DOI QR코드

DOI QR Code

A Study on Gender Difference in Antecedents of Trust and Continuance Intention to Purchase Voice Speakers

  • Received : 2019.11.25
  • Accepted : 2020.05.14
  • Published : 2020.09.30

Abstract

This study aims at understanding gender difference in trust and the related factors affecting the intention to purchase voice speakers VS. VS are one of the innovations that are emerging at a fast pace in the market. Although it seems to be widely embraced by both genders, people do not intend to use them in some cases due to a lack of trust and the rumors circling these types of technologies. Nevertheless, there are particular barriers to the acceptance of VS technology between females and males due to unfamiliarity with the effective components of such technologies. Therefore, assuming that increasing the knowledge-based familiarity with an effective technique is essential for accepting it. So far, only little is known about VS and its concepts to increase the familiarity and, as a consequence, the acceptance of effective technology. Technology adoption in gender has been studied for many years, and there are many general models in the literature describing it. However, having more customized models for emerging technologies upon their features seems necessary. This study is based on Theory of Reasoned Action and trust-based acceptance which provides a background for understanding the relationships between beliefs, attitude, intentions, and subject norms and how it's affecting gender trust in VS. The statistical analysis results indicate that perceived system quality and perceived interaction quality have stronger influences on trust for males, while privacy concern and emotional trust have stronger influences on trust for females with the intention of purchase for both genders. Our study can be beneficial for future research in the areas of Perceived risk and Perceived utility and behavioral intention to use and human-technology interaction and psychology.

Keywords

Acknowledgement

This work was supported by Institute for Information and communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No: 2018-0-00261, GDPR Compliant Personally Identifiable Information Management Technology for IoT Environment) and the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2018S1A5A2A01039413).

