DOI QR코드

DOI QR Code

A Study on Gender Difference in Antecedents of Trust and Continuance Intention to Purchase Voice Speakers

  • 투고 : 2019.11.25
  • 심사 : 2020.05.14
  • 발행 : 2020.09.30

초록

This study aims at understanding gender difference in trust and the related factors affecting the intention to purchase voice speakers VS. VS are one of the innovations that are emerging at a fast pace in the market. Although it seems to be widely embraced by both genders, people do not intend to use them in some cases due to a lack of trust and the rumors circling these types of technologies. Nevertheless, there are particular barriers to the acceptance of VS technology between females and males due to unfamiliarity with the effective components of such technologies. Therefore, assuming that increasing the knowledge-based familiarity with an effective technique is essential for accepting it. So far, only little is known about VS and its concepts to increase the familiarity and, as a consequence, the acceptance of effective technology. Technology adoption in gender has been studied for many years, and there are many general models in the literature describing it. However, having more customized models for emerging technologies upon their features seems necessary. This study is based on Theory of Reasoned Action and trust-based acceptance which provides a background for understanding the relationships between beliefs, attitude, intentions, and subject norms and how it's affecting gender trust in VS. The statistical analysis results indicate that perceived system quality and perceived interaction quality have stronger influences on trust for males, while privacy concern and emotional trust have stronger influences on trust for females with the intention of purchase for both genders. Our study can be beneficial for future research in the areas of Perceived risk and Perceived utility and behavioral intention to use and human-technology interaction and psychology.

키워드

과제정보

This work was supported by Institute for Information and communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No: 2018-0-00261, GDPR Compliant Personally Identifiable Information Management Technology for IoT Environment) and the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2018S1A5A2A01039413).

