首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
This study examines factors influencing adoption and use of computer-based voice over Internet protocol (VoIP) phone service and attempts to integrate 2 theoretical approaches: the technology acceptance model (TAM) and the uses and gratifications framework. Using data from an online survey of VoIP users ( N = 420), structural equation modeling analyses revealed that perceived ease of use had a significant impact on perceived usefulness. In addition, perceived usefulness had a positive effect on actual VoIP use. The study further discovered that motivations for communication and instrumental use significantly affected perceived ease of use, perceived usefulness, and actual VoIP use. This study suggests that integration of TAM and uses and gratifications can be fruitful in understanding user acceptance of new communication technologies.  相似文献   

2.
Recognizing that new and old media coexist in media markets, the overarching aim of this study is to investigate how the perceived characteristics of online video platforms and consumer-related factors affect consumer intention to use the Internet and television to watch video content. The primary theoretical foundations are the theory of planned behavior (TPB) and the technology acceptance model (TAM). By extending TAM and TPB into other constructs, the present study aims to provide richer explanations for consumers’ choice of a video platform in the competitive video marketplace. This study used a survey method to collect data. A total of 1500 adults throughout the US who use the Internet were employed for the sample of the main survey. For the analysis to test hypotheses, 388 responses were used. This study found that the more consumers perceive online video platforms differ from television in satisfying their needs, the more likely they are to use online video platforms. The relative advantage and compatibility of online video platforms decrease the likelihood of using television.  相似文献   

3.
As smartphone penetration continues to double in Sub-Saharan Africa, many businesses are looking into this channel for conducting their business activities. In Cameroon, all the top e-commerce giants have deployed smartphone applications to facilitate m-commerce activities. However, little is known about the factors that influence m-commerce adoption in the country. As such, this study had as objective to determine the key factors that influence consumer’s adoption of m-commerce applications in Cameroon. Using data from 372 respondents, a modified version of the extended unified theory of acceptance and use of technology (UTAUT2) was validated in the Cameroon context. The findings showed that social influence, facilitating conditions, hedonic motivations, perceived risk and perceived trust were significant predictors of the behavioural intention to adopt m-commerce applications. Also, the results showed that consumers who had a high intention to adopt m-commerce were more likely to recommend the technology to others. For researchers, the study depicts the relevance of extending existing technology acceptance models like the UTUAT2 with appropriate factors in different technological and geographical context. For practitioners, the study identifies customer-specific and environmental factors that m-commerce providers in Cameroon and other regions with similar characteristics could consider when designing and implementing strategies for attracting consumers to use their m-commerce applications.  相似文献   

4.
Internet of Things (IoT) is a new vision of the future technological ubiquity in ubiquitous computing, which becomes the mapping from the real world to the digital one. Radio frequency identification (RFID) technology is a key enabler of the future IoT and it has a great economical potential. However, the RFID system uses of Electronic Product Code (EPC) tags can drastically threaten the security of applications. With the widespread use of RFID technology, its security problems become the hot topic in the academic and industrial fields. Aiming at the RFID network's security problems, we propose a novel P2P based RFID network architecture (P2P-RFID), and analyze the security problems in this kind of network. And a feasible and scalable protocol to guarantee P2P-RFID network security is also presented in this paper. The proposed protocol uses P2P storage technology together with the utilizing of asymmetric encryption algorithm (RSA) based authentication. An analysis proves that the presented protocol is secure. Moreover, the protocol authentication does not require a Certificate Authentication (CA) database, which avoids the single-point bottleneck.  相似文献   

5.
This study provides insights into the potential impact of country culture on consumers’ perceptions toward usage of new innovative technological services. Focusing on mobile banking (m-banking), this work compares responses from three distinct consumer segments, including– 1) consumers living in Egypt, 2) consumers from Egypt who are living in the U.S. and 3) U.S. consumers. The study utilizes constructs from the Technology Acceptance Model (TAM) including, perceived ease of use and perceived usefulness, along with perceived risk, trust and social influence to examine the differences between these three distinct consumer segments’ usage intentions toward mobile banking. The hypothesized model was tested using structural equation modeling (SEM). Results indicate that country culture (both primary and secondary) can, to some degree, influence consumers’ perceptions and intentions toward mobile banking. Implications and future research suggestions are provided.  相似文献   

