Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Business

An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath Jan 2024

An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath

Journal of International Technology and Information Management

ABSTRACT

The Internet of Things (IoT) enables the connection between humans, physical objects, and cyber objects, resulting in monitoring, automation, and decision-making capabilities. This connection can be complex and lead to uncertainty for individuals before adopting IoT technology. To address this, we conducted research on the role of Institution-based trust in the context of IoT adoption. Our model for IoT adoption is based on existing literature and includes the components of Institution-based trust and its antecedents. Through empirical testing, we confirmed that Institution-based trust positively affects IoT adoption at the individual level. Additionally, we found that User confirmation/disconfirmation and familiarity …


Privacy In Online Communities: How Control And Assurances Influence Intention To Disclose Personal Information, Oscar E. Lopez Arizaga Jun 2022

Privacy In Online Communities: How Control And Assurances Influence Intention To Disclose Personal Information, Oscar E. Lopez Arizaga

Doctoral Dissertations

Online Health Communities provide a rich, context-specific scenario for the study of privacy, which promises to enhance our knowledge of this complex phenomena. Online communities are only successful to the extent that individuals join and participate in the communities, and privacy concerns are a barrier to this success. In this dissertation, the privacy calculus and the agentic perspective of social cognitive theory provide the theoretical foundation for studying privacy in online communities. The first study represents a comprehensive literature review of online privacy in IS. Several research opportunities are found in the literature including limited empirical work on the roles …


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya Jan 2022

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Towards A Calibrated Trust-Based Approach To The Use Of Facial Recognition Technology, Gary Kok Yew Chan Nov 2021

Towards A Calibrated Trust-Based Approach To The Use Of Facial Recognition Technology, Gary Kok Yew Chan

Research Collection Yong Pung How School Of Law

The use of facial recognition technology has given rise to much debate relating to issues concerning privacy infringements, bias and inaccuracies of data and outputs, possibilities of covert use, the lack of data security and the problem of function creep. Certain states and jurisdictions have called for bans and moratoria on the use of facial recognition technology. This paper argues that a blanket ban on facial recognition technology would be overly precautionary without fully considering the wide range of uses and benefits of the innovation. To promote its acceptance, trust in facial recognition technology should be developed in a calibrated …


Why Do Robots Have Smiley Faces?, Mark Findlay Jun 2021

Why Do Robots Have Smiley Faces?, Mark Findlay

Research Collection Yong Pung How School Of Law

The author discussed why engineers and designers provide machines with the semblance of friendliness, and why it takes more than that for humans to trust AI. The ground-breaking AI in community research and policy initiative by CAIDG, supported by the National Research Foundation Singapore under its Emerging Areas Research Projects Funding Initiative, seeks to understand how and why trust can be established when humans and machines come together.


Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra Jan 2021

Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra

Journal of International Technology and Information Management

Blockchain is one of the most promising technological innovations of recent times, with the potential to change the very way information systems are used by the accounting function. It is however expected to be disruptive and yet to see high adoption rates. Identification of factors influencing the adoption is required to empower the accounting fraternity to harness the full potential of blockchains. This study is one of the first to inductively explore and develop an adoption model for blockchains as well as for accounting applications with theoretical groundings in the Technology-Organization-Environment (TOE) framework, which has been extended with a variable …


Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin Jan 2021

Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin

Journal of International Technology and Information Management

The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use the Uber ridesharing app. It focuses on extending the UTAUT2 in collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs – performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new …


From Truth To Trust: The Impact Of Blockchain Traceability On Trust In Product Authenticity, Frank Betz Jan 2021

From Truth To Trust: The Impact Of Blockchain Traceability On Trust In Product Authenticity, Frank Betz

Theses and Dissertations

In the global marketplace, customers are increasingly unaware of the source, provenance, and authenticity of products. Early research has shown that the introduction of blockchain technology into the supply chain area can make it more transparent and trustworthy. As a platform that supports distributed, cryptographically secure, auditable transactions, blockchain has expanded from the domain of digital cryptocurrency into the domain of physical asset provenance and ownership tracking and tracing. This research examines blockchain support of trust in product authenticity adopting a two-paper dissertation format. In the first conceptual paper, I develop a conceptual framework on blockchain technology's unique features and …


Why We Use A New Currency: The Role Of Trust And Control In Explaining The Perception And Usage Of Bitcoin, Joseph B. Walton Jan 2020

Why We Use A New Currency: The Role Of Trust And Control In Explaining The Perception And Usage Of Bitcoin, Joseph B. Walton

Theses and Dissertations

Social media, e-commerce, global peer-to-peer technologies, and the near ubiquity of computers and smartphones allow people to interact, trust, and exchange value across traditional socio-economic control boundaries and over significant distances. Since the creation in 2008 of a new cryptographic currency system called Bitcoin, a financial technology market sector of about 250 billion USD has rapidly emerged, raising questions about the nature of currency in society and whether new types of non-national money are warranted and viable. This debate has pitted heterodox economic interests against orthodox economic interests while it has rekindled interest in theories that view money as a …


An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law Jan 2018

An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law

Journal of International Technology and Information Management

Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …


Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman Apr 2017

Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman

Indiana Law Journal

How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is one in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and nonpublic information through the lens of social science —namely, principles of trust.

