Social Media Malware: Determinants of Users Intention to Share Potentially Infected Posts

Size: px
Start display at page:

Download "Social Media Malware: Determinants of Users Intention to Share Potentially Infected Posts"

Transcription

1 Social Media Malware: Determinants of Users Intention to Share Potentially Infected Posts Emergent Research Forum Paper Sonia Camacho Universidad de los Andes Abstract Malware has become problematic in social networking sites (SNS), where users can click on links that come from legitimate users but that may be infected with non-authorized downloads. This may generate security risks for companies (e.g. unauthorized access to sensitive information), if employees use those social networks from their work devices. Considering the relevance of this phenomenon for organizations, this ERF paper explores the potential of malware infection from the point of view of the weakest link in security efforts: the user. This study proposes a theoretical model based on Theory of Reasoned Action that will aid in understanding the factors that determine a user s intention to share potentially infected content in a SNS. This model will be empirically validated using a survey-based study involving Facebook users, and structural equation modelling techniques. Keywords Social networking sites, malware, online sharing behavior. Introduction Malware is a short word for malicious software and it refers to software that is designed to cause damage or perform unwanted actions in a computer system (e.g. run a computer virus) (TechTerms.com, 2015). Malware has become problematic in social networking sites, where users may click on links that are sent by legitimate friends or acquaintances and that may come with infected non-authorized downloads (Everett, 2010). Sharing personal information on social networking sites increases the vulnerability of users and their possibility of falling victims to phishing (Jagatic, Johnson, Jakobsson, and Menczer 2007). In a study conducted on 2011, more than 50% of Information Technology (IT) practitioners surveyed indicated an increase of malware in their systems due to the use of social media, and more than 60% specified that social media represented a security risk to their organizations (Ponemon 2011 as cited in He 2012). Considering the relevance of this phenomenon to organizations, researchers have explored the psychological tactics (e.g. manipulating users greed or curiosity) employed by malware authors to lure users into opening malicious links, as well as the activities performed by malware once it is activated (e.g. fighting existing protection mechanisms) (Abraham and Chengalur-Smith 2010). Moreover, they have studied the mechanisms employed by organizations to address malware and other security risks derived from social networking sites (e.g. monitoring social networking sites usage, banning its use, having up-todate security software) (Everett 2010; He 2012). However, and considering that the user is the weakest link in security efforts, the strategies to address malware and other risks need to focus on the usage behavior of individuals (ISACA 2010 as cited in He 2012). This is a pressing issue considering that users may believe that the behaviors they are performing are not risky (Davinson and Sillence 2010). Therefore, the research objective of this study is to explore the motivations users have to click or share dubious links in social networking sites. Twenty-second Americas Conference on Information Systems, San Diego,

2 Theoretical Background and Research Model In order to achieve the proposed research objective, this study proposes a theoretical model based on Theory of Reasoned Action (briefly described below). Theory of Reasoned Action Theory of Reasoned Action (TRA) has been used widely in Information Systems (IS) studies that have sought to understand the adoption and use of IS (Hong, Kim, and Lee 2008). According to TRA, individuals performance of certain behaviors is determined by individuals intentions to carry out them, which in turn, are influenced by subjective norms and individuals attitude. The attitude toward a particular behavior is determined by a set of beliefs the individual holds about that behavior (Ajzen and Fishbein 1980). In the application of TRA to IS adoption studies, researchers have found inconsistent results in terms of the power of attitude to predict individuals behavior, and as such, this construct has been generally excluded from adoption models (Kroenung & Eckhardt, 2015). This theory is deemed suitable for this study, as it explores a user s intention to perform a particular behavior (i.e. clicking on a link or sharing a post) and its antecedents. Research Model and Hypotheses The proposed research model is based on the theoretical framework described above and shown in Figure 1. The constructs and hypotheses included in this model are described in detail below. Social norms H1+ Perceived usefulness of content H2+ Intention to click on link or share post Trust in SNS contacts H3- H4- Perceived vulnerability Figure 1. Proposed research model Social norms Social norms refer to individuals perceptions of what referent individuals or groups believe about a particular behavior. They are determined by individuals perceived expectations of specific others and individuals intention to comply with these expectations (Davis, Bagozzi, and Warshaw 1989). In the context of social networking sites (SNS), authors have found that individuals sharing behavior can be influenced by the behavioral patterns of their friends (Bakshy, Rosenn, Marlow, and Adamic 2012; Chakraborty, Vishik, and Rao 2013). Moreover, social norms have been found to influence individuals intentions to use Facebook (Błachnio, Przepiórka, and Rudnicka 2013) and individuals disclosure in SNS (Cheung, Lee, and Chan 2015). In light of these findings, it is expected that users will be more likely to click on a link or share a post if their friends have done so, or if they believe their friends expect them to do it (i.e. as a result of social influence). Thus, it is hypothesized that: H1: Social norms are positively related to the intention to click on a link or share a post Perceived usefulness of content Perceived usefulness refers to an individual s belief that using a particular IS will generate improvements in her or his job performance (Davis, Bagozzi, and Warshaw 1989). This construct has shown to be a strong determinant of intention to use an IS (Venkatesh, Morris, Davis, and Davis 2003). In the Twenty-second Americas Conference on Information Systems, San Diego,

