International Journal of Mobile Communications (30 papers in press)
An integrated model of the antecedents and consequences of perceived information overload using WeChat as an example
by Liang Ma, Xin Zhang, Gao Shan Wang, Ge Zhang
Abstract: In recent years, more and more social media users have complained of information overload. In this paper, we obtained data from surveys of users of the multi-purpose Chinese social website, WeChat, to develop an integrated model of information overload. The model was used to determine the antecedents and consequences of WeChat users' perceived information overload. A field survey of 244 WeChat users was conducted to test the research model and hypotheses. The results showed the following key findings: 1) the amount of information received and the length of content increased users' perceptions of information overload, while the number of WeChat subscriptions followed was not a significant factor; 2) users' perceptions of information overload were associated with negative emotions and increased intention to discontinue usage; 3) the type and severity of negative emotions and consequent likelihood of discontinuing usage will vary according to the users' different levels of experience. The implications of our results for researchers, website managers and psychosocial practitioners are discussed.
Keywords: perceived information overload; number of subscription follow; amount of information received; length of information; negative emotion; discontinuous usage intention.
Factors influencing the purchase of travel insurance over mobile banking
by Chi-Hsuan Lin, Kuang-Hsun Shih, Wei-Chuan Wang, Lee-Fen Chuang, Wei-Chun Tsai, Chung-Fu Huang
Abstract: By adopting the Davis's technology acceptance model and introducing the variables of system quality, information quality, and service quality from the information system success model, this study's purpose is to combine these two models to explore the factors that influence consumers to purchase travel insurance through the mobile banking system. In our entire study process, total 300 survey questionnaires were collected, approaching a response rate of 100%. Due to the insufficient number of samples and this is a new issue, it may lead to insufficient statistical analysis. Moreover, the number of valid questionnaires was 261, approximately 87% of the response rate. Research results show the following: in our hypothesis test, only one of the 12 hypotheses is not valid. Last, the study provides recommendations and directions for the financial industry to use as reference when promoting mobile banking operations in the future.
Keywords: Technology Acceptance Model; Information System Success Model; Mobile Banking; Structural Equation Modeling (SEM).
Exploring factors affecting the adoption of Mobile Payment at physical stores
by Lin Wang, Xuefeng Dai
Abstract: This study develops and empirically tests a research model to comprehensively examine factors influencing the adoption of mobile payment at physical stores. In particular, this study proposes an integrated theoretical framework that combines the theory of technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT). The results indicate that: attitude is the most important factor influencing users intention to adopt offline mobile payment compared to perceived usefulness and social influence; personal innovativeness, perceived usefulness and promotional offer also have significant effects on attitude whereas the perceived ease of use is not as important as others but does with significant effect on perceived usefulness.
Keywords: Offline mobile payment;Mobile commerce;Technology acceptance model;User acceptance.
Customer Resistance to Churn in a Mature Mobile Telecommunications Market
by Younghoon Chang, Seungyeon Kim, Siew Fan Wong, Myeong-Cheol Park
Abstract: Effective customer retention is critical for company survival, especially in a mature mobile telecommunications market. To build on customer retention research, we propose an integrative model capturing the dual relational mechanisms that explain customer resistance to churn. We empirically test the model using data from 815 subscribers who have stayed with their mobile network operators for more than three years. The results show that two contrasting mechanisms, dedication-based and constraint-based relationships, simultaneously determine customer resistance to churn. The constraints of procedural, financial, and relational costs significantly influence perceived risk, while dedication factors of economy-based and identification-based trust significantly influence commitment.
Keywords: resistance to churn; customer retention; constraint-based relationship; dedication-based relationship.
A Multi-Modal Approach for Evaluating Player Experience on Different Gaming Platforms
by Yavuz Inal, Kerem Rızvanoğlu, Çakır Aker
Abstract: The aim of this experimental study was to adopt a multi-modal approach to analyse player experience on PC and mobile gaming platforms, and identify both the factors that potentially have an effect on this experience and the set of methods that are effective on measuring it. Game experience questionnaire was enriched through usability scales, semi-structured interviews and player observations. Data was collected from 20 undergraduate university students that were selected from casual gamers that had never played the Plants vs. Zombies game before. Results of the study showed that participants who played on the PC platform declared more positive feelings when compared to the players of the mobile platform. The bivariate correlations between the game experience items on each platform showed that flow, competence, and challenge were the marker components of game experience that differed due to the players' game experience on each platform.
