首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 693 毫秒
1.
无形产品类别对网上购物认知风险的影响   总被引:1,自引:0,他引:1  
为了探究网上购物中无形产品对消费者认知风险的影响,进一步完善网上购物的风险认知理论,本研究采用实验室实验与问卷调查相结合的手段,对60名大学生施测。结果表明:首先对于不同类别的无形商品,消费者的总体认知风险差异显著;其次在网上购买无形商品不仅给消费者带来了财务风险、时间风险、身体风险、绩效风险和心理风险,还有社会风险;最后对于大多数类别的无形商品,身体风险并不是消费者在网上购物时所担心的。结论:消费者在网上购买不同类别的无形产品时所认知到的风险结构是有差异的,在网上购买专业性服务时,消费者认知到的风险是最大的。  相似文献   

2.
消费者网上购买行为感知风险动态模型研究   总被引:6,自引:0,他引:6  
感知风险对消费者购买行为的解释作用越来越重要。消费者网上购物过程中的感知风险不同于传统环境中的感知风险。本研究在探讨网上购物感知风险的含义、纬度及影响因素的基础上提出了网上购买行为感知风险的动态模型,模型中包括了影响消费者风险感知的因素、细化的消费者感知风险纬度以及可接受风险水平对消费者总体感知风险和减少风险行为的调节作用。  相似文献   

3.
为探讨网上购物环境中消费者相关因素对认知风险的影响,通过问卷法调查了298名被试,探讨了网上购物环境中认知风险的维度构成、对总体认知风险有显著影响的消费者相关因素以及消费者相关因素对每个风险维度的作用。结果表明:网上购物环境中消费者相关因素通过7个风险维度对总体认知风险起作用,这些相关因素对每个风险维度的影响并不相同。  相似文献   

4.
移动增值服务消费者感知风险维度实证研究   总被引:1,自引:0,他引:1  
对移动增值服务消费者感知风险的维度结构进行了实证研究.首先,在回顾文献和用户深度访谈的基础上,得出移动服务中消费者感知风险的基本构成要素;然后,通过试调查和初步统计分析得到正式调查的测量量表,通过问卷调查收集数据;最后,经过探索性因子分析和验证性因子分析证实了移动服务中消费者感知风险的维度,即感知隐私风险、感知经济风险...  相似文献   

5.
随着以计算机技术为代表的信息产业的不断发展,网上购物,作为一种新兴并且迅速发展的购物方式,正受到越来越多消费者的青睐,越来越多的人享受着足不出户的购物乐趣。然而,网上购物模式自身的特点及特殊的交易方式决定了消费者在享受购物快捷、便利的同时也承担着网络交易的特定风险。我国现行法律制度对网络消费者的保护还很薄弱。对于在网络消费当中出现的问题,消费者往往无所适从。要切实保护网上购物消费者权益,必须根据网上购物消费的特点制定相应的法律法规和相应的管理制度。本文在分析网上购物特点的基础上,深入分析了网上购物消费者权益保护存在的问题。并通过阐述我国关于网上购物消费者的立法保护,对网上购物消费者权益保护的对策与建议,希望能对我国网上购物消费者的权益保障有所帮助。  相似文献   

6.
郑宏明 《人类工效学》2009,15(3):22-25,71
整合了以往的计划行为模型、技术接受模型、交易成本分析,提出了网上购物扩展的计划行为模型(ETPB),并对该模型用结构方程进行了验证。结果发现,开放性人格通过网上购物行为控制正向影响网上购物意向,信任倾向分别通过网上购物交易成本、主观参照正向影响网上购物意向。对于大学生来说,开放性人格对网上购物意向有间接正向影响,而信任倾向、网上购物风险对网上购物意向没有显著的影响;对在职人员来说,信任倾向通过网上购物交易成本间接正向影响网上购物意向,网上购物风险对网上购物意向有直接正向影响,而开放性人格对网上购物意向不存在显著的间接影响。  相似文献   

7.
通过模拟网上购物实验,研究网络购物环境中信息安全因素对用户行为的影响,方差分析(ANOVA)结果表明,消费者对于通过国际第三方认证的购物网站的信任度比较高;使用中介付款方式有使消费者的风险承担程度和购买意愿得到提高的趋势;实验结果同时表明,随着网上购物经验的丰富,消费者对于电子商务网站的满意度,信任度,其风险承担程度和购买意愿都会提高。  相似文献   

