International Journal of Mobile Communications (12 papers in press)
The roles of motivation and media engagement in second-screen viewing experiences
by Cheng-yu Lin, Po-chien Chang
Abstract: Traditional TV viewing has been blended with the use of second-screen mobile devices. Increased engagement via mobile devices or applications has quickly become a new norm interacting with program-related information (e.g., following fan community or play related games) or chatting on social apps (e.g., Twitter) while watching television (TV). New features and behaviours are emerging that create challenges and opportunities for attracting advertising revenues and viewer attention in the second-screen environment. This study explored the antecedent and consequences of second-screen mobile phone use. Four categories, control, enrichment, sharing, and participation, were identified as second-screen TV viewing behaviours. An empirical model was developed by integrating audiences motivation, media engagement and second-screen behaviour. A response from 562 TV audience participants were collected and reveals that audience motivation for using a second screen is mainly affected by their engagement experiences, and further led to the corresponding usage behaviours. Mobile users, motivated by common interests and social sharing, are more engaged in online activities while watching TV programs. Second screen users are also obsessed with their social connectivity experiences rather than interactive features of TV programs. Theoretical and practical implications for effective second screen strategies are discussed.
Keywords: Second-Screen; Media engagement; Media-user behavior; Uses and Gratification; Media consumption.
Investigating the continuance usage intention of mobile payment: A multi-theoretical perspective
by Samar Mouakket
Abstract: Understanding the factors that motivate users to continue using mobile payment (MP) is considered essential to organisations wishing to increase customer retention of this rather new technology. Drawing on the unified theory of acceptance and use of technology (UTAUT) and the innovation diffusion theory (IDT), this research examines the factors affecting MP usage within post-adoption context, which in turn has a link to positive word of mouth towards this technology. A survey is carried out with university students in the United Arab Emirates who have used mobile payment. Structural Equation Modeling (SEM) is employed to test and analyse both the measurement model and the structural model. We have conducted data analysis with structural equation modeling. The results indicate that all the proposed factors in our model have influenced users continuance intention to use MP, with the exception of trialability. Also, continuance intention is found to determine positive word of mouth.
Keywords: UTAUT; IDT; mobile payment; continuance intention; word of mouth.
A Generic Work Zone Evaluation Tool Driven by Macroscopic Traffic Simulation Model
by Hongcheng Gan, June Wei, Gang Wang
Abstract: This study proposed a generic work zone evaluation tool driven by a dynamic macroscopic traffic model. The tool can investigate the effects of a work zone on freeway conditions. The classical freeway traffic network model METANET was extended to better capture typical work zone characteristics in terms of speed and capacity reductions through modifying its speed-density relationship functions. The tool can present profiles of traffic state variables, system-level performance indices, and annotated traffic conditions maps. It was used to develop a prototype computer-aided decision support system and applied in two simulation-based case studies. Case studies show that it is effective and useful for understanding complicated work zone impacts and can aid in better design and assessment of work zone plans. It can be integrated in a dynamic transportation management system for better communication between road operator and travellers.
Keywords: Freeway work zone; evaluation; decision support systems; macroscopic traffic simulation; mobile communications.
Empirical study on video clip consumption: Focusing on viewing habits and use motives
by Minjeong Ham, Ji Young Lee, Sang Woo Lee
Abstract: With the increase in video consumption on mobile devices, Korean broadcasters have begun to provide short video clips of re-edited existing broadcast content. This study aims to investigate the motivations that drive Korean consumers to watch short clips online and understand the behavior of consumers to analyze video clips additional promotional effects. Exploratory factor analysis and hierarchical regression were performed with online survey data. Findings suggest that selective entertainment is the most important factor affecting video clip consumption, intent to watch live programming on TV, and intent to purchase VOD. Additionally, video clip use motives have a strong influence on the intent to watch live programming on TV and purchase VOD. Therefore, broadcasters may consider consumers psychological needs when providing video clip content. Because no academic study has attempted to investigate the relation between video clips usage and use patterns, this findings will be helpful for future research.
