Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors

Location-based services (LBS) can present the personalized information and services to users based on their positions and contexts. This may improve users’ experience and bring a positive utility to them. However, their privacy concern may be aroused and perceived risk be increased because LBS need to utilize their location information. From a dual perspective of enablers and inhibitors, this research examined the factors affecting user adoption of LBS. Enablers include perceived usefulness and trust, whereas the inhibitor is privacy risk. The results indicate that contextual offering is the main factor affecting trust, whereas ubiquitous connection is the main factor affecting perceived usefulness. Privacy concern affects privacy risk. Trust has significant effects on perceived usefulness and privacy risk. And these three factors predict user adoption and usage behavior.

[1]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[2]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[3]  Richard T. Watson,et al.  Location-based services , 2008, CACM.

[4]  Kaan Varnali,et al.  obile marketing research : The-state-ofthe-art , 2009 .

[5]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[6]  Bongsik Shin,et al.  Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes , 2010, Inf. Syst. Frontiers.

[7]  Mary Beth Rosson,et al.  The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..

[8]  Shalini Chandra,et al.  of the Association , 2018 .

[9]  Mary Ann Eastlick,et al.  Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment , 2006 .

[10]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[11]  Richard D. Holowczak,et al.  Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls , 2008, Decis. Support Syst..

[12]  Dong Hee Shin,et al.  Understanding User Acceptance of DMB in South Korea Using the Modified Technology Acceptance Model , 2009, Int. J. Hum. Comput. Interact..

[13]  Keng Siau,et al.  An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns , 2008, J. Assoc. Inf. Syst..

[14]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[15]  Ying-Feng Kuo,et al.  Towards an understanding of the behavioral intention to use 3G mobile value-added services , 2009, Comput. Hum. Behav..

[16]  Guohua Wu,et al.  The effects of Web assurance seals on consumers' initial trust in an online vendor: A functional perspective , 2010, Decis. Support Syst..

[17]  Jason Bennett Thatcher,et al.  The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems , 2011, IEEE Transactions on Engineering Management.

[18]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[19]  Minna Pura Linking perceived value and loyalty in location‐based mobile services , 2005 .

[20]  B. Byrne Structural Equation Modeling with LISREL, PRELIS, and SIMPLIS: Basic Concepts, Applications, and Programming , 1998 .

[21]  Matti Rossi,et al.  The impact of use context on mobile services acceptance: The case of mobile ticketing , 2009, Inf. Manag..

[22]  Niina Mallat,et al.  Exploring consumer adoption of mobile payments - A qualitative study , 2007, J. Strateg. Inf. Syst..

[23]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[24]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[25]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[26]  ThaeMin Lee,et al.  THE IMPACT OF PERCEPTIONS OF INTERACTIVITY ON CUSTOMER TRUST AND TRANSACTION INTENTIONS IN MOBILE COMMERCE , 2005 .

[27]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[28]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[29]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[30]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[31]  Sonja Wiley-Patton,et al.  Consumer adoption of mobile TV: Examining psychological flow and media content , 2009, Comput. Hum. Behav..

[32]  Hsi-Peng Lu,et al.  Factors affecting purchase intention on mobile shopping web sites , 2009, Internet Res..

[33]  Gi Mun Kim,et al.  Understanding dynamics between initial trust and usage intentions of mobile banking , 2009, Inf. Syst. J..

[34]  In Lee,et al.  An empirical examination of factors influencing the intention to use mobile payment , 2010, Comput. Hum. Behav..

[35]  Kar Yan Tam,et al.  The Effects of Post-Adoption Beliefs on the Expectation-Confirmation Model for Information Technology Continuance , 2006, Int. J. Hum. Comput. Stud..

[36]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[37]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[38]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[39]  Sung S. Kim,et al.  Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services , 2009, MIS Q..

[40]  Jinwoo Kim,et al.  Culture-Technology Fit: Effects of Cultural Characteristics on the Post-Adoption Beliefs of Mobile Internet Users , 2007, Int. J. Electron. Commer..

[41]  Xin Luo,et al.  Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services , 2010, Decis. Support Syst..

[42]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[43]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[44]  B. Byrne Book Review: Structural Equation Modeling with EQS and EQS/Windows: Basic Concepts, Applications, and Programming , 1994 .

[45]  Detmar W. Straub,et al.  Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture , 2008, J. Manag. Inf. Syst..

[46]  Bernd W. Wirtz,et al.  Understanding consumer acceptance of mobile payment services: An empirical analysis , 2010, Electron. Commer. Res. Appl..

[47]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[48]  Naresh K. Malhotra,et al.  Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..

[49]  Joon Koh,et al.  A Comparison of Online Trust Building Factors between Potential Customers and Repeat Customers , 2004, J. Assoc. Inf. Syst..

[50]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[51]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[52]  H. Raghav Rao,et al.  A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..

[53]  Zhaohua Deng,et al.  Exploring factors affecting Chinese consumers' usage of short message service for personal communication , 2010, Inf. Syst. J..

[54]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[55]  Ardion Beldad,et al.  How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust , 2010, Comput. Hum. Behav..

[56]  Richard T. Watson,et al.  Task-technology fit for mobile locatable information systems , 2008, Decis. Support Syst..

[57]  Sumeet Gupta,et al.  The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..

[58]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[59]  Alexander Hars,et al.  Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..

[60]  David Gefen,et al.  Customer Loyalty in E-Commerce , 2002, J. Assoc. Inf. Syst..

[61]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[62]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[63]  Yung-Ming Li,et al.  Increasing trust in mobile commerce through design aesthetics , 2010, Comput. Hum. Behav..