724
Views
14
CrossRef citations to date
0
Altmetric
Articles

Study on initial adoption of advanced driver assistance system: integrated model of PMT and UTAUT 2

, &

References

  • Abdi, H. (2003). Partial least square regression (PLS regression). Encyclopedia for Research Methods for the Social Sciences, 6(4), 792–795.
  • Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14(3), 396–402.
  • Aziz, T., Horiguchi, Y., & Sawaragi, T. (2014). Towards understanding the development of driver's mental model of a Lane Departure Warning system while driving. Journal of Advanced Mechanical Design, Systems, and Manufacturing, 8(3), 1–12.
  • Bae, J. (2016). 2016 Deloitte global automobile customer survey. Deloitte Anjin Review, 8, 16–28.
  • Bilgihan, A., Kandampully, J., & Zhang, T. (2016). Towards a unified customer experience in online shopping environments. International Journal of Quality and Service Sciences, 8(1), 102–119.
  • Brookhuis, K. A., De Waard, D., & Janssen, W. H. (2001). Behavioural impacts of advanced driver assistance systems–an overview. European Journal of Transport and Infrastructure Research, 1(3), 245–253.
  • Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS Quarterly, 29(3), 399–426.
  • Chen, K. Y., & Yeh, C. F. (2017). Factors affecting adoption of smart meters in the post-Fukushima era in Taiwan: An extended protection motivation theory perspective. Behaviour and Information Technology, 36(9), 955–969.
  • Chiu, H. C., Hsieh, Y. C., & Kao, C. Y. (2005). Website quality and customer’s behavioural intention: An exploratory study of the role of information asymmetry. Total Quality Management & Business Excellence, 16(2), 185–197.
  • Chou, H. L., & Sun, J. C. Y. (2017). The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers. Computers and Education, 112, 83–96.
  • Cicchino, J. B. (2017). Effectiveness of forward collision warning and autonomous emergency braking systems in reducing front-to-rear crash rates. Accident Analysis & Prevention, 99, 142–152.
  • Crossler, R. E., Long, J. H., Loraas, T. M., & Trinkle, B. S. (2014). Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems, 28(1), 209–226.
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly: Management Information Systems, 13(3), 319–339.
  • Edwards, M., Nathanson, A., & Wisch, M. (2014). Estimate of potential benefit for Europe of fitting autonomous emergency braking (AEB) systems for pedestrian protection to passenger cars. Traffic Injury Prevention, 15(sup1), S173–S182.
  • Eichelberger, A. H., & Mccartt, A. T. (2016). Toyota drivers’ experiences with dynamic radar cruise control, pre-collision system, and lane-keeping assist. Journal of Safety Research, 56, 67–73.
  • European Commission. (2016). Advanced driver assistance systems. European Road Safety Observatory, 1–38.
  • Falk, R. F., & Miller, N. B. (1992). A primer for soft modeling. Akron, OH: University of Akron Press.
  • Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429.
  • Fong, L. H. N., Lam, L. W., & Law, R. (2017). How locus of control shapes intention to reuse mobile apps for making hotel reservations: Evidence from Chinese consumers. Tourism Management, 61, 331–342.
  • Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.
  • Gao, Y., Li, H., & Luo, Y. (2015). An empirical study of wearable technology acceptance in healthcare. Industrial Management & Data Systems, 115(9), 1704–1723.
  • Gefen, D., Straub, D., & Boudreau, M.-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(1), 7.
  • Geronimo, D., Lopez, A. M., Sappa, A. D., & Graf, T. (2010). Survey of pedestrian detection for advanced driver assistance systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(7), 1239–1258.
  • Goulao, A. P. B. A. (2014). E-Health individual adoption –empirical model based on UTAUT2 (Dissertation of Master). Retrieved from: https://run.unl.pt/handle/10362/13760?locale=en
  • Guo, X., Han, X., Zhang, X., Dang, Y., & Chen, C. (2015). Investigating m-health acceptance from a protection motivation theory perspective: Gender and age differences. Telemedicine and e-Health, 21(8), 661–669.
  • Herrero, Á, & San Martïn, H. (2017). Explaining the adoption of social networks sites for sharing user-generated content: A revision of the UTAUT2. Computers in Human Behavior, 71, 209–217.
  • Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95.