Keywords: Player Experience; Mobile Games; Gameplay; Game Usability; Gaming Platforms; Multi-Modal Approach.
UNDERSTANDING THE FACTORS AFFECTING CONSUMERS CONTINUANCE INTENTION IN MOBILE SHOPPING: THE CASE OF PRIVATE SHOPPING CLUBS
by Mehmet Cem Bölen, Üstün Özen
Abstract: This study aims to determine the factors affecting the continuance intention in using mobile shopping apps and websites. Within the scope of the study, a research model is proposed that integrates an information systems (IS) expectation-confirmation model (ECM), flow theory, and trust. Structural equation modelling (SEM) was employed to analyse data collected from 518 users of the most popular private shopping clubs in Turkey. The results revealed that the variables of perceived usefulness, satisfaction, and enjoyment directly and significantly affected the consumers' continuance intention in using the private shopping clubs' mobile apps and websites. The focus dimension of the flow experience was not found to have a significant effect on either consumer satisfaction or continuous usage intention. Another interesting result of the study is that, contrary to the general belief in the literature, the trust dimension does not have a significant effect on consumers' continuance intention.
Keywords: Mobile shopping; Private shopping clubs; Expectation confirmation model; Flow theory; Trust.
MULTIMODAL SYSTEMS FOR SPEECH RECOGNITION
by Orken Zh. Mamyrbayev, Dinara Mussayeva, Bagashar Zhumazhanov, Farida Gusmanova, Keylan Alimhan, Beibut Amirgaliyev
Abstract: In this article, we have implemented a system of multimodal recognition of Kazakh speech, based on speech and lip recognition. During the feature extraction phase, several methods have been used, such as voice activity detection (VAD), mel-frequency cepstral coefficients, perceptual linear prediction, relative perceptual linear prediction, and their first-order time derivatives. The main problems of recognition of Kazakh speech, VAD algorithms and speech segmentation, lip movement recognition are considered in the article. The description of probabilistic modelling of audiovisual speech based on coupled hidden Markov models (HMMs), information fusion methods with weight coefficients for audio and video speech modalities, and parametric representation of signals is provided. Quantitative results in multimodal recognition of continuous Kazakh speech indicate high accuracy and reliability of the automatic system. This approach has been used and compared in terms of computational time and recognition speed and gives very interesting results.
Keywords: VAD; speech segmentation; multimodal systems; speech recognition; information systems.
Effects of Virtual Reality News on Knowledge Gain and News Attitudes
by Yoori Hwang, Se-Hoon Jeong, Sonho Kim, Jung-Yoon Yum
Abstract: This research examined the effects of virtual reality (VR) news on knowledge gain and news attitudes. This study found that compared to non-VR news, VR news could have a negative impact on knowledge gain, whereas it could have some positive effect on news attitudes. The positive effect on news attitudes was only found with a more experience-related news topic (i.e., travel sites in Rio de Janeiro), but not with a less experience-related news topic (i.e., new surgical procedure for pancreatic cancer). The positive impact of VR on news attitudes was mediated by presence and subsequent enjoyment.
Keywords: Keywords: virtual reality (VR); news; journalism; knowledge; attitudes.
Use of social networking applications (SNAs) by immigrant children, adolescents, and young adultsto maintain contact with those who remained in the country of origin: Usage characteristics and habits
by Zilka Gila
Abstract: In the present research, we examined the use and its influence of social networking applications on the process of young immigrants' acclimatisation in Israel, given the widespread use of such applications by children, adolescents, and young people to maintain contact with those who remained in their country of origin. This is a mixed-method study. A total of 551 participants from Israel completed questionnaires, of whom 110 were also interviewed. Interviewees were asked to clarify the quantitative findings to help gain in-depth understanding of the factors affecting acclimatisation. The semi-structured interviews covered all the topics included in the research questionnaires. The interviewees wanted to share positive and negative experiences they lived through, and some provided detailed descriptions. The study found that participants feel that communication alleviates the sense of longing, enables intimate discourse, sentiment sharing, release of anger, and relief of frustration. The use of web applications encourages significant interactions with those who remained in the country of origin, but to a certain extent causes social isolation in the new country.