Keywords: TV viewing; mobile device; video clips; live programs; VOD.
Factors Influencing Users' Willingness for Online Messaging Services: A Developing Country Perspective
by Ikramul Hasan, Samiul Parvez Ahmed, Sarwar Uddin Ahmed, Tanzina Binte Yousuf
Abstract: This study aims to identify the factors that determine the willingness to use online messaging services (OMS) in the context of a collective societal country. The measurement model includes six latent variables related to the respondents perceptions associated with perceived usefulness, perceived ease of use, perceived monetary value, perceived enjoyment, word of mouth (WOM) and intention to use. Primary survey was conducted with a structured questionnaire on a sample of 300 respondents. Partial least square technique was used to test the hypotheses. The results indicate that the aforementioned perceptual factors have significant relationship with WOM which also acts as mediator. Proposed model in this study is expected to overcome the limitations of existing technology adoption theories by adding an extension to Technology Acceptance Model by including WOM. Findings of the study add nuance to the understanding of the policymakers and practitioners regarding motivation behind using internet based online messaging services.
Keywords: Online Messaging Service; TAM Model; Word of Mouth; Bangladesh.
Research on the Influence of RFID Techniques on the Intelligent SC Performance
by Caihong Liu
Abstract: Firstly,on the reviews, from the perspective of SCOR model performance this paper analyses the evaluation indicators on the performance of intelligent SC .Secondly, RFID's capability based, the conceptual model of RFID on the intelligent SC performance is constructed. Thirdly, the questionnaire data table is formed by using the methods of network data mining and literature reading. Then, the reliability and validity of the questionnaire data are analyzed by SPSS 22.0 software. Finally,we construct the structural equation model of RFID on the intelligent SC performance by the means of AMOS software. AS a result, the optimization model was proposed, and the influence path hypothesis and other theoretical research hypotheses were verified.
Keywords: Wireless Radio Frequency Identification (RFID); Intelligent supply chain; Structural Equation Modeling; Performance; SCOR Model; IT application capability.
A scientometric analysis of mobile recommender systems
by Kasra Madadipouya, Liyana Shuib, Suraya Hamid
Abstract: With further advancements in technology, a new emerging topic called 'mobile recommender systems' has gained tremendous momentum. The amount of research on mobile recommender systems can reflect the development of a variety of research topics such as mobile computing and context-aware systems. Hence, performing a scientometric mapping on this topic is needed. However, there is a lack of research in this area that aims to perform a detailed scientometric mapping. The objective of this study is to perform a scientometric mapping related to mobile recommender systems. We analysed publications between 2002 and 2017 indexed in Web of Science. The analysis maps the parameters of total output, the growth of output, authorship, major contributors, thematic trends and emerging topics in the field. Our study serves as a resource for future research by shedding light on how trends in mobile recommender systems research have evolved as well as providing insights into the current state of this field.
Keywords: recommender system; recommender system research; mobile recommendation system; context-aware recommender systems; scientometric analysis; scientometric mapping; scientometrics; mapping.
A provably secure pairing-free anonymous handover authentication protocol for mobile wireless networks
by Sunday Oyinlola Ogundoyin
Abstract: To address the limitations in the existing anonymous handover authentication (AHA) protocols, we propose a novel certificateless-based public key cryptography (CL-PKC) AHA protocol using elliptic curve cryptography (ECC). The protocol can achieve all the security requirements of AHA protocol and provide countermeasure against privilege escalation. The beauty of our protocol is that it is autonomous, where nodes only need to contact the authentication server (AS) once for pseudonym set and thereafter they can renew their pseudonyms on their own. The formal protocol analysis shows that the protocol achieves mutual authentication and session key establishment. Moreover, we show that the protocol is secure in the random oracle model based on elliptic curve discrete logarithm assumption (DLA). The performance evaluation demonstrates that the proposed AHA protocol is very efficient in terms of computation cost and communication overhead than related protocols.
