The Importance of Sports Network Externality

Size: px
Start display at page:

Download "The Importance of Sports Network Externality"

Transcription

1 (2007) 16, & 2007 Operational Research Society Ltd. All rights reserved X/07 $ Perceived network externalities and communication technology acceptance Troy J. Strader 1, Sridhar N. Ramaswami 2 and Philip A. Houle 1 1 College of Business & Public Administration, Drake University, Des Moines, IA, U.S.A.; 2 Department of Marketing, College of Business, Iowa State University, Ames, IA, U.S.A. Correspondence: Troy J. Strader, College of Business & Public Administration, Drake University, 2507 University Avenue, Des Moines, IA , USA. Tel: þ ; Fax: þ ; Troy.Strader@drake.edu Abstract Electronic mail ( ) and instant messaging (IM) systems represent two communication technologies that are potentially substitutable. A unique feature of and IM is that their value to an individual user increases as the number of other people adopting the system grows. This is referred to as a positive network externality. This externality makes it difficult for consumers to switch to other systems because of the potential loss of connectivity with network members. Further, as this externality grows, it has unintended negative consequences in the form of spim and spam. Including these three network externality effects positive, cross-impact, and negative the present study investigates the determinants of electronic communication system use based on an extended Technology Acceptance Model. The study findings suggest that user perceptions regarding network externalities have a positive impact on use of electronic communication systems while perceptions of problems associated with unsolicited messages and perceived usefulness of alternative systems do not significantly affect system use. This study contributes to our understanding of the factors that affect use of existing and newer alternative communication technologies. (2007) 16, doi: /palgrave.ejis Keywords: electronic mail; instant messaging; information technology acceptance; technology acceptance model; network externality; spam Received: 31 January 2006 Revised: 9 October 2006 Accepted: 21 December 2006 Introduction Because of the increasing relevance of emerging information technologies in the everyday life of individuals, understanding the factors that influence their adoption and use has become an important research topic (Venkatesh and Morris, 2000; Green and Hevner, 2000; Luo et al. (2000); Van Slyke et al., 2002). One important class of emerging information technologies is groupware technologies such as electronic mail ( ) and instant messaging (IM). An interesting feature of these groupware technologies is that they exhibit network externalities that is, their usefulness and value increase as the network of users expands (Chen and Lou, 2002; Kontzer, 2003). To capture the adoption of such technologies, therefore, it becomes necessary that the drivers of adoption include the features of the technology as well as network characteristics. Under the Technology Acceptance Model (TAM), the features of a technology are expressed from the customers perspective. Instead of focusing on physical features of a technology, the focus is shifted to the meaning of the features to the customer in terms of its usefulness and ease of use. The TAM model suggests that perceived usefulness and ease of use influence intent to use a technology; intent to use, in turn, drives actual adoption and use. A large number of technologies has been tested

2 Perceived network externalities Troy J. Strader et al 55 previously using the TAM model including , voice mail, word processors, spreadsheets, database programs, graphic systems, decision support systems, and Web browsers (Wang et al., 2004). In a majority of these studies, use of the TAM model was supported by the empirical results. To incorporate the network externality aspects as part of the TAM model, extensions have related externality to perceived usefulness and intent to use a technology (van den Hooff et al., 2005; Li, Chau and Lou, 2005). That is, as externality becomes more prevalent, the usefulness of a technology increases; this, in turn, is expected to impact intent to use in a positive manner. Using a social pressure argument, externality also has been posited to have a direct impact on intent to use, regardless of the perceived usefulness of a technology. The present study identifies and addresses three gaps in the existing literature for systems and technologies that exhibit network externality properties. First, while previous literature has investigated the adoption of a large number of information technologies (as listed above), there are few studies that have focused on the IM system. One reason for this is the relative newness of this technology. IM has become increasingly important in recent times because of the increase in its application potential. Its customers were primarily young users to begin with; however, its users have become more varied in recent years and additionally, it has found increasing application in work settings. By examining IM adoption using the TAM model with externalities, not only does the study apply TAM in a new setting, it also identifies some previously unknown (new) drivers of IM. Second, previous studies have examined technologies one-at-a-time and thus have not captured potential interdependencies that may be present among related technologies. Specifically, the issue of cross-impact of externality addresses the question: does the network size of one technology affect the adoption and use of another technology? This question is important as network size could act as a deterrent to adoption and diffusion of newer, succession products and technologies. For example, it is possible that because the people one communicates with continue to use , that individual may hesitate to use IM even if they believe that IM is a better technology than . The cross-impact could also act in a reverse direction, where the new technology once adopted prevents migration back to the older technology. This may happen in cases where the newer technology offers utility improvements that are substantively significant. The present study addresses the cross-impact issue for the first time. Third, most previous studies have examined the positive externalities and ignored potential negative externalities of a technology. The present study addresses the negative externality issue. As network size has increased, so have spam in the case of and spim in the case of IM. The nuisance and insecurity created by spim and spam could actually result in weakening the usefulness perceptions of customers with associated negative impact on adoption and extent of use of the systems. The study determines the extent to which spim and spam are seen as nuisance factors and captures their impact on usefulness of the two systems. The remaining sections are organized as follows: first we discuss the conceptual model describing the adoption phenomenon the TAM and how network externalities-related constructs can be incorporated into an extended model applied to the context of electronic communications system adoption. This is followed by presentation of the research methodology including a description of the survey methodology, construct items and measures, and the analytical method. Finally, the results and conclusions are presented. Conceptual framework The traditional model Over the years, a large number of studies have been conducted on identifying the factors affecting user acceptance of information technologies. These studies are based on a variety of frameworks including diffusion of innovation (Rogers, 1995), the theory of reasoned action (Fishbein and Ajzen, 1975), the theory of planned behavior (Ajzen, 1991), and the TAM (Davis et al., 1989). Many of these studies involved single-user information technology acceptance for spreadsheets, databases, and similar software. Less attention has been given to transactional information technologies, such as electronic communication systems (ECS), where system use requires more than one participant. In this study, we investigate the determinants of ECS adoption using the TAM with extensions made for network externalityrelated factors. The TAM model has been applied successfully in a wide variety of contexts, such as computer usage behavior (Davis, 1989), acceptance of information technology (e.g., Venkatesh and Davis, 1996; Dishaw and Strong, 1999), use of Internet technology (e.g., Teo et al., 1999; Lederer et al., 2000; Moon and Kim, 2001), and adoption of cellular phones (Kwon and Chidambaram, 2000). We refer to our extended model as the Communication TAM (CTAM). The TAM model was adapted from Fishbein and Ajzen s theory of reasoned action TRA (1975). TRA suggests that a person s acceptance of an information system (IS) is determined by his intention to accept it. The intention, in turn, is determined by the person s attitude toward the IS. Davis (1989) replaced the attitude concept with two distinct belief variables perceived usefulness and perceived ease of use. Thus, TAM posits that intent to adopt a new technology by consumers is determined by two important beliefs regarding the technology perceived usefulness and perceived ease of use (Davis et al., 1989; Adams et al., 1992; Venkatesh et al., 2002). Because of its excellent track record in explaining why people accept or reject an innovation, TAM is considered today as the dominant model for investigating acceptance of innovations by users (Templeton and Byrd, 2003).

3 56 Perceived network externalities Troy J. Strader et al Perceived usefulness of a certain technology can be defined as the user s evaluative belief about the degree to which that technology enables the user to build and maintain interpersonal relationships in a social context (Li et al., 2005). This contrasts with the meaning provided to this concept in a job setting that it represents beliefs regarding the degree to which using a specific application system will increase an employee s job performance (Davis et al., 1989). Regardless, it refers to the gains that the user makes when using a technology and is expected to have a positive influence on the user s attitudes and behaviors. Perceived ease of use is defined as the degree to which a person believes that using a particular system would be free of effort (Davis, 1989). According to Venkatesh (2000), a vast body of research in behavioral decision making (e.g., Payne et al., 1993) and IS (e.g., Todd and Benbasat, 1991, 1994) has demonstrated that individuals attempt to minimize effort in their behaviors. This concept is opposite in meaning to the relative complexity notion proposed by Rogers (1995), which he defines as the degree to which an innovation is perceived as difficult to understand and use. Using this concept in the context of adoption of innovations, Rogers proposes that as the level of complexity of an innovation increases, the slower is its rate of adoption within the target market. Using the same logic, we expect the intent to adopt the communication systems to be higher among individuals that perceive them to be easy to use. Based on the above discussion, we offer the following two hypotheses: H1: The greater the perceived usefulness of the communication system for managing inter-personal communication, the higher the intent to use the system. H2: The greater the perceived ease of use of the communication system for managing inter-personal communication, the higher the intent to use the system. The positive relationship between behavioral intentions and action has been assessed in numerous past studies involving the TAM. As in earlier studies, we include the following hypotheses regarding intention to use a system and actual system use. H3a: H3b: The higher the intent to use , the greater its actual use. ThehighertheintenttouseIM,thegreateritsactualuse. The extended model The present study makes three extensions to the traditional model. All three extensions are linked to the concept of network externality and its implications on choice of communication technologies by users. These are: (1) the impact of positive network externalities (i.e., network size) on perceived usefulness of and IM; (2) the impact of negative network externalities (i.e., spam and spim) on perceived usefulness of and IM, respectively; and (3) the indirect impact of network externality on intent to adopt a competing system. Extension 1: role of positive network externality Network externalities exist in markets where the utility that a user derives from consumption of a good increases with the number of other agents consuming the good (Katz and Shapiro, 1985, p. 424). There are three sources of network externalities (Katz and Shapiro, 1985). One source of network externalities is a direct physical effect of the number of users on the quality of the product or service. The value of a fax machine to one user increases as more fax machines are purchased and used by others. Another source is an indirect effect where the utility of a product increases with the number of users because the quality of the product is higher or there are more complementary products available (Katz and Shapiro, 1986; Farrell and Saloner, 1987). As the user base for Macintosh computers grows, there should be a resulting growth in compatible software that further enhances the value of the hardware. A third source of network externalities (which captures another form of indirect effect) exists in situations where increasing sales of a durable good produces greater quality and availability of post-purchase services related to the product. The greater the number of people buying a certain brand of washing machine, the greater the likelihood that service for the machines will be provided. The focus of the present study is on the first source the direct effect. Direct network externalities have been extensively studied in economics, marketing, and organizational strategy for more than two decades. Early studies focused on theoretical development (Katz and Shapiro, 1985, 1986). Mathematical models were utilized to identify the relationship between network externalities, user utility, competition, and resulting market outcomes (Economides and Himmelberg, 1995; Forman and Chen, 2003; Park, 2004). The contexts studied were primarily physical goods such as spreadsheet software and VCRs, and various technologies such as banking networks and telecommunication equipment. Consumers were assumed to be homogeneous and network size was used as a simple measure of the magnitude of network externalities that existed. These early studies set the stage for extending research to a wider range of perspectives (firms and individual users) and contexts (e.g., newer technology products and services). As far as the present study is concerned, positive consumption externalities exist when the utility that a user derives from use of a particular communication technology increases with the number of other people using the same service. In other words, the more the