References

  1. An, B. K., Lee, D. S., Lee, J. S., Park, Y. S., Song, H. S., and Park, S. Y. (2004). Strongly fluorescent organogel system comprising fibrillar self-assembly of a trifluoromethyl-based cyanostilbene derivative. Journal of the American Chemical Society, 126(33), 10232-10233.  https://doi.org/10.1021/ja046215g
  2. Angst, C. M., and Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370.  https://doi.org/10.2307/20650295
  3. Bandura, A. (1986). Fearful expectations and avoidant actions as coeffects of perceived self-inefficacy. American Psychologist, 41(12), 1389-1391.  https://doi.org/10.1037/0003-066X.41.12.1389
  4. Borgelt, K. B., and Mayer, G. N. (1995). U.S. Patent No. 5,398,285. Washington, DC: U.S. Patent and Trademark Office. 
  5. Carino, N. J., and Malhotra, V. M. (eds.). (2004). Handbook on nondestructive testing of concrete. CRC Press. 
  6. Cheung, M. Y., Luo, C., Sia, C. L., and Chen, H. (2009). Credibility of electronic word-of-mouth: Informational and normative determinants of on-line consumer recommendations. International Journal of Electronic Commerce, 13(4), 9-38.  https://doi.org/10.2753/JEC1086-4415130402
  7. Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336. 
  8. Choi, Y., Choi, M., Kim, M., Ha, J. W., Kim, S., and Choo, J. (2018). Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 8789-8797. 
  9. Corbitt, B. J., Thanasankit, T., and Yi, H. (2003). Trust and e-commerce: A study of consumer perceptions. Electronic Commerce Research and Applications, 2(3), 203-215.  https://doi.org/10.1016/S1567-4223(03)00024-3
  10. Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334.  https://doi.org/10.1007/BF02310555
  11. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.  https://doi.org/10.1287/isre.1060.0080
  12. Dwyer, C., Guthold, M., Falvo, M., Washburn, S., Superfine, R., and Erie, D. (2002). DNA-functionalized single-walled carbon nanotubes. Nanotechnology, 13(5), 601-604.  https://doi.org/10.1088/0957-4484/13/5/311
  13. Falk, R. F., and Miller, N. B. (1992). A primer for soft modeling. University of Akron Press. 
  14. Ajzen,I., and Fishbein, M. (1977). Attitude-behavior relations: A theoreticalanalysis and review of empirical research. Psychological bulletin, 84(5),888. 
  15. Fornell, C., and Cha, J. (1994). Advanced methods of marketing research, ed. RP Bagozzi. 
  16. Fornell, C., and Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382-388.  https://doi.org/10.1177/002224378101800313
  17. Fortin, D. R., Westin, S., and Mundorf, N. (1997). On the predispositions toward information technology: A three-way cross-cultural study. Telematics and Informatics, 14(2), 145-157.  https://doi.org/10.1016/S0736-5853(96)00030-5
  18. Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 33(3), 38-53.  https://doi.org/10.1145/569905.569910
  19. Gefen, D., and Straub, D. W. (2000). The relative importance of perceived ease of use in IS adoption: A study of e-commerce adoption. Journal of the Association for Information Systems, 1(1), 8. 
  20. Gong, X., Zhang, K. Z., Zhao, S. J., and Lee, M. K. (2016). The effects of cognitive and emotional trust on mobile payment adoption: A trust transfer perspective. PACIS 2016 Proceedings, p. 350. 
  21. Hair, A. (1998). Tatham, and black. Multivariate Analysis. 
  22. Harris, M. B., and Miller, K. C. (2000). Gender and perceptions of danger. Sex Roles, 43(11-12), 843-863.  https://doi.org/10.1023/A:1011036905770
  23. Herbig, J., Kraemer, T., Mark, M., Weber, T., Chin, C., Nagerl, H. C., and Grimm, R. (2003). Preparation of a pure molecular quantum gas. Science, 301(5639), 1510-1513.  https://doi.org/10.1126/science.1088876
  24. Hietz, P., and Briones, O. (1998). Correlation between water relations and within-canopy distribution of epiphytic ferns in a Mexican cloud forest. Oecologia, 114(3), 305-316.  https://doi.org/10.1007/s004420050452
  25. Hoy, M. G., and Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28-45.  https://doi.org/10.1080/15252019.2010.10722168
  26. Hsu, L. C. (2017). Investigating community members' purchase intention on Facebook fan page. Industrial Management & Data Systems, 117(5), 766-800.  https://doi.org/10.1108/IMDS-05-2016-0180
  27. Huang, N. E. (2014). Hilbert-Huang transform and its applications (Vol. 16). World Scientific. 
  28. Kalina, E., and Laufer, H. (1974). Aos pais de adolescentes. Cobra Norato. 
  29. Kehoe, C., and Guzdial, M. (1997). What we know about technological support for project-based learning. 1997 ASEE/IEEE Frontiers in Education Conference Proceedings. 
  30. Keil, M., Tan, B. C., Wei, K. K., Saarinen, T., Tuunainen, V., and Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. MIS Quarterly, 24(2), 299-325.  https://doi.org/10.2307/3250940