Keywords: Internet communication applications; social networking; WhatsApp; social development; immigrants.
What customers want from smart devices: Investigating explicitly judged and implicitly derived success factors
by Kyungdoh Kim, Robert W. Proctor, Chang-Soo Ok
Abstract: Smart devices are gaining popularity, and success of such products requires understanding customer requirements. To investigate success factors of smart devices, we conducted two survey studies regarding cell phones, tablet computers, and laptop computers. First, we determined explicit judgements of success factors through pairwise comparison of various factors. Second, we derived success factors implicitly by having users evaluate their own smart devices. Finally, we compared these two results and finalised the success factors for smart devices, which include the following. People want to repurchase innovative smart devices with good design. Products with competitive advantage and good usability that meet customer needs are recommended by individuals who have used them. Also, products with good market conditions will typically succeed.
Keywords: smart device; product success; success factor; competitive advantage; innovativeness.
What drives students online self-disclosure behavior on social media? A hybrid SEM and artificial intelligence approach
by Ibrahim Arpaci
Abstract: This study investigated drivers of the online self-disclosure behaviour on social media by employing a complementary structural equation modelling (SEM) and artificial intelligence approach. The study developed a theoretical model based on the 'theory of planned behaviour' (TPB) and 'communication privacy management' (CPM) theory. The predictive model was validated by employing a multi-analytical approach based on the data obtained from 300 undergraduate students. The model focused on the role of security, privacy, and trust perceptions in predicting the attitudes toward the selfie-posting behaviour. The results suggested that privacy and security are significantly associated with the trust, which explains a significant amount of the variance in the attitudes. Consistently, results of the machine-learning classification algorithms suggested that attributes of the security, privacy, and trust could predict the attitudes with an accuracy of more than 61% in most cases. Further, mediation analysis results indicated that privacy has no direct effect, but an indirect effect on the attitudes. These findings suggested a trade-off between the privacy concerns and perceived benefits of the actual behaviour.
Keywords: Social media; self-disclosure; trust; artificial intelligence; machine learning.
A Comparative Analysis and Performance Evaluation of Web Application Protection Techniques against Injection Attacks
by Nabeel Salih Ali, Ahmed Hazim Alhilali, Mohammed Falih, Salam Kadhim, Hayder K. Fatlawi, Abdul Samad Bin Shibghatullah
Abstract: Nowadays, most animation activities are based on internet-enabled applications. But, the majority of web developers have ignored the privacy and security aspects of each application, turning them into attractive targets for security issues and therefore increasing the attacker's concerning. Structured query language injection attack (SQLIA) is the prevalent and dominant type of severe web application attacks. This paper provides a comparative study for web application protection techniques and evaluates their performance against SQLIA by conducting a detailed review of various SQLIA previously detected and prevented by protection techniques, a summary and analysis of a critical review of the defensive techniques that were done to address such attack, performance comparison of the different protective approaches through an evaluation using performance metrics to identify efficient and high-performance techniques. Finally, the paper highlights and focuses on the critical and vital directions or protection approaches that require more studies by future research.
Keywords: Web applications; SQL injection; Protection techniques; Detection and prevention; Performance evaluation; Web attacks; Defensive approaches; Defensive tools; Injection; Web security; Protective method.
A Longitudinal Study on the Effects of Motivational Mobile Application Uses on Online News Engagement
by Ji Won Kim, Sunyoung Park, Yoonmo Sang
Abstract: Based on four-wave panel data, this study explored the relationships between different uses of motivational mobile applications and online news engagement. Three motivational mobile application uses informational, recreational, and relational were identified and rank-ordered according to respondents everyday mobile application preferences. Results showed that only relational mobile application use had positive relationships with online news engagement. Results further indicate that over the four-year period examined (20132016) only the use of relational mobile application led to continuous growth of online news engagement. This study advances the literature on mobile communication not only by introducing results of a longitudinal study that challenge and support conflicting previous findings but that also provide support for the possibility of the mobile facilitation hypothesis.