  • Jang, C., Kim, C., Jo, K., & Sunwoo, M. (2017). Design factor optimization of 3D flash lidar sensor based on geometrical model for automated vehicle and advanced driver assistance system applications. International Journal of Automotive Technology, 18(1), 147–156.
  • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(SPEC. ISSUE 3), 549–566.
  • Lee, J., Choi, J., Yi, K., Shin, M., & Ko, B. (2014). Lane-keeping assistance control algorithm using differential braking to prevent unintended lane departures. Control Engineering Practice, 23, 1–13.
  • Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly: Management Information Systems, 33(1), 71–90.
  • Macedo, I. M. (2017). Predicting the acceptance and use of information and communication technology by older adults: An empirical examination of the revised UTAUT2. Computers in Human Behavior, 75, 935–948.
  • Maddux, J. E. (1993). Social cognitive models of health and exercise behavior: An introduction and review of conceptual issues. Journal of Applied Sport Psychology, 5(2), 116–140.
  • Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469–479.
  • Madigan, R., Louw, T., Dziennus, M., Graindorge, T., Ortega, E., Graindorge, M., & Merat, N. (2016). Acceptance of automated road transport systems (ARTS): an adaptation of the UTAUT model. Transportation Research Procedia, 14, 2217–2226.
  • Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and Intervention in health-related behavior: A meta-Analytic Review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106–143.
  • Moghavvemi, S., Paramanathan, T., Rahin, N. M., & Sharabati, M. (2017). Student’s perceptions towards using e-learning via Facebook. Behaviour and Information Technology, 36(10), 1081–1100.
  • Robertson, R. D., Meister, S. R., Vanlaar, W. G. M., & Mainegra Hing, M. (2017). Automated vehicles and behavioural adaptation in Canada. Transportation Research Part A: Policy and Practice, 104, 50–57.
  • Rödel, C., Stadler, S., Meschtscherjakov, A., & Tscheligi, M. (2014, September). Towards autonomous cars: The effect of autonomy levels on acceptance and user experience. In Proceedings of the 6th international conference on automotive user interfaces and interactive vehicular applications (pp. 1–8). Seattle, WA: ACM.
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93–114.
  • Soualmi, B., Sentouh, C., Popieul, J., & Debernard, S. (2014). Automation-driver cooperative driving in presence of undetected obstacles. Control Engineering Practice, 24, 106–119.
  • Sun, Y., Wang, N., Guo, X., & Peng, Z. (2013). Understanding the acceptance of mobile health services: A comparison and integration of alternative models. Journal of Electronic Commerce Research, 14(2), 183–200.
  • Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly: Management Information Systems, 15(1), 125–142.
  • Tulloch, H., Reida, R., D’angeloa, M. S., Plotnikoff, R. C., Morrina, L., Beatona, L., … Pipe, A. (2009). Predicting short and long-term exercise intentions and behaviour in patients with coronary artery disease: A test of protection motivation theory. Psychology and Health, 24(3), 255–269.
  • Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198.
  • Van Der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 695–704.
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly: Management Information Systems, 27(3), 425–478.
  • Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly: Management Information Systems, 36(1), 157–178.
  • Wang, G., Liu, Q., & Wu, Q. (2016). Far-infrared pedestrian detection for advanced driver assistance systems using scene context. Optical Engineering, 55(4), 043105–043105.
  • Woon, I. M. Y., Tan, G. W., & Low, R. T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers (367–380).
  • Wu, S. H., Huang, C. T., & Chen, Y. F. (2015). Leisure-service quality and hedonic experiences: Singing at a Karaoke house as a form of theatre. Total Quality Management & Business Excellence, 26(3-4), 297–311.
  • Xu, X. (2014). Understanding users’ continued use of online games: An application of UTAUT2 in social network games. MMEDIA 2014. In Proceedings of the sixth international conferences on advances in multimedia (pp. 58–65). Nice: IARIA.
  • Yuan, S., Ma, W., Kanthawala, S., & Peng, W. (2015). Keep using my health apps: Discover users’ perception of health and fitness apps with the UTAUT2 model. Telemedicine and e-Health, 21(9), 735–741.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.