8.
C2C交易中第三方信任机制作用的实证分析   总被引:1,自引:0,他引:1  
提出了C2C市场中第三方信任机制作用模型,这些机制包括反馈系统、Escrow服务、C2C中介以及电子商务法律法规.通过网上问卷调查,收集到215份有效数据,并采用SPSS与PLS Graph进行统计分析,检验了量表的信度、效度与模型假设.结果表明Escrow服务、C2C中介、反馈系统显著影响消费者对卖方信任的建立,没有发现法律法规对信任的显著作用.此外,信任显著影响感知风险与交易动机.  相似文献   

9.
对影响大学生网上购物认知风险因素的探索   总被引:1,自引:0,他引:1  
对86名在校大学生采用情景问卷的准实验法,比较了网上购物和传统购物认知风险差异和网上购物时价格对风险认知的影响,以及两类不同网上经验(购物经验,上网时间)对认知风险的影响机制.研究发现购物方式和价格对购物认知风险均有显著的影响,网上经验对购物认知风险有调节作用:购物经验对购物方式和商品价格都有调整作用,上网时间只对购物方式有影响.  相似文献   

10.
消费者网上购物行为的实证研究   总被引:1,自引:0,他引:1  
在采用模型(TAM)框架下引入任务技术匹配(TTF)和感知风险(PR),构建了消费者网上购物的概念模型TAM/TTF/PR,并在中国背景下进行实证检验.结果表明:网上购物的意向最大程度上决定着实际行为,而其最主要的驱动要素则是感知有用性;TTF通过直接和间接的方式来对实际行为产生很大的正影响,并可以降低对实际行为有较大抑制作用的PR;而感知易用性间接地对实际行为产生正影响的力度十分微弱.证明了TAM/TTF/PR模型优于TAM/PR模型.研究结果可为关于电子商务的理论研究和实践探索提供启示.  相似文献   

11.
With the advent of various Internet of Things (IoT) technologies, smart-homes have become an important application area. However, the low end-user penetration of the smart-home market as of 2021 points out towards the fact that the users are resistant to use home IoT and smart-home solutions. Privacy concerns is an important factor that hinders the smart-home adoption as per existing literatures. Unfortunately, current smart-home literatures have not focused enough on the theoretical aspect of the privacy concern construct per se, what are its various antecedents, and what constitutes the users’ privacy concerns. Consequently, in this work a resistive modelling approach is used focusing on the privacy aspect that hinders the diffusion of IoT-based smart-homes in the society. Innovation Resistance Theory (IRT) and Multidimensional Development Theory (MDT) are used as the theoretical background. Multiple antecedents of privacy concern are considered ranging from individual (user skill), technological to environmental factors (legal & policy aspect). Moreover, privacy concern is treated from three aspects of informational privacy, physical privacy, and psychological privacy. The proposed model is validated and tested using data collected from 463 users residing in Thailand. The differences in privacy perception and its effect on user resistance depending on gender and residence type is also discussed. Results show that the user characteristics of user skill has the highest impact on privacy concern, followed by legal & policy aspect, and technological aspect respectively. Moreover, physical, and psychological privacy are more important than informational privacy concerns. Appropriate theoretical and practical suggestions are provided based on the results.  相似文献   

12.
The Internet has been often described as a tool that fosters the inclusion of traditionally marginalized people in the democratic process. Yet, if the type of device used by people to access the Internet impacts their online democratic engagement, uneven Internet penetration and differences in the devices used by social groups will result in a deeper democratic divide. After discussing the impact of the types of internet use and type of access devices on civic engagement, we postulate 3 hypotheses on how democratic values and type of access to the Internet—place and devices—are related to the civic use of social media. We use data from a Valparaíso Regional poll in Chile in 2017, 2018 and 2019 to test those hypotheses. People who access the Internet via mobile phones are less likely to use social media with a civic purpose, while those who access the Internet at home or work are more likely to do so. Since low-income sectors primarily access the Internet via mobile phones while higher income groups have a wider array of Internet connection options, the rapid growth of cell phone use for accessing the Internet risks deepening social and income gaps in civic engagement.  相似文献   

13.
In this study, we tested the following three hypotheses regarding the data utilization of online services: 1) Service users are concerned about the data utilization of service providers, and there exists a privacy paradox. 2) Consumer evaluations of data utilization are diverse, and some service users are positive about data utilization. 3) People with familiarity with the Internet are more positive about data utilization. In order to quantitatively measure people's evaluation of data utilization, we used contingent valuation method (CVM) in a survey by questionnaire of 5986 people to find out their willingness to pay for data utilization. The results of the empirical analysis show that all hypotheses were supported. We can obtain the following two policies and service providers implications. First, there is a privacy paradox with respect to data utilization, so the service providers need to create an environment where people can choose the level of data utilization. Second, it is necessary to design a rule that takes diverse values into account.  相似文献   