Keywords: Mobile Facilitation Hypothesis; Four-Wave Panel Survey; Structural Equation Modeling; Mobile Application; Informational Use; Recreational Use; Relational Use; Online News Engagement.
Examining Academic Landscape of Mobile Banking
by Hai-Yen Chang, John S. Liu, Ching-Wen Lin, Vincent C. Ma
Abstract: This study aims to identify trends in mobile banking (MB) research by reviewing influential academic articles. We adopted content analysis as a qualitative methodology and main path analysis as a quantitative methodology, to portray the development of MB research over the period from 1990 to 2016. We identified 14 highly influential articles in the evolution of MB literature. We found that the majority of the articles were written in an Asian context. The predominant theme shifted from MB adoption to the impact of MB on the effectiveness of individual lives. The primary concern of MB users changed from risk to usefulness, especially among the young users. The implications for financial institutions include focusing on consumer lifestyle, monitoring security measure and communicating to college students as the main potential customers.
Keywords: mobile banking; main path analysis; content analysis; technology acceptance model.
Investigating the adoption intention of gamification apps on mobile services
by Tony Cheng-Kui Huang, Ya-Wen Lee, Shin-Horng Chen
Abstract: Previous studies exploring adoption in the field of management information systems have focused on the objects of information systems or information technologies. However, since the popularity of smart phones has led to the usage of apps, limited investigations have attempted to understand the usage intention of apps. In this study, a research model is proposed to comprehend how users perceive and adopt a gamification app in the initial adoption phase of the information system life cycle. Since there are various topics within gamification services, we only pinpoint one popular type of service, exercise, as the research subject. The investigation involving 173 usable subjects was conducted to evaluate the model by using structural equation modelling. The result demonstrates that our proposed model explains 56.7% of the variance. The findings have interesting implications with respect to the initial usage of exercise gamification apps, both for researchers and practitioners.
Keywords: Gamification; Technology acceptance model; Initial usage; Individual level; Exercise.
Understanding users intention to switch mobile instant messaging
by Shuang Cheng, Sang-Joon Lee
Abstract: In recent years, mobile instant messaging (MIM) has become increasingly popular and has integrated in the daily lives of millions of people worldwide. Previous studies on MIM have primarily focused on its initial adoption and continuance usage, while paying less attention to switching behaviour. This study aims to explore the key factors influencing users switching intention of MIM in China, using the push-pull-mooring (PPM) framework of the migration theory, and empirically examine the three types of predictors for MIM switching intention: push (fatigue), pull (referent network size, future expectation, complementarity, and transfer trust), and mooring (switching cost) factors. Our results indicated that all of these factors have significant effects on switching intention. The results yield both theoretical and practical implications.
Keywords: mobile instant messaging; fatigue; network externality; transfer trust; switching cost; switching intention; push-pull-mooring framework.
A simple and portable add on converter module for communication and measurements
by Dinesh Kumar, Majo Mary Mathew, Madhusoodanan Kottarathil Naduvil
Abstract: This paper presents the development of a new versatile portable add-on converter module which can be used for analysing mobile communication and cable TV networks. Present testing techniques required separate test equipment for characterising electrical and optical networks. Here, we develop a new system work as an add-on module for electrical frequency domain reflectometer which can perform measurements in electrical as well as optical cable networks. Using this technique, millions of electrical cable analyser currently in use all over the world can be converted into the optical analyser. The same system can also be configured as a bidirectional communication system for a wide variety of applications like fibre to the antenna/fibre to the home, cable TV applications. We also show that the developed system has wideband performance over a frequency range from 800 MHz to 2.5 GHz and a dynamic range of 45 dB.
Keywords: Converter module; electrical frequency domain reflectometer; radio over fiber; single-mode fiber; multimode fiber.
