首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Given the popularity of checking in at a location via mobile phone, little research has examined the germane motivations tied to location check-in as a form of in-group electronic word-of-mouth and its relation to the concern of privacy. A survey with 255 college students found that the students' privacy concerns – both online and Facebook specific – did not show any relationship with the motivations of location check-in as a means of information sharing. However, the relationship varied among the non-users of location check-in on Facebook. Involvement with mobile phone showed mixed relationships with check-in motivations – commitment to Facebook, self-development and reputation, and promotional viral communication. Findings not only confirm that young Facebook users are relatively free from the concern of privacy during their location-based information sharing, but also suggest different motivational mechanisms to operate for Facebook users’ viral communication depending on the habitualness of their mobile phone use. Implications are discussed for interpersonal marketing strategies on social networking sites.  相似文献   

2.
Although mobile purchase is convenient in the age of mobile commerce, many consumers still do not utilize mobile purchase to its full potential. From the mobile vendor’s perspective, retaining current customers and facilitating their continued purchase are crucial to create profitability and achieve a sustainable development. An understanding of the continuance intention towards mobile purchase can provide insights into mobile vendors’ marketing campaigns. Therefore, it is important to examine the determinants that impact continuance intentions of consumers for mobile purchase. Drawing upon information success model, flow theory and trust, this study proposed and empirically tested an integrated model to better understand the determinants of consumers’ continued intention to purchase on mobile sites. Empirical data from 462 users who had experience with mobile purchase were tested against the proposed research model by using structural equation modelling (SEM). The results indicated that information quality, and privacy and security concerns are the main factors affecting trust, whereas service quality is the main factor affecting flow. System quality, and privacy and security concerns affect satisfaction. Trust affects flow, which in turn affects satisfaction. These three factors together affect continued intention towards mobile purchase. The findings of this study provide several important implications for mobile commerce research and practice.  相似文献   

3.
As advertisers increasingly rely on mobile-based data, consumer perceptions regarding the collection and use of such data becomes of great interest to scholars and practitioners. Recent industry data suggests advertisers seeking to leverage personal data offered via mobile devices would be wise to acknowledge and address the privacy concerns held by mobile users. Utilizing the theoretical foundation of communication privacy management (CPM), the current study investigates commonly understood privacy concerns such as collection, control, awareness, unauthorized secondary use, improper access and a newly adapted dimension of location tracking, trust in mobile advertisers, and attitudes toward mobile commerce, to predict mobile commerce engagement. Data from this study indicate that control, unauthorized access, trust in mobile advertisers, and attitude toward mobile commerce significantly predicted 43% of the variance in mobile commerce activity.  相似文献   

4.
We examine how two different underlying mechanisms of behavioral loyalty to a brand—attitudinal loyalty and habit—impact smartphone users' privacy management when they browse personalized vs. non-personalized mobile websites. The online experimental study conducted with Amazon Mechanical Turk workers (N = 73) finds different responses of attitudinal loyalty and habit towards personalization in significant three-way interactions between personalization, attitudinal loyalty, and habit on privacy disclosure and protection behaviors. When interacting with a personalized website, highly habitual consumers without high level of attitudinal loyalty disclosed the most personal information on a personalized mobile site, and displayed the least intention of protecting their privacy on their smartphones, whereas consumers with high levels of both habit and attitudinal loyalty reported the highest tendency of privacy protection behavior. However, habit and personalization do not have a significant effect on disclosure behaviors when users have high attitudinal loyalty to a brand. Theoretical and practical implications are discussed.  相似文献   

5.
In view of the deficiencies in current literature, this study seeks to examine if mobile social commerce continuance usage influences brand loyalty among customers, and assessed the inhibitor role of privacy concern in mobile social commerce usage intention. Privacy concern was measured by using concern for social media information privacy (CFSMIP). Therefore, this study proposes and empirically validated a model that combines CFSMIP, brand loyalty, and Expectation Confirmation Model, in the Asian context. The results suggested that users' CFSMIP does not inhibit them from the continuous usage of mobile social commerce, and influences their perceived usefulness on mobile social commerce positively. Moreover, all the paths in the baseline model of Expectation Confirmation Model have been reconfirmed in this study. Besides, users' continuance usage and satisfaction on mobile social commerce are proven to be boosters for brand loyalty. Relevant managerial implications are then discussed.  相似文献   