Keywords: mobile wireless networks; MWNs; cryptography; elliptic curve discrete logarithm assumption; certificateless; anonymous handover authentication; AHA; autonomous.
A survey of what customers want in smartwatch brand applications
by Meuel Jeong, Kyeongjin Park, Kyungdoh Kim
Abstract: This research explores how smartwatch brand apps can be used to advertise companies and brands. A survey was conducted to analyse the utilisation of the brand app in smartwatch, and a total of 134 data were collected. Study 1 discovered the external factors that influence intention to use and tracked the relationship between factors using technology acceptance model. The results of the structural equation model analysis showed that the ease of use had a significant positive impact on the intention to use and the complexity and financial risk had a statistically negative impact on the intention to use. Study 2 investigated what types of smartwatch brand apps users would use. As a result of analysis of variance, music, weather information, basic telephone function, SNS, navigation, basic SMS, productivity, and health showed higher use intention. Types with low intentions were e-books, games, sports, entertainment, QR code/barcode recognition, finance, photography and video.
Keywords: smartwatch; advertisement; brand app; intention to use; technology acceptance model; TAM.
The glamorous world: how Instagram use is related to affluence estimates, materialism, and self-esteem
by Yoori Hwang, Se-Hoon Jeong
Abstract: Based on cultivation theory, this study examined whether Instagram use is positively related to: 1) greater affluence estimates (i.e., estimates regarding the prevalence of affluence); 2) greater materialistic values, and ultimately; 3) lower self-esteem. Based on an online survey of 530 adults in Korea, this study found that Instagram use was positively related to affluence estimates and materialistic values. In addition, the results showed that Instagram use was indirectly related to lower self-esteem mediated by greater materialistic beliefs. Theoretical and practical implications of these findings are discussed.
Keywords: Instagram; cultivation theory; affluence; materialism; self-esteem.
The perspective of information system success with social interaction on online game continuance: the moderating role of gender, age, and play frequency
by Chih-Hung Wu, Chao-Wei Lai, Shih-Chih Chen
Abstract: This study proposed a modified hypothetical model to investigate the influence among six dimensions, namely, system quality, game quality, privacy protection service, user satisfaction, benefits of social interaction, and continuance usage intention. Besides, this study included gender, age, and usage frequency as moderators in the proposed model. The results showed that system and game quality significantly influenced the satisfaction and benefits of social interaction on online game players, as well as their continuance intention toward online games. The modified D&M IS success model significantly predicted the intention of online game players to continue playing an online game product. In addition, high frequency online game players show the significantly stronger influence of system quality on benefits of social interaction than low frequency online game players. This study provided a better understanding of the relationship about the factors how to influence the online games continuance intention for academics and practitioners.
Keywords: online game; D&M information system success model; system quality; game quality; privacy protection service; PPS; partial least squares.
Mobile information security management for small organisation technology upgrades: the policy-driven approach and the evolving implementation approach
by Martin Brodin, Jeremy Rose
Abstract: Information security management researchers are often focused on the information security policy, its implementation and evaluation as the primary means of ensuring that organisations protect their valuable data. However, information security is usually nested with a variety of other concerns (for instance technology upgrades, information access, efficiency and sustainability issues, employee satisfaction), so this policy-driven approach is seldom operated in isolation. We investigate the approach as implied in the mobile information security literature, provide a literature-inspired characterisation and use it to analyse an iPad implementation for politicians in a Swedish municipality. The analysis provides only a partial explanation for security work in this kind of small organisation technology upgrade, so we develop a complementary approach: the evolving implementation approach. A suggestion is made for how the two approaches can be reconciled, and implications for both practitioners and researchers derived.
Keywords: information management; mobile devices; implementation; device strategy; IS management.