3 knowledge sharing literature, Sussman and Siegal (2003) found that the usefulness of information provided by others (e.g. advice, recommendations) increases individuals likelihood of adopting that piece of information (e.g. to follow the advice). In the same vein, finding useful knowledge in online communities increases users intentions to seek and share knowledge in those communities (Park, Gu, Leung, and Konana 2014; Yu, Lu, and Liu 2010). Considering these findings, it is expected that individuals intention to click on a link or share a post will increase if they find the information contained in that link or post useful (e.g. it gives more knowledge to the user, it offers discounts or prizes). In formal terms: H2: Perceived usefulness of content is positively related to the intention to click on a link or share a post Perceived vulnerability Perceived vulnerability refers to the degree to which an individual believes a threat will occur to him/her (Lee, Larose, and Rifon 2008; Mohamed and Ahmad 2012, p. 2368). In Protection Motivation Theory studies, perceptions of vulnerability to a threat (e.g. a computer virus) are positively related to the intentions to adopt protective behaviors (e.g. installing a firewall) (see for example Lee, Larose, and Rifon 2008). In the context of SNS, perceptions of vulnerability to different risks (e.g. blackmailing, identity theft) have a negative impact on users disclosure of their information (Cheung, Lee, and Chan 2015). In the same vein, it is expected that users perception of vulnerability to potential risks (e.g. personal information loss, virus infections) involved in a link or post will lead to a protective behavior (i.e., avoiding to click on a link or to share a post). Thus, it is hypothesized that: H3: Perceived vulnerability is negatively related to the intention to click on a link or share a post Trust Trust can be defined as a person's willingness to be vulnerable to another, based on the expectation that her/his confidence will not be exploited (Mayer, Davis, and Schoorman 1995). In the context of SNS, users develop trusting beliefs towards other users based on perceptions of similarity (Krasnova, Spiekermann, Koroleva, and Hildebrand 2010). Those trusting beliefs help users mitigate the privacy concerns derived from disclosing their information in SNS (Cheung, Lee, and Chan 2015). In light of the previous findings, it is expected that trust in the source of information in a SNS (i.e. a SNS contact) will reduce the perceived vulnerability of a user to a potential threat in the link or post that s/he is considering to share. In formal terms: H4: Trust in social networking sites contacts is negatively related to perceived vulnerability Methodology This research will employ a survey-based study to collect data and test the hypothesized relationships. Participants in this study will be adults that are active Facebook users, and they will be recruited using a market research firm. Facebook is chosen as the SNS focus of this study because it is the leading social network worldwide, with 1.5 billion monthly active users (Statista, 2016). After obtaining consent, participants will be randomly assigned to one of three groups. Each group will be presented with a different scenario (a screenshot), in which a hypothetical Facebook News Feed will show one of the following: (1) a link containing a video of a celebrity, (2) a link offering extra-security features (e.g. antispam software), and (3) a post offering a free product. Those scenarios were chosen based on some of the emotions manipulated by malware authors to persuade users: curiosity (e.g. offering information about celebrities), fear (e.g. issuing a fraud alert), and greed (e.g. offering free things) (Abraham and Chengalur- Smith 2010). The scenarios will be pretested to make sure they are realistic and that participants have no difficulty in placing themselves in their assigned hypothetical scenario (following D'Arcy, Hovav, and Galletta 2009). In each of the groups, and after presenting the screenshots, participants will respond to the items measuring the five constructs included in the research model. In addition, other variables (e.g. age, gender, occupation, time with a Facebook account, and whether participants deem the content exhibited in the screenshot to be dangerous) will be collected to control for their potential influence on the endogenous constructs of the model. Ethics approval will be sought before data collection. Twenty-second Americas Conference on Information Systems, San Diego,

4 Measurement Instrument In order to measure the constructs in the proposed research model, previously validated scales will be adapted to the context of this study. Intention will be measured with a scale from Cheung and Lee (2012). Social norm and trust will be measured with scales from Cheung, Lee, and Chan (2015). Perceived usefulness of content will be measured with a scale from Sussman and Siegal (2003). Finally, perceived vulnerability will be measured with a scale from Mohamed and Ahmad (2012). Model Validation and Sample Size Structural Equation Modeling (SEM) will be used to validate the proposed model. In particular, Partial Least Squares (PLS) will be used as it is suitable for exploratory studies, like the one proposed (Gefen, Straub, and Boudreau 2000). In order to compare the differences among the three groups, the guidelines offered by Faul, Erdfelder, Lang, and Buchner (2007) to detect a medium size effect, with a power of 0.80, an alpha of 0.05, and 3 groups will be followed. According to these guidelines, the minimum number of participants that would need to be recruited is 53 per group (159 in total). In order to account for potential spoiled responses, a total of 180 participants will be recruited. Potential contributions and limitations From an academic standpoint, this is the first known study to address the issue of malware infection from the point of view of users motivations to share potentially malicious content in social networking sites. This study will also help to advance the Dark Side of Information Technology literature, by understanding the factors that make invidividuals vulnerable to the infection of malware while they interact with their SNS applications. From a practical perspective, an understanding of users motivations to share potentially malicious content will help organizations to design more effective user training programs aimed at reducing the threat of malware disseminated through social media. This study has some limitations. First, due to its focus on only one SNS, its results may not be generalizable to other SNS with different characteristics (e.g. Twitter and its shortened links). Second, the proposed research model does not contemplate motivations tied to individual differences or cultural factors. These elements may be included in future research studies. References Abraham, S., & Chengalur-Smith, I An overview of social engineering malware: Trends, tactics, and implications, Technology in Society (32), pp Ajzen, I., & Fishbein, M Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall, Inc. Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L The role of social networks in information diffusion, in Proceedings of the 21st international conference on WWW (pp ). ACM. Błachnio, A., Przepiórka, A., and Rudnicka, P Psychological Determinants of Using Facebook: A Research Review, International Journal of Human-Computer Interaction (29), pp Chakraborty, R., Vishik, C., & Rao, R Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing, Decision Support Systems, pp Cheung, C. M., & Lee, M. K What drives consumers to spread electronic word of mouth in online consumer-opinion platforms, Decision Support Systems (53), pp Cheung, C., Lee, Z. W., & Chan, T. K Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence, Internet Research (25:2), pp D'Arcy, J., Hovav, A., & Galletta, D User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, Information Systems Research (20:1), pp Twenty-second Americas Conference on Information Systems, San Diego,