4 Perceived network externalities Troy J. Strader et al 57 number of people on or IM, the more the utility individual consumers derive from these technologies. That is, H4a: H4b: The greater a user s network externality perceptions for , the more useful he/she perceives to be for communications. The greater a user s network externality perceptions for IM, the more useful he/she perceives IM to be for communications. Extension 2: role of negative network externality (spam and spim) For well over a decade, individuals have benefited from the simplicity and low cost of sending messages. But this simplicity and low marginal cost also comes with a price. It is cheap and easy for organizations and individuals to send large numbers of unsolicited, mostly unwanted, messages (Strader et al., 2005). These messages are commonly referred to as spam. Spam can be viewed as a negative result of network externalities where network growth increases value to organizations sending unsolicited messages because it increases the potential number of recipients. In 2003, approximately two billion spams were sent every day (Swartz, 2004). More recently, IM systems have begun to suffer from the same problems associated with spam. Unsolicited instant messages are referred to as spim. More than one billion spims were sent in 2003, and it is estimated that this number will grow four-fold each year for the next several years (Swartz, 2004). The question we address in this study is whether spam and spim are merely an annoyance, or are they negatively affecting user perceptions regarding the usefulness of these communications systems, which culminates in a decrease in system use. A review of popular press articles and surveys of Internet user activities indicates that one factor that may potentially have a negative impact on use of these systems is perceptions regarding the growing number of unsolicited messages (Fallows, 2003; Biever, 2004; Bird, 2004; Schultz, 2004; Swartz, 2004). An overall finding of an October 2003 survey of users noted that spam is beginning to undermine the integrity of and to degrade the online experience (Fallows, 2003, p. i). Extension 3: impact of network externality of one system on adoption of a competing system The network externality concept implies that a particular technology (with associated network) will retain its edge as long as the network size is maintained or even increased. However, there are situations where one technology succeeds another and attempts to draw consumers from the earlier technology. In other words, there is potential for the network size to decrease and the externality benefits to fall for the first technology. This is likely the case for against IM; and it may be so for improvements in IM (such as between traditional IM and videosupported IM). The degree to which a network sees erosion in its size is likely to vary depending on relative cost and benefit perceptions of the individual user. With improvements in technology, a succeeding technology (IM) is likely to offer better features and thus have greater utility than its predecessor ( ). Studies have pointed out that IM provides unique benefits: information on availability of a person on the network at any given time, real-time communication with that person, expansion of buddy network, and better quality of communication. These improvements increase the utility of IM technology and make it more valuable to the user. However, this has to be matched against the potential loss in utility arising from switching from because not all people on a person s network may switch to the IM network. Some researchers have called this as loss of connectivity (Windrum and Birchenhall, 2005). Two points need to be made regarding user evaluations of costs and benefits. First, while TAM studies do not measure benefits and costs and their tradeoffs specifically, they measure perceived usefulness of a technology. Through this measure, it is possible to infer that when users consider a technology as useful, they perceive that technology to provide them with benefits they value more than the costs they incur. Second, the higher such perceptions of usefulness, the lower will be the likelihood of switching to a new technology. There may be some variability in this behavior as younger people and college students will likely experience greater switching to IM than older people. Overall, H5a: H5b: The more a user perceives that there are problems associated with unsolicited messages (spam), the less useful they perceive to be for communications. The more a user perceives that there are problems associated with unsolicited instant messages (spim), the less useful they perceive IM to be for communications. H6a: H6b: The more useful a user perceives to be, the lower their intention to use IM. The more useful a user perceives IM to be, the lower their intention to use . Figure 1 provides an overview of the proposed model. The basic constructs in the model include spam/spim perceptions, perceived network externalities, perceived usefulness, perceived ease of use, behavioral intention to use, and actual system use.

5 58 Perceived network externalities Troy J. Strader et al Spam (SPAM) Perceived Network Externalities (NET_EM) _ Perceived Ease of Use (PEOU_EM) Perceived Usefulness (PU_EM) _ Behavioral Intention to use (BI_EM) Use (EM_USE) Table 1 Survey sample characteristics Characteristic Category Number Percentage (%) Gender Female Male Missing Spim (SPIM) Perceived Network Externalities IM (NET_IM) Figure 1 use. Research method _ Perceived Usefulness IM (PU_IM) Perceived Ease of Use IM (PEOU_IM) Behavioral Intention to use IM (BI_IM) Data An online survey was used to collect data for this study during May/June The respondents were undergraduate and graduate students in a business college in a Midwestern private university in the United States. The student group was chosen for this study because they represent a group of individuals who is likely to be aware of both and IM and possibly may be users of at least one, if not both, systems. Extra credit points were given to students completing the survey. Approximately 300 students were invited to participate in the study and 163 surveys were completed for a response rate of 54.3%. The demographic makeup of the sample is described in Table 1. The descriptive statistics and correlations among the study constructs are shown in Table 2. Measures All model constructs, with the exception of actual system use, were measured using multi-item scales. The items were adapted from previous studies except for the measure of perceived network externalities. Use, behavioral intension to use, perceived ease of use, and perceived usefulness were adapted from Venkatesh and Davis (1996). The measures for perceptions of spam and spim were based on scales recommended by Strader et al. (2005). Finally, the measure of perceived network externalities was developed based on categories of users a person is most likely to wish to communicate with: friends, family members, and other individuals. The items were framed in a Likert format; each item was expressed in the form of a statement and respondents were asked to indicate the level to which they agreed or disagreed with the statement. The next section describes the components of each construct including reliability statistics. The scale items for the constructs are listed in Appendix A. _ IM Use (IM_USE) Proposed conceptual model to explain and IM Age or older Missing Education High school Some college Undergraduate degree Some graduate school Graduate degree Missing Income I do not know I would rather not say Less than $50, $50,000 $74, $75,000 $99, $100,000 $124, $125,000 or more Missing Perceptions of spam/spim Two items were used to measure each of these two constructs. These items focus on the amount of time and effort wasted on dealing with unsolicited messages. The reliability coefficient for these two-item scales was for spam and for spim. Perceived network externalities Individuals may wish to communicate online with people who fit into one of the three categories: friends, family, and other individuals. Using these categories, three items were constructed to measure the perceived network externalities. Theoretically, an individual should receive greater utility from an electronic communication system when a larger number of friends, family, and other individuals use the same system. The reliability coefficient for these scales was for and for IM. Perceived ease of use The scales for perceived ease of use for and IM systems were adapted from Venkatesh and Davis (1996). The focus is on four dimensions of user perceptions regarding how easy it is to use these systems. This scale has been validated in numerous previous studies. The reliability coefficient for this scale was for and for IM.

6 Perceived network externalities Troy J. Strader et al 59 Table 2 Correlations and descriptive statistics SPAM NET_EM SPIM NET_IM PEOU_EM PU_EM PEOU_IM PU_IM BI_EM BI_IM EM_USE IM_USE Spam (SPAM) Perc. Network Ext. EM (NET_EM) Spim (SPIM) a Perc. Network Ext. IM (NET_IM) a b Perc. Ease of Use EM (PEOU_EM) a b Perc. Usefulness EM (PU_EM) a b a a Perc. Ease of Use IM (PEOU_IM) a a a a Perc. Usefulness IM (PU_IM) a a b a a Beh. Intention to Use EM (BI_EM) a a a Beh. Intention to Use IM (BI_IM) a a b a a a EM Use (EM_USE) a c a a a IM Use (IM_Use) b a a a a Mean Std. Deviation a Po0.01; b Po0.05, c Po0.10. Perceived usefulness The two scales for perceived usefulness for and IM were also adapted from Venkatesh and Davis (1996). The focus is on four dimensions of user perceptions of the usefulness of the systems for communications purposes. Similar to ease of use, these scales have been validated in numerous previous studies and the present study provides further support for their reliability in studies of technology adoption. The reliability coefficient for this scale was for and for IM. Behavioral intention to use An important dependent variable in the study is user s intention to use an and/or IM system. This construct is important because of its high correlation with actual system use. Two-item scales for behavioral intention to use each of the two systems were developed from Venkatesh and Davis (1996). The reliability coefficient for this scale was for and for IM. and IM system use A single-item was used to measure system use. For example, individuals were asked to what extent they disagreed or agreed with the statement I often use electronic mail. Analytical method The relative importance of the various predictors for each construct in Figure 1 was investigated using a structural equation model. The model indicated the following relationships: PU EM ¼ f ðspam; NE EMÞ PU IM ¼ f ðspim; NE IMÞ BI EM ¼ f ðpeou EM; PU EM; PU IMÞ BI IM ¼ f ðpeou IM; PU IM; PU EMÞ USE EM ¼ f ðbi EMÞ USE IM ¼ f ðbi IMÞ In the preceding equations, SPAM and SPIM are the perceived level of time and effort wasted dealing with unsolicited and instant messages. NET_EM and NET_IM are the perceived network externalities associated with each system. PU_EM, PU_IM, PEOU_EM, and PEOU_IM are the primary TAM model constructs for perceived usefulness and perceived ease of use for each system. BI_EM and BI_IM are the behavioral intentions to use each system. USE_EM and USE_IM are the level of actual use of the system by the user. The structural model analytics indicated that two new paths not specified in the hypothesized model could be added to improve the fit statistics. The first new path is between perceived ease of use and perceived usefulness for both systems. This is not a relationship included in the original TAM model, but may result from the ECS systems being easy to use relative to software packages tested in earlier TAM studies. Second, a direct path from perceived network externalities to intention to use IM indicates the strength of the network externalities