14.
Unlike gambling, lottery games can exist in a lawful form to raise funds for charitable institutions. Owing to the expeditious development of network technology, lotteries over the Internet have become an inevitable trend. Since the Internet allows people to communicate with each other without direct contact, it is more difficult to guarantee the security and fairness of online lotteries than for conventional lottery games. However, electronic lottery methods can also provide something that conventional lottery mechanisms cannot: they allow players to purchase tickets at any time and in any place where they can access the Internet. The authors propose an online lottery mechanism that can confirm the propositions of general lottery games. Specifically, this novel method not only allows players to make t-out-of-n numbers in lotteries without iterative selection but also preserves the privacy of players' choices, making the system more similar to traditional lottery games.  相似文献   

15.
网络服务提供者协助解密义务,隐含着公权力(侦查权)与私权利(通信秘密权、隐私权)之间的冲突。用户的非公开信息应该在可控、可追溯基础上,遵循必要性原则和比例原则,综合考虑执法成本,司法机关经由法律确定网络服务提供者履行协助解密义务获取,进而达到社会治理管控、公众安宁生活与网络服务提供者营业自由的综合效益最大化目标,避免落入公权力严重侵犯私权利的情形或者出现政府失效的无序状态。  相似文献   

16.
This study aims to determine the factors that influence user intention to use location-based emergency applications. The Unified Theory of Acceptance and Use of Technology (UTAUT) is used as a fundamental theory by adding other relevant variables: trust, privacy concern, and fear of crime. Data were collected through questionnaires distributed to the users of the X-Igent Panic Button application. A total of 348 data were collected online using random sampling and processed using structural equation modeling. This study concludes that this application adoption's determinant factors are performance expectancy, trust, social influence, fear of crime, and collection as privacy concerns. These factors become significant predictors of behavioral intention by explaining about 60.5% of the total variation. The study also concludes that trust in services or service providers has the most significant positive impact on the behavioral intention to use location-based mobile applications in emergencies.  相似文献   

17.
The sustainable development of Internet hospitals and e-health platforms relies on the participation of patients and physicians, especially on the provision of health counseling services by physicians. The objective of our study is to explore the factors motivating Chinese physicians to provide online health counseling services from the perspectives of their online and offline reputation. We collect the data of 141029 physicians from 6173 offline hospitals located in 350 cities in China. Based on the reputation theory and previous studies, we incorporate patients’ feedback as physicians’ online reputation and incorporate physicians’ offline professional status as physicians’ offline reputation. Results show that physicians’ online reputation significantly and positively influence their online counseling behaviors, whereas physicians’ offline reputation significantly and negatively influence their online counseling behaviors. We conclude that physician’s online and offline reputations show a competitive and substitute relationship rather than a complementary relationship in influencing physicians to provide online counseling services in Internet hospitals. One possible explanation for the substitute relationship could be the constraints of limited time and effort of physicians.  相似文献   

18.
Nanotechnology enables the development of new and improved products. However, the public is also concerned about uncertain risks associated with nanotechnology-enabled products. To address this concern, the study aims to expand the understanding about public benefit and risk perceptions as a basis for the effective formulation of policy that addresses public interests. The study investigates public benefit and risk perceptions of nanotechnology development from the psychological and sociological aspects through a questionnaire survey conducted on Klang Valley, Malaysia. Analysis of variance (ANOVA) illustrates that demographics indeed influences public benefit and risk perceptions of nanotechnology development. However, public knowledge about nanotechnology exerts no effect on public benefit and risk perceptions of nanotechnology development based on independent t-tests. Simple linear regression reveals that the lack of public trust in government increases risk perception. Public attitude perceives nanotechnology to be more beneficial than risky, thus influencing benefit perception rather than risk perception. Public lifestyle, such as culture, religious beliefs and social group influence benefit perception but not risk perception. Result is expected to deliver better communication of benefit and risk of nanotechnology to the public as well as ensure an ethical policy regarding nanotechnology development.  相似文献   

19.
ABSTRACT

This paper presents findings from a literature review on older adults continued use of the Internet following an identity theft incident. Globally, identity theft is increasing, statistics show that the number of older adults falling victim to identity theft is growing. Victims of identity theft suffer emotional, physical, psychological, and social problems; many change their behaviour as a result. The aim of the review was to examine literature to determine what is known regarding how older adults use the Internet and/or modify their online behaviour following an identity theft event. It was found that knowledge is lacking regarding the impact that identity theft events have on older adults’ continuation of Internet use. Little research has been undertaken to understand the factors and interrelationships that contribute to the situation. The review highlights that a systems ergonomics approach should be considered as an appropriate framework to drive future research in this area.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号