참고문헌

  1. An, B. K., Lee, D. S., Lee, J. S., Park, Y. S., Song, H. S., and Park, S. Y. (2004). Strongly fluorescent organogel system comprising fibrillar self-assembly of a trifluoromethyl-based cyanostilbene derivative. Journal of the American Chemical Society, 126(33), 10232-10233. 
  2. Angst, C. M., and Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370. 
  3. Bandura, A. (1986). Fearful expectations and avoidant actions as coeffects of perceived self-inefficacy. American Psychologist, 41(12), 1389-1391. 
  4. Borgelt, K. B., and Mayer, G. N. (1995). U.S. Patent No. 5,398,285. Washington, DC: U.S. Patent and Trademark Office. 
  5. Carino, N. J., and Malhotra, V. M. (eds.). (2004). Handbook on nondestructive testing of concrete. CRC Press. 
  6. Cheung, M. Y., Luo, C., Sia, C. L., and Chen, H. (2009). Credibility of electronic word-of-mouth: Informational and normative determinants of on-line consumer recommendations. International Journal of Electronic Commerce, 13(4), 9-38. 
  7. Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336. 
  8. Choi, Y., Choi, M., Kim, M., Ha, J. W., Kim, S., and Choo, J. (2018). Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 8789-8797. 
  9. Corbitt, B. J., Thanasankit, T., and Yi, H. (2003). Trust and e-commerce: A study of consumer perceptions. Electronic Commerce Research and Applications, 2(3), 203-215. 
  10. Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334. 
  11. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. 
  12. Dwyer, C., Guthold, M., Falvo, M., Washburn, S., Superfine, R., and Erie, D. (2002). DNA-functionalized single-walled carbon nanotubes. Nanotechnology, 13(5), 601-604. 
  13. Falk, R. F., and Miller, N. B. (1992). A primer for soft modeling. University of Akron Press. 
  14. Ajzen,I., and Fishbein, M. (1977). Attitude-behavior relations: A theoreticalanalysis and review of empirical research. Psychological bulletin, 84(5),888. 
  15. Fornell, C., and Cha, J. (1994). Advanced methods of marketing research, ed. RP Bagozzi. 
  16. Fornell, C., and Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382-388. 
  17. Fortin, D. R., Westin, S., and Mundorf, N. (1997). On the predispositions toward information technology: A three-way cross-cultural study. Telematics and Informatics, 14(2), 145-157. 
  18. Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 33(3), 38-53. 
  19. Gefen, D., and Straub, D. W. (2000). The relative importance of perceived ease of use in IS adoption: A study of e-commerce adoption. Journal of the Association for Information Systems, 1(1), 8. 
  20. Gong, X., Zhang, K. Z., Zhao, S. J., and Lee, M. K. (2016). The effects of cognitive and emotional trust on mobile payment adoption: A trust transfer perspective. PACIS 2016 Proceedings, p. 350. 
  21. Hair, A. (1998). Tatham, and black. Multivariate Analysis. 
  22. Harris, M. B., and Miller, K. C. (2000). Gender and perceptions of danger. Sex Roles, 43(11-12), 843-863. 
  23. Herbig, J., Kraemer, T., Mark, M., Weber, T., Chin, C., Nagerl, H. C., and Grimm, R. (2003). Preparation of a pure molecular quantum gas. Science, 301(5639), 1510-1513. 
  24. Hietz, P., and Briones, O. (1998). Correlation between water relations and within-canopy distribution of epiphytic ferns in a Mexican cloud forest. Oecologia, 114(3), 305-316. 
  25. Hoy, M. G., and Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28-45. 
  26. Hsu, L. C. (2017). Investigating community members' purchase intention on Facebook fan page. Industrial Management & Data Systems, 117(5), 766-800. 
  27. Huang, N. E. (2014). Hilbert-Huang transform and its applications (Vol. 16). World Scientific. 
  28. Kalina, E., and Laufer, H. (1974). Aos pais de adolescentes. Cobra Norato. 
  29. Kehoe, C., and Guzdial, M. (1997). What we know about technological support for project-based learning. 1997 ASEE/IEEE Frontiers in Education Conference Proceedings. 
  30. Keil, M., Tan, B. C., Wei, K. K., Saarinen, T., Tuunainen, V., and Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. MIS Quarterly, 24(2), 299-325. 
  31. Kharpal, A. (2017, January 19). Google co-founder Sergey Brin says he's 'surprised' by pace of A.I. and uses a story of a cat to explain it. CNBC. Retrieved from https://www.cnbc.com/2017/01/19/google-co-founder-sergey-brin-said-he-is-surprised-by-pace-of-ai.html 
  32. Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13-45. 
  33. Komiak, S. X., and Benbasat, I. (2004). Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce. Information Technology and Management, 5(1-2), 181-207. 
  34. Komiak, S. Y., and Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941-960. 
  35. Kramarae, C., and Taylor, H. J. (1993). Women and men on electronic networks: A conversation or a monologue. Women, Information Technology, and Scholarship, 52-61. 
  36. Lee, E. J. (2005). Creating value for online shoppers: Implications for satisfaction and loyalty. ACR Asia-Pacific Advances, 6, 370. 
  37. Lewis, K., Kaufman, J., and Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-mediated Communication, 14(1), 79-100. 
  38. Li, H., Sarathy, R., and Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445. 
  39. Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. CAIS, 28, 28. 
  40. Luhmann, N. (1979). 1979 Trust and power. Chichester: Wiley. 
  41. McKnight, R., and Anderson, G. (2002). System andmethod for providing distributed computing services. U.S. PatentApplication No. 09/847,828. 
  42. Metzger, C. H., and Karrai, K. (2004). Cavity cooling of a microlever. Nature, 432(7020), 1002-1005. 
  43. Mikulincer, M., and Nachshon, O. (1991). Attachment styles and patterns of self-disclosure. Journal of Personality and Social Psychology, 61(2), 321. 
  44. Miller, J. D., Few, L. R., Wilson, L., Gentile, B., Widiger, T. A., MacKillop, J., and Keith, C. W. (2013). The Five-Factor Narcissism Inventory (FFNI): A test of the convergent, discriminant, and incremental validity of FFNI scores in clinical and community samples. Psychological Assessment, 25(3), 748. 
  45. Milne, G. R., and Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206-215. 