Patent law’s public use bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows that current …


Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen Jan 2016

Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen

Journal of International Technology and Information Management

Over the past few decades, information technology outsourcing has become a widely used and researched means for enterprises to enhance their performance. As future collaboration is the most desirable outcome between enterprises and IT outsourcing vendors, the purpose of this study is to construct a new model to examine: 1) whether information technology outsourcing satisfaction impact future collaboration, 2) whether value co-creation impact outsourcing satisfaction, 3)which factors influence value co-creation, and 4) whether trust influence enterprises’ commitments. This research assumes that: 1) trust predicts enterprises’ commitments; 2) customer orientation and participation, service quality, communication culture, and enterprises’ commitment predicts value …


Progressive Trust Formation Within The South African Fresh Produce Industry Through The Use Of Self-Service Technologies, Justy Range, Awie C. Leonard Phd Jul 2015

Progressive Trust Formation Within The South African Fresh Produce Industry Through The Use Of Self-Service Technologies, Justy Range, Awie C. Leonard Phd

The African Journal of Information Systems

When using self-service solutions to deliver services the challenge is to retain the trust of the end user. This is specifically the case when dealing with end users in the fresh produce market environment. This sector has not seen the adoption of self-service technologies specifically in southern Africa. In this paper we propose a model to enhance our understanding of trust formation using self-service technologies. A qualitative research approach, based on a case study was followed to create the model. This case study offers insight into how the dynamics of the product, supporting services and the technology shapes trust forming …


In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh Nov 2014

In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh

Odai Khasawneh

Tacit knowledge is an organizational resource that is difficult to cultivate. It requires that responsible agents in the organization take an active role in encouraging trust and the development of relationships where individuals feel that their voice will be heard and that there will be a benefit from them passing knowledge onto someone else. In knowledge work tacit knowledge is especially important. 

This research found that servant leadership is an important factor in influencing tacit knowledge sharing, however leader-member exchange is a factor that will strongly support the sharing of tacit knowledge. 

If there is a dearth in servant leadership, …


The Influence Of Leadership And Trust On The Sharing Of Tacit Knowledge: Exploring A Path Model, Billy Whisnant, Odai Khasawneh Dec 2013

The Influence Of Leadership And Trust On The Sharing Of Tacit Knowledge: Exploring A Path Model, Billy Whisnant, Odai Khasawneh

Odai Khasawneh

Information systems engineers were investigated to determine the influence of servant leadership and the quality of the leader-member exchange relationship as influencers of trust and tacit knowledge sharing. This study proposed that there is a path of leadership to the sharing of tacit knowledge that required trust. Findings partially support this notion, as mediation procedures indicate partial mediation exists between servant leadership and tacit knowledge sharing as well as leader-member exchange and tacit knowledge sharing. A path analysis found a strong degree of model fit in the proposed relationship. Categorical moderation indicated that a high level of leader-member exchange will …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


A Critical Examination Of The Relationship Between The Use Of Gatekeepers, Trust, And Organisation Knowledge-Sharing, Deogratias Harorimana Dr Oct 2012

A Critical Examination Of The Relationship Between The Use Of Gatekeepers, Trust, And Organisation Knowledge-Sharing, Deogratias Harorimana Dr

Dr Deogratias Harorimana

This thesis critically examines the relationship between gatekeepers, trust, and an organisation’s knowledge sharing. The research applied mixed methods with the case study approach. In this research the concept ‘gatekeeper’ is widely used to represent a class of those who are part of a knowledge management strategy; they collect information and knowledge and contextualise this before they can share it with the rest of the members of the organisation’s knowledge networks - within the formal and informal organisation. In this study, it was found that there was a strong relationship between the openness of a given firm, as regards its …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier Jan 2007

A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier

Journal of International Technology and Information Management

This paper develops a framework and model for building trust by combining research on the creation of trust with the dimensions of trust: ability, benevolence and integrity. By combining these dimensions in a matrix with the types of trust production based on characteristics, process and institutions, the paper develops a robust 3 x 3 matrix with which to categorize and understand trust production. The framework is developed and analyzed in the light of literature on consumer trust. This framework can help researchers, practitioners and consumers understand trust creation and assist businesses in developing a comprehensive strategy for managing trust.


Conceptualization Of Trust, Commitment, And Understanding The Relationships Between Trust, Commitment, And Willingness To Try Internet Banking Services, Siew Tong Fock, Hian Chye Koh Jan 2006

Conceptualization Of Trust, Commitment, And Understanding The Relationships Between Trust, Commitment, And Willingness To Try Internet Banking Services, Siew Tong Fock, Hian Chye Koh

Research Collection Lee Kong Chian School Of Business

This paper examines trust and commitment and their antecedents and consequences within the context of Internet banking, based on data collected from a survey of 500 Singapore undergraduates. After the establishment of a conceptual model that links trust and commitment to the willingness to try Internet banking, the empirical findings show that higher levels of trust and commitment are significantly associated with a greater willingness to try Internet banking. The paper also investigates security, ethics, privacy, openness, the speed of response, quality of information, regulatory control, technology advancement, and reputation as determinants of trust. Of these, security, regulatory control, technology …


Lands Available For Mineral Leasing, John R. Little, Jr. Jun 1985

Lands Available For Mineral Leasing, John R. Little, Jr.

Public Lands Mineral Leasing: Issues and Directions (Summer Conference, June 10-11)

14 pages.

Contains references.