1,474
Views
4
CrossRef citations to date
0
Altmetric
Articles

Challenges in times of a pandemic: what drives and hinders the adoption of location-based applications?

& ORCID Icon
Pages 438-457 | Received 13 Jul 2020, Accepted 08 Mar 2021, Published online: 29 Mar 2021

References

  • Abdullah, F., & Ward, R. (2016). Developing a General Extended Technology Acceptance Model for E-Learning (GETAMEL) by analysing commonly used external factors. Computers in Human Behavior, 56, 238–256. https://doi.org/10.1016/j.chb.2015.11.036
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T
  • Ajzen, I. (2002). Constructing a TPB questionnaire: Conceptual and methodological considerations. https://bit.ly/2pErhPf
  • Alalwan, A. A., Baabdullah, A. M., Rana, N. P., Tamilmani, K., & Dwivedi, Y. K. (2018). Examining adoption of mobile internet in Saudi Arabia: Extending TAM with perceived enjoyment, innovativeness and trust. Technology in Society, 55, 100–110. https://doi.org/10.1016/j.techsoc.2018.06.007
  • Amnesty International. (2020). Joint statement: States use of digital surveillance technologies to fight pandemic must respect human rights. Retrieved May 10, 2020, from https://www.amnesty.org/en/documents/pol30/2081/2020/en/
  • Armitage, C. J., & Conner, M. (2001). Efficacy of the theory of planned behaviour: A meta‐analytic review. British Journal of Social Psychology, 40(4), 471–499. https://doi.org/10.1348/014466601164939
  • Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122–147. https://doi.org/10.1037/0003-066X.37.2.122
  • Bandura, A. (1997). Self-efficacy: The exercise of Control. W.H. Freeman.
  • Chang, C. W., & Chen, G. M. (2014). College students’ disclosure of location-related information on Facebook. Computers in Human Behavior, 35, 33–38. https://doi.org/10.1016/j.chb.2014.02.028
  • Chenoweth, T., Minch, R., & Gattiker, T. (2009, January). 2009 42nd Hawaii International Conference on System Sciences, Application of protection motivation theory to adoption of protective technologies (pp. 1–10). IEEE.
  • Cheon, J., Lee, S., Crooks, S. M., & Song, J. (2012). An investigation of mobile learning readiness in higher education based on the theory of planned behavior. Computers & Education, 59(3), 1054–1064. https://doi.org/10.1016/j.compedu.2012.04.015
  • Cheung, R., & Vogel, D. (2013). Predicting user acceptance of collaborative technologies: An extension of the technology acceptance model for e-learning. Computers & Education, 63, 160–175. https://doi.org/10.1016/j.compedu.2012.12.003
  • Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295–336.
  • Chin, W. W. (2010). How to write up and report PLS analyses. In V. Esposito Vinzi, W. W. Chin, J. Henseler, & H. Wang (Eds.), Handbook of partial least squares: Concepts, methods and applications (pp. 655–690). Springer Handbooks of Computational Statistics.
  • Chiu, C. M., & Wang, E. T. (2008). Understanding Web-based learning continuance intention: The role of subjective task value. Information & Management, 45(3), 194–201. https://doi.org/10.1016/j.im.2008.02.003
  • Crossler, R. E. (2010, January). Protection motivation theory: Understanding determinants to backing up personal data [Paper presentation]. 2010 43rd Hawaii International Conference on System Sciences (pp. 1–10). IEEE. https://doi.org/10.1109/HICSS.2010.311
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
  • Dijkstra, T. K., & Henseler, J. (2015). Consistent partial least squares path modeling. MIS Quarterly, 3(2), 297–316.
  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422. https://doi.org/10.1080/01449290410001715723
  • Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Addison-Wesley.
  • Fodor, M., & Brem, A. (2015). Do privacy concerns matter for Millennials? Results from an empirical analysis of location-based services adoption in Germany. Computers in Human Behavior, 53, 344–353. https://doi.org/10.1016/j.chb.2015.06.048
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/10.1177/002224378101800104
  • Ha, S., & Stoel, L. (2009). Consumer e-shopping acceptance: Antecedents in a technology acceptance model. Journal of Business Research, 62(5), 565–571. https://doi.org/10.1016/j.jbusres.2008.06.016
  • Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 18 (2), 139–152.