  31. Kharpal, A. (2017, January 19). Google co-founder Sergey Brin says he's 'surprised' by pace of A.I. and uses a story of a cat to explain it. CNBC. Retrieved from https://www.cnbc.com/2017/01/19/google-co-founder-sergey-brin-said-he-is-surprised-by-pace-of-ai.html 
  32. Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13-45.  https://doi.org/10.2753/MIS0742-1222240401
  33. Komiak, S. X., and Benbasat, I. (2004). Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce. Information Technology and Management, 5(1-2), 181-207.  https://doi.org/10.1023/B:ITEM.0000008081.55563.d4
  34. Komiak, S. Y., and Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941-960.  https://doi.org/10.2307/25148760
  35. Kramarae, C., and Taylor, H. J. (1993). Women and men on electronic networks: A conversation or a monologue. Women, Information Technology, and Scholarship, 52-61. 
  36. Lee, E. J. (2005). Creating value for online shoppers: Implications for satisfaction and loyalty. ACR Asia-Pacific Advances, 6, 370. 
  37. Lewis, K., Kaufman, J., and Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-mediated Communication, 14(1), 79-100.  https://doi.org/10.1111/j.1083-6101.2008.01432.x
  38. Li, H., Sarathy, R., and Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445.  https://doi.org/10.1016/j.dss.2011.01.017
  39. Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. CAIS, 28, 28. 
  40. Luhmann, N. (1979). 1979 Trust and power. Chichester: Wiley. 
  41. McKnight, R., and Anderson, G. (2002). System andmethod for providing distributed computing services. U.S. PatentApplication No. 09/847,828. 
  42. Metzger, C. H., and Karrai, K. (2004). Cavity cooling of a microlever. Nature, 432(7020), 1002-1005.  https://doi.org/10.1038/nature03118
  43. Mikulincer, M., and Nachshon, O. (1991). Attachment styles and patterns of self-disclosure. Journal of Personality and Social Psychology, 61(2), 321. 
  44. Miller, J. D., Few, L. R., Wilson, L., Gentile, B., Widiger, T. A., MacKillop, J., and Keith, C. W. (2013). The Five-Factor Narcissism Inventory (FFNI): A test of the convergent, discriminant, and incremental validity of FFNI scores in clinical and community samples. Psychological Assessment, 25(3), 748. 
  45. Milne, G. R., and Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206-215.  https://doi.org/10.1177/074391569101200206
  46. Moschis, G. P., and Churchill Jr, G. A. (1978). Consumer socialization: A theoretical and empirical analysis. Journal of Marketing Research, 15(4), 599-609.  https://doi.org/10.1177/002224377801500409
  47. Nowak, G. J., and Phelps, J. E. (1992). Understanding privacy concerns: An assessment of consumers' information-related knowledge and beliefs. Journal of Direct Marketing, 6(4), 28-39.  https://doi.org/10.1002/dir.4000060407
  48. Nunnally, J. C., and Bernstein, I. H. (1967). McGraw-Hill series in psychology. Psychometric theory. New York, NY, US: McGraw-Hill. 
  49. Page, X., Kobsa, A., and Knijnenburg, B. P. (201). Don't disturb my circles! Boundary preservation is at the center of location-sharing concerns. In Sixth International AAAI Conference on Weblogs and Social Media. 
  50. Park, K., Kwak, C., Lee, J., and Ahn, J. H. (2018). The effect of platform characteristics on the adoption of smart speakers: Empirical evidence in South Korea. Telematics and Informatics, 35(8), 2118-2132.  https://doi.org/10.1016/j.tele.2018.07.013
  51. Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134.  https://doi.org/10.1080/10864415.2003.11044275
  52. Novas, F. P., Garcia, J. S. M., Ortiz, J. C., and Jimenez, P. M. (2011). Inteligencia emocional, celos, tendencia al abuso y estrategias de resolucion de conflicto en la pareja. Escritos de Psicologia (Internet), 4(1), 34-43.  https://doi.org/10.24310/espsiescpsi.v4i1.13312
  53. Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Suny Press. 
  54. Ringle, C. M., Wende, S., and Will, A. (2005). SmartPLS 2.0 M3 Beta. Hamburg. 
  55. Rousseau, D. M. (1998). The 'problem' of the psychological contract considered. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 19(S1), 665-671.  https://doi.org/10.1002/(SICI)1099-1379(1998)19:1+<665::AID-JOB972>3.0.CO;2-X
  56. Sanchez-Franco, M. J. (2006). Exploring the influence of gender on the web usage via partial least squares. Behavior & Information Technology, 25(1), 19-36.  https://doi.org/10.1080/01449290500124536
  57. Schmidt, S. R., and Bohannon, J. N. (1988). In defense of the flashbulb-memory hypothesis: A comment on McCloskey, Wible, and Cohen. 
  58. Seyal, A. H., and Pijpers, G. G. (2004). Senior government executives' use of the internet: A Bruneian scenario. Behavior & Information Technology, 23(3), 197-210.  https://doi.org/10.1080/01449290410001669978
  59. Sheehan, K. B., and Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-73.  https://doi.org/10.1509/jppm.19.1.62.16949
