Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Trust

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 36

Full-Text Articles in Business

Investigation Of Algorithmic Nudging On Decision Quality: Evidence From Randomized Experiments In Online Recommendation Settings, Yuxiao Luo Feb 2024

Investigation Of Algorithmic Nudging On Decision Quality: Evidence From Randomized Experiments In Online Recommendation Settings, Yuxiao Luo

Dissertations, Theses, and Capstone Projects

Most recently, academic research has started to address the relationship between nudges and Artificial Intelligence/Machine Learning (AI/ML) and found that personalized targeting algorithms can influence individual and collective behaviors in ways that may lead to undesired consequences for both end-users and firms. This dissertation investigates the effects of digital nudging, particularly algorithmic nudging, on user’s decision quality in online badge recommendations in the e-commerce context. Nudge is a choice architecture that alters individual’s behavior in a predictable way while preserving all available options and keeping the same economic incentives. In this dissertation, I conducted three independent and relevant studies and …


An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath Jan 2024

An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath

Journal of International Technology and Information Management

ABSTRACT

The Internet of Things (IoT) enables the connection between humans, physical objects, and cyber objects, resulting in monitoring, automation, and decision-making capabilities. This connection can be complex and lead to uncertainty for individuals before adopting IoT technology. To address this, we conducted research on the role of Institution-based trust in the context of IoT adoption. Our model for IoT adoption is based on existing literature and includes the components of Institution-based trust and its antecedents. Through empirical testing, we confirmed that Institution-based trust positively affects IoT adoption at the individual level. Additionally, we found that User confirmation/disconfirmation and familiarity …


Privacy In Online Communities: How Control And Assurances Influence Intention To Disclose Personal Information, Oscar E. Lopez Arizaga Jun 2022

Privacy In Online Communities: How Control And Assurances Influence Intention To Disclose Personal Information, Oscar E. Lopez Arizaga

Doctoral Dissertations

Online Health Communities provide a rich, context-specific scenario for the study of privacy, which promises to enhance our knowledge of this complex phenomena. Online communities are only successful to the extent that individuals join and participate in the communities, and privacy concerns are a barrier to this success. In this dissertation, the privacy calculus and the agentic perspective of social cognitive theory provide the theoretical foundation for studying privacy in online communities. The first study represents a comprehensive literature review of online privacy in IS. Several research opportunities are found in the literature including limited empirical work on the roles …


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya Jan 2022

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran Jan 2021

Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran

Scholarship and Professional Work - Business

There are many advantages to adopt cloud computing, however, some important issues need to be addressed, such as cybersecurity, cost-saving, trust, implementation complexity, and cloud provider’s reliability. This study developed a research framework to study the human factors that interact with technical and cybersecurity factors to affect the cloud-computing provider’s performance from the user’s perspective. Research hypotheses were developed and a survey was conducted to test the hypotheses and validate the research framework.


Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin Jan 2021

Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin

Journal of International Technology and Information Management

The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use the Uber ridesharing app. It focuses on extending the UTAUT2 in collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs – performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new …


Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra Jan 2021

Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra

Journal of International Technology and Information Management

Blockchain is one of the most promising technological innovations of recent times, with the potential to change the very way information systems are used by the accounting function. It is however expected to be disruptive and yet to see high adoption rates. Identification of factors influencing the adoption is required to empower the accounting fraternity to harness the full potential of blockchains. This study is one of the first to inductively explore and develop an adoption model for blockchains as well as for accounting applications with theoretical groundings in the Technology-Organization-Environment (TOE) framework, which has been extended with a variable …


Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo Jan 2021

Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo

Journal of International Technology and Information Management

Mutual trust among social networks users encourages positive communications, so it is critical to study trust in the context of online social networks. In this study, we built a model to calculate trust of social media users. Data was collected from Qzone (Tencent Technology Co., Ltd.), a SN service (also known as QQ) in China. We identified 150 QQ users and 3 friends from each of the users; data of these users were collected by Python program. The relationship between trust and closeness was constructed using an ordinary least squares regression model, and the factors that influence trust between social …


Building A Theoretical Research Model For Trust Development: The Case Of Mobile Financial Services In Myanmar, Phyo Min Tun Oct 2020

Building A Theoretical Research Model For Trust Development: The Case Of Mobile Financial Services In Myanmar, Phyo Min Tun