6.
Most modern people inevitably use smart phones for their daily activities. These devices are more than just telephones and a means to connect with others for many people. They are also fashionable products. This study utilizes two models—the Technology Acceptance Model (TAM) and the Unified Theory of Acceptance and Use of Technology (UTAUT)—to explore whether cognitive age is an important factor influencing technology acceptance behavior. We conduct a comparative analysis using the two models in the context of smartphones. Our results using model 1 show that perceived usefulness, perceived ease of use, fashion involvement, and flow are all significant factors in technology acceptance and use by digital natives (i.e. those under 34 years old). The results of model 2, which divides digital immigrants into two groups, reveal that perceived usefulness, perceived ease of use, and flow are significant for digital immigrants who perceive themselves to be younger than their chronological age. For digital immigrants who perceive themselves to be as old as or order than their chronological age (cognitive age> = 34 years old), only perceived usefulness is significant. Finally, we discuss these results and make suggestions relevant to technology acceptance and use in different cognitive age groups.  相似文献   

7.
An e-vendor's website inseparably embodies an interaction with the vendor and an interaction with the IT website interface. Accordingly, research has shown two sets of unrelated usage antecedents by customers: (1) customer trust in the e-vendor and (2) customer assessments of the IT itself, specifically the perceived usefulness and perceived ease-of-use of the website as depicted in the technology acceptance model (TAM). Research suggests, however, that the degree and impact of trust, perceived usefulness, and perceived ease of use change with experience. Using existing, validated scales, this study describes a free-simulation experiment that compares the degree and relative importance of customer trust in an e-vendor vis-a-vis TAM constructs of the website, between potential (i.e., new) customers and repeat (i.e., experienced) ones. The study found that repeat customers trusted the e-vendor more, perceived the website to be more useful and easier to use, and were more inclined to purchase from it. The data also show that while repeat customers' purchase intentions were influenced by both their trust in the e-vendor and their perception that the website was useful, potential customers were not influenced by perceived usefulness, but only by their trust in the e-vendor. Implications of this apparent trust-barrier and guidelines for practice are discussed.  相似文献   

8.
M-commerce is defined as any direct or indirect transaction conducted and facilitated through a wireless telecommunication network. There are currently 94.9 million M-commerce users worldwide in 2003 and the segment is expected to grow to 1.67 billion by 2008. This research explores how Singaporeans are influenced to adopt the M-commerce. The research employs the Technology Acceptance Model (TAM) to examine factors affecting Singaporeans’ attitudes toward this emerging mobile technology and applications.The research uses a quantitative approach to survey 866 Singaporean students examining their decision-making process to adopt M-commerce. Empirical data from regression analyses reflect consumer perceived usefulness (PU) influence attitude toward using (AT) M-commerce. It is also found consumer innovativeness, past adoption behavior, technology cluster adoption, age, and gender affect their adoption behavior. Results from multiple regression analyses further reveal that male respondents tend to perceived M-commerce favorably.The majority of positive relationships between PU, PEOU, AT, innovativeness, adoption behavior, and demographics are supported by the empirical data. Results also support the applicability of TAM and its extension to examine M-commerce adoption by Singapore consumers. This research also validates the robustness of TAM to study emerging technologies outside the U.S. context.  相似文献   

9.
Using a technology acceptance model (TAM) and uses and gratification theory (U&G) as primary theories, this exploratory study investigates what factors promote or hinder the use of video sharing websites. Theoretically, this study attempts to examine the integration of TAM and U&G with other perceptions of video sharing sites and consumer characteristics. Practically, the investigation provides video sharing websites with insights into the appeal of their sites to audiences. In addition, this study may help offline video media counter the threats from the drastic growth of video sharing websites. The findings concludes that those males who use the Internet for emotional pleasure and excitement, perceive video sharing websites to have greater usefulness, ease of use, substitutability, and content variety are more frequently using video sharing websites. With respect to service evaluation factors, content variety appears to mitigate the negative effects of content quality, loading speed, screen size, display resolution, and audio quality on video sharing websites.  相似文献   

10.
With a value-sensitive approach in mind, a theoretical and empirical analysis was conducted and reported here to explain the factors that influence potential user adoption of cloud computing by integrating quality factors as well as cognitive motivations as primary determining factors. The factors are explored as human values and the methodology how designers should take these values into account is examined. The results show that user intentions and behaviors are largely influenced by the perceived values of cloud services, which include availability, access, security and reliability. These values were found to be the significant antecedents of usefulness and ease of use in cloud computing. Theoretically, the model proposed in this paper advances the existing technology acceptance models and can be used to predict the acceptance and diffusion of cloud computing. Practically, the findings should guide the government and industry promoting cloud services to increase user acceptance by enhancing user experience and ensuring security.  相似文献   

11.