7 60 Perceived network externalities Troy J. Strader et al construct in determining IM use. Network externalities for newer communication systems may be a stronger predictor of intention to use and actual use than just the perception that the system is useful. Neither new path involves a dramatic departure from the hypothesized model, but may indicate that factors affecting electronic communication system use vary depending on whether the technologies are in the growth or maturity phases of their life cycle. After adding these new paths to the hypothesized model, the fit statistics indicate the following: chi-square with 142 degrees of freedom ¼ (P ¼ 0.000), GFI (goodness-of-fit index) ¼ 0.87, RMSR (root-mean-squared residual) ¼ 0.051, NNFI (non-normed fit index) ¼ 0.94, and CFI (comparative fit index) ¼ The chi-square statistic, as well as the other indicators of relative and absolute fit (e.g., NNFI, CFI, and RMSEA), unequivocally suggest that the hypothesized structural model is a reasonably good representation of the variance covariance matrix of study measures. The parameter estimates for the hypothesized model are reported in Table 3 for and Table 4 for IM. Results The overall results suggest that the extended TAM model captures the adoption of IM better than that of . The R-square value for each of the three equations (see Tables 3 and 4) indicates a better fit in the case of IM. This result may hint that the TAM model is much more applicable to newer technologies. It is possible that the phenomenon of interest may shift from adoption or nonadoption for a new technology to extent of use for older technologies. Test of hypotheses The traditional model Hypotheses H1 and H2 suggest that perceived usefulness and ease of use should be positively associated with intent to use a system. These hypotheses come directly from the TAM model but are tested in the context of communication (transactional) technologies. Results show that while perceived usefulness of has a significant association with the intent to use , the same is not true for IM. The structural coefficient for is 0.37, while that for IM is There is greater support for the hypothesis relating to the effects of perceived ease of use. This is another relationship that has been tested in previous TAM studies of acceptance of individual technologies. For , the findings show that the perceived ease of use has a positive effect on intention to use . The structural coefficient (0.21) is significant at the Po0.10 level. The coefficient for IM is 0.37 and significant at the Po0.01 level. Finally, hypothesis H3 tests the relationship between intention to use a system and actual use. The findings of this study support previous findings. For , the beta coefficient (0.31) is significant at the Po0.000 level. Similarly, the coefficient in the case of IM is significant at the Po0.000 level. The extended model The first extension pertains to the impact of positive network externalities. The expectation is that perceptions of network size will drive perceptions of usefulness of a system. Results show this to be the case. For , the beta coefficient value for this relationship is 0.50, which is significant at the Po0.000 level. For IM, the relationship is also positive (b ¼ 0.36) and significant at the Po0.000 level. The second extension examines the negative aspects of network externality, whereby larger network size offers a positive inducement to use of spam and spim by advertisers and unscrupulous agents. The expectation is that spam and spim will become a source of nuisance with the capacity to negatively impact the usefulness of the communication systems. The findings of the study indicate that consumers are not impacted negatively by either spam or spim. The third extension examines the cross-impact arising from positive network externality. When externality is high, the perceived usefulness of a system is likely to be high. The latter, in turn, implies that consumers may find an alternative system as less valuable and hence show a lower intent to use that system. These hypotheses would be unique to the CTAM for considering choices between alternative communication technologies that Table 3 Parameter estimates for model in Figure 1 ( ) Predictor Perceived usefulness of Intent to use Actual use of b t b t b t Spam Network externality for a Perceived ease of use of a b Perceived usefulness of a Perceived usefulness of IM Intent to use a R a 0.21 a 0.11 a a Po0.01; b Po0.10.

8 Perceived network externalities Troy J. Strader et al 61 could conceivably both provide the same function. Results do not support this assertion. No significant associations are found in either case. Empirically derived relationships As mentioned earlier, three relationships were suggested by the solution to the structural model. The first two are direct paths from perceived ease of use to perceived usefulness for both technologies. Those who consider IM or as easy to use also find it more useful. The third path reflects a direct relationship of network externality of IM to intent to use IM (b ¼ 0.57; Po0.01). This is an interesting finding as it implies that higher network size of IM is sufficient to induce intent to try that ECS, regardless of usefulness perceptions. The results above are summarized and related to the several hypotheses in Table 5. Discussion of results The purpose of this study was to conceptualize and test the relevance of factors that lead to consumer use of and IM systems. The basis for the study was the TAM with three network externality-related extensions that capture unique characteristics of transactional, communication-oriented, information technologies. These extensions pertain to positive network externalities (network size), negative externalities (spam and spim), and cross-network externality (impact of network size of on IM use and vice versa). Of these three extensions, the empirical test of the model provided support for only the positive network externalities factor. Before we examine the implications of the study s findings, the study limitations are discussed next. Limitations Several limitations of our study are noteworthy. First, because the study was based on survey measures that were cross-sectional in nature, caution must be exercised in drawing cause effect inferences. The results, therefore, might not be interpreted as proof of causal relationships, but rather as lending support for a prior causal scheme. The development of a time-series database and testing of the externality usefulness intent linkage in a longitudinal framework would provide more insights into probable causation. Second, the study is based on a sample of college students. Unlike other consumer studies, the choice of students is appropriate as they are the primary targets for a service like IM. All the same, replication of this study using other sample groups will provide greater validation for the generalizability of the study s findings. Third, the study used two products that experience network effects and IM. The study design could be used to test other sets of products that exhibit similar network effects and technology succession property. Finally, because the study data were collected from a single source, there is a likelihood of problems arising from common method variance. The measurement model tested using the study measures indicated that this was not a major issue in the present study. Despite these limitations, the results offer useful insights into the relevance of network externality for adoption and use of network products. In the next section, key findings of the study are discussed and managerial implications are drawn from them. Study framework implications The traditional model Overall, there was good support for the traditional TAM model for both and IM. Except for the non-relationship between perceived usefulness and intent to use IM, all other relationships were significant at the Po0.01 level. These results provide validation for the use of TAM to capture consumer adoption of communication technologies such as and IM. Interestingly, maybe because of its newness, not too many previous studies have examined IM adoption. IM adoption is still in the early stages of adoption with less than 35% of the population having adopted it (as suggested by the study s sample). More studies are needed to not only track this phenomenon, but also to identify conditions that facilitate migration of consumers from to IM. Positive network externalities (perceived level of use by other individuals) One of the purposes of the study was to examine whether perceived level of use of a communication system by friends, family, and the overall population would affect perceptions of its usefulness. There is strong evidence to support the idea that perceived network Table 4 Parameter estimates for model in Figure 1 (IM) Predictor Perceived usefulness of IM Intent to use IM Actual use of IM b t b t b t Spim Network externality for IM a a Perceived ease of use of IM a a Perceived usefulness of IM Perceived usefulness of Intent to use IM a R a 0.55 a 0.68 a a Po0.01.