  • Henseler, J., Hubona, G., & Ray, P. A. (2016). Using PLS path modeling in new technology research: Updated guidelines. Industrial Management & Data Systems, 116 (1), 2–20. https://doi.org/10.1108/IMDS-09-2015-0382
  • Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43 (1), 115–135. https://doi.org/10.1007/s11747-014-0403-8
  • Hsu, M. H., & Chiu, C. M. (2004). Internet self-efficacy and electronic service acceptance. Decision Support Systems, 38(3), 369–381. https://doi.org/10.1016/j.dss.2003.08.001
  • Kang, J. Y. M., Mun, J. M., & Johnson, K. K. (2015). In-store mobile usage: Downloading and usage intention toward mobile location-based retail apps. Computers in Human Behavior, 46, 210–217. https://doi.org/10.1016/j.chb.2015.01.012
  • Keith, M. J., Babb, J. S., Jr., Furner, C. P., & Abdullat, A. (2011, January). The role of mobile self-efficacy in the adoption of location-based applications: An iPhone experiment. In 2011 44th Hawaii International Conference on System Sciences (pp. 1–10). IEEE.
  • Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163–1173. https://doi.org/10.1016/j.ijhcs.2013.08.016
  • Koohikamali, M., Gerhart, N., & Mousavizadeh, M. (2015). Location disclosure on LB-SNAs: The role of incentives on sharing behavior. Decision Support Systems, 71, 78–87. https://doi.org/10.1016/j.dss.2015.01.008
  • Korzaan, M. L., & Boswell, K. T. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48(4), 15–24.
  • LaRose, R., & Rifon, N. J. (2007). Promoting i‐safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs, 41(1), 127–149. https://doi.org/10.1111/j.1745-6606.2006.00071.x
  • LaRose, R., Rifon, N., Liu, S., & Lee, D. (2005, May). Understanding online safety behavior: A multivariate model. In the 55th Annual Conference of the International Communication Association, New York city.
  • Lee, D., Larose, R., & Rifon, N. (2008). Keeping our network safe: A model of online protection behaviour. Behaviour & Information Technology, 27(5), 445–454. https://doi.org/10.1080/01449290600879344
  • Liébana-Cabanillas, F., Ramos de Luna, I., & Montoro-Ríos, F. (2017). Intention to use new mobile payment systems: A comparative analysis of SMS and NFC payments. Economic research-Ekonomska Istraživanja, 30(1), 892–910. https://doi.org/10.1080/1331677X.2017.1305784
  • Lohmöller, J. B. (1989). Latent variable path modeling with partial least squares. Physica-Verlag.
  • Lu, Y., Zhou, T., & Wang, B. (2009). Exploring Chinese users’ acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory. Computers in Human Behavior, 25(1), 29–39. https://doi.org/10.1016/j.chb.2008.06.002
  • Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469–479. https://doi.org/10.1016/0022-1031(83)90023-9
  • Malhotra, Y., & Galletta, D. (2005). A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information Systems, 22(1), 117–151. https://doi.org/10.1080/07421222.2003.11045840
  • Marakas, G., Johnson, R., & Clay, P. F. (2007). The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8(1), 16–46. https://doi.org/10.17705/1jais.00112
  • Min, S., So, K. K. F., & Jeong, M. (2019). Consumer adoption of the Uber mobile application: Insights from diffusion of innovation theory and technology acceptance model. Journal of Travel & Tourism Marketing, 36(7), 770–783. https://doi.org/10.1080/10548408.2018.1507866
  • Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. https://doi.org/10.1016/j.chb.2012.07.008
  • Muñoz, F. L., Hernandez-Mendez, J., & Sanchez-Fernandez, J. (2012). Generalising user behavior in online travel sites through the travel 2.0 website acceptance model. Online Information Review, 36, 879–902.
  • Natarajan, T., Balasubramanian, S. A., & Kasilingam, D. L. (2017). Understanding the intention to use mobile shopping applications and its influence on price sensitivity. Journal of Retailing and Consumer Services, 37, 8–22. https://doi.org/10.1016/j.jretconser.2017.02.010
  • Pipitwanichakarn, T., & Wongtada, N. (2019). Leveraging the technology acceptance model for mobile commerce adoption under distinct stages of adoption. Asia Pacific Journal of Marketing and Logistics. https://doi.org/10.1108/APJML-10-2018-0448
  • Rafique, H.,Almagrabi, A. O.,Shamim, A.,Anwar, F., &Bashir, A. K. (2020). Investigating the Acceptance of Mobile Library Applications with an Extended Technology Acceptance Model (TAM). Computers & Education, 145, 103732. https://doi.org/10.1016/j.compedu.2019.103732
  • Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. SmartPLS GmbH. http://www.smartpls.com
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
  • Salimon, M., Bamgbade, J., Nathaniel, A., & Adekunle, T. (2017). Integrating technology acceptance model and organizational innovativeness in the adoption of mobile commerce. Management Science Letters, 7(10), 497–512.