6.
Advanced speech recognition technology facilitated the development of voice-based smart devices. Voice user interface (VUI) is now a common feature on smartphones, computers, smart home devices, and car systems. The fragmented and context focused literature on VUI motivates this examination of the relationship between perceived quality and customer satisfaction in VUI portable devices. This study is the first to introduce extrinsic motivational factors as an extension to Wixom and Todd’s model. These additional antecedent factors add an enriched explanation of VUI user behavior. This study is also the first to consider the role of gender in a VUI behavior model. Our findings suggest that the proposed driving factors, including trust, perceived risks, perceived enjoyment, and mobile self-efficacy, significantly affect VUI user attitudes, which influence their continuance intention. Our results also address the role of gender on the association of attitude toward VUI use and its antecedents. The findings show that perceived risk (privacy concerns) and perceived ease of use are more influential on VUI use behavior of males than females. However, the effect of trust and mobile self-efficacy play a more crucial role for females than males.  相似文献   

7.
This paper proposes and tests a conceptual model of private-information sensitive mobile app adoption utilizing privacy calculus approach. It also explores the role of personality in affecting perceived benefits of using mobile apps and compares the findings across two countries: the US and China. Irrespective of the cultural environment, millennial mobile app users download apps that require access to sensitive personal information in order to satisfy their informational and social (but not entertainment) needs. Perceived privacy concern does not influence adoption or future use of private-information sensitive apps. Extraversion and agreeableness are positively related to user perceptions of benefits obtained from using apps.  相似文献   

8.
The use of mobile applications continues to experience exponential growth. Using mobile apps typically requires the disclosure of location data, which often accompanies requests for various other forms of private information. Existing research on information privacy has implied that consumers are willing to accept privacy risks for relatively negligible benefits, and the offerings of mobile apps based on location-based services (LBS) appear to be no different. However, until now, researchers have struggled to replicate realistic privacy risks within experimental methodologies designed to manipulate independent variables. Moreover, minimal research has successfully captured actual information disclosure over mobile devices based on realistic risk perceptions. The purpose of this study is to propose and test a more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions. As with prior research, this study employs a theoretical lens based on privacy calculus. However, we draw more detailed and valid conclusions due to our use of improved methodological rigor. We report the results of a controlled experiment involving consumers (n=1025) in a range of ages, levels of education, and employment experience. Based on our methodology, we find that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. In addition, this relationship is heavily moderated by the consumer practice of disclosing false data. We conclude by discussing the contributions of our methodology and the possibilities for extending it for additional mobile privacy research.  相似文献   

9.
This study explores the antecedents and consequences of health information privacy concerns in online health communities by integrating the dual calculus and protection motivation theories. On the basis of survey data from 337 users, health information privacy concerns, together with informational and emotional support, significantly influence personal health information (PHI) disclosure intention. Privacy concerns are negatively influenced by two coping appraisals (i.e., response efficacy and self-efficacy) and positively affected by two threat appraisals (i.e., perceived vulnerability and perceived severity). The perceived health status differentially moderates the effects of privacy concerns and informational support on the PHI disclosure intention.  相似文献   

10.
Trust and privacy features of websites have evolved as an important concern for any businesses or interactions, particularly in online networks. The study investigates the relationship between trust, privacy concerns and behavioural intention of users on the social network. The behavioural intention of users on the online social network (OSN) is captured by intention to disclose information and intention to interact with others in OSN. The study was conducted on a sample of 457 active users from one of the major social networking website, Facebook. Partial least squares based structural equation modelling was used for analysing the results. The findings of the study reveal that intention to disclose information mediates the relationship between trust in the website and the intention to interact with others. Another important finding of the study indicates that prior positive experience with the website significantly impacts the trust in website, and the trust in website also plays a crucial role while determining the information privacy concerns in the OSN.  相似文献   

11.
In mobile and pervasive computing applications, opportunistic connections allow co-located devices to exchange data directly. Keeping data sharing local enables large-scale cooperative applications and empowers individual users to control what and how information is shared. Supporting such applications requires runtime frameworks that allow them to manage the who, what, when, and how of access to resources. Existing frameworks have limited expressiveness and do not allow data owners to modulate the granularity of information released. In addition, these frameworks focus exclusively on security and privacy concerns of data providers and do not consider the privacy of data consumers. We present PADEC, a context-sensitive, privacy-aware framework that allows users to define rich access control rules over their resources and to attach levels of granularity to each rule. PADEC is also characterized by its expressiveness, allowing users to decide under which conditions should which information be shared. We provide a formal definition of PADEC and an implementation based on private function evaluation. Our evaluation shows that PADEC is more expressive than other mechanisms, protecting privacy of both consumers and providers.  相似文献   

