[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Identifying factors influencing consumers' intent to install mobile applications

Published: 01 June 2016 Publication History

Abstract

We survey and assess undergraduate students regarding smartphone and tablet usage.We assess factors that influence consumers to install mobile apps.Few previous studies have investigated factors that influence consumers intention to install mobile apps.Perceived security familiarity are significant factors that influence consumers intention to install mobile apps.Results show that consumers that perceive more security have greater trust and reduced perceived risk. The purpose of this research is to explore the factors that influence a consumer before installing a mobile application. A research model is created based on perceived risk, trust, perceived benefit, and intent to install. Seven antecedents of trust and risk include perceived security, perceived reputation, application characteristics, familiarity, desensitization, consumer disposition to trust, and consumer disposition to risk. Partial least squares (PLS) is used to test the research model. Only significant antecedents are retained and a new research model is created, which includes the antecedents of perceived security and familiarity. Results show that consumers that perceive more security have greater trust and reduced perceived risk. Furthermore, consumers that feel more familiar with finding, purchasing, downloading, and installing applications have greater trust and reduced perceived risk. More than half (R2=.505) of the variability in the intention to install an app is explained.

References

[1]
M. Aghekyan-Simonian, S.K. Forsythe, V. Chattaraman, The role of product brand image and online store image on perceived risks and online purchase intentions for apparel, Journal of Retailing and Consumer Services, 19 (2012) 325-331.
[2]
I. Ajzen, The theory of planned behavior, Organizational Behavior and Human Decision Processes (1991) 179-211.
[3]
M. Al-Debei, E. Al-Lozi, Explaining and predicting the adoption intention of mobile data services: A value-based approach, Computers in Human Behavior, 35 (2014) 326-338.
[4]
Android Authority, . http://www.androidauthority.com/google-play-store-vs-the-apple-app-store-601836/
[5]
G. Bansal, F. Zahedi, Trust-discount tradeoff in three contexts: frugality moderating privacy and security concerns, Journal of Computer Information Systems (2014) 13-29.
[6]
F. Belanger, L. Carter, Trust and risk in e-government adoption, Journal of Strategic Information Systems, 17 (2008).
[7]
K. Callum, L. Jeffrey, Kinshuk, Comparing the role of ICT literacy and anxiety in the adoption of mobile learning, Computers in Human Behavior, 39 (2014) 8-19.
[8]
M. Chang, W. Wu, Revisiting perceived risk in the context of online shopping: an alternative perspective of decision-making styles, Psychology & Marketing, 29 (2012) 378-400.
[9]
Y. Chen, X. Yan, M. Gordon, The joint moderating role of trust propensity and gender on consumers' online shopping behavior, Computers in Human Behavior, 43 (2015) 272-283.
[10]
C. Chen, Perceived risk, usage frequency of mobile banking services, Managing Service Quality, 23 (2013) 410-436.
[11]
H. Chemingui, H. Ben lallouna, Resistance, motivations, trust and intention to use mobile financial services, International Journal of Bank Marketing, 31 (2013) 574-592.
[12]
W.W. Chin, Issues and opinion on structural equation modeling, MIS Quarterly, 22 (1998) 7-16.
[13]
W.W. Chin, The partial least squares approach to stuctural equation modeling, in: The partial least squares approach to stuctural equation modeling, Lawrence Eribaum Association, London, UK, 1998.
[14]
F. Davis, Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quarterly, 13 (1989) 319-340.
[15]
Z. Deng, X. Mo, S. Liu, Comparison of the middle-aged and older users' adoption of mobile health services in China, International Journal of Medical Informatics, 83 (2014) 210-224.
[16]
M. Fishbein, I. Ajzen, Belief, attitude, intention, and behavior: an introduction to theory and research, Addison-Wesley, 1975.
[17]
S. Forsythe, B. Shi, Consumer patronage and risk perceptions in internet shopping, Journal of Business Research, 56 (2003) 867-875.
[18]
D. Gefen, E-commerce: the role of familiarity and trust, Omega, 28 (2000) 725-737.
[19]
Google, . http://developer.android.com/guide/topics/manifest/manifest-intro.html#perms
[20]
G. Jiang, L. Peng, R. Liu, Research on the factors influencing mobile game adoption in China, Proceedings of 4th international conference on logistics, informatics and service science, 5 (2015) 1297-1302.
[21]
Harris, Mark, A., Brookshire, R., Patten, K., Regan, B. Mobile application installation influences: have mobile device users become desensitized to excessive permission requests? Proceedings of the twentieth Americas conference on information systems (AMCIS 2015). Fajardo, Puerto Rico, August 13-15, 2015.
[22]
Mark A. Harris, S. Furnell, K. Patten, Comparing the mobile device security behavior of college students and information technology professionals, Journal of Information Privacy and Security, 10 (2014) 186-202.
[23]