Relationship Quality, Computer auditing and information security for mobile industry
by Ching-Wen Lin, Tung-Hsien Wu, Shaio Yan Huang
Abstract: Research has primarily focused on the security aspect of mobile communication for computer auditing research in the mobile industry. Few studies have examined the role of computer auditing on the mobile industry. Therefore, the current study investigated the mediating effect of computer audit on the correlation between relationship quality and information security by conducting a survey using the partial least-squares method. Computer audit directly influenced internal auditing performance, and relationship quality indirectly influenced information security through computer audit. Therefore, determining how sound computer auditing can be conducted is crucial for the internal audit department.
Keywords: CAATTs; computer auditing; mobile industry; performance.
A survey of what customers want in smartwatch brand applications
by Kyungdoh Kim, Kyeongjin Park, Meuel Jeong
Abstract: This research explores how smartwatch brand apps can be used to advertise companies and brands. A survey was conducted to analyse the utilisation of the brand app in smartwatch, and a total of 134 data were collected. Study 1 discovered the external factors that influence intention to use and tracked the relationship between factors using technology acceptance model. The results of the structural equation model analysis showed that the ease of use had a significant positive impact on the intention to use and the complexity and financial risk had a statistically negative impact on the intention to use. Study 2 investigated what types of smartwatch brand apps users would use. As a result of analysis of variance, music, weather information, basic telephone function, SNS, navigation, basic SMS, productivity, and health showed higher use intention. Types with low intentions were e-books, games, sports, entertainment, QR code/barcode recognition, finance, photography and video.
Keywords: Smartwatch; Advertisement; Brand app; Intention to use; TAM.
Social network services and their effects on network social capital: An instrumental variables approach
by KYUNG-GOOK PARK, Sehee Han
Abstract: The purpose of this study is to examine the association between social network services and network social capital while adopting an instrumental variables approach. This study includes a simple random sample of 491 respondents gathered through a cross-sectional survey in South Korea. The results show that users of social network services were higher in their network social capital in comparison with non-users of social network services. The results further suggest that it is high intensity users rather than low intensity users who are higher in network social capital than non-users of social network services. The current study contributes to the literature as it empirically investigates the association between social network services and network social capital, while including non-users of social network and tackling the possible endogeneity problem of the usage of social network services.
Keywords: network social capital; social network services; instrumental variable approach; treatment effects model; technology acceptance model.
Enhancing the Performance of Service Discovery Protocol Using Minimum Spanning Tree
by Cynthia Jayapal, Senthil Jayavel, Vanitha V
Abstract: In a wireless sensor network, aggregation is either done to avoid the redundant transmissions. In service provisioning, the control packets sent for service advertisement and discovery contribute significantly to the network traffic. In this paper, it is proposed to aggregate the similar control packets sent from different sources to a common destination along with minimum spanning tree, which is constructed for service provisioning. The mobile agent migration schemes used in the literature have got overhead in finding the migration path. Therefore, the proposed approach uses the spanning tree constructed for service discovery, as the migration path for the mobile agents. It is found from the investigation that the aggregation scheme has reduced average energy spent by 33%, control overhead by 12% and average discovery delay by 25%. Use of mobile agents has reduced the average discovery delay by 22%, control overhead by 19% and service discovery success ratio by 4%.
Keywords: Control Message Aggregation; Ad Hoc Network; Mobile Agents; Service Discovery; Spanning Tree.
The Perspective of Information System Success with Social Interaction on Online Game Continuance: The Moderating Role of Gender, Age, and Play Frequency
by Shih-Chih Chen, Chih-Hung Wu, Chao-Wei Lai
Abstract: This study proposed a modified hypothetical model to investigate the influence among six dimensions, namely, system quality, game quality, privacy protection service, user satisfaction, benefits of social interaction, and continuance usage intention. Besides, this study included gender, age, and usage frequency as moderators in the proposed model. The results showed that system and game quality significantly influenced the satisfaction and benefits of social interaction on online game players, as well as their continuance intention toward online games. The modified D&M IS success model significantly predicted the intention of online game players to continue playing an online game product. In addition, high frequency online game players show the significantly stronger influence of system quality on benefits of social interaction than low frequency online game players. This study provided a better understanding of the relationship about the factors how to influence the online games continuance intention for academics and practitioners.