5 Davinson, N., & Sillence, E It won't happen to me: promoting secure behaviour among internet users, Computers in Human Behavior (26:6), pp Davis, F. D., Bagozzi, R. P., & Warshaw, P. R User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science (35:8), pp Everett, C Social media: opportunity or risk?, Computer Fraud & Security (June), pp Faul, F., Erdfelder, E., Lang, A.-G., & Buchner, A G* Power 3: A flexible statistical power analysis program for th social, behavioral, and biomedical sciences, Behavior Research Methods (39:2), pp Gefen, D., Straub, D. W., & Boudreau, M. C Structural Equation Modeling and Regression: Guidelines for Research and Practice, Communications of the Association for Information Systems. He, W A review of social media security risks and mitigation techniques, Journal of Systems and Information Technology (14:2), pp Hong, S., Kim, J., & Lee, H Antecedents of use-continuance in information systems: toward an integrative view, Journal of Computer Information Systems (Spring), pp ISACA Top five social media risks for business: new ISACA white paper. Retrieved from Jagatic, T., Johnson, N., Jakobsson, M., & Menczer, F Social phishing, Communications of the ACM (50), pp Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T Online social networks: why we disclose, Journal of Information Technology (25:2), Kroenung, J., & Eckhardt, A The attitude cube - A three-dimensional model of situational factors in IS adoption and their impact on the attitude-behavior relationship, Information & Management (52), pp Lee, D., Larose, R., & Rifon, N Keeping our network safe: A model of online protection behavior, Behaviour and Information Technology (27:5), pp Mayer, R. C., Davis, J. H., & Schoorman, F. D An Integrative Model of Organizational Trust, Academy of Management Review (20:3), pp Mohamed, N., & Ahmad, I. H Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia, Computers in Human Behavior (28), pp Park, J. H., Gu, B., Leung, A. C., & Konana, P An investigation of information sharing and seeking behaviors in online investment communities, Computers in Human Behavior (31), pp Ponemon Ponemon Institute Research Report: Global Survey on Social Media Risks Survey of IT & IT Security Practitioners. Statista. January, Leading social networks worldwide as of January 2016, ranked by number of active users (in millions). Retrieved from Sussman, S. W., & Siegal, W. S Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption, Information Systems Research (14:1), pp TechTerms.com Malware. Retrieved from Venkatesh, V., Morris, M., Davis, G., & Davis, F User Acceptance of Information Technology: Toward a Unified View, MIS Quarterly (27:3), pp Yu, T.-K., Lu, L.-C., & Liu, T.-F Exploring factors that influence knowledge sharing behavior via weblogs, Computers in Human Behavior (26:1), Twenty-second Americas Conference on Information Systems, San Diego,

Knowledge of Security Protocols and Acceptance of E-commerce

Knowledge of Security Protocols and Acceptance of E-commerce Knowledge of Security Protocols and Acceptance of E-commerce Sumendra Singh, Faculty of Business and IT, Webster University, Thailand. E-mail: singh89sumendra@gmail.com Leslie Klieb, Faculty of Business

More information

An Analysis of Social Networks Usage for Information Communication in Business Organization

An Analysis of Social Networks Usage for Information Communication in Business Organization An Analysis of Social Networks Usage for Information Communication in Business Organization Gamonkwan Phuk-intr Chulalongkorn Business School, Chulalongkorn University, Thailand. Kanibhatti Nitirojntanad

More information

Knowledge Management System Adoption and Practice in Taiwan Life Insurance Industry: Analysis via Partial Least Squares

Knowledge Management System Adoption and Practice in Taiwan Life Insurance Industry: Analysis via Partial Least Squares Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 Knowledge Management System Adoption and Practice in

More information

Information Security Policy Compliance: A User Acceptance Perspective

Information Security Policy Compliance: A User Acceptance Perspective Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2011 Proceedings Midwest (MWAIS) 5-20-2011 Information Security Policy Compliance: A User Acceptance Perspective Ahmad Al-Omari,

More information

The Technology Acceptance Model for Competitive Software Products

The Technology Acceptance Model for Competitive Software Products The Technology Acceptance Model for Competitive Software Products Hock Chuan CHAN Department of Information Systems National University of Singapore chanhc@comp.nus.edu.sg Jing YANG Department of Information

More information

The Influence of Individual-level Cultural Orientation on ERP System Adoption

The Influence of Individual-level Cultural Orientation on ERP System Adoption Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Influence of Individual-level Cultural Orientation

More information

CONSUMER ACCEPTANCE OF TRUSTWORTHY E- COMMERCE: AN EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL

CONSUMER ACCEPTANCE OF TRUSTWORTHY E- COMMERCE: AN EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL CONSUMER ACCEPTANCE OF TRUSTWORTHY E- COMMERCE: AN EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL Muhammad Dharma Tuah Putra Nasution,Universitas Pembangunan Panca Budi Adi Anuar Azmin,Universiti Malaysia Perlis

More information

Factors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan

Factors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan Vol. 7, No.1, January 2017, pp. 322 328 E-ISSN: 2225-8329, P-ISSN: 2308-0337 2017 HRMARS www.hrmars.com Factors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan Farah Hanna

More information

Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi- Cultural View

Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi- Cultural View Association for Information Systems AIS Electronic Library (AISeL) WISP 2012 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-15-2012 Impact of Protection Motivation

More information

The Effect of the Consumers Innovativeness and Self-efficacy on Diffusion of Innovative Technology

The Effect of the Consumers Innovativeness and Self-efficacy on Diffusion of Innovative Technology , pp.234-238 http://dx.doi.org/10.14257/astl.2016.129.46 The Effect of the Consumers Innovativeness and Self-efficacy on Diffusion of Innovative Technology Hye-young Oh 1 1 Dept. of Computer Information

More information

Mobile Commerce Usage: Application of Theory of Reasoned Action (TRA) and Technology Acceptance Model (TAM)

Mobile Commerce Usage: Application of Theory of Reasoned Action (TRA) and Technology Acceptance Model (TAM) World Journal of Social Sciences Vol. 5. No. 2. April 2015 Issue. Pp. 41 50 Mobile Commerce Usage: Application of Theory of Reasoned Action (TRA) and Technology Acceptance Model (TAM) Shalini Wunnava *

More information

EXPLORING THE NEGATIVE SIDE OF SOCIAL NETWORKING SITES: THE ROLE OF PRIVACY RISK AND TRUSTWORTHINESS

EXPLORING THE NEGATIVE SIDE OF SOCIAL NETWORKING SITES: THE ROLE OF PRIVACY RISK AND TRUSTWORTHINESS EXPLORING THE NEGATIVE SIDE OF SOCIAL NETWORKING SITES: THE ROLE OF PRIVACY RISK AND TRUSTWORTHINESS 1 DAUW-SONG ZHU, 2 ZUI CHIH LEE, 3 CHEN-WEN CHUNG 1,3 Department of Business Administration, National