J. Hew, V. Lee, What catalyses mobile apps usage intention: an empirical analysis, Industrial Management & Data, 115 (2015) 1269-1291.
[24]
I. Hong, Understanding the consumer's online merchant selection process: the roles of product involvement, perceived risk, and trust expectation, International Journal of Information Management, 35 (2015) 322-336.
[25]
I. Hong, H. Cha, The mediating role of consumer trust in an online merchant in predicting purchase intention, International Journal of Information Management, 33 (2013) 927-939.
[26]
M. Hsu, C. Chang, L. Chuang, Understanding the determinants of online repeat purchase intention and moderating role of habit: the case of online group-buying in Taiwan, International Journal of Information Management (2015) 35.
[27]
B. Jones, A.G. Chin, On the efficacy of smartphone security: a critical analysis of modifications in business students' practices over time, International Journal of Information Management, 35 (2016) 561-571. http://dx.doi.org/10.1016/j.ijinfomgt.2015.06.003
[28]
D. Kim, D. Ferrin, R. Rao, A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents, Decision Support Systems, 44 (2008) 544-564.
[29]
S. Kim, D. Yoon, Antecedents of mobile app usage among smartphone users, in: American Academy of Advertising Conference Proceedings, 2013, pp. 72-83.
[30]
K. Kwahk, J. Park, Investigating the determinants of purchase intention in C2C e-commerce, World Academy of Science, Engineering and Technology, 6 (2012) 487-491.
[31]
M. Lee, Factors influencing the adoption of internet banking: an integration of TAM, Electronic Commerce Research and Applications, 8 (2009) 130-241.
[32]
C. Liao, C. Liu, K. Chen, Examining the impact of privacy: trust and risk perceptions beyond monetary transactions: an integrated model, Electronic Commerce Research and Applications, 10 (2011) 702-715.
[33]
Y. Lu, S. Yang, P. Chau, Y. Cao, Dynamics between the trust transfer process and intention to use mobile payment services: a cross-environment perspective, Information & Management, 48 (2011) 393-403.
[34]
McAfee, . http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2015.pdf
[35]
P. Pavlou, Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model, International Journal of Electronic Commerce, 7 (2003) 69-103.
[36]
P. Pavlou, D. Gefen, Building effective online marketplaces with institution-based trust, Information Systems Research, 15 (2004) 37-59.
[37]
J.P. Peter, L.X. Tarpey, A comparative analysis of three consumer decision strategies, Journal of Consumer Research (1975) 29-37.
[38]
S. Pi, H. Liao, H. Chen, Factors that affect consumers' trust and continuous adoption of online financial services, International Journal of Business and Management, 7 (2012) 108-119.
[39]
C. Preston, A. Colman, Optimal number of response categories in rating scales: reliability, validity, discriminating power, and respondent preferences, Acta Psychologica, 104 (2000) 1-15.
[40]
J. Roca, J. Garcia, J. de la Vega, The importance of perceived trust, security and privacy in online trading systems, Information Management & Computer Security, 17 (2009) 96-113.
[41]
SC Magazine, . http://www.scmagazine.com/mobile-app-study-reveals-privacy-concerns/article/371312/
[42]
G. Shen, Users' adoption of mobile applications: product type and message framing's moderating effect, Journal of Business Research, 68 (2015) 2317-2321.
[43]
D. Shin, Towards an understanding of the consumer acceptance of mobile wallet, Computers in Human Behavior, 25 (2009) 1343-1354.
[44]
J. Shin, K. Chung, J. Oh, C. Lee, The effect of site quality on repurchase intention in internet shopping through mediating variables: the case of university students in South Korea, International Journal of Information Management, 33 (2013) 453-463.
[45]
Statista, . http://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/
[46]
Statista, . http://www.statista.com/statistics/263794/number-of-downloads-from-the-apple-app-store/
[47]
D. Taylor, T. Voelker, I. Pentina, Mobile application adoption by young adults: a social network perspective, International Journal of Mobile Marketing, 6 (2011) 60-70.
[48]
S. Taylor, P. Todd, Understanding information technology usage: a test of competing models, Information Systems Research, 6 (1995) 144-176.
[49]
V. Venkatesh, M. Morris, G. Davis, F. Davis, User acceptance of information technology, MIS Quarterly, 27 (2003) 425-478.
[50]
Y. Wang, V. Wiegerinck, H. Krikke, H. Zhang, Understanding the purchase intention towards remanufactured product in closed-loop supply chains, International Journal of Physical Distribution & Logistics Management, 43 (2013).
[51]
M. Warkentin, D. Gefen, P. Pavlou, G. Rose, Encouraging citizen adoption of e-government by building trust, Electronic Markets, 12 (2002) 157-162.
[52]
H. Yang, Bon appetit for apps: young American consumers' acceptance of mobile applications, Journal of Computer Information Systems (2013) 85-96.
[53]
T. Zhou, An empirical examination of continuance intention of mobile payment services, Decision Support Systems, 54 (2013) 1085-1091.
[54]
T. Zhou, The effect of initial trust on user adoption of mobile payment, Information Development, 27 (2011) 290-300.