9 62 Perceived network externalities Troy J. Strader et al Table 5 Summary of hypotheses and findings H# Hypothesis Supported? H1 The greater the perceived usefulness of the communication system for managing inter-personal communication, the higher the intent to use the system , yes IM, no H2 The greater the perceived ease of use of the communication system for managing inter-personal Yes communication, the higher the intent to use the system H3a The higher the intent to use , the greater its actual use Yes H3b The higher the intent to use IM, the greater its actual use Yes H4a The greater a user s network externality perceptions for , the more useful he/she perceives Yes to be for communications H4b The greater a user s network externality perceptions for IM, the more useful he/she perceives IM Yes to be for communications H5a The more a user perceives that there are problems associated with unsolicited messages No (spam), the less useful they perceive to be for communications H5b The more a user perceives that there are problems associated with unsolicited instant messages No (spim), the less useful they perceive instant messaging to be for communications H6a The more useful a user perceives to be, the lower their intention to use instant messaging No H6b The more useful a user perceives instant messaging to be, the lower their intention to use No externalities affect perceived usefulness. Usefulness, in turn, affects intention to use a system as well as actual system use. Although not hypothesized, results also showed that network externalities influence use of IM directly. In other words, if the network that an individual belongs adopts IM or is planning to adopt IM, that individual will also adopt IM regardless of its level of usefulness. More than the utility of the system, the social influence or the need to belong become important factors in one s attitude toward the system. Overall, the evidence for positive network externality is strong. This implies, then, that conventional wisdom that focuses on increasing the intrinsic value of a product will be insufficient for success in the context of network effects. The network issue has become a particularly important one for developing and marketing newer technologies as they attempt to gain a critical mass of users. Negative externality perceptions of spam/spim Spam and spim are perceived as negative and of nuisance value by users. They are typically unsolicited and unwanted. They may also go beyond a simple annoyance and bring viruses that can harm someone s personal computer. The results of our study of this factor are clear. The time and effort wasted dealing with spam and spim do not appear to significantly affect a user s perception of the usefulness of a given communications system. Maybe, they have become such a common occurrence that individuals have learned to deal with them. It is apparent that the utility derived from and IM systems far outweigh their negative externality. Cross-externality: perceived usefulness and its effect on alternative system use One facet of the conceptual model proposed that the perceived usefulness of one electronic communication system may affect people s intention to use an alternative system. For example, if someone finds to be highly useful, the question is will that result in lower intention to use a newer technology like IM? As with perceptions regarding spam/spim, no significant association was found between perceived usefulness of e- mail and intention to use IM, and vice versa. The systems do not appear to be substitutes. This may also explain why individuals now have phones at home, carry cell phones, have accounts, and use IM. The older technologies are not replaced. They are added to a portfolio of available communication methods that give users more and more options. The value seems to come from having choices rather than selecting one optimal communication system. Managerial implications The results of this study have implications for and IM service providers. First, individuals have learned to cope with spam as well as its newer variation, spim. Software can be used to block many unsolicited messages, and those messages that get through can often be recognized as spam and deleted. Since perceptions regarding spam and spim have not been shown to effect perceptions of communication system usefulness, it is unlikely that users will want to pay much for spam blocking solutions. The result is that service providers should provide spam blocking services but may only be able to charge a nominal fee or nothing. A second implication is based on the finding that usefulness of one system does not negatively affect intention to use an alternative system. The implication for service providers is that they should not market newer communication systems (IM) by pointing to flaws in existing systems ( ). New systems appear to provide an alternative means of communication for users, but not necessarily a substitute. Introduction of new ECS may lead to an overall growth in communications, through multiple means, between individuals rather than a continual process of switching to new technologies.

10 Perceived network externalities Troy J. Strader et al 63 Finally, perceptions regarding the number of other people who use a particular communication system have a powerful effect on perceptions of usefulness and intention to use a system. Marketing of new communication systems should take this into account. And it seems they have. T-Mobile refers to communicating with friends and family in their advertising. Cingular has a Family Talk service plan. And MSN Messenger advertising mentions that you can use their service to chat online with friends, family, or colleagues. This finding also has strategic implications for firms providing communication services, online auctions, and other online services. When a new communication system is developed, it will be difficult to add users early on because they know that not many other people will be using the system. But after the communication system reaches a critical mass of users its use will take off with less marketing effort. For a further discussion of the difficulties associated with competing in highly networked markets, see Chakravorti (2004). Future research directions As discussed earlier, the model proposed in the present study should be tested in different contexts using different sets of products and different samples to evaluate its generalizability. One problem is in finding products that are somewhat substitutable and that show network externality effects. For technology successions that have network externalities, one research direction would be to evaluate the role of relative network externalities. As people migrate from one technology to another, the externality benefits shrink for one and expand for another. This phenomenon can be captured and expressed in the form of relative network externalities that is, the externality of one expressed as a ratio of externality of another. Two questions that arise are: how important is relative network externality when compared to the externality for a technology? What characteristics define people that exhibit higher relative network externality. If a technology successor is able to identify people who have a higher potential score for relative externality, the targeting efforts of firms could become more efficient. One research possibility is therefore to identify characteristics of individuals in terms of demographics, psychographics, and network profile that exhibit faster migration between technologies. Technology succession literature also has argued that for achieving market success, the increased usefulness of a succession technology (assuming new technologies have better features than existing technologies) and its associated welfare improvements need to make up for the loss of connectivity with the communication group arising from migration to that technology. Evaluating this equation may provide information on minimum welfare improvements that are needed and implications on product improvements. There is no empirical study that examines this trade-off to date, and future researchers can empirically investigate this issue for products that exhibit network effects. Finally, one implication of externality is to maximize the installed base of users for a product. Two strategies are available for achieving this goal: be a pioneer and be first in the market; and/or use a launch strategy that will ramp up the base quickly. The effectiveness of the two strategies has not been evaluated to date and could form a fertile area for future research. The message to managers is that it may not be a good idea to heavily invest in improving product features at the expense of efforts to increase the installed base of customers (Lee and O Connor, 2003). About the authors Troy J. Strader is Associate Professor of Information Systems at the Drake University College of Business & Public Administration. He received his Ph.D. in Information Systems from the University of Illinois at Urbana-Champaign. His research interests include communication technology adoption, online financial services, online consumer behavior, and mobile commerce. Sridhar N. Ramaswami is Professor of Marketing in the College of Business at Iowa State University. Dr. Ramaswami received his Ph.D. in Marketing from the University of Texas, Austin. His research focuses on consumer behavior in online markets, marketing of financial services, sales management, and brand equity management. Philip A. Houle is Associate Professor of Information Systems in the College of Business & Public Administration at Drake University. He received his Ph.D. in Computer and Information Control Sciences from the University of Minnesota. He served as the top Information Technology Administrator at Drake University from 1999 to References ADAMS D, NELSON R and TODD P (1992) Perceived usefulness, ease of use, and usage of information technology: a replication. MIS Quarterly 16(2), AJZEN I (1991) The theory of planned behavior. Organizational Behavior and Human Decision Processes 50(2), BIEVER C (2004) Spam being rapidly outpaced by spim. Retrieved November 1, 2005, from ns?id ¼ dn4822. BIRD D (2004) Think spam is tough? Try fighting spim. Retrieved November 1, 2005, from enterprise/article.php/ CHAKRAVORTI B (2004) The new rules for bringing innovations to market. Harvard Business Review 82(3), CHEN Y and LOU H (2002) Toward an understanding of the behavioral intention to use a groupware application. Journal of End User Computing 14(4), 1 16.

11 64 Perceived network externalities Troy J. Strader et al DAVIS F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13(3), DAVIS F, BAGOZZI R and WARSHAW P (1989) User acceptance of computer technology: a comparison of two theoretical models. Management Science 35(8), DISHAW M and STRONG D (1999) Extending the technology acceptance model with task-technology fit constructs. Information and Management 36(1), ECONOMIDES N and HIMMELBERG C (1995) Critical mass and network size with application to the U.S. fax market. In Toward a Competitive Telecommunications Industry: Selected Papers from the 1994 Telecommunication Policy Research Conference (BROCK G, Ed) Lawrence Erlbaum Associated, New York. FALLOWS D (2003) Spam: how it is hurting and degrading life on the Internet. Pew Internet & American Life Project. Retrieved July 19, 2005 from FARRELL J and SALONER G (1987) Competition, compatibility and standards: the economics of horses, penguins and lemmings. In Product Standardization as a Tool of Competitive Strategy (GABEL HL, Ed), pp 1 22, North Holland, New York. FISHBEIN M and AJZEN I (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Boston. FORMAN C and CHEN P-Y (2003) Network effects and switching costs in the market for routers and switches. Working Paper, Graduate School of Industrial Administration, Carnegie Mellon University, Pittsburgh, PA. GREEN G and HEVNER A (2000) The successful diffusion of innovations: guidance for software development organizations. IEEE Software 17(6), KATZ M and SHAPIRO C (1985) Network externalities, competition, and compatibility. American Economic Review 75(3), KATZ MandSHAPIRO C (1986) Technology adoption in the presence of network externalities. Journal of Political Economy 94(4), KONTZER T (2003) Corporate IM ready to take off. Information Week. Retrieved June 15, 2003, from IWK S0032. KWON H and CHIDAMBARAM L (2000) A test of the technology acceptance model: the case of cellular telephone adoption. Proceedings of the 33rd Annual Hawaii International Conference on Systems Sciences. 33, pp LEDERER A, MAUPIN D, SENA MandZHUANG Y (2000) The technology acceptance model and the World Wide Web. Decision Support Systems 29(3), LEE Y and O CONNOR G (2003) Network product launch strategy for network effects products. Journal of the Academy of Marketing Science 31(3), LI D, CHAU PandLOU H (2005) Understanding individual adoption of instant messaging: an empirical investigation. Journal of the Association for Information Systems 6(4), LUO H, LUO W and STRONG D (2000) Perceived critical mass effect on groupware acceptance. 9, MOON JandKIM Y (2001) Extending the TAM for a world-wide web context. Information and Management 38(4), PARK S (2004) Quantitative analysis of network externalities in competing technologies: the VCR case. The Review of Economics and Statistics 86(4), PAYNE W, BETTMAN J and JOHNSON E (1993) The Adaptive Decision-Maker. Cambridge University Press, New York. ROGERS E (1995) Diffusion of Innovations, 4th edn. The Free Press; New York. SCHULTZ M (2004) How to stop IM and spim abuse. Retrieved November 1, 2005, from STRADER T, HOULE P and RAMASWAMI S (2005) Spam, spim, and user perceptions of and instant messaging usefulness. International Journal of E-Business Research 1(4), SWARTZ J (2004) Spam s irritating cousin, spim, on the loose. Retrieved November 1, 2005, from spim_x.htm. TEMPLETON G and BYRD T (2003) Determinants of the relative advantage of structured SDM during the adoption stage of implementation. Information Technology and Management 4(4), TEO T, LIM VandLAI R (1999) Intrinsic and extrinsic motivation in Internet usage. Omega, International Journal of Management Science 27, TODD P and BENBASAT I (1991) An experimental investigation of the impact of computer-based decision aids on the decision making process. Information Systems Research 2(2), TODD P and BENBASAT I (1994) The influence of DSS on choice strategies: an experimental analysis of the role of cognitive effort. Organizational Behavior and Human Decision Processes 60, VAN DEN HOOFF B,GROOT J and DE JONGE S (2005) Situational influences on the use of communications technologies. Journal of Business Communication 41(2), VAN SLYKE C, COMUNALE C and BELANGER F (2002) Gender differences in perceptions of Web-based shopping. Communications of the ACM 45(7), VENKATESH V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation and emotion into the technology. Information Systems Research 11(4), VENKATESH V and DAVIS F (1996) A model of the antecedents of perceived ease of use: development and test. Decision Sciences 27(3), VENKATESH V and MORRIS M (2000) A theoretical extension of the technology acceptance model. Management Science 46(2), VENKATESH V, SPEIER C and MORRIS M (2002) User acceptance enablers in individual decision making about technology: toward an integrated model. Decision Sciences 33(3), WANG C, HSU Y and FANG W (2004) Acceptance of technology with network externalities: an empirical study of internet instant messaging services. Journal of Information Technology Theory and Application 6(4), WINDRUM P and BIRCHENHALL C (2005) Structural change in the presence of network externalities: a co-evolutionary model of technological successions. Journal of Evolutionary Economics 15, Appendix A Scale items and constructs (Likert scale where 1 ¼ strongly disagree and 7 ¼ strongly agree) Spam perceptions (SPAM) I waste a lot of time processing unwanted . Unwanted makes it difficult to sort through useful. Perceived network externalities (NETEM) Many people use electronic mail. Many of my friends use electronic mail. Many of my family members use electronic mail. Spim perceptions (SPIM) I waste a lot of time processing unwanted instant messages. Unwanted instant messages make it difficult to sort through useful instant messages. Perceived network externalities Instant Messaging (NETIM) Many people use instant messaging. Many of my friends use instant messaging. Many of my family members use instant messaging. Perceived ease of use (PEOUEM) My interaction with an electronic mail system is clear and understandable. Interacting with an electronic mail system would not require a lot of my mental effort. I find that an electronic mail system is easy to use. I would find it easy to get an electronic mail system to do what I want it to do.