More information

The Effects of Internet Experience and Attitudes Toward Privacy and Security on Internet Purchasing

The Effects of Internet Experience and Attitudes Toward Privacy and Security on Internet Purchasing Association for Information Systems AIS Electronic Library (AISeL) ECIS 2000 Proceedings European Conference on Information Systems (ECIS) 2000 The Effects of Experience and Attitudes Toward Privacy and

More information

Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation

Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Integrating Trust in Electronic Commerce with

More information

Prediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model

Prediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model Prediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model 1 Yong-Wee Sek, 2 Siong-Hoe Lau, 2 Kung-Keat Teoh, 3 Check-Yee Law 1 Shahril Bin Parumo 1 Faculty

More information

An Integrative Model of Clients' Decision to Adopt an Application Service Provider

An Integrative Model of Clients' Decision to Adopt an Application Service Provider Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) December 2003 An Integrative Model of Clients' Decision to Adopt

More information

How Loyal are You? Continuance Intention and Word of Mouth in Free/Libre Open Source Software

How Loyal are You? Continuance Intention and Word of Mouth in Free/Libre Open Source Software Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Doctoral Consortium Americas Conference on Information Systems (AMCIS) 2009 How Loyal are You? Continuance Intention and Word

More information

(Full Paper Submission) Yan Chen Auburn University at Montgomery

(Full Paper Submission) Yan Chen Auburn University at Montgomery DECISION SCIENCES INSTITUTE Influence of Security Concerns, Privacy Concerns, and Exchange Benefits on Mobile Commerce Adoption: A Social Exchange Perspective (Full Paper Submission) Yan Chen Auburn University

More information

INFLUENCE FACTORS ON INTENTION TO USE MOBILE BANKING

INFLUENCE FACTORS ON INTENTION TO USE MOBILE BANKING INFLUENCE FACTORS ON INTENTION TO USE MOBILE BANKING 1 KYUNGTAG LEE, 2 JEONGWOO KIM, 3 MIJIN NOH 1,2 Yeungnam University, 3 Kyungpook National University E-mail: 1 mykr21@gmail.com, 3 yomydragon@naver.com,

More information

End-User Acceptance Of E-Government Services In an Indonesia Regency

End-User Acceptance Of E-Government Services In an Indonesia Regency End-User Acceptance Of E-Government Services In an Indonesia Regency Deden Witarsyah Mohd Farhan MD Fudzee Mohamad Aizi Bin Salamat Information System Department Department of Multimedia Department of

More information

Information Adoption Model, a Review of the Literature

Information Adoption Model, a Review of the Literature Information Adoption Model, a Review of the Literature Yu Wang Abstract Along with the popularity of electronic word of mouth (ewom) communication, the issue about how individuals adopt online information

More information

User Acceptance of E-Government Services

User Acceptance of E-Government Services Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 User Acceptance of E-Government Services Ying-Hsun

More information

International Academic Institute for Science and Technology. Management. Vol. 3, No. 12, 2016, pp ISSN

International Academic Institute for Science and Technology. Management. Vol. 3, No. 12, 2016, pp ISSN International Academic Institute for Science and Technology International Academic Journal of Accounting and Financial Management Vol. 3, No. 12, 2016, pp. 30-37. ISSN 2454-2350 International Academic

More information

PROJECT Introduction Over the recent years, government use of the Internet as a platform to provide services to citizens has grown significantly. One of the major priorities already identified by

More information

PERCEPTION TOWARDS ENTERTAINMENT VALUE OF USERS BY SOCIAL NETWORKING SITES AN EMPIRICAL STUDY

PERCEPTION TOWARDS ENTERTAINMENT VALUE OF USERS BY SOCIAL NETWORKING SITES AN EMPIRICAL STUDY PERCEPTION TOWARDS ENTERTAINMENT VALUE OF USERS BY SOCIAL NETWORKING SITES AN EMPIRICAL STUDY DR. DHIRAJ JAIN*; MS. FARHAT FATIMA SADRIWALA** *ASSOCIATE PROFESSOR, PACIFIC INSTITUTE OF MANAGEMENT, UDAIPUR

More information

Information Security Policies Compliance: The Role of

Information Security Policies Compliance: The Role of Information Security Policies Compliance: The Role of Organizational Punishment Mohammad I. Merhi Department of Computer Information Systems & Quantitative Methods College of Business Administration University

More information

Using User-Generated Content when travelers make travel plans: A Theory of Planned Behavior perspective

Using User-Generated Content when travelers make travel plans: A Theory of Planned Behavior perspective Using User-Generated Content when travelers make travel plans: A Theory of Planned Behavior perspective Luiz Augusto Machado Mendes Filho 1 Felix B. Tan 2 Annette Mills 3 Abstract: User-Generated Content

More information

Social Commerce Adoption Model

Social Commerce Adoption Model Association for Information Systems AIS Electronic Library (AISeL) UK Academy for Information Systems Conference Proceedings 2012 UK Academy for Information Systems Spring 3-27-2012 Social Commerce Adoption

More information

INVESTIGATION OF TRUST, PERCEIVE SAFETY. PERCEIVED EASE OF USE, INCOME, GENDER AND RACE ON BOTTLED WATER USE

INVESTIGATION OF TRUST, PERCEIVE SAFETY. PERCEIVED EASE OF USE, INCOME, GENDER AND RACE ON BOTTLED WATER USE INVESTIGATION OF TRUST, PERCEIVE SAFETY. PERCEIVED EASE OF USE, INCOME, GENDER AND RACE ON BOTTLED WATER USE Anh Ta University of North Texas College of Business 1155 Union Circle #311160 Denton, TX 76203-5017

More information

Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures

Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures Publications 2010 Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures Cynthia M. Jones Nova Southeastern University Richard V. McCarthy Quinnipiac

More information

Why People Buy Virtual Items in Virtual Worlds with Real Money

Why People Buy Virtual Items in Virtual Worlds with Real Money Why People Buy Virtual Items in Virtual Worlds with Real Money Yue Guo University of East Anglia Stuart Barnes University of East Anglia Abstract Virtual worlds, such as Second Life and Everquest, have

More information

Examining the Factors Influencing Purchase Intention of Smartphones in Hong Kong

Examining the Factors Influencing Purchase Intention of Smartphones in Hong Kong Contemporary Management Research Pages 213-224, Vol. 12, No. 2, June 2016 doi:10.7903/cmr.13836 Examining the Factors Influencing Purchase Intention of Smartphones in Hong Kong Mei Mei Lau The Hong Kong

More information

Toward Developing a Theory of End User Information Security Competence

Toward Developing a Theory of End User Information Security Competence Toward Developing a Theory of End User Information Security Competence Canchu Lin University of Toledo Canchu.lin@rockets.toledo.edu Anand S. Kunnathur University of Toledo anand.kunnathur@utoledo.edu

More information

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail.

