共查询到20条相似文献,搜索用时 0 毫秒
1.
This study investigated the association between trust in individuals, social institutions and online trust on the disclosure of personal identifiable information online. Using the Internet attributes approach that argues that some structural characteristics of the Internet such as lack of social cues and controllability are conducive to a disinhibitive behavior it was expected that face to face trust and online trust will not be associated. In addition, it was expected that from the three components of trust, online trust only will be associated with the disclosure of identifiable personal information online. A secondary analysis of the 2009 Pew and American Life of Internet users (n = 1698) survey was conducted. In contrast with the Internet attribute approach the effect of trust in individuals and institutions was indirectly associated with the disclosure of identifiable information online. Trust in individuals and institutions were found to be associated with online trust. However, online trust only, was found to be associated with the disclosure of personal identifiable information. While trust online encourages the disclosure of identifiable information, perception of privacy risks predicted refraining from posting identifiable information online. The results show a complex picture of the association of offline and online characteristics on online behavior. 相似文献
2.
Firms have at their disposal an increasing amount of personal information about consumers gathered through various means.
Studies find that personalizing online interactions improves customer relationships and increases desirable behaviors, such
as positive word-of-mouth and increased purchase intent. However, other research suggests that the use of personal information
stimulates privacy concern, which has a negative effect on behavior. This study examines potential moderators of the negative
effects of privacy concern on behavioral intentions in the context of personalized online interactions. Results show that
increasing perceived information control reduces the negative effect of privacy concern on intentions to engage in positive
behaviors. In contrast, the offer of compensation has no effect on the relationship between privacy concern and these behavioral
intentions. However, compensation increases the salience of trust to privacy concern. 相似文献
3.
Consumer-generated self-disclosure is better than firm-generated advertising and sales reports in increasing contact opportunities and also more credible for firms to foster alignment with future market expectations. Previous research mostly assesses online self-disclosure from the rational approach of anticipated benefits and privacy risks without considering the “privacy paradox” phenomenon (users behave contrarily to privacy concern) in social networking sites (SNSs). We develop a theoretical model, grounded in constraint-based (lock-in) and dedication-based (trust-building) mechanisms and social identity theory, to predict online self-disclosure. We test the proposed theoretical model by surveying 395 consumers with participation experience in an online SNS. Different from the rational approach behind personalization, we advance knowledge on how to apply social identity, as well as constraint-based and dedication-based mechanisms, to motivate online self-disclosure induced by consumers. We provide theoretical and practical insights based on our research findings for managing the motivational mechanisms of online self-disclosure. 相似文献
4.
Based on assumptions from entertainment theory, an online-study (N = 419) was conducted to investigate the differential relationships between enjoyment and appreciation of a video clip that dealt with the features of natural gas as fuel for cars, objective and subjective knowledge about the content of that clip, and behavioral intentions of dealing with the topic of natural gas. Structural equation modeling revealed that enjoyment was directly positively related to objective and subjective knowledge. However, objective knowledge did not predict and subjective knowledge was only weakly associated with behavioral intentions. Appreciation, in contrast, was directly negatively related to knowledge acquisition and not related to subjective knowledge, but was the best predictor for behavioral intentions. These results point to the distinct processes and relationships of different entertainment experiences. Implications for entertainment–education and online video portals are discussed. 相似文献
5.
Non-empirical publications have espoused the importance of monitoring/controlling children’s online and computer activities through monitoring software; however, no empirical research has verified whether this is a viable means for promoting responsible and safe internet use. This study examined the association between parenting behaviours and adolescent online aggression. The sample included 733 adolescents (451 females), between 10 and 18 years, from Western Canada. Participants completed a questionnaire that included questions on internet aggression, and parenting. The parenting questions were modified from Stattin and Kerr’s (2000) questionnaire to better suit the online environment. Results from the univariate least squares factor analysis revealed two distinct factors: (1) Parent Solicitation (parents ask where child is going on the internet), (2) Child Disclosure (child naturally tells parents what they are doing). Hierarchical Linear Regression analysis revealed that having a computer in the bedroom increased the likelihood of engaging in online aggression and that adolescent self-disclosure of online behaviours (and not controlling or monitoring online activities) was negatively associated with online aggression. These findings emphasize the importance of establishing good communication between parents and adolescents rather than investing money on monitoring software and on controlling adolescent internet use. 相似文献
6.
Trust and distrust are considered crucial elements affecting online relationships – particularly those involving electronic transactions. Although some studies propose that they are distinct, others claim that they are merely opposite ends of one continuum. Further adding to the debate is the possibility of ambivalence, a topic that has not been examined in electronic transaction relationships. Unfortunately, current models of trust and distrust have limitations that impede explanations of how – or even if – ambivalence is generated by feelings of trust and distrust and how these two constructs can best coexist. We thus propose a hybrid model which considers the limitations and strengths of previous models. Namely, we posit that trust and distrust can coexist as separate components with related continua. We use polynomial regression analysis (PRA) and response surface analysis (RSA) to test these complex relationships. Using an empirical study of online consumer behaviour with 521 experienced online consumers, strong empirical validation is found for the model. We examine the effects of ambivalence on the truster’s intentions towards a website and find a small positive effect which increases such intentions. PRA and RSA confirm that trust and distrust are most likely separate components – not opposite ends of a continuum – with related continua. The continua within the subconstructs of trust and distrust likely have more complex and interesting relationships than have been considered previously. These findings lead to interesting future research opportunities on trust, distrust and ambivalence using advanced techniques such as PRA and RSA. 相似文献
7.
