999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

ExploringConsumers,BehavioralIntentioninUsingInformationTechnologyStudyinIoT

2020-12-28 02:26:02ZhangZhiming
中阿科技論壇(中英阿文) 2020年10期
關(guān)鍵詞:信息

ZhangZhiming

Abstract:As intelligent networking technology gradually comes to maturity and as its transmission speed increases, people are now heavily dependent on smartphones. Moreover, in combination with data collection, management, and analysis through wireless sensing equipment to obtain customer information regarding store activities, businesses can now extend e-commerce to personalized mobile commerce and can deploy effective mobile advertising and precise positioning marketing.

Key words: Internet of Things; Technology Acceptance Model

CLC number:G252;F323.6? ? ? ? ? ? ? Document identification code: A

In addition, IT behavior and intention research was used in this study to understand consumersacceptance and willingness in using store apps. In this study, technology acceptance model was used as a framework, and incentive theory viewpoints were used for some external variables. The model was able to shed light on whether consumers usage behavior was affected by various external stimuli through the indirect influence on perceived usefulness and perceived ease of use. In this study, SPSS version 22 and Smart PLS version 2.0 were used for data analysis. The results of the data analysis show that all facets of this study had good reliability levels, internal consistency, and construct validity. The model validation results show that external variables indirectly influence behavioral intention through perceived usefulness. However, among the external variables, only interactive incentives exerted significant influence on perceived ease of use, although it did not indirectly affect behavioral intention via perceived ease of use.

1? Introduction

Along with changes in network types, improvements in IT, innovation in network services, diversification in applications, and the continuous improvement in processing power and storage capacity of intelligent terminal equipment, people are gradually entering an era where they are always connected. Nowadays, the network has evolved from a human-oriented network pattern to an object-oriented Internet of Things (IoT) environment, forming a ubiquitous network environment [3]. Owing to an environment constructed by IoT, the combination of a wide range of wireless sensing networks, and various smart devices and network domains, network-linked objects have been extended to include objects in real life to form a gigantic network [7]. Consequently, the relevant information derived from the intelligent-object can be applied to commercial activities. IoT is not merely an expansion of the Internet or communication networks. Through the ability to link objects, more meaningful information can be collected. Hence, when IoT is combined with the precise positioning function of smart mobile devices, smart location-based personalized information can be obtained, which will eventually subvert traditional business operations.

The investigation of behavioral intention in this study is based on a technology acceptance model. Incentive theory viewpoints are added to the external variables in the model. Whether or not various external stimuli imposed upon consumers will indirectly affect user behavior through perceived usefulness and perceived ease of use can be observed. Through the model, consumer acceptance and willingness to use the store apps can be understood. This can help bring stores and their customers closer together and is helpful in improving store operation.

The objectives of this study are stated as follows:To use the technology acceptance model as a framework, with the addition of incentive theory viewpoints to discuss the effects of various external stimuli to consumers, and the acceptability and willingness to use store apps. The rest of this dissertation is organized as follows:An introduction that explains the background, and motivation, purpose of this study. Literature reference in this study that discusses IoT, incentive theory, and relevant theory of technology acceptance model. In the study method, data analysis method is employed to explore behavioral intention. The contents include research structures, objects, Study Hypothesis, Questionnaire Design and Distribution. The results and findings are also explained in this study. It includes descriptive statistics, reliability and validity analysis, and validation of the research models. Final conclusions of this study.

2? Literature Review

In this section, the relevant theories and technologies used in this study are explained. These include the Internet of Things and the technology acceptance model.

2.1? Internet of Things(IoT)

In the era of the Internet, people can interconnect and obtain information via the network. Through the combinational use of network and various wireless communication sensing networks, objects can now communicate with each other through the Internet environment [6].

The Internet of Things is not a new technology and is actually a very broad concept. "Things are made intelligent through the implantation of various micro-sensing chips in them. Wireless network is used to connect those intelligent things to the Internet. Hence, the information of things can be shared to implement dialogue between people and things, and communication between things. In this way, the things people interact with in their daily lives can automatically report their states. The things also automatically communicate with other things and people [1].

The operation of the Internet of Things is mainly divided into a three-layer structure. They are the perceived layer, network layer and application layer. These layers are described below. (1) The lowest layer is the perceived layer. It consists of sensing components, which mainly include data collection equipment. The main task of the perceived layer is to identify objects and to collect the information of various heterogeneous sensing data. (2) The middle layer is the network layer. communication networks and the Internet. Its main function is to perform tran It is built on the existing mobile smission and processing of information.(3) The top layer is the application layer. This layer combines the societal and real life usage requirements to further create an intelligent application system.