The South East Asian Journal of Management

Research Aims - This research study focuses on the factors affecting customer trust in mobile financial services (MFS) in Myanmar by developing a research model that incorporates six different factors: perceived usefulness, perceived ease of use, social pressure, enabling conditions, service quality, and satisfaction. Design/Methodology/Approach - Exploratory Factor Analysis (EFA) and Confirmatory Factor Analysis (CFA) were employed to analyse the data. Subsequently, Structural Equation Modeling (SEM) was utilised to examine hypotheses. An analysis was performed on the survey data collected from 250 mobile phone users who are likely to use or currently using MFS in Myanmar. Research Findings - The …


What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard Oct 2018

What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard

Communications of the IIMA

Consumers are expanding the types of goods they are exchanging in consumer-to-consumer e-commerce. There appears to be a subset called collaborative consumption. Collaborative consumption is a dynamic concept given that an individual must develop mechanisms to trust others with transporting, sharing, and consuming goods/services. This study develops a trust model for collaborative consumption with three expected influences -- natural propensity to trust (NPT), others’ trust of buyer/seller (OTBS), and objective trust (perceived website quality (PWSQ) and third party recognition (TPR)) -- on an individual’s trust in collaborative consumption. Regression analysis is utilized to assess the proposed model. The study finds …


An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law Jan 2018

An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law

Journal of International Technology and Information Management

Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …


Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala Jun 2017

Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala

Atlantic Marketing Journal

In this research, an online experiment was conducted to investigate the effect of the mere presence of digital third-party organization (TPO) endorsement and the quality of information conveyed by a digital TPO, referred to as the endorsement information value effect. Involvement and institution-based trust were tested as moderators of the endorsement information value effect. The results confirm the intuitive belief of managers that the mere presence of a digital TPO endorsement benefits websites by reducing risk perceptions, improving attitudes and increasing choice likelihood. The findings from this research revealed that effectiveness of digital TPO endorsement information value was contingent upon …


Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman Jun 2017

Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman

Research Collection School Of Computing and Information Systems

Trust is crucial in the relationships between charitable fundraisers and potential donors. This study examines factors that can help fundraisers gain potential donors’ trust, which is crucial to the success of the campaigns. Examining charitable fundraising campaigns on an online platform, this study finds that trust issues can be mitigated by providing a campaign description that is more sophisticated, more informative, and with fewer errors. Additionally, setting a higher campaign funding goal tends to lead to a more successful campaign. These characteristics likely reflect a competent, committed, and passionate fundraiser. On the other hand, mere exposure to a wide set …


Modelling And Testing Consumer Trust Dimensions In E-Commerce, Tiago Oliveira, Matilde Alhinho, Paulo Rita, Gurpreet Dhillon Jan 2017

Modelling And Testing Consumer Trust Dimensions In E-Commerce, Tiago Oliveira, Matilde Alhinho, Paulo Rita, Gurpreet Dhillon

Information Systems Publications

Prior research has found trust to play a significant role in shaping purchase intentions of a consumer. However there has been limited research where consumer trust dimensions have been empirically defined and tested. In this paper we empirically test a path model such that Internet vendors would have adequate solutions to increase trust. The path model presented in this paper measures the three main dimensions of trust, i.e. competence, integrity, and benevolence. And assesses the influence of overall trust of consumers. The paper also analyses how various sources of trust, i.e. consumer characteristics, firm characteristic, website infrastructure and interactions with …


The Mediation Effect Of Trusting Beliefs On The Relationship Between Expectation-Confirmation And Satisfaction With The Usage Of Online Product Recommendation, Muhammad Ashraft, Noor Ismawati Jaafart, Ainin Sulaiman Apr 2016

The Mediation Effect Of Trusting Beliefs On The Relationship Between Expectation-Confirmation And Satisfaction With The Usage Of Online Product Recommendation, Muhammad Ashraft, Noor Ismawati Jaafart, Ainin Sulaiman

The South East Asian Journal of Management

Online Product Recommendations (OPRs) are increasingly available to online customers as a value-added self-service in evaluating and choosing a product. Research has highlighted several advantages that customers can gain from using OPRs. However, the realization of these advantages depends on whether and to what extent customers embrace and fully utilise them. The relatively low OPR usage rate indicates that customers have not yet developed trust in OPRs’ performance. Past studies also have established that satisfaction is a valid measure of system performance and a consistent significant determinant of users’ continuous system usage. Therefore, this study aimed to examine the mediation …


Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen Jan 2016

Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen

Journal of International Technology and Information Management

Over the past few decades, information technology outsourcing has become a widely used and researched means for enterprises to enhance their performance. As future collaboration is the most desirable outcome between enterprises and IT outsourcing vendors, the purpose of this study is to construct a new model to examine: 1) whether information technology outsourcing satisfaction impact future collaboration, 2) whether value co-creation impact outsourcing satisfaction, 3)which factors influence value co-creation, and 4) whether trust influence enterprises’ commitments. This research assumes that: 1) trust predicts enterprises’ commitments; 2) customer orientation and participation, service quality, communication culture, and enterprises’ commitment predicts value …


Progressive Trust Formation Within The South African Fresh Produce Industry Through The Use Of Self-Service Technologies, Justy Range, Awie C. Leonard Phd Jul 2015

Progressive Trust Formation Within The South African Fresh Produce Industry Through The Use Of Self-Service Technologies, Justy Range, Awie C. Leonard Phd

The African Journal of Information Systems

When using self-service solutions to deliver services the challenge is to retain the trust of the end user. This is specifically the case when dealing with end users in the fresh produce market environment. This sector has not seen the adoption of self-service technologies specifically in southern Africa. In this paper we propose a model to enhance our understanding of trust formation using self-service technologies. A qualitative research approach, based on a case study was followed to create the model. This case study offers insight into how the dynamics of the product, supporting services and the technology shapes trust forming …


Sifo-Peers: A Social Foaf Based Peer-To-Peer Network, Brahmananda Sapkota, Lars Ludwig, Xuan Zhou, John G. Breslin Jan 2015

Sifo-Peers: A Social Foaf Based Peer-To-Peer Network, Brahmananda Sapkota, Lars Ludwig, Xuan Zhou, John G. Breslin

Communications of the IIMA

In this paper, an attempt is made to conceptually unite three different application areas for semantic technologies, namely personal Knowledge Management, social networking, and Peer-to-Peer information-sharing. Until now, semantic technology has been applied to each of these application areas separately or in binary combinations only. By functionally combining all three areas in a single application, it is hoped to sketch a compelling Semantic Web system that will help increase the spread and acceptance of the Semantic Web vision. A concrete usage scenario of a community of researchers is used to demonstrate the approach.


Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard Jan 2015

Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard

Communications of the IIMA

Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable elements keen to misuse its usage. Computers and the Internet present new ways to engage in old crimes, such as fraud and piracy. They also have made it possible for criminals to perpetrate new harmful acts, like data access and interference. However, national legislations and regional agreements are not sufficient to address the global nature of cybercrime. Therefore, …


Antecedents And Consequences Of Trust In Supply Chain: The Role Of Information Technology, Qing Hu, Jinghua Xiao, Kang Xie, Nilesh Saraf Jan 2014

Antecedents And Consequences Of Trust In Supply Chain: The Role Of Information Technology, Qing Hu, Jinghua Xiao, Kang Xie, Nilesh Saraf

Qing Hu

Trust has been a central construct in studies of inter-firm relationships. Many operational, organizational, social, and cultural factors have been identified to have significant impact on inter-firm trust. In this study, we investigate the role of information technology in generating inter-firm trust and the consequences of this trust in the context of supply networks. Using structural equation modeling techniques, our data show that the level of information systems integration among the partner firms in a supply network significantly impacts the trust among the firms which, together with the integrated information systems, explains more than half of the variances in information …


The Impacts Of Trust And Feelings On Knowledge Sharing Among Chinese Employees, Michael J. Zhang Jan 2014

The Impacts Of Trust And Feelings On Knowledge Sharing Among Chinese Employees, Michael J. Zhang

New England Journal of Entrepreneurship

This article examines the differential effects of two types of trust (affect based and cognition based) and two types of feelings (ganqing and jiaoqing) on different knowledge-sharing processes (seeking, transfer, and adoption) among Chinese employees. The influences of these different types of trust and feelings on Chinese employees’ propensities to seek, transfer, and adopt explicit and tacit knowledge are also analyzed and discussed. The analysis shows affect-based trust increases knowledge transfer, while cognition-based trust is more important to knowledge seeking and adoption. Affect-based trust alone can facilitate the different processes of sharing explicit knowledge. Effective sharing of tacit knowledge, on …