In what circumstances might privacy concerns about new communication tools like instant messaging help predict the degree to which people feel comfortable communicating via these new communication tools? The current study examined whether topic intimacy and perceived privacy predict levels of comfort with disclosure, and whether these associations are moderated by overall levels of trust and frequency of technology use. Participants reported on the degree to which they would feel comfortable discussing each of 32 topics (e.g., “times when I felt that I was in love”) using 10 different communication tools. Topic and tool interacted, such that the privacy of the communication tool was related to disclosure comfort only for intimate topics. Privacy concerns were more important to less frequent technology users, and topic intimacy mattered most to participants with low levels of trust. Results are discussed in terms of implications for extending models of disclosure to the selection of new communication tools. 相似文献
8.
9.
Trust is generally assumed to be an important precondition for people’s adoption of electronic services. This paper provides an overview of the available research into the antecedents of trust in both commercial and non-commercial online transactions and services. A literature review was conducted covering empirical studies on people’s trust in and adoption of computer-mediated services. Results are described using a framework of three clusters of antecedents: customer/client-based, website-based, and company/organization-based antecedents. Results show that there are many possible antecedents of trust in electronic services. The majority of the research has been conducted in the context of e-commerce; only few studies are available in the domains of e-government and e-health. For many antecedents, some empirical support can be found, but the results are far from univocal. The research calls for more, and particularly more systematic, research attention for the antecedents of trust in electronic services. The review presented in this paper offers practitioners an overview of possibly relevant variables that may affect people’s trust in electronic services. It also gives a state-of-the-art overview of the empirical support for the relevance of these variables. 相似文献
10.
11.
Hee-Woong Kim Yunjie Xu Sumeet Gupta 《Electronic Commerce Research and Applications》2012,11(3):241-252
Price and trust are considered to be two important factors that influence customer purchasing decisions in Internet shopping. This paper examines the relative influence they have on online purchasing decisions for both potential and repeat customers. The knowledge of their relative impacts and changes in their relative roles over customer transaction experience is useful in developing customized sales strategies to target different groups of customers. The results of this study revealed that perceived trust exerted a stronger effect than perceived price on purchase intentions for both potential and repeat customers of an online store. The results also revealed that perceived price exerted a stronger influence on purchase decisions of repeat customers as compared to that of potential customers. Perceived trust exerted a stronger influence on purchase decisions of potential customers as compared to that of repeat customers. 相似文献
12.
Concurrent computation has been with us for over 50 years, and has become essential today. Concurrency paradigms affect the way we think about parallelism, the programs we try to write, the algorithms we choose, the performance we achieve, the errors we make, and the support mechanisms we need. The paradigms are not equivalent. Although each paradigm can usually be simulated in environments designed for a different paradigm, such a “Turing machine style” proof of computational equivalency does not establish equivalency in terms of the effort required to program solutions, the proclivity for solutions to be error-prone, or the comparable effectiveness of solutions. Two classic concurrency paradigms are reviewed. A third (not so widely recognized) concurrency paradigm is then discussed. 相似文献
13.
Despite the many advantages of computer-assisted data collection, it is unclear if, when, or under what conditions embodied conversational agents (i.e., ECA, virtual humans) can replace human interviewers to collect personal information in interviews, especially for topics that might be regarded as ‘sensitive’. This paper presents results from an exploratory study designed to investigate how topic sensitivity affects individuals' preference to disclose to a human or an ECA interviewer. A convenience sample of 203 undergraduate business students completed a scenario-based survey that asked them to rate the sensitivity of various interview topics and indicate their preference to disclose such sensitive information to human or ECA interviewers. Open-ended questions revealed factors behind preferences for interviewer choice. Findings show a preference for ECAs when topics are highly sensitive and more likely to evoke negative self-admissions. For topics rated low in sensitivity or more likely to evoke positive self-admissions, human interviewers are preferred. Specifically, participants stated that they would feel more comfortable discussing sensitive topics with an ECA interviewer because it could not judge them. This indicates that the evaluative capability of the interviewer plays a factor in the amount of sensitive information elicited from interviewees. Overall, results contribute to an understanding of when and why ECA interviewers can effectively replace human interviewers. 相似文献
14.
