by constructs
Investigating Technology Acceptance of Mobile Payment in Germany and the USA
In today`s mobile world there is a high potential for M(obile)-payment services, but the mere existence of such services does not mean market readiness. Added values of M-payment are necessary to attract new users. The aim of this work is to investigate whether M-payment is or can be accepted by the consumers. We will determine the technology acceptance of consumers, face to face with the M-payment for Germany and the USA. For this purpose, we will carry out a technology acceptance analysis using a structural equation modeling technique. The constructs of the research model arise from the findings of an explorative study and a literature review. The results of an extended technology acceptance model (TAM) based evaluation shows, that user acceptance of M-payment, especially the influence of the constructs, perceived ease of use and willingness-to-pay differ to the intention to use
A Matter of Trust? Examination of Chatbot Usage in Insurance Business
Critical success factors such as trust and privacy concerns have been recognized as grand challenges for research of intelligent interactive technologies. Not only their ethical, legal, and social implications, but also their role in the intention to use these technologies within high risk and uncertainty contexts must be investigated. Nonetheless, there is a lack of empirical evidence about the factors influencing userâs intention to use insurance chatbots (ICB). To close this gap, we analyze (i) the effect of trust and privacy concerns on the intention to use ICB and (ii) the importance of these factors in comparison with the widely studied technology acceptance variables of perceived usefulness and perceived ease of use. Based on the results of our online survey with 215 respondents and partial least squares structural equation modelling (PLS-SEM), our findings indicate that although trust is important, other factors, such as the perceived usefulness, are most critical for ICB usage
- âŠ