A User Study on the Adoption of Context-Aware Destination Mobile Applications
Authors: Shu-Lu Hsu, Fang-Yi Chu
Abstract:
With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.
Keywords: Mobile Application, Context-Aware, Privacy Concern, TAM.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1094189
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2102References:
[1] S. R. Gulliver, G. Ghinea, M. Patel, and T. A. Serif, "Context-aware tour guide: user implications,” Mobile Information Systems, vol. 3, no. 2, pp. 71-88, 2007.
[2] J. Chudalla, and K. Pousttchi, "City marketing goes mobile: use of mobile commerce techniques for city marketing,” in GASCÓ, M. and TORRES, T., Information Communication Technologies and City Marketing. Digital Opportunities for Cities around the World, Information Science Reference, Hershey, 2009.
[3] L. Barkuus, and A. Dey, "Location-based services for mobile telephony: a study of users’ privacy concern,” in Proceedings of the INTERACT 2003, 9th IFIP TC13 International Conference on Human-Computer Interaction, July 2003.
[4] F. D. Davis, "Perceived usefulness, perceived ease of use and user acceptance of information technologies,” MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989.
[5] R. D. Davis, R. P. Bagozzi, , and P. R. Warshaw, "User acceptance of computer technology: A comparison of two theoretical model,” Management Science, vol. 35, no.8, pp. 982-1003, 1989.
[6] R. P. Horton, T. Buck, P. E. Waterson, and C. W. Clegg, "Explaining intranet use with the technology acceptance model,” Journal of information technology, vol. 16, no.4, pp. 237-249, 2001.
[7] I. K. Lai, "Traveler acceptance of an app-based mobile tour guide,” Journal of Hospitality & Tourism Research, doi: 1096348013491596, 2013.
[8] D. Y. Kim, J. Park, and A. M. Morrison, "A model of traveller acceptance of mobile technology,” International Journal of Tourism Research, vol. 10, no.5, pp. 393-407, 2008.
[9] S. Hong, J. Y. L. Thong, and K.Y. Tam, "Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet,” Decision Support Systems, vol. 42, no.3, pp. 1819–1834, 2006.
[10] B. Brown, and M. Chalmers, "Tourism and mobile technology,” in Proceedings of the eighth conference on European Conference on Computer Supported Cooperative Work, pp. 335-354, Helsinki, Finland: Kluwer Academic Publishers, 2003.
[11] J. Rasinger, M. Fuchs, and W. Höpken, "Information search with mobile tourist guides: A survey of usage intention,” Information Technology & Tourism, vol. 9, pp. 3-4, pp. 3-4, 2007.
[12] P. Obrien, and J. Burmeister, "Ubiquitous travel service delivery,” Information Technology & Tourism, vol. 5, no.4, pp. 221-233, 2003.
[13] R. Kramer, M. Modsching, and K. T. Hagen, "Development and evaluation of a context-driven, mobile tourist guide,” International Journal of Pervasive Computing and Communications, vol. 3, no.4, pp. 378-399, 2007.
[14] T. Simcock, S. Hillenbrand, and B. Thomas, "Developing a location based tourist guide application. Conference in Research and Practice in Information Technology Series,” vol. 34, no. 21, in Proceedings of the Australasian information security workshop conference on ACSW frontiers, pp. 177-183, 2003.
[15] R. Want, A. Hopper, V. Falcao, and J. Gibbons, "The active badge location system,” ACM Transactions on Information System, vol. 10, no. 1, pp. 91-102, 1992.
[16] B. N. Schilit and M. M. Theimer, "Disseminating active map information to mobile hosts,” Network IEEE, vol. 8, no.5, pp. 22-32, 1994.
[17] N. S. Ryan, J. Pascoe, and D. R. Morse, "Enhanced reality fieldwork: the context-aware archaeological assistant,” Computer Applications in Archaeology, Tempus Reparatum, 1998.