2.2? Technology Acceptance Model(TAM)

Based on TRA (Theory of Reasoned Action) with some modifications, Davis et al. [4] abandoned the ideas of subjective norm and normative beliefs and the motivation to comply, and instead proposed to add in two important facets: Perceived Usefulness (PU) and Perceived Ease of Use (PEU). Moreover, external variables were added to extend the acceptance of the system in question. The model is called the Technology Acceptance Mode (TAM), It is used to explain, predict, and diagnose the attitude and behavioral intention patterns of users facing new technologies. Since TAM is highly interpretive in the adoption of new technology, it is widely used in studies of consumer acceptance of new technology. It is used to understand the impact of external variables on users' internal beliefs, attitude, and intention, thereby affecting the use of new technology.

3? Study Method

This section explains in detail how the research was carried out, including explanation of the research framework, questionnaire design, and statistical methods used in the data analysis.

3.1? Research Structure

The framework is shown in Figure 1:

3.2? Study Objects, Questionnaire Design and Distribution

The study objects were set as the shops with iBeacon sensors installed and the users who had downloaded the app. The internet questionnaires were distributed, and the survey was conducted using Convenience Sampling. To reduce the number of invalid questionnaires, prior to filling the questionnaire, the consumers were asked whether they had downloaded the app and whether they had experience with the app. A total of 210 questionnaires were collected during the survey period. After lie checking, 21 invalid questionnaires were excluded, leaving 189 valid samples. The effective questionnaire rate was 90%. The questionnaires were measured using the 5-point Likert-Format Scale and the respondents were asked to select their opinions on the items (1 for strongly disagree, 5 for strongly agree). The higher the score, the higher the agreement.

3.3? Data Analysis Methods and Tools

In this study, SPSS version 22 and Smart PLS version 2.0 statistics software were used as data analysis tools. Smart PLS version 2.0 uses the PLS (Partial Least Squares) method to conduct mode analysis. [2]. At the same time, it provides a structural model for the verification of the relationship between structural concepts, and verification of the reliability and validity of a model.

4? Data Analysis

This section will explain the narrative statistical analysis, reliability and validity analysis, and verification of the research model of this study.

4.1 Narrative Statistical Analysis

In this study, basic data analysis was conducted on the valid questionnaire samples. There were more males (n=104, 55%) than females (n=85, 45%) among the respondents. The age distribution ranged from 18 to 39 years old and the majority were between 18 and 29 years old. The majoritys marital status was unmarried (n=101, 53.4%). The majoritys education level was university level (n=135, 71.4%). Their professions were mainly in the service sector (n=84, 44.4%) and in the military, police, government and education sector (n=33, 17.5%), followed by the information industry sector (n=21, 11.1%). The majority had monthly average incomes between $30,001 and $40,000 (n=78, 41.3%), followed by $40,001 and $50,000 (n=28, 14.8%). The majority had monthly average expenditure of between $5,001 and $10,000 (n=64, 33.9%), followed by $10,001 and $20,000 (n= 60, 31.7%).

4.2? Reliability and Validity Analysis

In this section, reliability analysis and factor analysis are described respectively.

4.2.1? Reliability Analysis

In questionnaire reliability testing, the reliability of the scale was tested by using Cronbach's α value proposed by Hair et al. [5] to measure the internal consistency of each facet. If α was larger than 0.7, the scale had high reliability. The reliability of the questionnaire was acceptable. The Cronbach's α values for all the study facets ranged from 0.713 to 0.953. They all attained Cronbach's α value criterion of 0.7. Hence, all facets of this study had good reliability level and each facet had high internal consistency.

4.2.2? Factor Analysis

In this study, we first performed a Bartlett's Sphericity Test. The test result was 5947.683 (Sig.= 0.000 <0.05) in Chi-square value, approaching 0.00, and it reached the significant level. This means that the items had a strong correlation between each other and the data were suitable for factor analysis. Furthermore, the result of Kaiser-Meyer-Olkin (KMO) test was 0.855. This means that each question had a high common variance, and the variations were very low in uniqueness.

The cross-loading scale for each facet shows that all factor loadings of all questions were greater than 0.5 and the other non-facet factor loadings were less than 0.5. Hence, the cross-loading analysis for each facet had reached the standard proposed by Chin [2]. The above analysis results prove that the study questionnaire had a good construct validity.

4.3? Research Model Validation

In the parameter estimation of SmartPLS, the bootstrapping method was used for analysis. Resampling of samples was used to estimate the distribution of statistical amounts. The settings for resampling was based on the suggestion of Chin [2]. To verify the significance of the estimated values of model structural paths, the resampling number was set to 500.

The research model verification results, except for the hypotheses H1, H5, H7, H9, H10, and H13, which received a significant level of verification support, the other hypotheses did not receive verification support. The model verification shows in Figure 2; the structural model path coefficient diagram shows in Figure 3:

4.4? Hypothesis Verification and Results

The results of model validation show that convenience, information, entertainment and interactive incentives all had a positive effect on perceived usefulness; and perceived usefulness had a positive effect on behavioral intention. As to the influence of convenience, promotion, information, entertainment, and interactive incentives on the perceived ease of use, only interactive incentive had significant effect. However, it did not indirectly affect behavioral intention via perceived ease of use.

