Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Business

An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath Jan 2024

An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath

Journal of International Technology and Information Management

ABSTRACT

The Internet of Things (IoT) enables the connection between humans, physical objects, and cyber objects, resulting in monitoring, automation, and decision-making capabilities. This connection can be complex and lead to uncertainty for individuals before adopting IoT technology. To address this, we conducted research on the role of Institution-based trust in the context of IoT adoption. Our model for IoT adoption is based on existing literature and includes the components of Institution-based trust and its antecedents. Through empirical testing, we confirmed that Institution-based trust positively affects IoT adoption at the individual level. Additionally, we found that User confirmation/disconfirmation and familiarity …


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya Jan 2022

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra Jan 2021

Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra

Journal of International Technology and Information Management

Blockchain is one of the most promising technological innovations of recent times, with the potential to change the very way information systems are used by the accounting function. It is however expected to be disruptive and yet to see high adoption rates. Identification of factors influencing the adoption is required to empower the accounting fraternity to harness the full potential of blockchains. This study is one of the first to inductively explore and develop an adoption model for blockchains as well as for accounting applications with theoretical groundings in the Technology-Organization-Environment (TOE) framework, which has been extended with a variable …


Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin Jan 2021

Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin

Journal of International Technology and Information Management

The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use the Uber ridesharing app. It focuses on extending the UTAUT2 in collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs – performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new …


Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo Jan 2021

Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo

Journal of International Technology and Information Management

Mutual trust among social networks users encourages positive communications, so it is critical to study trust in the context of online social networks. In this study, we built a model to calculate trust of social media users. Data was collected from Qzone (Tencent Technology Co., Ltd.), a SN service (also known as QQ) in China. We identified 150 QQ users and 3 friends from each of the users; data of these users were collected by Python program. The relationship between trust and closeness was constructed using an ordinary least squares regression model, and the factors that influence trust between social …


What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard Oct 2018

What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard

Communications of the IIMA

Consumers are expanding the types of goods they are exchanging in consumer-to-consumer e-commerce. There appears to be a subset called collaborative consumption. Collaborative consumption is a dynamic concept given that an individual must develop mechanisms to trust others with transporting, sharing, and consuming goods/services. This study develops a trust model for collaborative consumption with three expected influences -- natural propensity to trust (NPT), others’ trust of buyer/seller (OTBS), and objective trust (perceived website quality (PWSQ) and third party recognition (TPR)) -- on an individual’s trust in collaborative consumption. Regression analysis is utilized to assess the proposed model. The study finds …


An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law Jan 2018

An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law

Journal of International Technology and Information Management

Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …


Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen Jan 2016

Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen

Journal of International Technology and Information Management

Over the past few decades, information technology outsourcing has become a widely used and researched means for enterprises to enhance their performance. As future collaboration is the most desirable outcome between enterprises and IT outsourcing vendors, the purpose of this study is to construct a new model to examine: 1) whether information technology outsourcing satisfaction impact future collaboration, 2) whether value co-creation impact outsourcing satisfaction, 3)which factors influence value co-creation, and 4) whether trust influence enterprises’ commitments. This research assumes that: 1) trust predicts enterprises’ commitments; 2) customer orientation and participation, service quality, communication culture, and enterprises’ commitment predicts value …


Sifo-Peers: A Social Foaf Based Peer-To-Peer Network, Brahmananda Sapkota, Lars Ludwig, Xuan Zhou, John G. Breslin Jan 2015

Sifo-Peers: A Social Foaf Based Peer-To-Peer Network, Brahmananda Sapkota, Lars Ludwig, Xuan Zhou, John G. Breslin

Communications of the IIMA

In this paper, an attempt is made to conceptually unite three different application areas for semantic technologies, namely personal Knowledge Management, social networking, and Peer-to-Peer information-sharing. Until now, semantic technology has been applied to each of these application areas separately or in binary combinations only. By functionally combining all three areas in a single application, it is hoped to sketch a compelling Semantic Web system that will help increase the spread and acceptance of the Semantic Web vision. A concrete usage scenario of a community of researchers is used to demonstrate the approach.


Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard Jan 2015

Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard

Communications of the IIMA

Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable elements keen to misuse its usage. Computers and the Internet present new ways to engage in old crimes, such as fraud and piracy. They also have made it possible for criminals to perpetrate new harmful acts, like data access and interference. However, national legislations and regional agreements are not sufficient to address the global nature of cybercrime. Therefore, …


The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani Jan 2014

The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani

Journal of International Technology and Information Management

In the information-driven and application rich environment of smartphones, power is closer to the user than ever before and it has the potential of helping them become more effective and efficient. Smartphones have become increasingly important for companies to create strategic opportunities and competitive advantage by adding value for its stakeholders and improving efficiency. Technological advances in smartphones have led to increased mobile applications and implications for theory and practice since they create strategic opportunities and competitive advantage by adding value for customers and improving efficiency through the use of mobile technologies. Understanding the factors that influence the continuance in …


Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz Jan 2007

Personal Data Collection Via The Internet: The Role Of Privacy Sensitivity And Technology Trust, Susan K. Lippert, Paul Michael Swiercz

Journal of International Technology and Information Management

Policy makers and researchers from a wide range of perspectives have expressed concern about the interplay between privacy rights and information exchanges via the Internet. Of particular interest has been the challenge of protecting sensitive personal information. In this paper, we assert that user willingness to share sensitive data is an area of critical concern and requires additional investigation. In an effort to enrich the dialogue on the question of voluntary sharing of sensitive personal data via the Internet, we present a model showcasing the relationship between personal data sharing, privacy sensitivity, and technology trust and discuss how organizations can …


A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier Jan 2007

A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier

Journal of International Technology and Information Management

This paper develops a framework and model for building trust by combining research on the creation of trust with the dimensions of trust: ability, benevolence and integrity. By combining these dimensions in a matrix with the types of trust production based on characteristics, process and institutions, the paper develops a robust 3 x 3 matrix with which to categorize and understand trust production. The framework is developed and analyzed in the light of literature on consumer trust. This framework can help researchers, practitioners and consumers understand trust creation and assist businesses in developing a comprehensive strategy for managing trust.