12 Perceived network externalities Troy J. Strader et al 65 Perceived usefulness (PUEM) Using an electronic mail system improves my communication with friends, family, and other individuals. I am able to keep abreast of things happening with my friends, family, and other individuals because of the electronic mail system. I am able to keep up my relationships with friends, family, and other individuals because of the electronic mail system. I find an electronic mail system would be useful in my communication with friends, family, and other individuals. Perceived ease of use Instant Messaging (PEOUIM) My interaction with an instant messaging system is clear and understandable. Interacting with an instant messaging system would not require a lot of my mental effort. I find that an instant messaging system is easy to use. I would find it easy to get an instant messaging system to do what I want it to do. Perceived usefulness Instant Messaging (PUIM) Using an instant messaging system improves my communication with friends, family, and other individuals. I am able to keep abreast of things happening with my friends, family, and other individuals because of the instant messaging system. I am able to keep up my relationships with friends, family, and other individuals because of the instant messaging system. I find an instant messaging system would be useful in my communication with friends, family, and other individuals. Behavioral intention to use (BIEM) Assuming I had access to an electronic mail system, I intend to use it. Given that I had access to an electronic mail system, I predict that I would use it. Behavioral intention to use Instant Messaging (BIIM) Assuming I had access to an instant messaging system, I intend to use it. Given that I had access to an instant messaging system, I predict that I would use it. Use (EMUSE) I often use electronic mail. Use Instant Messaging (IMUSE) I often use instant messaging. Demographics (categorized) Gender Age Education Income

Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading

Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading Siriluck Rotchanakitumnuai Department of Management Information Systems Faculty of Commerce and Accountancy

More information

The Technology Acceptance Model with Online Learning for the Principals in Elementary Schools and Junior High Schools

The Technology Acceptance Model with Online Learning for the Principals in Elementary Schools and Junior High Schools The Technology Acceptance Model with Online Learning for the Principals in Elementary Schools and Junior High Schools RONG-JYUE FANG 1, HUA- LIN TSAI 2, CHI -JEN LEE 3, CHUN-WEI LU 4 1,2 Department of

More information

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China

More information

Consumer Search & Real Estate Websites: A Replication and Extension of the TAM

Consumer Search & Real Estate Websites: A Replication and Extension of the TAM Consumer Search & Real Estate Websites: A Replication and Extension of the TAM Karen Bayne, Scion Research Tony Garrett, Sarah Todd, University of Otago Abstract The use of internet real estate search

More information

PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY

PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY Bengisu Tulu School of Information Science Claremont Graduate University bengisu.tulu@cgu.edu Brian Hilton

More information

Strategy to maximize Mobile Advertising Effect in Smart Environment: Focused on DuCoffe model and TAM

Strategy to maximize Mobile Advertising Effect in Smart Environment: Focused on DuCoffe model and TAM Strategy to maximize Mobile Advertising Effect in Smart Environment: Focused on DuCoffe model and TAM Yong Beom Kim¹, Yongik Yoon², Yongwon Kim³ and Bong Gyou Lee 4 * 1 Korea Polytechnic University, 2

More information

CHAPTER 5: CONSUMERS ATTITUDE TOWARDS ONLINE MARKETING OF INDIAN RAILWAYS

CHAPTER 5: CONSUMERS ATTITUDE TOWARDS ONLINE MARKETING OF INDIAN RAILWAYS CHAPTER 5: CONSUMERS ATTITUDE TOWARDS ONLINE MARKETING OF INDIAN RAILWAYS 5.1 Introduction This chapter presents the findings of research objectives dealing, with consumers attitude towards online marketing

More information

A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE

A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE International Journal of Electronic Business Management, Vol. 10, No. 3, pp. 213-223 (2012) 213 A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE Hsiu-Li Liao * and

More information

DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING

DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING Proceedings of the International Conference for Education, 2005 World Scientific Publishing Company DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING SHOW-HUI HUANG International Business & Trade, Shu-Te

More information

ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS

ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS Siti Rahayu Abdul Aziz 1, Mohamad Ibrahim 2, and Suhaimi Sauti 3 1 Universiti Teknologi MARA, Malaysia, rahayu@fskm.uitm.edu.my

More information

Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18

Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Fida Hussain Chandio fida.chandio@brunel.ac.uk ABSTRACT Pakistan banking sector has gone through

More information

Dual. Utilitarian. Productivity. Fun

Dual. Utilitarian. Productivity. Fun An Interdisciplinary Journal on Humans in ICT Environments ISSN: 1795-6889 www.humantechnology.jyu.fi Volume 2 (2), October 2006, 225 235 AN ACCEPTANCE MODEL FOR USEFUL AND FUN INFORMATION SYSTEMS Thomas

More information

Investigating the Effect of Consumer Traits on the Relative Importance of TAM Constructs in an E-Commerce Context

Investigating the Effect of Consumer Traits on the Relative Importance of TAM Constructs in an E-Commerce Context Investigating the Effect of Consumer Traits on the Relative Importance of TAM Constructs in an E-Commerce Context Thijs L.J. Broekhuizen 1 ; Eelko K.R.E. Huizingh 2 1 Assistant Professor, University of

More information

Abstract. Keywords: Mobile commerce, short messaging services, mobile marketing. Mobile Marketing

Abstract. Keywords: Mobile commerce, short messaging services, mobile marketing. Mobile Marketing Consumer Perspectives On Mobile Advertising And Marketing Craig Standing, Steve Benson, Edith Cowan University Heikki Karjaluoto, University of Oulu, Finland Abstract Mobile marketing is set to make a

More information

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University Noa.aharony@biu.ac.il

More information

User Behavior Research of Information Security Technology Based on TAM

User Behavior Research of Information Security Technology Based on TAM , pp.203-210 http://dx.doi.org/10.14257/ijsia.2014.8.2.21 User Behavior Research of Information Security Technology Based on TAM Wang Cheng 1 and Wang Shi-bo 1 1 School of Economics and Management of Qiqihar

More information

The Diffusion of E-Learning Innovations in an Australian Secondary College: Strategies and Tactics for Educational Leaders

The Diffusion of E-Learning Innovations in an Australian Secondary College: Strategies and Tactics for Educational Leaders The Diffusion of E-Learning Innovations in an Australian Secondary College: Strategies and Tactics for Educational Leaders Sam Jebeile Division of Economic and Financial Studies Macquarie University Australia

More information

An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software

An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software Jack T. Marchewka Chang Liu Operations Management and Information Systems Department Northern Illinois

More information

The Effect of Demographics on Seamless Mobile Service Interface

The Effect of Demographics on Seamless Mobile Service Interface The Effect of Demographics on Seamless Mobile Service Interface Mattila, Anssi; and Pento, Tapio Abstract The purpose of this paper is to demonstrate the effect of demographic variables on choice of a

More information

Examining the Savings Habits of Individuals with Present-Fatalistic Time Perspectives using the Theory of Planned Behavior

Examining the Savings Habits of Individuals with Present-Fatalistic Time Perspectives using the Theory of Planned Behavior Examining the Savings Habits of Individuals with Present-Fatalistic Time Perspectives using the Theory of Planned Behavior Robert H. Rodermund April 3, 2012 Lindenwood University 209 S. Kingshighway, Harmon

More information

The Relationship of E-CRM, Customer Satisfaction and Customer Loyalty. The Moderating Role of Anxiety

The Relationship of E-CRM, Customer Satisfaction and Customer Loyalty. The Moderating Role of Anxiety Middle-East Journal of Scientific Research 16 (4): 531-535, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.16.04.11568 The Relationship of E-CRM, Customer Satisfaction and Customer

More information

Factors affecting the Satisfaction of China s Mobile Services Industry Customer. Su-Chao Chang a, Chi-Min Chou a, *