The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani Jan 2014

The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani

Journal of International Technology and Information Management

In the information-driven and application rich environment of smartphones, power is closer to the user than ever before and it has the potential of helping them become more effective and efficient. Smartphones have become increasingly important for companies to create strategic opportunities and competitive advantage by adding value for its stakeholders and improving efficiency. Technological advances in smartphones have led to increased mobile applications and implications for theory and practice since they create strategic opportunities and competitive advantage by adding value for customers and improving efficiency through the use of mobile technologies. Understanding the factors that influence the continuance in …


The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer Dec 2013

The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer

Graduate Theses and Dissertations

With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …


A Critical Examination Of The Relationship Between The Use Of Gatekeepers, Trust, And Organisation Knowledge-Sharing, Deogratias Harorimana Dr Oct 2012

A Critical Examination Of The Relationship Between The Use Of Gatekeepers, Trust, And Organisation Knowledge-Sharing, Deogratias Harorimana Dr

Dr Deogratias Harorimana

This thesis critically examines the relationship between gatekeepers, trust, and an organisation’s knowledge sharing. The research applied mixed methods with the case study approach. In this research the concept ‘gatekeeper’ is widely used to represent a class of those who are part of a knowledge management strategy; they collect information and knowledge and contextualise this before they can share it with the rest of the members of the organisation’s knowledge networks - within the formal and informal organisation. In this study, it was found that there was a strong relationship between the openness of a given firm, as regards its …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Switching Costs And Loyalty: Understanding How Trust Moderates Online Consumers’ Ties To Merchants, Michelle Carter, Richard Klein, Jason B. Thatcher, Ryan Wright May 2012

Switching Costs And Loyalty: Understanding How Trust Moderates Online Consumers’ Ties To Merchants, Michelle Carter, Richard Klein, Jason B. Thatcher, Ryan Wright

Jason Bennett Thatcher

Information technology has transformed how travelers interact with travel service providers. Due to fierce competition in the online air travel industry, e-ticketing services have focused attention on fostering customer loyalty. This is an important strategy because, in general, initial transactions with new customers are less profitable than transactions with existing customers. Drawing on research on customer loyalty, switching costs, and trust, this study develops, and proposes an empirical test, for a model incorporating trust as a moderator of the relationship between switching costs and online customer loyalty. We propose that in the presence of high customer trust, e-businesses should have …


The Impact Of Internet Health Information On Patient Compliance: The Role Of Perceived Information Asymmetry, John Laugesen, Khaled Hassanein, Yufei Yuan Dec 2011

The Impact Of Internet Health Information On Patient Compliance: The Role Of Perceived Information Asymmetry, John Laugesen, Khaled Hassanein, Yufei Yuan

Publications and Scholarship

In recent years, patients have been increasingly seeking and using Internet Health Information (IHI) to become more active in managing their own health in a partnership with their physicians. This trend has both positive and negative effects on the interactions and trust between the patient and physician. This study will examine the impact of patients’ use of IHI on various elements that characterize the interactions between a patient and her/his physician through the lens of Principal-Agent Theory. Specifically information asymmetry between the patient and physician and its relationships with the patient’s trust in and use of IHI, the patient’s trust …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang Apr 2011

Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang

Hongjiang Xu

This research studied the problem of B2C and C2Cconsumers’ attitudes towards trust of the businesstransaction process in China by using the“Consumer Attitudes towards Trust in the e-Business Model.” Four factors in the model wereanalyzed, privacy, security, financial institution andtrusted seal. From this analysis, the conclusion onthe consumers’ attitudes was drawn.


Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul Jan 2010

Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul

Dissertations

Virtual worlds are computer-simulated worlds in which multi-players can simultaneously interact in a rich graphical environment. The development of virtual worlds, along with the massive growth of users, creates opportunities for business organizations. This dissertation involves many studies regarding virtual world adoption in business by virtual consumers.

Most of the research in Information Systems (IS) was conducted investigating factors influencing technology adoption, such as ease of use and usefulness, subjective norms and behavioral controls, self-efficacy, performance and effort expectancy, flow, etc. However, most of these research studies focused neither on design aspects related to affordances nor users' goal-oriented behaviors, such …