12.
This study investigated the current state of college students' perceptions toward mobile learning in higher education. Mobile learning is a new form of learning utilizing the unique capabilities of mobile devices. Although mobile devices are ubiquitous on college campuses, student readiness for mobile learning has yet to be fully explored in the United States. The paper describes a conceptual model, based on the theory of planned behavior (TPB), which explains how college students' beliefs influence their intention to adopt mobile devices in their coursework. Structural equation modeling was used to analyze self-report data from 177 college students. The findings showed that the TPB explained college students' acceptance of m-learning reasonably well. More specifically, attitude, subjective norm, and behavioral control positively influenced their intention to adopt mobile learning. The results provide valuable implications for ways to increase college students' acceptance of mobile learning.  相似文献   

13.
Bring Your Own Device (BYOD) programs permit employees to use personal devices to access organizational information. Users gain convenience, while employers benefit from increased productivity and reduced IT expense. Security boundaries must extend to personal devices to mitigate data exfiltration, thereby infringing on employees’ privacy by monitoring their personal devices. These monitoring mechanisms play a critical role in employee participation in a BYOD program. Our results demonstrate that the BYOD monitoring mechanisms and privacy concerns suppress the benefits of increased job performance expectancy when evaluating whether to participate in a BYOD program. This research identifies that tasks measured, frequency of monitoring, and organizational control are significant impediments to behavioral intention for BYOD participation.  相似文献   

14.
We are living in an era where data lead to opportunities, especially customer data. According to privacy laws, however, without customers’ authorisation, organisations face many limitations in using identifiable information for secondary purposes. Consequently, organisations are missing out on many potential business opportunities to capitalise on customer data. Privacy concerns have become the biggest roadblock to gain customer consent because of the potential risks associated with the use of personal information. This situation underscores the importance of devising effective information practices and strategies in dealing with the use of customer data. Privacy literature suggests that information practices may influence individuals’ intentions to participate in situations requiring the collection and use of personal data. Yet, existing research has not systematically analysed the role of these strategies in influencing intention. Also, previous studies focus primarily on the disclosure of personal data. Issues surrounding ‘authorisation of personal data for secondary use’ remain unexplored. The purpose of our study is to examine the role of information practices on intention to authorise secondary use of personal data. The results show that privacy concerns and trusting beliefs significantly affect individual perceptions of information practices. Perception of information practices in turn exerts significant effect on intention to authorise secondary use of personal data. Both theoretical and managerial implications of the results are discussed.  相似文献   

15.
Privacy policy statements and privacy assurance cues are among the most important website features that online providers use to increase individuals’ trust and willingness to disclose private information online. The focus of this study is a comprehensive examination of the process by which privacy assurance mechanisms influence trust and the moderating role of privacy concern in this process. We use the lens of the Elaboration Likelihood Model to investigate the way different individuals perceive and process privacy assurance mechanisms. We argue that the trust-enhancing role of these mechanisms depends on the individual’s privacy concern. The results of this study articulate the process by which various privacy assurance mechanisms operate in enhancing an individual’s trust, and show that there are distinct behavioral differences between individuals with high- vs low-privacy concern when forming their trust to disclose private information. The paper sheds new light on the role of elaboration in the trust building process, and shows why privacy assurance mechanisms have different impacts depending on individuals’ privacy concerns.  相似文献   

16.
A classification of location privacy attacks and approaches   总被引:1,自引:0,他引:1  
In recent years, location-based services have become very popular, mainly driven by the availability of modern mobile devices with integrated position sensors. Prominent examples are points of interest finders or geo-social networks such as Facebook Places, Qype, and Loopt. However, providing such services with private user positions may raise serious privacy concerns if these positions are not protected adequately. Therefore, location privacy concepts become mandatory to ensure the user’s acceptance of location-based services. Many different concepts and approaches for the protection of location privacy have been described in the literature. These approaches differ with respect to the protected information and their effectiveness against different attacks. The goal of this paper is to assess the applicability and effectiveness of location privacy approaches systematically. We first identify different protection goals, namely personal information (user identity), spatial information (user position), and temporal information (identity/position + time). Secondly, we give an overview of basic principles and existing approaches to protect these privacy goals. In a third step, we classify possible attacks. Finally, we analyze existing approaches with respect to their protection goals and their ability to resist the introduced attacks.  相似文献   