Factors affecting the Satisfaction of China s Mobile Services Industry Customer. Su-Chao Chang a, Chi-Min Chou a, * Factors affecting the Satisfaction of China s Mobile Services Industry Customer Su-Chao Chang a, Chi-Min Chou a, * a Dept. of Business Administration, National Cheng Kung University, 1 University Rd.,

More information

The Relationships between Perceived Quality, Perceived Value, and Purchase Intentions A Study in Internet Marketing

The Relationships between Perceived Quality, Perceived Value, and Purchase Intentions A Study in Internet Marketing The Relationships between Quality, Value, and Purchase Intentions A Study in Internet Marketing Man-Shin Cheng, National Formosa University, Taiwan Helen Cripps, Edith Cowan University, Australia Cheng-Hsui

More information

Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia

Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia International Review of Business Research Papers Vol.4 No.5. October-November 2008. PP.1-10 Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In

More information

Evaluating the Factors Affecting on Intension to Use of E-Recruitment

Evaluating the Factors Affecting on Intension to Use of E-Recruitment American Journal of Information Science and Computer Engineering Vol., No. 5, 205, pp. 324-33 http://www.aiscience.org/journal/ajisce Evaluating the Factors Affecting on Intension to Use of E-Recruitment

More information

EFFECT OF ENVIRONMENTAL CONCERN & SOCIAL NORMS ON ENVIRONMENTAL FRIENDLY BEHAVIORAL INTENTIONS

EFFECT OF ENVIRONMENTAL CONCERN & SOCIAL NORMS ON ENVIRONMENTAL FRIENDLY BEHAVIORAL INTENTIONS 169 EFFECT OF ENVIRONMENTAL CONCERN & SOCIAL NORMS ON ENVIRONMENTAL FRIENDLY BEHAVIORAL INTENTIONS Joshi Pradeep Assistant Professor, Quantum School of Business, Roorkee, Uttarakhand, India joshipradeep_2004@yahoo.com

More information

UNDERSTANDING EXPLORATORY USE

UNDERSTANDING EXPLORATORY USE UNDERSTANDING EXPLORATORY USE OF ERP SYSTEMS 1 Rui D. Sousa Terry College of Business University of Georgia rsousa@uga.edu Dale L. Goodhue Terry College of Business University of Georgia dgoodhue@terry.uga.edu

More information

Students Acceptance on Document Sharing through Online Storage System

Students Acceptance on Document Sharing through Online Storage System Students Acceptance on Document Sharing through Online Storage System Wan Hussain Wan Ishak, Fadhilah Mat Yamin, Amlus Ibrahim Universiti Utara Malaysia, Sintok, Kedah, Malaysia Email: hussain@uum.edu.my

More information

Task-Technology Fit and Adoption Behaviors of Mobile Business Systems

Task-Technology Fit and Adoption Behaviors of Mobile Business Systems International DSI / Asia and Pacific DSI 2007 Full Paper (July, 2007) Task-Technology Fit and Adoption Behaviors of Mobile Business Systems Ching-Chang Lee *, Kuo-Wei Su, Cheng-Ta Lu, Xin-Xin Yu National

More information

Issues in Information Systems Volume 13, Issue 1, pp. 361-370, 2012

Issues in Information Systems Volume 13, Issue 1, pp. 361-370, 2012 ANALYSIS OF THE VARIABLES THAT AFFECT FREQUENCY OF USE AND TIME SPENT ON TEXT MESSAGING Alan Peslak, Penn State University, arp14@psu.edu Wendy Ceccucci, Quinnipiac University, wendy.ceccucci@quinnipiac.edu

More information

Attitude, Behavioral Intention and Usage: An Empirical Study of Taiwan Railway s Internet Ticketing System

Attitude, Behavioral Intention and Usage: An Empirical Study of Taiwan Railway s Internet Ticketing System Attitude, Behavioral Intention and Usage: An Empirical Study of Taiwan Railway s Internet Ticketing System Wen-Hung Wang Department of Shipping and Transportation Management National Taiwan Ocean University,

More information

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption , pp.155-164 http://dx.doi.org/10.14257/ijsh.2013.7.5.16 An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption Kwang-Kyu Seo Department of Management Engineering, Sangmyung

More information

A STUDY ON ERP SYSTEM ACCEPTANCE BASED ON TECHNOLOGY ACCEPTANCE MODEL

A STUDY ON ERP SYSTEM ACCEPTANCE BASED ON TECHNOLOGY ACCEPTANCE MODEL A STUDY ON SYSTEM ACCEPTANCE BASED ON TECHNOLOGY ACCEPTANCE MODEL Rajesri Govindaraju and Nenny Indriany Faculty of Industrial Technology, Bandung Institute of Technology Jalan Ganesha No. 10, Bandung

More information

Contextual factors that influence learning effectiveness: Hospitality students perspectives

Contextual factors that influence learning effectiveness: Hospitality students perspectives Contextual factors that influence learning effectiveness: Hospitality students perspectives Sung Mi Song Hospitality Management Iowa State University Robert Bosselman Hospitality Management Iowa State

More information

Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation

Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation Yogesh Malhotra Florida Atlantic University & @BRINT Research Institute ymalhotra@fau.edu

More information

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT 1 E-learning: Students perceptions of online learning in hospitality programs Sungmi Song Hospitality Management Iowa State University Robert Bosselman Hospitality Management Iowa State University ABSTRACT

More information

Asian Research Journal of Business Management

Asian Research Journal of Business Management Asian Research Journal of Business Management FACTORS INFLUENCING ONLINE TRADING ADOPTION: A STUDY ON INVESTORS ATTITUDE IN GREATER VISAKHAPATNAM CITY Dr. Krishna Mohan Vaddadi 1 & Merugu Pratima 2 * 1

More information

Conceptualising and Modelling Virtual Experience for the Online Retailer: The 3D Technology

Conceptualising and Modelling Virtual Experience for the Online Retailer: The 3D Technology Conceptualising and Modelling Virtual Experience for the Online Retailer: The 3D Technology INTRODUCTION Previous studies (e.g., Jiang & Benbasat, 2005; Algharabat & Dennis, 2010 a, b, c) regarding online

More information

EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT

EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT Matthew J. Wills, Dakota State University Omar F. El-Gayar, Dakota State University Dorine Bennett, Dakota State

More information

A Study on Customer Satisfaction in Mobile Telecommunication Market by Using SEM and System Dynamic Method

A Study on Customer Satisfaction in Mobile Telecommunication Market by Using SEM and System Dynamic Method A Study on in Mobile Telecommunication Market by Using SEM and System Dynamic Method Yuanquan Li, Jiayin Qi and Huaying Shu School of Economics & Management, Beijing University of Posts & Telecommunications,

More information

TRUST AND USER ACCEPTANCE OF MOBILE ADVERTISING

TRUST AND USER ACCEPTANCE OF MOBILE ADVERTISING TRUST AND USER ACCEPTANCE OF MOBILE ADVERTISING Samer Barakat, Management Information Systems Department, Faculty of Economics & Administrative Science, Applied Science Private University, Jordan sbarakat@asu.edu.jo

More information

Issues in Information Systems Volume 16, Issue I, pp. 163-169, 2015

Issues in Information Systems Volume 16, Issue I, pp. 163-169, 2015 A Task Technology Fit Model on e-learning Linwu Gu, Indiana University of Pennsylvania, lgu@iup.edu Jianfeng Wang, Indiana University of Pennsylvania, jwang@iup.edu ABSTRACT In this research, we propose

More information

Complementing Classroom Teaching with an Internet Course Website: Does Gender and Race Matter

Complementing Classroom Teaching with an Internet Course Website: Does Gender and Race Matter Complementing Classroom Teaching with an Internet Course Website: Does Gender and Race Matter T. Ramayah School of Management, Universiti Sains Malaysia, 11800 Penang, MALAYSIA Abstract This research looks

More information

Siao-Sian Huang Department of Information Management, ChungHua University, HsinChu, Taiwan

Siao-Sian Huang Department of Information Management, ChungHua University, HsinChu, Taiwan The Actual Usage of ERP Systems: An Extended Technology Acceptance Perspective Ya-Yueh Shih Department of Management Information Systems, National Chiayi University 580 Sinmin Road, Chiayi 60054, Taiwan

More information

Customers Acceptance of Online Shopping In Saudi Arabia

Customers Acceptance of Online Shopping In Saudi Arabia Customers Acceptance of Online Shopping In Saudi Arabia Sulaiman A. Al-Hudhaif, Ph.D. Saleh Saad Alqahtani, Ph.D. College of Business Administration King Saud University Introduction: Good news for e-

More information

Examining acceptance of information technology: A longitudinal. Study of Iranian high school teachers

Examining acceptance of information technology: A longitudinal. Study of Iranian high school teachers 2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore Examining acceptance of information technology: A longitudinal Study of Iranian

More information

APPLYING THE TECHNOLOGY ACCEPTANCE MODEL AND FLOW THEORY TO ONLINE E-LEARNING USERS ACCEPTANCE BEHAVIOR

APPLYING THE TECHNOLOGY ACCEPTANCE MODEL AND FLOW THEORY TO ONLINE E-LEARNING USERS ACCEPTANCE BEHAVIOR APPLYING THE TECHNOLOGY ACCEPTANCE MODEL AND FLOW THEORY TO ONLINE E-LEARNING USERS ACCEPTANCE BEHAVIOR Su-Houn Liu, Chung Yuan Christian University, vandy@mis.cycu.edu.tw Hsiu-Li Liao, Chung Yuan Christian

More information

EXAMINING STUDENTS ACCEPTANCE OF TABLET PC USING TAM

EXAMINING STUDENTS ACCEPTANCE OF TABLET PC USING TAM EXAMINING STUDENTS ACCEPTANCE OF TABLET PC USING TAM Omar El-Gayar, Dakota State University, omar.el-gayar@dsu.edu Mark Moran, Dakota State University, mark.moran@dsu.edu ABSTRACT With the proliferation

More information

Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING. Full Paper. Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b

Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING. Full Paper. Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b a School of Technology Management & Logistics, College of Business, Universiti

More information

Branding and Search Engine Marketing

Branding and Search Engine Marketing Branding and Search Engine Marketing Abstract The paper investigates the role of paid search advertising in delivering optimal conversion rates in brand-related search engine marketing (SEM) strategies.