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Author(s): Makkonen, Pekka; Schutskoff, Sanna Title: Personal branding

More information

Technology Acceptance Analysis of Local Government Tourism Website

Technology Acceptance Analysis of Local Government Tourism Website African Journal of Business Management Vol. 6(49), pp. 11891-11895, 12 December, 2012 Available online at http://www.academicjournals.org/ajbm DOI: 10.5897/AJBM10.1590 ISSN 1993-8233 2012 Academic Journals

More information

Exploring Chinese Users Acceptance of Social Commerce Sites

Exploring Chinese Users Acceptance of Social Commerce Sites Exploring Chinese Users Acceptance of Social Commerce Sites Jia Shen Department of Information Systems and Supply Chain Management College of Business Administration Rider University Lawrenceville, NJ,

More information

Global Media Journal Spring 2013 Harden & Al Beayeyz 1

Global Media Journal Spring 2013 Harden & Al Beayeyz 1 Global Media Journal Spring 2013 Harden & Al Beayeyz 1 A COMPARATIVE ANALYSIS OF SOCIAL NETWORKING SITE USE IN TWO DISTINCT CULTURES: EVALUATING THE IT-CULTURE CONFLICT Gina Harden, gina.harden@unt.edu

More information

Toward An Understanding of the Behavioral Intention to Use Mobile Banking Services

Toward An Understanding of the Behavioral Intention to Use Mobile Banking Services Association for Information Systems AIS Electronic Library (AISeL) PACIS 2004 Proceedings Pacific Asia Conference on Information Systems (PACIS) December 2004 Toward An Understanding of the Behavioral

More information

Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/)

Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2007, vol. 12, no.3 (http://www.arraydev.com/commerce/jibc/)

More information

Responding to Negative Social Media Content: an Organizational Identification Perspective

Responding to Negative Social Media Content: an Organizational Identification Perspective Responding to Negative Social Media Content: an Organizational Identification Perspective Emergent Research Forum Paper Abstract Quynh N. Nguyen University of North Texas Quynh.Nguyen@unt.edu Anna Sidorova

More information

APPLYING A MODEL OF THE DYNAMICS OF PURCHASING FROM VIRTUAL STORES TO UAE

APPLYING A MODEL OF THE DYNAMICS OF PURCHASING FROM VIRTUAL STORES TO UAE APPLYING A MODEL OF THE DYNAMICS OF PURCHASING FROM VIRTUAL STORES TO UAE, Department of MIS, American University of Sharjah, Sharjah, UAE 26666 Rbarkhi@aus.edu (On leave from Virginia Tech, USA) Abstract

More information

Analyzing the impact of social media on consumer attitudes toward the brand and their intention to purchase

Analyzing the impact of social media on consumer attitudes toward the brand and their intention to purchase Global Media Journal, Persian Edition Fall and winter 402, Volume 9, Issue 4 Received in: /9//90/60 Accepted in: 6/90/90/6 Analyzing the impact of social on consumer attitudes toward the brand and their

More information

Purpose of Using Social Networks

Purpose of Using Social Networks American International Journal of Contemporary Research Vol. 2 No. 3; March 2012 Purpose of Using Social Networks Abstract William Barnett, PhD Associate Professor of Computer Information Systems College

More information

Exploring Technological Factors Affecting the Adoption of M-Commerce in Jordan

Exploring Technological Factors Affecting the Adoption of M-Commerce in Jordan Australian Journal of Basic and Applied Sciences, 7(6): 395-400, 2013 ISSN 1991-8178 Exploring Technological Factors Affecting the Adoption of M-Commerce in Jordan 1 Feras Fares Al Mashagba, 2 Eman Fares

More information

Like A Global Endorsement. How Clicking Like Influences Facebook Users Brand Recall and Future Purchasing Intentions

Like A Global Endorsement. How Clicking Like Influences Facebook Users Brand Recall and Future Purchasing Intentions Like A Global Endorsement. How Clicking Like Influences Facebook Users Brand Recall and Future Purchasing Intentions Ronda Mariani Saint Leo University Derek Mohammed Saint Leo University Social media

More information

A study on the relationship of contact service employee s attitude and emotional intelligence to coping strategy and service performance

A study on the relationship of contact service employee s attitude and emotional intelligence to coping strategy and service performance , pp.75-79 http://dx.doi.org/10.14257/astl.2014.70.18 A study on the relationship of contact service employee s attitude and emotional intelligence to coping strategy and service performance Kim, Gye Soo

More information

ATTITUDES AND YOUNG CONSUMERS ORGANIC FOOD PURCHASING INTENTIONS

ATTITUDES AND YOUNG CONSUMERS ORGANIC FOOD PURCHASING INTENTIONS Journal of Science Ho Chi Minh City Open University VOL. 19 (3) 2016 October/2016 55 ATTITUDES AND YOUNG CONSUMERS ORGANIC FOOD PURCHASING INTENTIONS NGUYEN KIM NAM Ho Chi Minh City Industry and Trade

More information

A STUDY ON KNOWLEDGE BASE TRUST IN ADOPTING E-TRANSACTION

A STUDY ON KNOWLEDGE BASE TRUST IN ADOPTING E-TRANSACTION A STUDY ON KNOWLEDGE BASE TRUST IN ADOPTING E-TRANSACTION Hsiang-Yung Feng 1, Ting-Yuan Chang 2 1 National Pingtung Institute of Commerce, 2 National Cheng Kung University (TAIWAN) E-mails:hyfeng@npic.edu.tw,

More information

MEASUREMENT OF DISCONFIRMATION IN ONLINE PURCHASING BEHAVIOR

MEASUREMENT OF DISCONFIRMATION IN ONLINE PURCHASING BEHAVIOR MEASUREMENT OF DISCONFIRMATION IN ONLINE PURCHASING BEHAVIOR Chinho Lin, Institute of Information Management of National Cheng Kung University, Taiwan R.O.C. Email: linn@mail.ncku.edu.tw Yu-Huei Wei, Department

More information

Copyright subsists in all papers and content posted on this site.

