Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Science and Technology Studies

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya Jan 2022

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin Jan 2021

Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin

Journal of International Technology and Information Management

The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use the Uber ridesharing app. It focuses on extending the UTAUT2 in collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs – performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new …


Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo Jan 2021

Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo

Journal of International Technology and Information Management

Mutual trust among social networks users encourages positive communications, so it is critical to study trust in the context of online social networks. In this study, we built a model to calculate trust of social media users. Data was collected from Qzone (Tencent Technology Co., Ltd.), a SN service (also known as QQ) in China. We identified 150 QQ users and 3 friends from each of the users; data of these users were collected by Python program. The relationship between trust and closeness was constructed using an ordinary least squares regression model, and the factors that influence trust between social …


Enhancing Trust In The Cryptocurrency Marketplace: A Reputation Scoring Approach, Dan Freeman, Tim Mcwilliams, Sudip Bhattacharyya, Craig Hall, Pablo Peillard Aug 2018

Enhancing Trust In The Cryptocurrency Marketplace: A Reputation Scoring Approach, Dan Freeman, Tim Mcwilliams, Sudip Bhattacharyya, Craig Hall, Pablo Peillard

SMU Data Science Review

Trust is paramount for the effective operation of any monetary system. While the distributed architecture of blockchain technology on which cryptocurrencies operate has many benefits, the anonymity of users on the blockchain has provided criminal users an opportunity to hide both their identities and illicit activities. In this paper, we present a scoring mechanism for cryptocurrency users where the scores represent users’ trustworthiness as safe or risky transactors in the cryptocurrency community. In order to distinguish law-abiding users from potential threats in the Bitcoin marketplace, we analyze historical thefts to profile transactions, classify them into risky and non-risky categories using …


Opening Autonomous Airspace–A Prologue, Samuel M. Vance Apr 2017

Opening Autonomous Airspace–A Prologue, Samuel M. Vance

International Journal of Aviation, Aeronautics, and Aerospace

The proliferation of Unmanned Aerial Vehicles (UAV), and in particular small Unmanned Aerial Systems (sUAS), has significant operational implications for the Air Traffic Control (ATC) system of the future. Integrating unmanned aircraft safely presents long-standing challenges, especially during the lengthy transition period when unmanned vehicles will be mixed with piloted vehicles. Integration of dissimilar systems is not an easy, straight-forward task and in this case is complicated by the difficulty to truly know what is present in the airspace. Additionally, there are significant technology, security and liability issues that will need resolution to ensure property and life are protected and …