The Diffusions, Impacts, Adoption and Usage of ICTs upon Society

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 5 of 9
  • Item
    Job Seekers' Acceptance of Job Recommender Systems: Results of an Empirical Study
    ( 2018-01-03) Laumer, Sven ; Gubler, Fabian ; Maier, Christian ; Weitzel, Tim
    Based on UTAUT2 and the importance of trust to explain user behavior in relation to recommender systems, we focus on job recommender systems by developing and validating a job recommender system acceptance model. The results of our empirical, survey-based study with 440 job seekers indicate that beside performance expectancy and habit, trust is among the three most important determinants and it is especially relevant for women, passive job seekers and those without experience in using job recommender systems. The paper extends general trust and recommender system research by revealing three moderators for the trust and intention relationship. It contextualizes the UTAUT2 by incorporating trust as an antecedent of a consumer’s intention to use and by revealing three moderating effects for this relationship. Hence, it is the basis for further studies investigating the acceptance of job recommender system, which has rather been neglected by prior research.
  • Item
    The Impact s of Requested Permission on Mobile App Adoption: The Insights Based on an Experiment in Taiwan
    ( 2018-01-03) Lai, Hsiangchu ; Hsu, Jack Shih-Chieh ; Wu, Min-Xun
    Due to the popularity of smartphones, the number of apps has been growing up rapidly. Users have to grant requested permissions before downloading apps. However, some apps may request more permissions than they need. It may cause the concern of security or privacy. The purpose of this study is to investigate the impacts of requested permissions on users' intention to install mobile apps. We developed the proposed proposal by embedding the social exchange theory into technology acceptance model plus the concept of permission-function fit, perceived privacy-level and perceived privacy risk. We validated the proposed hypotheses with data collected from 389 smartphone users by using experimental design approach. The findings include (1) Users' attitude toward the app positively influences their download intention. (2) Users' perceived usefulness and the ranking of the app positively influence users' attitude toward the app while perceived privacy risk negatively affects users' attitude. Further, if the app requests more permissions than it needs, users have a negative attitude toward it. Overall, perceived usefulness has the strongest effect on attitude. (3) The privacy-level of the requested permissions positively affects users' perception of privacy risk. In addition, if there are over-requested permissions, users perceive higher privacy risk.
  • Item
    Understanding the Determinants of Cloud Computing Adoption for High Performance Computing
    ( 2018-01-03) Lynn, Theo ; Liang, Xiaoning ; Gourinovitch, Anna ; Morrison, John ; Fox, Grace ; Rosati, Pierangelo
    Within the complex context of high performance computing (HPC), the factors influencing technology adoption decisions remain largely unexplored. This study extends Diffusion of Innovation (DOI) and Human-Organization-Technology fit (HOT-fit) theories into an integrated model, to explore the impact of ten factors on cloud computing adoption decisions in the HPC context. The results suggest that adopters and non-adopters have different perceptions of the indirect benefits, adequacy of resources, top management support, and compatibility of adopting cloud computing for HPC. In addition, perceptions of the indirect benefits and HPC competences can be used to predict the cloud computing adoption decision for HPC. This is one of the first studies in the information systems (IS) literature exploring the factors impacting the cloud computing adoption decision in the important context of HPC. It integrates two influential technology adoption theories and enhances understanding of the key factors influencing organizations’ cloud computing adoption decisions in this context.
  • Item
    How Do IT-related Traits Drive the Internet Use of Mature Adults? The Interplay of Curiosity and Control
    ( 2018-01-03) Rockmann, Robert ; Gewald, Heiko
    It can frequently be observed that mature adults use the Internet differently as younger members of society. We propose a model based on IT-related traits to conceptualize the Internet use behavior of mature adults, specifically focusing on curiosity- and control-related traits. We empirically tested our model by investigating the duration and intensity of mature adults’ Internet use. The results reveal that traits reflecting -˜curiosity’ (Personal Innovativeness in IT and Computer Playfulness) explain variations in the duration of Internet use, while traits reflecting -˜control’ (Computer Self-Efficacy and Computer Anxiety) predict the intensity to which mature adults make use of the Internet. Our paper thereby contributes to research on post-acceptance variations and on individual differences in IT use.
  • Item
    How to Check Out? An Empirical Exploration of Customers’ Different Cognitive Processes in Retailing Context
    ( 2018-01-03) Rinta-Kahila, Tapani ; Penttinen, Esko ; Pääsky, Hans-Petteri
    Self-checkouts (SCOs) have become an integral part of many retail servicescapes. While SCOs have the potential to improve service while simultaneously cutting operations costs, achieving satisfactory utilization rates for them can be challenging. As these systems come with high investment costs, it is important for managers to understand how customers choose between traditional service and self-service technology. To understand this choice better, we study the cognitive processes consumers use in their decision-making through the lens of dual-systems theories. We conduct an exploratory field study where we observe and interview customers checking out from retail stores. We discover four distinct customer types regarding the extent of reflexive (automatic) and reflective (deliberate) processing they use in their checkout selection: habitual traditional checkout users, habitual SCO users, situational users, and drifting users. Moreover, we find that the processing styles are highly related to the different stages of technology acceptance.