Copyright subsists in all papers and content posted on this site. Student First Name: Mubarak Student Second Name: Alruwaie Copyright subsists in all papers and content posted on this site. Further copying or distribution by any means without prior permission is prohibited,

More information

USER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES

USER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES USER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES Kakoli Bandyopadhyay Lamar University, P.O. Box 10033, Beaumont, TX 77710 Phone: (409) 880-8627, Fax: (409) 880-8235 E-Mail: kakoli.bandyopadhyay@lamar.edu

More information

Available online at ScienceDirect. Procedia Economics and Finance 27 ( 2015 )

Available online at  ScienceDirect. Procedia Economics and Finance 27 ( 2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 27 ( 2015 ) 567 573 22nd International Economic Conference IECS 2015 Economic Prospects in the Context of Growing

More information

THE ADOPTION AND USE OF INTERNET BANKING BY MALAYSIAN CONSUMERS: AN EMPIRICAL INVESTIGATION

THE ADOPTION AND USE OF INTERNET BANKING BY MALAYSIAN CONSUMERS: AN EMPIRICAL INVESTIGATION THE ADOPTION AND USE OF INTERNET BANKING BY MALAYSIAN CONSUMERS: AN EMPIRICAL INVESTIGATION Chee Leong LIM Taylor s Business School, Taylor s College, Subang Jaya, Selangor. E-mail: lim.cheeleong@taylors.edu.my

More information

Organization Culture Dimensions as Antecedents of Internet Technology Adoption

Organization Culture Dimensions as Antecedents of Internet Technology Adoption Organization Culture Dimensions as Antecedents of Internet Technology Adoption Subhasish Dasgupta 1 and Babita Gupta 2 1 George Washington University, 2115 G Street, NW, Suite 515, Washington, DC 20052,

More information

Determinants of User s Intention to Use MMS: A Pilot Study

Determinants of User s Intention to Use MMS: A Pilot Study Determinants of User s Intention to Use MMS: A Pilot Study Zhaohui Chen Department of Information Systems, City University of Hong Kong Tel: (852) 2788-7421,Fax: (852) 2788-8694 Email: ischen@is.cityu.edu.hk

More information

Evaluating Supply Chain Context-Specific Antecedents of Post-Adoption Technology Performance

Evaluating Supply Chain Context-Specific Antecedents of Post-Adoption Technology Performance Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2005 Proceedings Special Interest Group on Human-Computer Interaction 2005 Evaluating Supply Chain Context-Specific Antecedents

More information

Incorporating Perceived Risk Into The Diffusion Of Innovation Theory For The Internet And Related Innovations

Incorporating Perceived Risk Into The Diffusion Of Innovation Theory For The Internet And Related Innovations Incorporating Perceived Risk Into The Diffusion Of Innovation Theory For The Internet And Related Innovations Zakaria I. Saleh. Yarmouk University, Jordan DrZaatreh@netscape.net ABSTRACTS Despite the high

More information

Investigating Social Influence on Acceptance of Executive Information Systems: A UTAUT Framework Approach

Investigating Social Influence on Acceptance of Executive Information Systems: A UTAUT Framework Approach Association for Information Systems AIS Electronic Library (AISeL) SAIS 2007 Proceedings Southern (SAIS) 3-1-2007 Investigating Social Influence on Acceptance of Executive Information Systems: A UTAUT

More information

An investigation on the Acceptance of Facebook by Travellers for Travel Planning

An investigation on the Acceptance of Facebook by Travellers for Travel Planning An investigation on the Acceptance of Facebook by Travellers for Travel Planning Nina Enter, Eleni Michopoulou, School of Culture and Lifestyle University of Derby, Buxton, UK N.Enter1@unimail.derby.ac.uk

More information

TPB (Ajzen, 1991), TAM (Davis et al., 1989) Topic: E-filing

TPB (Ajzen, 1991), TAM (Davis et al., 1989) Topic: E-filing TPB (Ajzen, 1991), TAM (Davis et al., 1989) Topic: E-filing Perceived usefulness Attitude Intention Ease of use Perceived behavioral control Subjective norm Introduction Over the recent years, government

More information

Motivating Employees to Comply with Information Security Policies

Motivating Employees to Comply with Information Security Policies Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2016 Proceedings Midwest (MWAIS) Spring 5-19-2016 Motivating Employees to Comply with Information Security Policies David Sikolia

More information

An Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site

An Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-2010 An Examination of Privacy Concerns and Trust Entities

More information

The Role of National Culture and Gender on Information Elements in E-commerce: A Pilot Study on Trust

The Role of National Culture and Gender on Information Elements in E-commerce: A Pilot Study on Trust Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Role of National Culture and Gender on Information

More information

Application of Value-based Adoption Model to Analyze SaaS Adoption Behavior in Korean B2B Cloud Market

Application of Value-based Adoption Model to Analyze SaaS Adoption Behavior in Korean B2B Cloud Market Application of Value-based Adoption Model to Analyze SaaS Adoption 1 Hong-Kyu Kwon, 2 Kwang-Kuyu Seo 1, First Author Department of Industrial & Management Engineering, Namseoul University, hongkyuk@nsu.ac.kr

More information

Virtual Community of Consumers: Why People are Willing to Contribute?