More information

FAMILY BUSINESS GOVERNANCE STRUCTURES: INCIDENCE AND EFFECTS

FAMILY BUSINESS GOVERNANCE STRUCTURES: INCIDENCE AND EFFECTS 126 FAMILY BUSINESS GOVERNANCE STRUCTURES: INCIDENCE AND EFFECTS Abstract E. Alan Hartman College of Business University of Wisconsin Oshkosh Oshkosh, WI 54901 FAX: 920-424-7413 TEL: 920-424-3441 Email:

More information

1 INTRODUCTION 2 LITERATURE

1 INTRODUCTION 2 LITERATURE AN EMPIRICAL STUDY ON THE INTENTIONS OF PHYSICIANS IN ADOPTING ELECTRONIC MEDICAL RECORDS WITH MODIFIED TECHNOLOGY ACCEPTANCE MODELS IN RURAL AREAS OF TAIWAN Wei-Min Huang and Chiao-Ting Shih, Department

More information

The Study of Implementation and Assessment of a Cloud Computer Room. Pai-shu Huang, Shih-hao Shen. WuFeng University, Taiwan

The Study of Implementation and Assessment of a Cloud Computer Room. Pai-shu Huang, Shih-hao Shen. WuFeng University, Taiwan The Study of Implementation and Assessment of a Cloud Computer Room Pai-shu Huang, Shih-hao Shen 0178 WuFeng University, Taiwan The Asian Conference on Technology in the Classroom 2012 2012 Abstract: The

More information

AN EMPIRICAL STUDY ON THE INTENTIONS OF PHYSICIANS IN ADOPTING ELECTRONIC MEDICAL RECORDS WITH MODIFIED TECHNOLOGY ACCEPTANCE MODELS IN RURAL AREAS OF

AN EMPIRICAL STUDY ON THE INTENTIONS OF PHYSICIANS IN ADOPTING ELECTRONIC MEDICAL RECORDS WITH MODIFIED TECHNOLOGY ACCEPTANCE MODELS IN RURAL AREAS OF AN EMPIRICAL STUDY ON THE INTENTIONS OF PHYSICIANS IN ADOPTING ELECTRONIC MEDICAL RECORDS WITH MODIFIED TECHNOLOGY ACCEPTANCE MODELS IN RURAL AREAS OF TAIWAN Wei-Min Huang and Chiao-Ting Shih, Department

More information

A Structural Equation Model for ICT Usage in Higher Education

A Structural Equation Model for ICT Usage in Higher Education Usluel, Y. K., Aşkar, P., & Baş, T. (2008). A Structural Equation Model for ICT Usage in Higher Education. Educational Technology & Society, 11 (2), 262-273. A Structural Equation Model for ICT Usage in

More information

Does Trust Matter to Develop Customer Loyalty in Online Business?

Does Trust Matter to Develop Customer Loyalty in Online Business? Does Trust Matter to Develop Customer Loyalty in Online Business? Pattarawan Prasarnphanich, Ph.D. Department of Information Systems, City University of Hong Kong Email: pprasarn@cityu.edu.hk Abstract

More information

Students Perceptions of Distance Learning, Online Learning and the Traditional Classroom

Students Perceptions of Distance Learning, Online Learning and the Traditional Classroom 1 of 10 Students Perceptions of Distance Learning, Online Learning and the Traditional Classroom John O'Malley, Department of Management and Business Systems Harrison McCraw, Department of Accounting and

More information

What Keeps Online Customers Repurchasing through the Internet?

What Keeps Online Customers Repurchasing through the Internet? What Keeps Online Customers Repurchasing through the Internet? KANOKWAN ATCHARIYACHANVANICH, HITOSHI OKADA and NOBORU SONEHARA Factors affecting the intention of purchasing online have been investigated

More information

ICT acceptation : The case of CRM project

ICT acceptation : The case of CRM project Business School W O R K I N G P A P E R S E R I E S Working Paper 2014-356 ICT acceptation : The case of CRM project Mouna JEGHAM Jean-Michel SAHUT http://www.ipag.fr/fr/accueil/la-recherche/publications-wp.html

More information

MAGNT Research Report (ISSN. 1444-8939) Vol.2 (Special Issue) PP: 213-220

MAGNT Research Report (ISSN. 1444-8939) Vol.2 (Special Issue) PP: 213-220 Studying the Factors Influencing the Relational Behaviors of Sales Department Staff (Case Study: The Companies Distributing Medicine, Food and Hygienic and Cosmetic Products in Arak City) Aram Haghdin

More information

PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST?

PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? Shanan G. Gibson & Elaine D. Seeman College of Business, East Carolina University gibsons@ecu.edu; seemane@ecu.edu ABSTRACT

More information

Investigating firm s acceptance of cloud computing as disruptive information system: a conceptual model

Investigating firm s acceptance of cloud computing as disruptive information system: a conceptual model Investigating firm s acceptance of cloud computing as disruptive information system: a conceptual model Authors Eko Agus Prasetio, School of Business and Management, Bandung Institute of Technology, eko.prasetio@sbm-itb.ac.id

More information

Determinants of User Acceptance of Digital Libraries: An Empirical Examination of Individual Differences and System Characteristics

Determinants of User Acceptance of Digital Libraries: An Empirical Examination of Individual Differences and System Characteristics DETERMINANTS OF USER ACCEPTANCE OF DIGITAL LIBRARIES 97 Determinants of User Acceptance of Digital Libraries: An Empirical Examination of Individual Differences and System Characteristics WEIYIN HONG,

More information

Location-Based Mobile Decision Support Systems and Their Effect On User Performance

Location-Based Mobile Decision Support Systems and Their Effect On User Performance Location-Based Mobile Decision Support Systems and Their Effect On User Performance Rahul C. Basole Georgia Institute of Technology School of Industrial and Systems Engineering 755 Ferst Drive Atlanta,

More information

Determinants of Internet Entrepreneurship Intentions among Business School Students

Determinants of Internet Entrepreneurship Intentions among Business School Students Determinants of Internet Entrepreneurship Intentions among Business School Students Yu-Min Wang and Yi-Shuan Lin Abstract This study presents the findings of an empirical study to analyze factors affecting

More information

Determinants of Intention to Use an Online Bill Payment System among MBA Students

Determinants of Intention to Use an Online Bill Payment System among MBA Students Determinants of Intention to Use an Online Bill Payment System among MBA Students T. Ramayah Chin Yee Ling School of Management, Universiti Sains Malaysia E-mail: ramayah@usm.my Norazah Mohd Suki College

More information

Consumer Perception of Mobile Phone Attributes

Consumer Perception of Mobile Phone Attributes Consumer Perception of Mobile Phone Attributes Tao Zhang 1, Pei-Luen Patrick Rau 2, Jia Zhou 2 1 Department of Electrical Engineering and Computer Science Vanderbilt University, TN 37211, USA 2 Department

More information

COLLABORATION USING CLOUD COMPUTING AND TRADITIONAL SYSTEMS

COLLABORATION USING CLOUD COMPUTING AND TRADITIONAL SYSTEMS COLLABORATION USING CLOUD COMPUTING AND TRADITIONAL SYSTEMS Barbara Jo White, Western Carolina University, whiteb@email.wcu.edu Jo Ann E. Brown, Radford University, jbrown268@radford.edu Cynthia S. Deale,

More information

Gender-Specific Websites: How Do Female Visitors Respond? ABSTRACT

Gender-Specific Websites: How Do Female Visitors Respond? ABSTRACT Gender-Specific Websites: How Do Female Visitors Respond? Eugenia Huang National Chengchi University: 64, Sec. 2, Zhinan Rd., Taipei 116, Taiwan, R.O.C. Phone: +886-2-29387348 eugenia@nccu.edu.tw Cheng-Wei,

More information

Factors Affecting the Adoption of Online Banking An Integration of Technology Acceptance Model and Theory of Planned Behavior

Factors Affecting the Adoption of Online Banking An Integration of Technology Acceptance Model and Theory of Planned Behavior Factors Affecting the Adoption of Online Banking An Integration of Technology Acceptance Model and Theory of Planned Behavior Nour-Mohammad Yaghoubi (Ph.D) Management Department of University of Sistan

More information

INVESTIGATING THE SUCCESS FACTORS FOR THE ACCEPTANCE OF MOBILE HEALTHCARE TECHNOLOGY

INVESTIGATING THE SUCCESS FACTORS FOR THE ACCEPTANCE OF MOBILE HEALTHCARE TECHNOLOGY INVESTIGATING THE SUCCESS FACTORS FOR THE ACCEPTANCE OF MOBILE HEALTHCARE TECHNOLOGY Chun-Hua Hsiao, Department of Marketing, Kainan University, Taoyuan, Taiwan, R.O.C., maehsiao@gmail.com Mei-Chun Chen,

More information

EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS

EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS 49 International Journal of Information Science and Technology EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS H. Sajady, Ph.D. M. Dastgir, Ph.D. Department of Economics and Social Sciences

More information

Copyright subsists in all papers and content posted on this site.