  • Schepers, J., & Wetzels, M. (2007). A meta-analysis of the technology acceptance model: Investigating subjective norm and moderation effects. Information & Management, 44(1), 90–103. https://doi.org/10.1016/j.im.2006.10.007
  • Scherer, R., Siddiq, F., & Tondeur, J. (2019). The technology acceptance model (TAM): A meta-analytic structural equation modeling approach to explaining teachers’ adoption of digital technology in education. Computers & Education, 128, 13–35. https://doi.org/10.1016/j.compedu.2018.09.009
  • Shen, G. C. C. (2015). Users' adoption of mobile applications: Product type and message framing's moderating effect. Journal of Business Research, 68(11), 2317–2321. https://doi.org/10.1016/j.jbusres.2015.06.018
  • Shimonski, R. (2015). Cyber reconnaissance, surveillance and defense. Syngress.
  • Shin, D. H. (2009). Towards an understanding of the consumer acceptance of mobile wallet. Computers in Human Behavior, 25(6), 1343–1354. https://doi.org/10.1016/j.chb.2009.06.001
  • Statista. (2014). The App Date. Retrieved September 1, 2020, from https://es.statista.com/estadisticas/493850/edad-del-perfil-de-usuario-de-smartphone-en-espana-2014/
  • Statista. (2020a). Global smartphone penetration rate as share of population from 2016 to 2020. Retrieved May 10, 2020, from https://www.statista.com/statistics/203734/global-smartphone-penetration-per-capita-since-2005/
  • Statista. (2020b). Smartphone ownership rate by country 2018. Retrieved May 10, 2020, from https://www.statista.com/statistics/539395/smartphone-penetration-worldwide-by-country/
  • Šumak, B., Heričko, M., & Pušnik, M. (2011). A meta-analysis of e-learning technology acceptance: The role of user types and e-learning technology types. Computers in Human Behavior, 27(6), 2067–2077. https://doi.org/10.1016/j.chb.2011.08.005
  • Tsai, J., Kelley, P. G., Cranor, L. F., & Sadeh, N. (2009). Location-sharing technologies: Privacy risks and controls. In Proceedings of the 37th Research Conference on Communication, Information, and Internet, Arlington, VA.
  • van Bavel, R., Rodríguez-Priego, N., Vila, J., & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies, 123, 29–39. https://doi.org/10.1016/j.ijhcs.2018.11.003
  • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. https://doi.org/10.1287/mnsc.46.2.186.11926
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
  • Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531–542. https://doi.org/10.1016/j.ijinfomgt.2016.03.003
  • Witte, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education & Behavior, 27(5), 591–615. https://doi.org/10.1177/109019810002700506
  • Wottrich, V. M., van Reijmersdal, E. A., & Smit, E. G. (2019). App users unwittingly in the spotlight: A model of privacy protection in mobile apps. Journal of Consumer Affairs, 53(3), 1056–1083. https://doi.org/10.1111/joca.12218
  • Woon, I., Tan, G. W., Low, R. (2005). A protection motivation theory approach to home wireless security. ICIS 2005 Proceedings, 31.
  • Wu, B., & Chen, X. (2017). Continuance intention to use MOOCs: Integrating the technology acceptance model (TAM) and task technology fit (TTF) model. Computers in Human Behavior, 67, 221–232. https://doi.org/10.1016/j.chb.2016.10.028
  • Xiong, J., Qureshi, S., Najjar, L. (2013). Factors that affect information and communication technology adoption by small businesses in China. Information Systems and Quantitative Analysis Faculty Proceedings & Presentations, 46.
  • Xu, F., Huang, S. S., & Li, S. (2019). Time, money, or convenience: What determines Chinese consumers’ continuance usage intention and behavior of using tourism mobile apps? International Journal of Culture, Tourism and Hospitality Research, 13(3), 288–302. https://doi.org/10.1108/IJCTHR-04-2018-0052
  • Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135–174. https://doi.org/10.2753/MIS0742-1222260305
  • Yiu, C. S., Grant, K., & Edgar, D. (2007). Factors affecting the adoption of Internet Banking in Hong Kong – Implications for the banking sector. International Journal of Information Management, 27(5), 336–351. https://doi.org/10.1016/j.ijinfomgt.2007.03.002
  • Youn, S. (2005). Teenagers' Perceptions of Online Privacy and Coping Behaviors: A Risk–Benefit Appraisal Approach. Journal of Broadcasting & Electronic Media, 49(1), 86–110. https://doi.org/10.1207/s15506878jobem4901_6
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
  • Zhang, L., & McDowell, W. C. (2009). Am I really at risk? Determinants of online users' intentions to use strong passwords. Journal of Internet Commerce, 8(3-4), 180–197. https://doi.org/10.1080/15332860903467508
  • Zhou, T. (2012). Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. Journal of Electronic Commerce Research, 13(2), 135.