The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services

Heng Xu1, Sumeet Gupta2
1Pennsylvania State University
2Dept. of Business Administration, Shri Shankaracharya College of Engineering and Technology, Bhilai, India

Tóm tắt

Từ khóa


Tài liệu tham khảo

Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28(3), 557–582.

Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9(2), 204–215.

Agarwal, R., & Karahanna, E. (2000). Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665–692.

Barkhuus, L., & Dey, A. (2003). Location-based services for mobile telephony: A study of user’s privacy concerns, Proceedings of the INTERACT, 9th IFIP TC13 International Conference on Human-Computer Interaction, Zurich, Switzerland, pp. 7.

Barnes, J. S. (2003). Known by the network: The emergence of location-based mobile commerce. In E.-P. Lim & K. Siau (Eds.), Advances in mobile commerce technologies (pp. 171–189). Hershey: Idea Group.

Bellavista, P., Kupper, A., & Helal, S. (2008). Location-based services: Back to the future. IEEE Pervasive Computing, 7(2), 85–89.

Bock, G., Kankanhalli, A., & Sharma, S. (2006). Are norms enough? The role of collaborative norms in promoting organizational knowledge seeking. European Journal of Information Systems, 15(4), 357–367.

Buchanan, T., Paine, C., Joinson, A. N., & Reips, J. U. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157–165.

Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(1), 81–105.

Chae, M. & Kim, J. (2001). Information quality for mobile internet services: A theoretical model with empirical validation. In V. Storey, S. Sarkar, & J. DeGross (Eds.), Proceeding of Twenty-Second International Conference on Information Systems (ICIS). New Orlean, LA, USA, pp. 43–53.

Chellappa, R. K., & Sin, R. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2), 181–202.

Clarke, R. (2001). Person location and person tracking: Technologies, risks and policy implications. Information Technology & People, 14(2), 206.

Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale: L. Erlbaum Associates.

Cook, M., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Boston: Houghton Mifflin.

Danezis, G., Lewis, S., & Anderson, R. (2005). How much is location privacy worth, Proceedings of the Fourth Workshop on the Economics of Information Security (WISE), Harvard University.

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 982–1003.

Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.

Dinev, T., & Hart, P. (2006b). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29.

Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance — an empirical investigation. Journal of Strategic Information Systems, 17(3), 214–233.

Faul, F., Erdfelder, E., Lang, A.-G., & Buchner, A. (2007). G* Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods, 39(2), 175–191.

Flynn, L. R., & Goldsmith, R. E. (1999). A short, reliable measure of subjective knowledge. Journal of Business Research, 46(1), 57–66.

Fornell, C., & Bookstein, F. L. (1982). Two structrual equation models: LISREL and PLS applied to customer exit-voice theory. Journal of Marketing Research, 19(11), 440–452.

Gefen, D., Karahanna, E., & Straub, D. W. (2003). Inexperience and experience with online stores: The importance of TAM and trust. IEEE Transactions on Engineering Management, 50(3), 307–321.

Gefen, D., Straub, D., & Boudreau, M. (2000). Structural equation modeling techniques and regression: Guidelines for research practice. Communications of AIS, 7(7), 1–78.

Goldsmith, R. E., & Hofacker, C. F. (1991). Measuring consumer innovativeness. Journal of the Academy of Marketing Science, 19(3), 209–221.

Gupta, S., & Kim, H.-W. (2007). The moderating effect of transaction experience on the decision calculus in on-line repurchase. International Journal of Electronic Commerce, 12(1), 127–158.

Johnson, C. A. (1974). Privacy as personal control. In D. H. Carson (Ed.), Man-environment interactions: Evaluations and applications: Part 2, vol. 6 (pp. 83–100). Washington: Privacy, Environmental Design Research Association.

Junglas, I., & Watson, R. T. (2006). The U-constructs: Four information drives. Communications of AIS, 17, 569–592.

Kaasinen, E. (2003). User needs for location-aware mobile services. Personal and Ubiquitous Computing, 7(1), 70–79.

Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, June, pp. 183-213.

Kim, H. W., Xu, Y., & Koh, J. (2004). A comparison of online trust building factors between potential customers and repeat customers. Journal of the Association for Information Systems, 5(10), 392–420.

Kirton, M. (1976). Adaptors and innovators: A description and measure. Journal of Applied Psychology, 61(5), 622–629.

Leonard-Barton, D., & Deschamps, I. (1988). Managerial influence in the implementation of new technology. Management Science, 34(10), 1252–1265.

Levy, S. (2004). A future with nowhere to hide?, Newsweek viewed Aug 28, 2008 < http://www.newsweek.com/id/53986/ >

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.

Margulis, S. T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, 59(2), 411–429.

Midgley, D. F., & Dowling, G. R. (1978). Innovativeness: The concept and its measurement. Journal of Consumer Research, 4(4), 229–242.

Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.

Pedersen, E. P. (2005). Adoption of mobile internet services: An exploratory study of mobile commerce early adopters. Journal of Organizational Computing and Electronic Commerce, 15(2), 203–222.

Rao, B., & Minakakis, L. (2003). Evolution of mobile location-based services. Communications of ACM, 46(12), 61–65.

Rogers, E. M. (1995). Diffusion of innovations (4th ed.). New York: Free Press.

Sheppard, B. H., Hartwick, J., & Warshaw, P. R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15(3), 325–343.

Smith, H. J., Milberg, J. S., & Burke, J. S. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.

Straub, D., Limayem, M., & Karahanna-Evaristo, E. (1995). Measuring system usage: Implications for IS theory testing. Management Science, 41(8), 1328–1342.

Taylor, S., & Todd, P. A. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.

Thiesse, F. (2007). RFID, privacy and the perception of risk: A strategic framework. Journal of Strategic Information Systems, 16(2), 214–232.

Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience on personal computer utilization: Testing a conceptual model. Journal of Management Information Systems, 11(1), 167–187.

Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342–365.

Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigations of the effects of the mood. Organizational Behavior and Human Decision Processes, 79(1), 1–28.

Venkatesh, V., Morris, G. M., Davis, B. G., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.

Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.

Wold, H. (1982). Soft modeling: The basic design and some extensions. In K. G. Joreskog & H. Wold (Eds.), Systems under indirect observations: Part 2 (pp. 1–54). Amsterdam: North-Holland.

Xu, H. (2009). Consumer responses to the introduction of privacy protection measures: An exploratory research framework. International Journal of E-Business Research, 5(2), 21–47.

Xu, H. & Teo, H. H. (2004). Alleviating consumer’s privacy concern in location-based services: A psychological control perspective, Proceedings of the Twenty-Fifth Annual International Conference on Information Systems (ICIS 2004), Washington, D. C., United States, pp. 793–806.

Xu, H., Teo, H. H., & Tan, B. C. Y. (2005). Predicting the adoption of location-based services: The roles of trust and privacy risk, Proceedings of 26th Annual International Conference on Information Systems (ICIS 2005), Las Vegas, NV, pp. 89.