Virtual Community of Consumers: Why People are Willing to Contribute? Virtual Community of Consumers: Why People are Willing to Contribute? Cindy M. Y. Cheung Department of Information Systems City University of Hong Kong iscin@cityu.edu.hk Sarah P.W. Shek Department of

More information

Switching Behavior in Social Networking Sites:

Switching Behavior in Social Networking Sites: Association for Information Systems AIS Electronic Library (AISeL) CONF-IRM 2011 Proceedings International Conference on Information Resources Management (CONF-IRM) 6-2011 Switching Behavior in Social

More information

Will Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF

Will Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF Will Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF Research-in-Progress Yi-Ming Tai National Pingtung Institute of Commerce ymtai@npic.edu.tw Yi-Cheng Ku Providence

More information

Management Science Letters

Management Science Letters Management Science Letters 3 (2013) 1307 1314 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl An empirical study on different factors influencing

More information

DETERMINANTS OF GREEN PURCHASE BEHAVIOUR AMONG YOUNG CONSUMERS: AN ONLINE PERSPECTIVE

DETERMINANTS OF GREEN PURCHASE BEHAVIOUR AMONG YOUNG CONSUMERS: AN ONLINE PERSPECTIVE DETERMINANTS OF GREEN PURCHASE BEHAVIOUR AMONG YOUNG CONSUMERS: AN ONLINE PERSPECTIVE Adeline Kok Li-Ming Sunway University, Malaysia Teoh Boon Wai Green Possibilities Frontier, Malaysia ABSTRACT Consumers

More information

Information Sharing on Social Networking Websites: Antecedents and Consequences of Trust

Information Sharing on Social Networking Websites: Antecedents and Consequences of Trust Information Sharing on Social Networking Websites: Antecedents and Consequences of Trust Completed Research Paper Mohammad Salehan Seyed Mohammadreza Mousavizadeh Kashipaz College of Business College of

More information

A Model of Sustainable Trust in B2C E-Markets

A Model of Sustainable Trust in B2C E-Markets Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 A Model of Sustainable Trust in B2C E-Markets

More information

Factors Affecting Malaysian young consumers online purchase intention in social media websites

Factors Affecting Malaysian young consumers online purchase intention in social media websites Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 40 ( 2012 ) 326 333 Factors Affecting Malaysian young consumers online purchase intention in social media websites See

More information

Introduction. pulled into traveling by internal and external factors (Crompton, 2003). Push factors are more

Introduction. pulled into traveling by internal and external factors (Crompton, 2003). Push factors are more The effects of motivation and satisfaction of college football tourist on revisit and recommendation: a structural model Erinn D. Tucker School of Hotel and Restaurant Administration Oklahoma State University

More information

Factors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan

Factors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan Factors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan Farooq Alam Khan, Basheer Ahmad Abstract: Much literature on electronic government services

More information

Perceived risk of security and privacy in online shopping: A study of Malaysia context

Perceived risk of security and privacy in online shopping: A study of Malaysia context Perceived risk of security and privacy in online shopping: A study of Malaysia context Marzieh Zendehdel 1, Laily Hj Paim (Corresponding author) 2 1. Department of Resource Management and Consumer Studies,

More information

AGE DIFFERENCES IN BEHAVIORAL INTENTION TO USE INTERNET MARKETING: A COMPARATIVE STUDY BETWEEN MALAYSIAN AND TAIWANESE

AGE DIFFERENCES IN BEHAVIORAL INTENTION TO USE INTERNET MARKETING: A COMPARATIVE STUDY BETWEEN MALAYSIAN AND TAIWANESE International Journal of Business and Society, Vol. 16 No. 3, 2015, 386-396 AGE DIFFERENCES IN BEHAVIORAL INTENTION TO USE INTERNET MARKETING: A COMPARATIVE STUDY BETWEEN MALAYSIAN AND TAIWANESE Salmi

More information

Frequency of Usage: The Impact of Technology Acceptance Factors versus Social Factors

Frequency of Usage: The Impact of Technology Acceptance Factors versus Social Factors Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-5-2011 Frequency of Usage: The Impact of Technology Acceptance Factors versus Social Factors

More information

Towards a Theory of Trusted Performance in Software Development Projects

Towards a Theory of Trusted Performance in Software Development Projects Communications of the IIMA Volume 12 Issue 1 Article 3 2012 Towards a Theory of Trusted Performance in Software Development Projects Jim Jenkins Seattle Pacific University Gerhard Steinke Seattle Pacific

More information

Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model

Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model Full Paper Javad Abed Gurpreet Dhillon Virginia Commonwealth University Virginia Commonwealth

More information

Research on the Willingness to Accept Mobile Internet Advertising Based on Customer Perception---A Case of College Students

Research on the Willingness to Accept Mobile Internet Advertising Based on Customer Perception---A Case of College Students Association for Information Systems AIS Electronic Library (AISeL) WHICEB 2017 Proceedings Wuhan International Conference on e-business Summer 5-26-2017 Research on the Willingness to Accept Mobile Internet

More information

Internet Banking: Enablers and Inhibitors for Developing Economies A Study of Potential Users in Jamaica Completed Research Paper

Internet Banking: Enablers and Inhibitors for Developing Economies A Study of Potential Users in Jamaica Completed Research Paper Internet Banking: Enablers and Inhibitors for Developing Economies A Study of Potential Users in Jamaica Completed Research Paper Annette M. Mills University of Canterbury Department of Accounting and

More information

The Role of Buying Center Members Individual Motivations for the Adoption of Innovative Hybrid Offerings

The Role of Buying Center Members Individual Motivations for the Adoption of Innovative Hybrid Offerings The Role of Buying Center Members Individual Motivations for the Adoption of Innovative Hybrid Offerings - The Case of Battery Electric Vehicles in Corporate Fleets This paper investigates the adoption

More information

A Study on Users Intention of Using Mobile Payment

A Study on Users Intention of Using Mobile Payment A Study on Users Intention of Using Mobile Payment 1 Hsio-Min Wang, 2 Bolortsetseg Idertsog 1 Professor, Department of Business Administration DaYeh University, Taiwan, 2 Graduate Student, Department of

More information

A Methodological Analysis of User Technology Acceptance

A Methodological Analysis of User Technology Acceptance A Methodological Analysis of User nology Acceptance Heshan Sun School of Information Studies Syracuse University hesun@syr.edu Abstract The majority of research on user technology acceptance, e.g. technology

More information

36

36 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntariness in the acceptance of information