RFID technology, which is concerned as one of the core technologies of Internet of Things, has been widely deployed in healthcare environment and brings a lot of convenience for people’s daily life. However, the security and privacy challenges of RFID authentication protocols are receiving more and more attention. One of the problems is that the current RFID protocols usually use a backend server to store the detailed information of tagged objects, which may lead to the issue of information leakage if the server is hacked or attacked by the adversary. To address this challenge, in this paper, we propose a security enhanced RFID authentication protocol for healthcare environment using the technique of indistinguishability obfuscation, which prevents the leakage of sensitive data from the backend server. Meanwhile, we extend the protocol to fit for the scenario of cloud environment where the tags’ information is stored in the cloud server. To our knowledge, our protocols are the first applications of indistinguishability obfuscation in the field of RFID authentication system. Moreover, our protocols are scalable and practical, and they are analyzed to achieve most of the security properties of the RFID system.

  相似文献   

12.
The rapid growth of artificial intelligence (AI) technology has prompted the development of AI-based intelligent products. Accordingly, various technology acceptance theories have been used to explain acceptance of these products. This comparative study determines which models best explain consumer acceptance of AI-based intelligent products and which factors have the greatest impact in terms of purchase intention. We assessed the utility of the Technology Acceptance Model (TAM), the Theory of Planned Behavior (TPB), the Unified Theory of Acceptance and Use of Technology (UTAUT), and the Value-based Adoption Model (VAM) using data collected from a survey sample of 378 respondents, modeling user acceptance in terms of behavioral intention to use AI-based intelligent products. In addition, we employed decomposition analysis to compare each factor included in these models in terms of influence on purchase intention. We found that the VAM performed best in modeling user acceptance. Among the various factors, enjoyment was found to influence user purchase intention the most, followed by subjective norms. The findings of this study confirm that acceptance of highly innovative products with minimal practical value, such as AI-based intelligent products, is more influenced by interest in technology than in utilitarian aspects.  相似文献   

13.
This study conducted a cross-cultural analysis of the impact of knowledge management (KM) practices on the acceptance of Massive Open Online Courses (MOOCs). The study extended the Technology Acceptance Model (TAM) with KM practices. A structural equation modeling (SEM) was employed to test the hypothesized relationships based on data collected from 540 engineering students in Malaysia and Turkey. The results indicated that KM practices, including knowledge access, knowledge storage, and knowledge application have a positive and significant impact on perceived usefulness (PU) of MOOCs. However, knowledge sharing has a positive and significant impact on perceived ease of use (PEOU) of MOOCs. Further, a SEM-based multi-group analysis was employed to identify the moderating role of culture in examining the impact of KM practices on MOOCs acceptance. The findings suggested cultural differences in patterns between acceptance behaviors of engineering students in Malaysia and Turkey.  相似文献   

14.
基于RFID技术的物联网安全隐患研究   总被引:2,自引:1,他引:1  
魏绍蓉 《现代电子技术》2012,35(14):76-78,82
RFID技术在各个领域的成熟应用,促使其与物联网的应用密不可分。但是目前基于RFID技术的物联网应用中数据安全性保证和隐私安全问题已经成为未来物联网发展的瓶颈,所以基于RFID技术的物联网安全隐患的研究已经成为一个迫在眉睫和广为关注的问题。在此对RFID技术、RFID系统组成、工作原理以及对基于RFID技术的物联网构成要素进行了分析;同时对造成物联网潜在与安全隐患产生的主要原因、主要攻击方式、安全策略进行了研究。  相似文献   

15.
射频识别技术是一种无线自动识别技术,通过射频信号识别目标并进行数据交换,RFID可跟踪和识别物体,并可在商业活动进行中自动收集数据。RFID技术在物联网中具有广泛的应用,但在实际应用环境中,RFID面临着信息安全和隐私保护方面的问题和风险。文中主要针对射频识别系统的安全问题、安全需求、可能受到的攻击以及解决策略等方面展开讨论,旨在从技术层面分析射频识别系统的隐私和安全问题,并提出一些可行的解决策略,减少了对RFID系统带来的影响。  相似文献   