  46. Moschis, G. P., and Churchill Jr, G. A. (1978). Consumer socialization: A theoretical and empirical analysis. Journal of Marketing Research, 15(4), 599-609. 
  47. Nowak, G. J., and Phelps, J. E. (1992). Understanding privacy concerns: An assessment of consumers' information-related knowledge and beliefs. Journal of Direct Marketing, 6(4), 28-39. 
  48. Nunnally, J. C., and Bernstein, I. H. (1967). McGraw-Hill series in psychology. Psychometric theory. New York, NY, US: McGraw-Hill. 
  49. Page, X., Kobsa, A., and Knijnenburg, B. P. (201). Don't disturb my circles! Boundary preservation is at the center of location-sharing concerns. In Sixth International AAAI Conference on Weblogs and Social Media. 
  50. Park, K., Kwak, C., Lee, J., and Ahn, J. H. (2018). The effect of platform characteristics on the adoption of smart speakers: Empirical evidence in South Korea. Telematics and Informatics, 35(8), 2118-2132. 
  51. Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134. 
  52. Novas, F. P., Garcia, J. S. M., Ortiz, J. C., and Jimenez, P. M. (2011). Inteligencia emocional, celos, tendencia al abuso y estrategias de resolucion de conflicto en la pareja. Escritos de Psicologia (Internet), 4(1), 34-43. 
  53. Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Suny Press. 
  54. Ringle, C. M., Wende, S., and Will, A. (2005). SmartPLS 2.0 M3 Beta. Hamburg. 
  55. Rousseau, D. M. (1998). The 'problem' of the psychological contract considered. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 19(S1), 665-671. 
  56. Sanchez-Franco, M. J. (2006). Exploring the influence of gender on the web usage via partial least squares. Behavior & Information Technology, 25(1), 19-36. 
  57. Schmidt, S. R., and Bohannon, J. N. (1988). In defense of the flashbulb-memory hypothesis: A comment on McCloskey, Wible, and Cohen. 
  58. Seyal, A. H., and Pijpers, G. G. (2004). Senior government executives' use of the internet: A Bruneian scenario. Behavior & Information Technology, 23(3), 197-210. 
  59. Sheehan, K. B., and Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-73. 
  60. Shin, D. H. (2015). Effect of the customer experience on satisfaction with smartphones: Assessing smart satisfaction index with partial least squares. Telecommunications Policy, 39(8), 627-641. 
  61. Shin, D. H. (2017). Conceptualizing and measuring quality of experience of the internet of things: Exploring how quality is perceived by users. Information & Management, 54(8), 998-1011. 
  62. Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. 
  63. Stewart (2003). The 2007 survey on teaching writing: American public opinion on the importance of writing in schools. 
  64. Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., and Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81-101. 
  65. Taylor, S. L., Moneret-Vautrin, D. A., Crevel, R. W., Sheffield, D., Morisset, M., Dumont, P., ... and Baumert, J. L. (2010). Threshold dose for peanut: Risk characterization based upon diagnostic oral challenge of a series of 286 peanut-allergic individuals. Food and Chemical Toxicology, 48(3), 814-819. 
  66. Teo, T. S., and Liu, J. (2007). Consumer trust in e-commerce in the United States, Singapore and China. Omega, 35(1), 22-38. 
  67. Thakur, R. (2016). Understanding customer engagement and loyalty: A case of mobile devices for shopping. Journal of Retailing and Consumer Services, 32, 151-163. 
  68. Van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704. 
  69. Venkatesh, V., and Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS quarterly, 115-139. 
  70. Venkatesh, V., Thong, J. Y., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178. 
  71. Walton, J. C., Larson, J. A., Roberts, R. K., Lambert, D. M., English, B. C., Larkin, S. L., ... and Reeves, J. M. (2010). Factors influencing farmer adoption of portable computers for site-specific management: A case study for cotton production. Journal of Agricultural and Applied Economics, 42(2), 193-209. 
  72. Wan, S., Dras, M., Dale, R., and Paris, C. (2006). Using dependency-based features to take the 'para-farce' out of paraphrase. In Proceedings of the Australasian Language Technology Workshop 2006, 131-138. 
  73. Wei, F. (2014). Sankardas Roy, Xinming Ou, and Robby. 2014. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS'14), 13, ACM, New York, NY, USA. 
  74. Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453. 
  75. Wetzels, M., Odekerken-Schroder, G., and Van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177-195. 
  76. Wilson, D., and Valacich, J. S. (2012). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. 33rd International Conference on Information Systems, Orlando. 
  77. Wood, E., Zivcakova, L., Gentile, P., Archer, K., De Pasquale, D., and Nosko, A. (2012). Examining the impact of off-task multi-tasking with technology on real-time classroom learning. Computers & Education, 58(1), 365-374. 
  78. Xu, D. J., Benbasat, I., and Cenfetelli, R. T. (2009). The effect of perceived service quality, perceived sacrifice and perceived service outcome on online customer loyalty. ICIS 2009 Proceedings, 175. 
  79. Yang, X., Schiller, S., Teo, H. H., and Wang, Q. (2017). Decision confidence and purchase intention in software trials: A cognitive stopping rule perspective. AIS Transactions on Human-Computer Interaction, 9(2), 123-148. 
  80. Yang, Z., Cai, S., Zhou, Z., and Zhou, N. (2005). Development and validation of an instrument to measure user perceived service quality of information presenting web portals. Information & Management, 42(4), 575-589. 
  81. Zhang, G., Liu, H., Qu, J., and Li, J. (2016). Two-dimensional layered MoS 2: Rational design, properties and electrochemical applications. Energy & Environmental Science, 9(4), 1190-1209. 
  82. Zhang, T., and Lin, W. (2014). Metal-organic frameworks for artificial photosynthesis and photocatalysis. Chemical Society Reviews, 43(16), 5982-5993. 
  83. Zhou, J. (2014). Multicatalyst system in asymmetric catalysis. John Wiley & Sons. 
  84. Zhou, T. (2011). An empirical examination of initial trust in mobile banking. Internet Research, 21(5), 527-540. 
  85. Zhou, T. (2013). An empirical examination of user adoption of location-based services. Electronic Commerce Research, 13(1), 25-39.