17.
Technological innovations are increasingly helping people expand their social capital through online networks by offering new opportunities for sharing personal information. Online social networks are perceived to provide individuals new benefits and have led to a surge of personal data uploaded, stored, and shared. While privacy concerns are a major issue for many users of social networking sites, studies have shown that their information disclosing behavior does not align with their concerns. This gap between behavior and concern is called the privacy paradox. Several theories have been explored to explain this, but with inconsistent and incomplete results. This study investigates the paradox using a construal level theory lens. We show how a privacy breach, not yet experienced and psychologically distant, has less weight in everyday choices than more concrete and psychologically-near social networking activities and discuss the implications for research and practice.  相似文献   

18.
The purpose of this study is to develop a better understanding of the factors motivating individuals who use cloud-based services despite the privacy and security risks associated with it. The authors developed a research model that incorporates the theory of planned behavior (TPB) and constructs from previous research to explain individuals’ intentions to use cloud-based services. Our analysis shows support for the relationships among predictor variables (attitude, subjective norm, perceived behavioral control, and information privacy) and the outcome variable (behavioral intention). Additionally, our analysis shows IT leadership and trust as moderating variables between the TPB predictor variables (attitude and perceived behavioral control), but not subjective norm. The results indicate that IT leadership support of cloud-based systems can have a positive effect on cloud adoption and individuals are likely to continue their use of cloud computing despite the privacy and security risks associated with it.  相似文献   

19.
In the online and offline worlds, the value of personal information – especially information about commercial purchases and preferences – has long been recognised. Exchanges and uses of personal information have also long sparked concerns about privacy. Public opinion surveys consistently indicate that overwhelming majorities of the American public are concerned that they have lost all control over information about themselves and do not trust organisations to protect the privacy of their information. Somewhat smaller majorities favour federal legislation to protect privacy. Despite public support for stronger privacy protection, the prevailing policy stance for over thirty years has been one of reluctance to legislate and a preference for self‐regulation by business to protect privacy. Although some privacy legislation has been adopted, policy debates about the commercial uses of personal information have been dominated largely by business concerns about intrusive government regulation, free speech and the flow of commercial information, costs, and effectiveness. Public concerns about privacy, reflected in public opinion surveys and voiced by a number of public interest groups, are often discredited because individuals seem to behave as though privacy is not important. Although people express concern about privacy, they routinely disclose personal information because of convenience, discounts and other incentives, or a lack of understanding of the consequences. This disconnect between public opinion and public behaviour has been interpreted to support a self‐regulatory approach to privacy protections with emphasis on giving individuals notice and choice about information practices. In theory the self‐regulatory approach also entails some enforcement mechanism to ensure that organisations are doing what they claim, and a redress mechanism by which individuals can seek compensation if they are wronged. This article analyses the course of policy formulation over the last twenty years with particular attention on how policymakers and stakeholders have used public opinion about the commercial use of personal information in formulating policy to protect privacy. The article considers policy activities in both Congress and the Federal Trade Commission that have resulted in an emphasis on “notice and consent.” The article concludes that both individual behaviour and organisational behaviour are skewed in a privacy invasive direction. People are less likely to make choices to protect their privacy unless these choices are relatively easy, obvious, and low cost. If a privacy protection choice entails additional steps, most rational people will not take those steps. This appears logically to be true and to be supported by behaviour in the physical world. Organisations are unlikely to act unilaterally to make their practices less privacy invasive because such actions will impose costs on them that are not imposed on their competitors. Overall then, the privacy level available is less than what the norms of society and the stated preferences of people require. A consent scheme that is most protective of privacy imposes the largest burden on the individual, as well as costs to the individual, while a consent scheme that is least protective of privacy imposes the least burden on the individual, as well as fewer costs to the individual. Recent experience with privacy notices that resulted from the financial privacy provisions in Gramm‐Leach‐Bliley supports this conclusion. Finally, the article will consider whether the terrorist attacks of 11 September have changed public opinion about privacy and what the policy implications of any changes in public opinion are likely to be.  相似文献   

20.
Drawing upon prior research on Internet information privacy concerns, this study examines the effects of perceived ubiquity on consumers?? acceptance of mobile advertising. We postulate that, due to increasing unethical information practice, ubiquity can be perceived both positively and negatively, exercising complex effects on trust, risk, attitude, and intention to delete the ad. With 510 Japanese general consumers, our findings indicate that perceived ubiquity significantly strengthens trust and attitude toward the ad, while none of the negative effects are confirmed. Perceived ubiquity is therefore generally accepted as a favorable utility of mobile communication, leading to more likely acceptance of the ad it delivers. In closing, theoretical and managerial implications are discussed, and important limitations are recognized.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号