A Technology Acceptance Model-Based Analytics for Online Mobile Games Using Machine Learning Techniques

In recent years, the enhancement in technology has been envisioning for people to complete tasks in an easier way. Every manufacturing industry requires heavy machinery to accomplish tasks in a symmetric and systematic way, which is much easier with the help of advancement in the technology. The technological advancement directly affects human life as a result. It is found that humans are now fully dependent on it. The online game industry is one example of technology breakthrough. It is now a prominent industry to develop online games at world level. In this paper, our main objective is to analyze major factors which encourage mobile games industry to expand. Analyzing the system and symmetric relations inside can be done into two phases. The first phase is through a TAM Model, which is a very efficient way to solve statistical problems, and the second phase is with machine learning (ML) techniques, such as SVM, logistic regression, etc. Both strategies are popular and efficient in analyzing a system while maintaining the symmetry in a better way. Therefore, according to results from both the TAM model and ML approach, it is clear that perceived usefulness, attitude, and symmetric flow are important factors for game industry. The analytics provide a clear insight that perceived usefulness is an important parameter over behavior intention for the online mobile game industry.

[1]  Luca Di Persio,et al.  Deep Learning and Mean-Field Games: A Stochastic Optimal Control Perspective , 2020, Symmetry.

[2]  Giang T. T. Phan,et al.  Proposing a gamma radiation based intelligent system for simultaneous analyzing and detecting type and amount of petroleum by-products , 2020 .

[3]  H. Arabnia,et al.  University Online Courses: Correlation between Students' Participation Rate and Academic Performance , 2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI).

[4]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[5]  Prashanth Raman Examining the importance of gamification, social interaction and perceived enjoyment among young female online buyers in India , 2020 .

[6]  Alfredo Cuzzocrea,et al.  A Machine Learning Tool for Supporting Advanced Knowledge Discovery from Chess Game Data , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

[7]  Marcia Friesen,et al.  Serious Games and ML for Detecting MCI , 2019, 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[8]  Celestine Iwendi,et al.  A Survey on Energy-Aware Wireless Sensor Routing Protocols , 2019, EAI Endorsed Trans. Energy Web.

[9]  C. Stein,et al.  Structural equation modeling. , 2012, Methods in molecular biology.

[10]  Mohit Mittal,et al.  Detection of attacks in IoT based on ontology using SPARQL , 2017, 2017 7th International Conference on Communication Systems and Network Technologies (CSNT).

[11]  Glenn J. Browne,et al.  The Role of Need for Cognition and Mood in Online Flow Experience , 2006, J. Comput. Inf. Syst..

[12]  Marijana Zekić-Sušac,et al.  Predicting company growth using logistic regression and neural networks , 2016 .

[13]  I. Ajzen,et al.  Accessibility and stability of predictors in the theory of planned behavior. , 1992 .

[14]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[15]  Niina Mallat,et al.  Exploring consumer adoption of mobile payments - A qualitative study , 2007, J. Strateg. Inf. Syst..

[16]  Yang Jiang,et al.  Computerized Interactive Gaming via Supporting Vector Machines , 2008, Int. J. Comput. Games Technol..

[17]  Yong Liu,et al.  Exploring the impact of use context on mobile hedonic services adoption: An empirical study on mobile gaming in China , 2011, Comput. Hum. Behav..

[18]  Chin-Lung Hsu,et al.  Why do people play on-line games? An extended TAM with social influences and flow experience , 2004, Inf. Manag..

[19]  Rupak Rauniar,et al.  Technology acceptance model (TAM) and social media usage: an empirical study on Facebook , 2014, J. Enterp. Inf. Manag..

[20]  I. Ajzen The theory of planned behavior , 1991 .

[21]  Julian Togelius,et al.  Detecting Predatory Behavior in Game Chats , 2015, IEEE Transactions on Computational Intelligence and AI in Games.

[22]  Seshadhri Srinivasan,et al.  Type-2 fuzzy ontology-based multi-agents system for wireless sensor network , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.

[23]  Celestine Iwendi,et al.  A Neuro-Fuzzy Approach for Intrusion Detection in Energy Efficient Sensor Routing , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).

[24]  J. Miles,et al.  A time and a place for incremental fit indices , 2007 .

[25]  Harry Bouwman,et al.  Would you share? Predicting the potential use of a new technology , 2009, Telematics Informatics.

[26]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[27]  De Liu,et al.  The Effects of Trust and Enjoyment on Intention to Play Online Games , 2007 .

[28]  James M. Boyle,et al.  A systematic literature review of empirical evidence on computer games and serious games , 2012, Comput. Educ..

[29]  Nathaniel Oco,et al.  Cyberbullying Detection for Online Games Chat Logs using Deep Learning , 2019, 2019 IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management ( HNICEM ).

[30]  Ali Jahanshahi TinyCNN: A Tiny Modular CNN Accelerator for Embedded FPGA , 2019, ArXiv.