The advent of social networks opened a myriad opportunities for merging the social character of trust with the technical possibilities offered by the Internet and its availability as a mobile service. While most of the computational trust models aim to detect trustworthy entities, much less attention is paid to how these models are perceived by the users who are the core of the system. This paper delves into the workings of online trust systems under user bias and analyses the user behaviour through biases defined by Prospect theory. By performing empirical study on an existing system, we are able to demonstrate that there is a huge discrepancy between the aim of implementation of the online trust models and the users’ perception of those models. Understanding of this relation by the system designers can reduce complexity and improve the user experience and the system performance. The results imply that the tendency of the users to exhibit cognitive biases is not only the cause, but also the effect from the trust system design. These results and the analysis are then used to propose to the system designers a methodology for user bias identification and mitigation in the form of a Choice architecture for trust systems. 相似文献
15.
This article analyzes the relationships among online trust and two of its most important antecedents, namely privacy and security, and explains how consumers’ characteristics (gender, age, education and extraversion), moderate the influence of both privacy and security in online trust. This study expands previous literature by identifying the conditions under which perceived privacy and security are likely to have the greatest positive effects on consumer trust in the online retailer. Based on data from 398 online consumers, the results revealed that the influence of both privacy and security on online trust was stronger for male, younger, more educated, and less extraverted consumers. Implications for theory and management are discussed. 相似文献
16.
Online peer-to-peer (P2P) lending is a new but essential financing method for small and micro enterprises that is conducted on the Internet and excludes the involvement of collateral and financial institutions. To tackle the inherent risk of this new financing method, trust must be cultivated. Based on trust theories, the present study develops an integrated trust model specifically for the online P2P lending context, to better understand the critical factors that drive lenders’ trust. The model is empirically tested using surveyed data from 785 online lenders of PPDai, the first and largest online P2P platform in China. The results show that both trust in borrowers and trust in intermediaries are significant factors influencing lenders’ lending intention. However, trust in borrowers is more critical, and not only directly nurtures lenders’ lending intention more efficiently than trust in intermediaries, but also carries the impact of trust in intermediaries on lenders’ lending intention. To develop lenders’ trust, borrowers should provide high-quality information for their loan requests and intermediaries should provide high-quality services and sufficient security protection. The findings provide valuable insights for both borrowers and intermediaries. 相似文献
17.
Bert Slof Anouschka van Leeuwen Jeroen Janssen Paul A. Kirschner 《Journal of Computer Assisted Learning》2021,37(1):39-50
In computer-supported collaborative learning research, studies examining the combined effects of individual level, group level and within-group differences level measures on individual achievement are scarce. The current study addressed this by examining whether individual, group and within-group differences regarding engagement and prior knowledge predict individual achievement. Engagement was operationalised as group members' exhibited activities in the task space (i.e., discussing domain-content) and social space (i.e., regulating ideas, actions and socioemotional processes). Prior knowledge and achievement were operationalised as group members' performance on a domain-related pre-test and post-test, respectively. Data was collected for 95 triads of secondary education students collaborating on a complex business-economics problem. Subsequently, three different multilevel models were tested to examine the combined effect. First a model with the individual level measures (model 1) was tested and in subsequent models the group level measures (model 2) and within-group levels measures (model 3) were added. Findings indicate model 2 showed the best fit; group members' individual engagement in the social space activities as well as the groups' average prior knowledge positively predicts individual achievement. No effects were found for either group members' or groups' engagement in the task space and for the within-group differences. 相似文献
18.
19.
Ever since the beginnings of the internet researchers have questioned its utility in developing and maintaining psychological healthy romantic and sexual relations. Advocates of the social presence theory and media richness theory purport that in leaner media individuals can be quite aggressive towards one another (e.g., in the form of flaming). In contrast, others believe that the lack of traditional cues in CMC can in fact be overcome and instead lead to more personal, intimate relationships. As this paper will demonstrate, when we consider how beneficial it is to form relationships online we also need to consider individuals’ characteristics (e.g., personality characteristics and physical attractiveness), the amount of time people spend online, the duration of online relationships, and how these relationships effect individuals’ offline activities and relationships. Overall, the view here is that online relationships can be empowering for many people; that is, cyberspace provides a unique environment for people to experience and learn about relationships and sexuality. 相似文献
20.
GUY JUMARIE 《International journal of systems science》2013,44(8):819-838
For an urban highway with quasi-dense traffic, neither modelling via continuum equations nor modelling via stochastic counting processes are fully satisfactory. A model is suggested which consists of adding white noise to the deterministic equations, and which is supported by a physical analysis of the phenomenon. The theoretical stochastic distributed system so obtained is considered and a distributed diffusion equation is derived. For the practical purpose of implementing the traffic control, another modelling via the finite element technique is designed. In this way the initial distributed system is converted into a finite set of lumped parameter systems in a cascaded combination. The study is performed on this combination. Despite this paper being of an ‘ applied ’ nature, it gives rise to some new problems to which possible solutions are suggested. Notable, the catastrophe theory is utilized to check the validity of the finite element technique, and the study of the limiting probability density by using the diffusion equation. The content of the paper applies to a broad class of stochastic distributed systems 相似文献