Copyright subsists in all papers and content posted on this site. Student First Name: Raed Student Second Name: Algharabat Copyright subsists in all papers and content posted on this site. Further copying or distribution by any means without prior permission is prohibited,

More information

End User Adoption of ERP Systems: Investigation of Four Beliefs

End User Adoption of ERP Systems: Investigation of Four Beliefs Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2008 Proceedings Americas Conference on Information Systems (AMCIS) 1-1-2008 : Investigation of Four Beliefs Ibrahim M. Al-Jabri

More information

Keywords: Smartphone, Mobile advertising, Innovation Diffusion Theory

Keywords: Smartphone, Mobile advertising, Innovation Diffusion Theory Smart Choice: Smartphone Users Intentions to Accept Mobile Advertising Jong-Hyuok Jung, Texas Christian University, USA Yonjung Sung, Southern Methodist University, USA Wei-Na Lee, University of Texas

More information

DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN

DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN INTRODUCTION Fauziah Baharom 1, Ola T. Khorma 2, Haslina Mohd 3, and Mahmood G. Bashayreh

More information

An Examination of the Determinants of Customer Loyalty in Online Group-buying Context in China

An Examination of the Determinants of Customer Loyalty in Online Group-buying Context in China Association for Information Systems AIS Electronic Library (AISeL) WHICEB 2014 Proceedings Wuhan International Conference on e-business Summer 6-1-2014 An Examination of the Determinants of Customer Loyalty

More information

NANYANG TECHNOLOGICAL UNIVERSITY

NANYANG TECHNOLOGICAL UNIVERSITY NANYANG TECHNOLOGICAL UNIVERSITY Division of Information Studies Wee Kim Wee School of Communication & Information Digitally Mediated Fitness Games for Corporate Wellness CI6299 Critical Inquiry Proposal

More information

The Implementation of e-procurement System in Health Sector in Greece: Attitudes of Potential Users and Implications for Hospital Management

The Implementation of e-procurement System in Health Sector in Greece: Attitudes of Potential Users and Implications for Hospital Management International Journal of Health Research and Innovation, vol. 1, no. 1, 2013, 15-23 ISSN: 2051-5057 (print version), 2051-5065 (online) Scienpress, 2013 The Implementation of e-procurement System in Health

More information

UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS

UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS Journal of Electronic Commerce Research, VOL 14, NO 2, 2013 UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS Yongqiang Sun School of Information

More information

An exploratory study of student motivations for taking online courses and learning outcomes

An exploratory study of student motivations for taking online courses and learning outcomes An exploratory study of student motivations for taking online courses and learning outcomes ABSTRACT Sarath A. Nonis Arkansas State University Grant H. Fenner Arkansas State University An investigation

More information

EFFECTS OF ENVIRONMENTAL CONDITIONS ON BUSINESS SCHOOLS INTENTIONS TO OFFER E-COMMERCE DEGREE PROGRAMS

EFFECTS OF ENVIRONMENTAL CONDITIONS ON BUSINESS SCHOOLS INTENTIONS TO OFFER E-COMMERCE DEGREE PROGRAMS EFFECTS OF ENVIRONMENTAL CONDITIONS ON BUSINESS SCHOOLS INTENTIONS TO OFFER E-COMMERCE DEGREE PROGRAMS Dharam S. Rana College of Business Jackson State University E-mail: dsrana@jsums.edu Phone: 601-979-2973

More information

Basic Concepts in Research and Data Analysis

Basic Concepts in Research and Data Analysis Basic Concepts in Research and Data Analysis Introduction: A Common Language for Researchers...2 Steps to Follow When Conducting Research...3 The Research Question... 3 The Hypothesis... 4 Defining the

More information

Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education

Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education Chen-Feng Wu Department of Information Management, Yu Da University No 168, Hsueh-fu Rd, Tanwen Village, Chaochiao Township,

More information

Understanding the Continued Usage of Business e-learning Courses in HK Corporations

Understanding the Continued Usage of Business e-learning Courses in HK Corporations Understanding the Continued Usage of Business e-learning Courses in HK Corporations Paul Yeung Ernest Jordan Macquarie Graduate School of Management, Macquarie University, Australia e-mail : pyeung@vtc.edu.hk

More information

Warranty Designs and Brand Reputation Analysis in a Duopoly

Warranty Designs and Brand Reputation Analysis in a Duopoly Warranty Designs and Brand Reputation Analysis in a Duopoly Kunpeng Li * Sam Houston State University, Huntsville, TX, U.S.A. Qin Geng Kutztown University of Pennsylvania, Kutztown, PA, U.S.A. Bin Shao

More information

Kittipat Laisasikorn Thammasat Business School. Nopadol Rompho Thammasat Business School

Kittipat Laisasikorn Thammasat Business School. Nopadol Rompho Thammasat Business School A Study of the Relationship Between a Successful Enterprise Risk Management System, a Performance Measurement System and the Financial Performance of Thai Listed Companies Kittipat Laisasikorn Thammasat

More information

Undergraduate Psychology Major Learning Goals and Outcomes i

Undergraduate Psychology Major Learning Goals and Outcomes i Undergraduate Psychology Major Learning Goals and Outcomes i Goal 1: Knowledge Base of Psychology Demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical

More information

FAIR TRADE IN INSURANCE INDUSTRY: PREMIUM DETERMINATION OF TAIWAN AUTOMOBILE INSURANCE. Emilio Venezian Venezian Associate, Taiwan

FAIR TRADE IN INSURANCE INDUSTRY: PREMIUM DETERMINATION OF TAIWAN AUTOMOBILE INSURANCE. Emilio Venezian Venezian Associate, Taiwan FAIR TRADE IN INSURANCE INDUSTRY: PREMIUM DETERMINATION OF TAIWAN AUTOMOBILE INSURANCE Emilio Venezian Venezian Associate, Taiwan Chu-Shiu Li Department of Economics, Feng Chia University, Taiwan 100 Wen

More information

Critical Success Factors of the E-Recruitment System

Critical Success Factors of the E-Recruitment System Journal of Human Resources Management and Labor Studies June 2014, Vol. 2, No. 2, pp. 159-170 ISSN: 2333-6390 (Print), 2333-6404 (Online) Copyright The Author(s). 2014. All Rights Reserved. Published by

More information

An Improved Measure of Risk Aversion

An Improved Measure of Risk Aversion Sherman D. Hanna 1 and Suzanne Lindamood 2 An Improved Measure of Risk Aversion This study investigates financial risk aversion using an improved measure based on income gambles and rigorously related

More information

E-Commerce Web Sites Trust Factors: An Empirical Approach

E-Commerce Web Sites Trust Factors: An Empirical Approach Contemporary Engineering Sciences, Vol. 6, 2013, no. 1, 1 7 HIKARI Ltd, www.m-hikari.com E-Commerce Web Sites Trust Factors: An Empirical Approach Radwan M. Al-Dwairi Department of Computer Information

More information

THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION

THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION Elaine Seeman, Department of Management Information Systems College of Business, East Carolina

More information

STUDENTS PERCEPTIONS OF IT SUPPORTED LEARNING

STUDENTS PERCEPTIONS OF IT SUPPORTED LEARNING Bilgi Ekonomisi ve Yönetimi Dergisi / 2011 Cilt: VI Sayı: II STUDENTS PERCEPTIO OF IT SUPPORTED LEARNING Meliha HANDZIC * Merdžana OBRALIC ** Emir CICKUSIC *** Abstract: The objective of this study was

More information

SWITCHING TENDENCIES OF CONSUMERS OF MOBILE PHONE SERVICES IN MADURAI DISTRICT

SWITCHING TENDENCIES OF CONSUMERS OF MOBILE PHONE SERVICES IN MADURAI DISTRICT SWITCHING TENDENCIES OF CONSUMERS OF MOBILE PHONE SERVICES IN MADURAI DISTRICT Abstract Dr. A. Shabinullah khan 1 Dr. A. Abbas manthiri 2 India as Asia s third largest economy, is adding at least one million

More information

Issues in Information Systems Volume 15, Issue I, pp. 409-417, 2014

Issues in Information Systems Volume 15, Issue I, pp. 409-417, 2014 STUDENT ACCEPTENCE OF LEARNING MANAGEMENT SYSTEMS: A STUDY ON DEMOGRAPHICS Chet Claar, Central Washington University, claar@cwu.edu Laura Portolese Dias, Central Washington University, diasl@cwu.edu Robert

More information

INVESTIGATION OF EFFECTIVE FACTORS IN USING MOBILE ADVERTISING IN ANDIMESHK. Abstract

INVESTIGATION OF EFFECTIVE FACTORS IN USING MOBILE ADVERTISING IN ANDIMESHK. Abstract INVESTIGATION OF EFFECTIVE FACTORS IN USING MOBILE ADVERTISING IN ANDIMESHK Mohammad Ali Enayati Shiraz 1, Elham Ramezani 2 1-2 Department of Industrial Management, Islamic Azad University, Andimeshk Branch,

More information

An Investigation of the Factors Influencing the Adoption of E-Health Services:

An Investigation of the Factors Influencing the Adoption of E-Health Services: An Investigation of the Factors Influencing the Adoption of E-Health Services: The Case for Selected Hospitals in Lagos State, Nigeria 1 Senanu Okuboyejo & 2 Valerie Ochiotu Department of Computer and

More information

Failure of Knowledge Management Systems in the Financial Services Industry

Failure of Knowledge Management Systems in the Financial Services Industry Failure of Knowledge Management Systems in the Financial Services Industry Research-in-Progress Udo Wild University of Bamberg, Germany udo.wild@uni-bamberg.de Sven Laumer University of Bamberg, Germany

More information

A Study on consumers continuing to use online group-buying platforms: The impact of price performance expectations

A Study on consumers continuing to use online group-buying platforms: The impact of price performance expectations December 2010, Volume 9, No.12 (Serial No.90) Chinese Business Review, ISSN 1537-1506, USA A Study on consumers continuing to use online group-buying platforms: The impact of price performance expectations

More information