More information

EURASIAN JOURNAL OF SOCIAL SCIENCES

EURASIAN JOURNAL OF SOCIAL SCIENCES Eurasian Journal of Social Sciences, 1(2), 2013, 46-51 EURASIAN JOURNAL OF SOCIAL SCIENCES http://www.econjournals.net PERSONALITY TRAITS AS FACTORS AFFECTING E-BOOK ADOPTION AMONG COLLEGE STUDENTS: DOES

More information

USER ACCEPTANCE OF E-COMMERCE TECHNOLOGY: A META-ANALYTIC COMPARISON OF COMPETING MODELS

USER ACCEPTANCE OF E-COMMERCE TECHNOLOGY: A META-ANALYTIC COMPARISON OF COMPETING MODELS USER ACCEPTANCE OF E-COMMERCE TECHNOLOGY: A META-ANALYTIC COMPARISON OF COMPETING MODELS Yayla, Ali, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA, ayayla@fau.edu Hu, Qing, Florida

More information

Predictors of e-government Adoption in Mauritius: An Extended version of the Technology Adoption Model (TAM) Mahadeo, J, D and Wastell D, G

Predictors of e-government Adoption in Mauritius: An Extended version of the Technology Adoption Model (TAM) Mahadeo, J, D and Wastell D, G Predictors of e-government Adoption in Mauritius: An Extended version of the Technology Adoption Model (TAM) Mahadeo, J, D and Wastell D, G Introduction Acceptance of technology by users has obtained widespread

More information

Quality of Usage as a Neglected Aspect of Information Technology Acceptance

Quality of Usage as a Neglected Aspect of Information Technology Acceptance Quality of Usage as a Neglected Aspect of Information Technology Acceptance Birte Autzen Department of General Management and Information Systems Prof. Dr. Armin Heinzl University of Mannheim 68131 Mannheim

More information

The Credibility of Saudi Media Institution Sites through Social Media from the Perspectives of Saudi Youth

The Credibility of Saudi Media Institution Sites through Social Media from the Perspectives of Saudi Youth The Credibility of Saudi Media Institution Sites through Social Media from the Perspectives of Saudi Youth Dr. Falah Amer Aldahmashi Faculty of Arts Department of Communication and Media King Faisal University

More information

User acceptance of e-commerce technology: a meta-analytic comparison of competing models

User acceptance of e-commerce technology: a meta-analytic comparison of competing models Iowa State University From the SelectedWorks of Qing Hu June, 2007 User acceptance of e-commerce technology: a meta-analytic comparison of competing models Ali Yayla, Florida Atlantic University Qing Hu,

More information

Factors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers

Factors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers th The 7 Smart Collaboration for Business in Technology and Information Industries 2016 Factors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers Andi Muhammad Iqbal

More information

Effect of Determinants of E-Retailing on Customer Satisfaction: Empirical evidences from India

Effect of Determinants of E-Retailing on Customer Satisfaction: Empirical evidences from India DOI : 10.18843/ijms/v5iS3/05 DOIURL :http://dx.doi.org/10.18843/ijms/v5is3/05 Effect of Determinants of E-Retailing on Customer Satisfaction: Empirical evidences from India Rashmi Dang, Phd Research Scholar,

More information

WHY ARE CONSUMERS WILLING TO PAY FOR PRIVACY? AN APPLICATION OF THE PRIVACY-FREEMIUM MODEL TO MEDIA COMPANIES

WHY ARE CONSUMERS WILLING TO PAY FOR PRIVACY? AN APPLICATION OF THE PRIVACY-FREEMIUM MODEL TO MEDIA COMPANIES WHY ARE CONSUMERS WILLING TO PAY FOR PRIVACY? AN APPLICATION OF THE PRIVACY-FREEMIUM MODEL TO MEDIA COMPANIES Complete Research Schreiner, Michel, Ludwig-Maximilians-Universität München, Munich, Germany,

More information

Evaluation of Future Mobile Services Based on the Technology Acceptance Model

Evaluation of Future Mobile Services Based on the Technology Acceptance Model Association for Information Systems AIS Electronic Library (AISeL) ECIS 2008 Proceedings European Conference on Information Systems (ECIS) 2008 Evaluation of Future Services Based on the Technology Acceptance

More information

A Comprehensive Multimedia Marketing Strategy to Effectively Disseminate Fire Science Information. Presented by: John Diaz and Toddi Steelman, Ph.D.

A Comprehensive Multimedia Marketing Strategy to Effectively Disseminate Fire Science Information. Presented by: John Diaz and Toddi Steelman, Ph.D. A Comprehensive Multimedia Marketing Strategy to Effectively Disseminate Fire Science Information Presented by: John Diaz and Toddi Steelman, Ph.D. Outline of Presentation Perception of Fire Tools for

More information

The Effect of Accounting Information Systems in Accounting

The Effect of Accounting Information Systems in Accounting The Effect of Accounting Information Systems in Accounting Awosejo, O.J 1, Kekwaletswe, R, M 2, Pretorius, P 3 and Zuva, T 4 Abstracts Generally, ICT have improved the quality of professional services

More information

The Compositions, Antecedents and Consequences of Brand Loyalty. Chien-An Lin, National Kaohsiung University of Hospitality and Tourism, Taiwan

The Compositions, Antecedents and Consequences of Brand Loyalty. Chien-An Lin, National Kaohsiung University of Hospitality and Tourism, Taiwan The Compositions, Antecedents and Consequences of Brand Loyalty Chien-An Lin, National Kaohsiung University of Hospitality and Tourism, Taiwan Asian Conference on Psychology and Behavioral Sciences 2015

More information

An empirical study on predicting user acceptance of e-shopping on the Web

An empirical study on predicting user acceptance of e-shopping on the Web Information & Management 41 (2004) 351 368 An empirical study on predicting user acceptance of e-shopping on the Web Hung-Pin Shih * Information Management Department, Hsuan Chuang University, Taiwan,

More information

Toward Modeling the Effects of Cultural Dimension on ICT Acceptance in Indonesia

Toward Modeling the Effects of Cultural Dimension on ICT Acceptance in Indonesia Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 65 ( 2012 ) 833 838 International Congress on Interdisciplinary Business and Social Science 2012 (ICIBSoS 2012) Toward

More information