16.
The explosion in recent interest in radio-frequency identification (RFID) tags stems primarily from advances in information processing in supply chain management. Given their processing power and memory capabilities, RFID tags can be used in a wide range of applications including those where barcodes can and cannot be used. Although the potential exists, it is hampered by the relatively high unit cost of implementation and issues related to privacy and security. As with any technology, unit cost of RFID tags and their related systems is bound to come down. As for security and privacy issues, the main impediments are limited processing power, memory, and external power to operate these tags. In spite of these resource constraints, recent years have seen a plethora of new authentication protocols that promise to alleviate security and privacy concerns associated with the use of RFID tags. We evaluate a few protocols that have been suggested for use in passive RFID-tagged systems and identify vulnerabilities that may be present. When appropriate, we present modifications of existing protocols to prevent identified vulnerabilities.  相似文献   

17.
Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be addressed. Due to the wireless transmission of the RFID system, malicious people can gain the information in the RFID tags, and the user’s privacy is invaded. Although there have been many protection methods proposed for RFID security, the system has remained vulnerable to various attacks. In this paper, we propose a conforming of the EPCglobal Class 1 Generation 2 standards RFID ownership transfer protocol with provable security. The proposed scheme can resist several attacks and ensure a secure transaction.  相似文献   

18.
李冉 《电子测试》2016,(9):163-164
互联网的发展,移动商务的爆发式增长使消费者对移动电子支付产生了越来越强的依赖.随着新的市场参与者的加入,移动电子支付领域的竞争也越来越激烈.因此,探究消费者使用移动电子支付的影响因素显得犹为重要.基于技术接受模型(Technology Acceptance Model,ATM)和计划行为理论(Theory of Planned Behavior,TPB)影响消费者使用移动电子支付的因素有:感知有用性,感知易用性,兼容性,个人主观规范,感知风险和感知信任.通过实证调研得出如下结论:感知有用性,感知易用性,兼容性,个人主观规范和感知信任对消费者使用移动电子支付有正向影响;感知风险对消费者使用移动电子支付有负向影响.  相似文献   

19.
Artificial Intelligence (AI) agents are predicted to infiltrate most industries within the next decade, creating a personal, industrial, and social shift towards the new technology. As a result, there has been a surge of interest and research towards user acceptance of AI technology in recent years. However, the existing research appears dispersed and lacks systematic synthesis, limiting our understanding of user acceptance of AI technologies. To address this gap in the literature, we conducted a systematic review following the Preferred Reporting Items for Systematic Reviews and meta-Analysis guidelines using five databases: EBSCO host, Embase, Inspec (Engineering Village host), Scopus, and Web of Science. Papers were required to focus on both user acceptance and AI technology. Acceptance was defined as the behavioural intention or willingness to use, buy, or try a good or service. A total of 7912 articles were identified in the database search. Sixty articles were included in the review. Most studies (n = 31) did not define AI in their papers, and 38 studies did not define AI for their participants. The extended Technology Acceptance Model (TAM) was the most frequently used theory to assess user acceptance of AI technologies. Perceived usefulness, performance expectancy, attitudes, trust, and effort expectancy significantly and positively predicted behavioural intention, willingness, and use behaviour of AI across multiple industries. However, in some cultural scenarios, it appears that the need for human contact cannot be replicated or replaced by AI, no matter the perceived usefulness or perceived ease of use. Given that most of the methodological approaches present in the literature have relied on self-reported data, further research using naturalistic methods is needed to validate the theoretical model/s that best predict the adoption of AI technologies.  相似文献   

20.
While China has seen the widespread adoption of facial recognition payment, concerns over the potential risks impede the further growth of user acceptance. Drawing on the perspectives of perceived value and trust, we developed a research model to explore how the Chinese users’ trade-off between perceived benefits (perceived convenience and perceived novelty) and perceived risks (perceived privacy risk and perceived financial risk) influences their usage intention. Based on survey data from 1,200 Chinese mobile payment users, this study uses structural equation modeling to examine the hypotheses. Our results show that perceived convenience positively influences perceived value, while privacy risk and financial risk negatively influence perceived value and trust. Although perceived novelty has no significant effect on perceived value and trust, perceived value positively influences trust, and both of them have a positive effect on the intention to use. Furthermore, our moderation analysis indicates that the influence of perceived value on the intention to use is stronger among users who consider facial information to be more sensitive. The theoretical implications for research as well as the practical implications for practitioners are also discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号