Keywords: Online Game; Modified DeLone and McLean Information System Success Model; System Quality; Game Quality; Privacy Protection Service.
The roles of motivation and media engagement in second-screen viewing experiences
by Cheng-yu Lin, Po-chien Chang
Abstract: Traditional TV viewing has been blended with the use of second-screen mobile devices. Increased engagement via mobile devices or applications has quickly become a new norm interacting with program-related information (e.g., following fan community or play related games) or chatting on social apps (e.g., Twitter) while watching television (TV). New features and behaviours are emerging that create challenges and opportunities for attracting advertising revenues and viewer attention in the second-screen environment. This study explored the antecedent and consequences of second-screen mobile phone use. Four categories, control, enrichment, sharing, and participation, were identified as second-screen TV viewing behaviours. An empirical model was developed by integrating audiences motivation, media engagement and second-screen behaviour. A response from 562 TV audience participants were collected and reveals that audience motivation for using a second screen is mainly affected by their engagement experiences, and further led to the corresponding usage behaviours. Mobile users, motivated by common interests and social sharing, are more engaged in online activities while watching TV programs. Second screen users are also obsessed with their social connectivity experiences rather than interactive features of TV programs. Theoretical and practical implications for effective second screen strategies are discussed.
Keywords: Second-Screen; Media engagement; Media-user behavior; Uses and Gratification; Media consumption.
MOBILE INFORMATION SECURITY MANAGEMENT FOR SMALL ORGANISATION TECHNOLOGY UPGRADES: THE POLICY-DRIVEN APPROACH AND THE EVOLVING IMPLEMENTATION APPROACH
by Martin Brodin, Jeremy Rose
Abstract: Information security management researchers are often focused on the information security policy, its implementation and evaluation as the primary means of ensuring that organisations protect their valuable data. However, information security is usually nested with a variety of other concerns (for instance technology upgrades, information access, efficiency and sustainability issues, employee satisfaction), so this policy-driven approach is seldom operated in isolation. We investigate the approach as implied in the mobile information security literature, provide a literature-inspired characterisation and use it to analyse an iPad implementation for politicians in a Swedish municipality. The analysis provides only a partial explanation for security work in this kind of small organisation technology upgrade, so we develop a complementary approach: the evolving implementation approach. A suggestion is made for how the two approaches can be reconciled, and implications for both practitioners and researchers derived.
Keywords: information management; mobile devices; implementation; device strategy; IS management.
A Provably Secure Pairing-free Anonymous Handover Authentication Protocol For Mobile Wireless Networks
by Sunday Ogundoyin
Abstract: To address the limitations in the existing anonymous handover authentication (AHA) protocols, we propose a novel certificateless-based public key cryptography (CL-PKC) AHA protocol using elliptic curve cryptography (ECC). The protocol can achieve all the security requirements of AHA protocol and provide countermeasure against privilege escalation. The beauty of our protocol is that it is autonomous, where nodes only need to contact the authentication server (AS) once for pseudonym set and thereafter they can renew their pseudonyms on their own. The formal protocol analysis shows that the protocol achieves mutual authentication and session key establishment. Moreover, we show that the protocol is secure in the random oracle model based on elliptic curve discrete logarithm assumption (DLA). The performance evaluation demonstrates that the proposed AHA protocol is very efficient in terms of computation cost and communication overhead than related protocols.
Keywords: Mobile Wireless Networks; Cryptography; Elliptic Curve Discrete Logarithm Assumption; Certificateless; Anonymous Handover Authentication; Autonomous.
A Scientometric Analysis on Mobile Recommender Systems
by Kasra Madadipouya, Liyana Shuib, Suraya Hamid
Abstract: With further advancements in technology, a new emerging topic called mobile recommender systems has gained tremendous momentum. The amount of research on mobile recommender systems can reflect the development of a variety of research topics such as mobile computing and context-aware systems. Hence, performing a scientometric mapping on this topic is needed. However, there is a lack of research in this area that aims to perform a detailed scientometric mapping. The objective of this study is to perform a scientometric mapping related to mobile recommender systems. We analysed publications between 2002 and 2017 indexed in Web of Science. The analysis maps the parameters of total output, the growth of output, authorship, major contributors, thematic trends and emerging topics in the field. Our study serves as a resource for future research by shedding light on how trends in mobile recommender systems research have evolved as well as providing insights into the current state of this field.