5? Conclusions

The investigation of behavioral intention is to understand users acceptance and using willingness of the store app which can help narrow the gap between stores and consumers, and help improve operations. This study uses TAM as a framework and applies incentive theory to the external variables to determine whether consumers behavioral intention in using the app can be indirectly affected via perceived usefulness and perceived ease of use when the consumers are under various external stimuli and incentives.

The study results revealed that the external variables of convenience, information, entertainment and interactive incentives indirectly affect consumers behavioral intention through perceived usefulness. As to the influence of convenience, promotion, information, entertainment and interactive incentives on the perceived ease of use, only interactive incentive is significant, yet it does not indirectly affect behavioral intention through perceived ease of use.

Reference:

[1]張志勇,翁仲銘,石貴平,廖文華(2013),物聯(lián)網(wǎng)概論,碁峰信息股份有限公司.

[2]Chin, W.W. (1998), “The Partial Least Squares Approach to Structural Equation Modeling,” In G. A. Marcoulides (Ed.), Modern Methods for Business Research. Mahwah, New Jersey: Lawrence Erlbaum Associates, pp. 295-336.

[3]Coetzee, L., & Eksteen, J. (2011), “The Internet of Things-promise for the Future an Introduction,” Proceedings of the IST- Africa Conference, pp. 1-9.

[4]Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, Vol. 35, No. 8, pp. 982-1003.

[5]Hair, J.F., Anderson, R.E., Tatham, R.L., & Black, W.C. (1998), Multivariate Data Analysis (5th ed.), New Jersey: Prentice-Hall, Inc.

[6]ITU Internet Reports(2005), The Internet of Things, International Telecommunication Union.

[7]Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., & Borriello, G. (2009), “Building the Internet of Things Using RFID: The RFID Ecosystem Experience,” Proceedings of the IEEE Internet Computing, Vol. 13, No. 3, pp. 48-55.

猜你喜歡
信息
訂閱信息
中華手工(2017年2期)2017-06-06 23:00:31
展會信息
中外會展(2014年4期)2014-11-27 07:46:46
信息超市
展會信息
展會信息
展會信息
展會信息
展會信息
信息
健康信息
祝您健康(1987年3期)1987-12-30 09:52:32
主站蜘蛛池模板: 国产成人精彩在线视频50| 中文字幕精品一区二区三区视频| 国产亚洲欧美日韩在线一区| 国产精品自拍合集| 国产免费久久精品99re不卡| 中文字幕亚洲专区第19页| 成年网址网站在线观看| 日本一区二区不卡视频| 亚洲第一页在线观看| 国产香蕉97碰碰视频VA碰碰看| 久久人人爽人人爽人人片aV东京热| 人妻无码中文字幕一区二区三区| 视频二区国产精品职场同事| 美女高潮全身流白浆福利区| 免费国产无遮挡又黄又爽| 亚洲美女AV免费一区| 有专无码视频| 亚洲女同一区二区| 国产性爱网站| 久久频这里精品99香蕉久网址| 亚洲男人的天堂久久香蕉网 | 欧美国产精品拍自| 日本一区二区三区精品国产| 99资源在线| 伊大人香蕉久久网欧美| 性色生活片在线观看| 99国产精品免费观看视频| 亚洲区第一页| 视频一区视频二区中文精品| 日韩精品亚洲一区中文字幕| av色爱 天堂网| 麻豆精选在线| 国产一区二区影院| 又大又硬又爽免费视频| 欧美日韩精品综合在线一区| 欧美中日韩在线| 尤物在线观看乱码| 99re免费视频| 久久人与动人物A级毛片| 青青热久免费精品视频6| 中文字幕久久精品波多野结| 国产精品55夜色66夜色| 美女无遮挡被啪啪到高潮免费| 亚洲区视频在线观看| 91久久国产热精品免费| 久久中文电影| 9999在线视频| 日韩精品一区二区深田咏美| 在线观看热码亚洲av每日更新| 色成人综合| 无码一区二区波多野结衣播放搜索| 久久国产精品麻豆系列| 性欧美精品xxxx| 国产欧美精品一区aⅴ影院| 中文字幕在线永久在线视频2020| 精品国产电影久久九九| 狠狠色综合久久狠狠色综合| 五月婷婷精品| 在线精品视频成人网| 中文国产成人精品久久| 国产欧美又粗又猛又爽老| 国产在线麻豆波多野结衣| 国产激爽大片高清在线观看| 欧美成人A视频| 亚洲欧美日韩动漫| 国产在线拍偷自揄拍精品| 国产精品成人免费综合| 无码AV高清毛片中国一级毛片| 五月婷婷综合网| 自拍偷拍欧美| 亚洲 日韩 激情 无码 中出| 成人在线亚洲| 自拍偷拍欧美| 久久精品人人做人人爽| 亚洲天堂成人| 午夜视频日本| 久久精品人人做人人| 污视频日本| 久久精品一卡日本电影| 国产精品成人啪精品视频| a级毛片视频免费观看| 色老头综合网|