Cited By

View all
  • (2024)The Impact of Data Privacy on Users' Smartphone App Adoption DecisionsProceedings of the ACM on Human-Computer Interaction10.1145/36765258:MHCI(1-23)Online publication date: 24-Sep-2024
  • (2024)Identification of human values from goal modelsProceedings of the 2024 IEEE/ACM 17th International Conference on Cooperative and Human Aspects of Software Engineering10.1145/3641822.3641879(24-35)Online publication date: 14-Apr-2024
  • (2024)FakeX: A Framework for Detecting Fake Reviews of Browser ExtensionsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3656999(769-784)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Information Management: The Journal for Information Professionals
International Journal of Information Management: The Journal for Information Professionals  Volume 36, Issue 3
June 2016
256 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 June 2016

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Impact of Data Privacy on Users' Smartphone App Adoption DecisionsProceedings of the ACM on Human-Computer Interaction10.1145/36765258:MHCI(1-23)Online publication date: 24-Sep-2024
  • (2024)Identification of human values from goal modelsProceedings of the 2024 IEEE/ACM 17th International Conference on Cooperative and Human Aspects of Software Engineering10.1145/3641822.3641879(24-35)Online publication date: 14-Apr-2024
  • (2024)FakeX: A Framework for Detecting Fake Reviews of Browser ExtensionsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3656999(769-784)Online publication date: 1-Jul-2024
  • (2023)Heterogeneous User Responses to Privacy Risks in Mobile Apps: Understanding the Dualistic Role of Privacy Risk PerceptionsProceedings of the 25th International Conference on Mobile Human-Computer Interaction10.1145/3565066.3608694(1-7)Online publication date: 26-Sep-2023
  • (2023)Why people choose AppsInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2022.102965170:COnline publication date: 1-Feb-2023
  • (2023)Integrating human values in software development using a human values dashboardEmpirical Software Engineering10.1007/s10664-023-10305-y28:3Online publication date: 18-Apr-2023
  • (2023)Trust modeling in a distributed collaborative environment: application to a collaborative healthcare systemInternational Journal of Information Security10.1007/s10207-023-00707-w22:6(1585-1604)Online publication date: 6-Jun-2023
  • (2022)Internet of Things BackgroundMobile Information Systems10.1155/2022/48463722022Online publication date: 1-Jan-2022
  • (2022)Human values in software development artefactsInformation and Software Technology10.1016/j.infsof.2021.106731141:COnline publication date: 1-Jan-2022
  • (2022)Intention to use smartwatch health applicationsInformation and Management10.1016/j.im.2022.10368759:6Online publication date: 1-Sep-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media