  60. Shin, D. H. (2015). Effect of the customer experience on satisfaction with smartphones: Assessing smart satisfaction index with partial least squares. Telecommunications Policy, 39(8), 627-641.  https://doi.org/10.1016/j.telpol.2014.10.001
  61. Shin, D. H. (2017). Conceptualizing and measuring quality of experience of the internet of things: Exploring how quality is perceived by users. Information & Management, 54(8), 998-1011.  https://doi.org/10.1016/j.im.2017.02.006
  62. Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196.  https://doi.org/10.2307/249477
  63. Stewart (2003). The 2007 survey on teaching writing: American public opinion on the importance of writing in schools. 
  64. Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., and Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81-101.  https://doi.org/10.1386/macp.6.1.81/1
  65. Taylor, S. L., Moneret-Vautrin, D. A., Crevel, R. W., Sheffield, D., Morisset, M., Dumont, P., ... and Baumert, J. L. (2010). Threshold dose for peanut: Risk characterization based upon diagnostic oral challenge of a series of 286 peanut-allergic individuals. Food and Chemical Toxicology, 48(3), 814-819.  https://doi.org/10.1016/j.fct.2009.12.013
  66. Teo, T. S., and Liu, J. (2007). Consumer trust in e-commerce in the United States, Singapore and China. Omega, 35(1), 22-38.  https://doi.org/10.1016/j.omega.2005.02.001
  67. Thakur, R. (2016). Understanding customer engagement and loyalty: A case of mobile devices for shopping. Journal of Retailing and Consumer Services, 32, 151-163.  https://doi.org/10.1016/j.jretconser.2016.06.004
  68. Van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704.  https://doi.org/10.2307/25148660
  69. Venkatesh, V., and Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS quarterly, 115-139. 
  70. Venkatesh, V., Thong, J. Y., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178.  https://doi.org/10.2307/41410412
  71. Walton, J. C., Larson, J. A., Roberts, R. K., Lambert, D. M., English, B. C., Larkin, S. L., ... and Reeves, J. M. (2010). Factors influencing farmer adoption of portable computers for site-specific management: A case study for cotton production. Journal of Agricultural and Applied Economics, 42(2), 193-209.  https://doi.org/10.1017/S1074070800003400
  72. Wan, S., Dras, M., Dale, R., and Paris, C. (2006). Using dependency-based features to take the 'para-farce' out of paraphrase. In Proceedings of the Australasian Language Technology Workshop 2006, 131-138. 
  73. Wei, F. (2014). Sankardas Roy, Xinming Ou, and Robby. 2014. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS'14), 13, ACM, New York, NY, USA. 
  74. Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453.  https://doi.org/10.1111/1540-4560.00072
  75. Wetzels, M., Odekerken-Schroder, G., and Van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177-195.  https://doi.org/10.2307/20650284
  76. Wilson, D., and Valacich, J. S. (2012). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. 33rd International Conference on Information Systems, Orlando. 
  77. Wood, E., Zivcakova, L., Gentile, P., Archer, K., De Pasquale, D., and Nosko, A. (2012). Examining the impact of off-task multi-tasking with technology on real-time classroom learning. Computers & Education, 58(1), 365-374.  https://doi.org/10.1016/j.compedu.2011.08.029
  78. Xu, D. J., Benbasat, I., and Cenfetelli, R. T. (2009). The effect of perceived service quality, perceived sacrifice and perceived service outcome on online customer loyalty. ICIS 2009 Proceedings, 175. 
  79. Yang, X., Schiller, S., Teo, H. H., and Wang, Q. (2017). Decision confidence and purchase intention in software trials: A cognitive stopping rule perspective. AIS Transactions on Human-Computer Interaction, 9(2), 123-148.  https://doi.org/10.17705/1thci.00092
  80. Yang, Z., Cai, S., Zhou, Z., and Zhou, N. (2005). Development and validation of an instrument to measure user perceived service quality of information presenting web portals. Information & Management, 42(4), 575-589.  https://doi.org/10.1016/S0378-7206(04)00073-4
  81. Zhang, G., Liu, H., Qu, J., and Li, J. (2016). Two-dimensional layered MoS 2: Rational design, properties and electrochemical applications. Energy & Environmental Science, 9(4), 1190-1209.  https://doi.org/10.1039/C5EE03761A
  82. Zhang, T., and Lin, W. (2014). Metal-organic frameworks for artificial photosynthesis and photocatalysis. Chemical Society Reviews, 43(16), 5982-5993.  https://doi.org/10.1039/C4CS00103F
  83. Zhou, J. (2014). Multicatalyst system in asymmetric catalysis. John Wiley & Sons. 
  84. Zhou, T. (2011). An empirical examination of initial trust in mobile banking. Internet Research, 21(5), 527-540.  https://doi.org/10.1108/10662241111176353
  85. Zhou, T. (2013). An empirical examination of user adoption of location-based services. Electronic Commerce Research, 13(1), 25-39. https://doi.org/10.1007/s10660-013-9106-3