[18] A. K. Dey, "Providing architectural support for building context-aware applications,” Doctoral dissertation, Georgia Institute of Technology, 2000.
[19] A. K. Dey, G. D. Abowd, and D. Salber, "A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications,” Human Computer Interaction, vol. 16, no.2, pp. 97-166, 2001.
[20] A. K. Dey, "Understanding and using context,” Personal and Ubiquitous Computing, 5(1), 4-7, 2001.
[21] K. Plank, and S. Figge, "The potentials of mobile commerce- an economics perspective,” Frankfurt am Main, 2005.
[22] S. Alqatan, D. Singh, and K. A Ahmad, "Theoretic Discussion of Tourism M-commerce,” Journal of Convergence Information Technology, vol. 6, no. 12, pp. 366-372, 2011.
[23] E. Snekkenes, "Concepts for personal location privacy policies,” in Proceedings of the 3rd ACM conference on Electronic Commerce, pp. 48-57, ACM, October 2001.
[24] C. Bisdikian, J. Christensen, J. Davis II, M. R. Ebling, G. Hunt, W. Jerome, ... and D. Sow, "Enabling location-based applications,” in Proceedings of the 1st international workshop on Mobile commerce, pp. 38-42, ACM, July 2001.
[25] K. Sheehan, "Toward a typology of Internet users and online privacy concerns,” The Information Society, vol. 18, pp. 21-32, 2002.
[26] H. Xu, C. Zhang, P. Shi, and P. Song, "Exploring the role of overt vs. covert personalization strategy in privacy calculus,” in Academy of Management Proceedings, pp. 1-6, Academy of Management, August 2009.
[27] H. Xu, H. H. Teo, B. C. Y. Tan, and R. Agarwal, "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-based Services,” Journal of Management Information Systems, vol. 26, no.3, pp. 135-174, 2010.
[28] M. S. Ackerman, L. F. Cranor, and J. Reagle, "Privacy in e-commerce: examining user scenarios and privacy preferences,” in Proceedings of the 1st ACM conference on Electronic commerce, pp. 1-8, ACM, November 1999.
[29] J. Turow, J. King, C. J. Hoofnatle, A. Bleakley, and M. Hennessy, "Americans reject tailored advertising and three activities that enable it,” Departmental Papers (ASC), pp. 137, 2009.
[30] I. A. Junglas, N. A. Johnson, and C. Spitzmüller, "Personality traits and concern for privacy: an empirical study in the context of location-based services,” European Journal of Information Systems, vol. 17, no. 4, pp. 387-402, 2008.
[31] J. C. Nunnally, Psychometric Theory, NY: McGraw-Hill, 1978.
[32] Foreseeing Innovative New Digiservices, "Observation on mobile internet in Taiwan: 2011 Q2,” Retrieve from: http://www.find.org.tw/ eng/news.asp?msgid=535&subjectid=4&pos=0, 2011.
[33] C. E. Werts, R. L. Linn, and K. G. Jöreskog, "Intraclass reliability estimates: testing structural assumptions,” Educational and Psychological Measurement, vol. 34, pp. 25-33, 1974.
[34] W. W. Chin, "The partial least squares approach for structural equation modeling,” in George A. Marcoulides (Ed.), Modern Methods for Business Research, Lawrence Erlbaum Associates, pp. 295-336, 1998)
[35] C. Fornell and D. F. Larcker, "Structural equation models with unobservable variables and measurement errors,” Journal of Marketing Research, 18(1), 39-50, 1981.
[36] A. K. Dey and J. Häkkilä, "Context-awareness and mobile devices,” User Interface Design and Evaluation for Mobile Technology, vol. 1, pp. 205-217, 2008.
[37] K. L. Hui, B. C. Y. Tan, and C. Y. Goh, "Online information disclosure: Motivators and measurements,” ACM Transactions on Internet Technology, vol. 6, no. 4, pp. 415–441, 2006.