[31]  Hsi-Peng Lu,et al.  Why do People Continue to Play Social Network Game (SNG)?: An Empirical Study by Social and Emotional Perspectives , 2013, Int. J. E Adopt..

[32]  Imsook Ha,et al.  Determinants of adoption of mobile games under mobile broadband wireless access environment , 2007, Inf. Manag..

[33]  Ferda Nur Alpaslan,et al.  Supervised Learning in Football Game Environments Using Artificial Neural Networks , 2018, 2018 3rd International Conference on Computer Science and Engineering (UBMK).

[34]  Mohit Mittal,et al.  Predictive Analytics of Sensor Data Based on Supervised Machine Learning Algorithms , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).

[35]  Ming-Chi Lee,et al.  Understanding the behavioural intention to play online games: An extension of the theory of planned behaviour , 2009, Online Inf. Rev..

[36]  Chinmay Chakraborty,et al.  A self-congruence and impulse buying effect on user's shopping behaviour over social networking sites: an empirical study , 2021, Int. J. Pervasive Comput. Commun..

[37]  Yuanyuan Wang,et al.  Understanding Multilingual Correlation of Geo-Tagged Tweets for POI Recommendation , 2020, W2GIS.

[38]  Dong-Hee Shin,et al.  Why do people play social network games? , 2011, Comput. Hum. Behav..

[39]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[40]  Jinwoo Kim,et al.  Why People Continue to Play Online Games: In Search of Critical Design Factors to Increase Customer Loyalty to Online Contents , 2004, Cyberpsychology Behav. Soc. Netw..

[41]  Shibu Yooseph,et al.  Learning a mixture of microbial networks using minorization–maximization , 2019, Bioinform..

[42]  Yi Ding,et al.  Why do I Invite Friends to Join: an Empirical Study of Mobile Social Network Game , 2014, PACIS.

[43]  Celestine Iwendi,et al.  Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system , 2020, Trans. Emerg. Telecommun. Technol..

[44]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[45]  Tao Zhou,et al.  Exploring Chinese users' acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory , 2009, Comput. Hum. Behav..

[46]  Gabriela Moise,et al.  Emotion Classification Based on Biophysical Signals and Machine Learning Techniques , 2019, Symmetry.

[47]  Qingfeng Wang,et al.  Investigating gameplay intention of the elderly using an Extended Technology Acceptance Model (ETAM) , 2016 .

[48]  Edward J. Szewczak,et al.  Human Factors in Information Systems , 2002 .

[49]  Zhihua Xiong,et al.  A Simplified Climate Change Model and Extreme Weather Model Based on a Machine Learning Method , 2020, Symmetry.

[50]  Daniele Loiacono,et al.  Learning to Drive in the Open Racing Car Simulator Using Online Neuroevolution , 2010, IEEE Transactions on Computational Intelligence and AI in Games.

[51]  W. R. Dillon,et al.  A simulation study to investigate the use of cutoff values for assessing model fit in covariance structure models , 2005 .

[52]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[53]  Krishan Kumar,et al.  Network Lifetime Enhancement of Homogeneous Sensor Network Using ART1 Neural Network , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[54]  Hans van der Heijden,et al.  Factors influencing the usage of websites: the case of a generic portal in The Netherlands , 2003, Inf. Manag..

[55]  M. Csíkszentmihályi,et al.  Optimal experience in work and leisure. , 1989, Journal of personality and social psychology.

[56]  M. Csíkszentmihályi,et al.  Optimal experience: Psychological studies of flow in consciousness. , 1988 .

[57]  Mohit Mittal,et al.  Performance Evaluation of Cryptographic Algorithms , 2012 .

[58]  Eunil Park,et al.  Determinants of player acceptance of mobile social network games: An application of extended technology acceptance model , 2014, Telematics Informatics.

[59]  Hyokun Yun,et al.  Using Logistic Regression to Analyze the Balance of a Game: The Case of StarCraft II , 2011, ArXiv.

[60]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[61]  Trung Q. Duong,et al.  Evaluation of flow pattern recognition and void fraction measurement in two phase flow independent of oil pipeline’s scale layer thickness , 2020 .

[62]  S. Lipovetsky,et al.  Analysis of regression in game theory approach , 2001 .

[63]  Leonard Reinecke,et al.  The social side of gaming: How playing online computer games creates online and offline social support , 2012, Comput. Hum. Behav..

[64]  Richard,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace , 2022 .

[65]  R. MacCallum,et al.  Power analysis and determination of sample size for covariance structure modeling. , 1996 .

[66]  Yukiko Kawai,et al.  Accurate Spatial Mapping of Social Media Data with Physical Locations , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[67]  Fred D. Davis,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .

[68]  Satendra Kumar,et al.  Performance Evaluation of LEACH Protocol Based on Data Clustering Algorithms , 2019 .