Keywords: recommender system; recommender system research; mobile recommendation system; context-aware recommender systems; scientometric analysis; scientometric mapping; scientometrics; mapping.
An Analysis on Market Reaction to Mobile Payment Adoption: Comparison between Financial and Non-financial Industry
by Hai-Yen Chang, Kuang-Hsun Shih, Yi-Hsien Wang, Li-Ju Chien
Abstract: With the rising popularity of financial technology, the use of mobile payments has become a mainstream payment tool option. With the arrival of the mobile payment era, in addition to facing huge business opportunities and potential interests, business owners are also pondering how to combine their own advantages to maximise the wealth of shareholders, which is an important issue worthy of attention. This study found that there was a significant abnormal return before the event date, suggesting that investors had inconsistent opinions. Positive opinions were mainly towards non-financial industry operators, while negative opinions were mainly towards financial
industry operators. This phenomenon may be due to investors holding different expectations for different mobile payment companies.
Keywords: mobile payment; FinTech; market reaction; quantile regression; GARCH.
The Adoption of NFC-based Mobile Payment Services: An Empirical Analysis of Apple Pay in China
by Xiaodie Pu, Felix T.S. Chan, Alain Yee-Loong Chong, Ben Niu
Abstract: With the growing trend of mobile services prevailing in every sphere of our daily life, near field communication (NFC) is at the forefront of transforming the existing payment experience through providing a unified, secure transaction channel which can serve as an alternative to smart cards. Taking the opportunity offered by the recent launch of Apple Pay in China, this research aims to investigate the determinants of the behavioural intention to adopt NFC-enabled mobile payment services. The proposed model extends the technology acceptance model (TAM) with consumer trust, service quality dimensions and prior experience of users. The model is tested using survey
collected from 166 iPhone users in China. Perceived usefulness and trust are identified as significant drivers of behavioural intention to use Apple Pay. Among all the service quality dimensions, reliability is identified the most important factor affecting behavioural intention through perceived usefulness, which reflects consumers emphasis for stable, error-free transaction experience. Structural assurances, calculative-based trust and confidentiality are also shown to have indirect positive influence on behavioural intention through paths on trust. Finally, the mediation effects of perceived usefulness and perceived ease of use are analysed.
Keywords: mobile payment; technology acceptance model; TAM; Apple Pay; near field communication; NFC.
The Glamorous World: How Instagram Use is related to Affluence Estimates, Materialism, and Self-esteem
by Yoori Hwang, Se-Hoon Jeong
Abstract: Based on cultivation theory, this study examined whether Instagram use is positively related to: 1) greater affluence estimates (i.e., estimates regarding the prevalence of affluence); 2) greater materialistic values, and ultimately; 3) lower self-esteem. Based on an online survey of 530 adults in Korea, this study found that Instagram use was positively related to affluence estimates and materialistic values. In addition, the results showed that Instagram use was indirectly related to lower self-esteem mediated by greater materialistic beliefs. Theoretical and practical implications of these findings are discussed.
Keywords: Instagram; cultivation theory; affluence; materialism; self-esteem.
User's Perceptions of Perceived Usefulness, Satisfaction, and Intentions of Mobile Application
by Lori Baker-Eveleth, Robert Stone
Abstract: Mobile applications (apps) have become ubiquitous in our daily lives. This research is focused on users' perceptions of mobile apps' usefulness and the influence they have on user satisfaction and intentions toward these mobile apps. The data was collected via a questionnaire, with 121 responses, by students enrolled in business courses at a medium-sized university in the United States. Using structural equation modeling, self-efficacy of mobile apps and two of the three perceived usefulness measures significantly influenced satisfaction. Mobile app use also facilitated information seeking and social relationships to influence perception of satisfaction with these apps. A discussion of these results and conclusions are also provided.
Keywords: mobile apps; perceived usefulness of mobile apps; behavioural intentions of mobile apps; satisfaction with mobile apps.