999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

ExploringConsumers,BehavioralIntentioninUsingInformationTechnologyStudyinIoT

2020-12-28 02:26:02ZhangZhiming
中阿科技論壇(中英阿文) 2020年10期
關(guān)鍵詞:信息

ZhangZhiming

Abstract:As intelligent networking technology gradually comes to maturity and as its transmission speed increases, people are now heavily dependent on smartphones. Moreover, in combination with data collection, management, and analysis through wireless sensing equipment to obtain customer information regarding store activities, businesses can now extend e-commerce to personalized mobile commerce and can deploy effective mobile advertising and precise positioning marketing.

Key words: Internet of Things; Technology Acceptance Model

CLC number:G252;F323.6? ? ? ? ? ? ? Document identification code: A

In addition, IT behavior and intention research was used in this study to understand consumersacceptance and willingness in using store apps. In this study, technology acceptance model was used as a framework, and incentive theory viewpoints were used for some external variables. The model was able to shed light on whether consumers usage behavior was affected by various external stimuli through the indirect influence on perceived usefulness and perceived ease of use. In this study, SPSS version 22 and Smart PLS version 2.0 were used for data analysis. The results of the data analysis show that all facets of this study had good reliability levels, internal consistency, and construct validity. The model validation results show that external variables indirectly influence behavioral intention through perceived usefulness. However, among the external variables, only interactive incentives exerted significant influence on perceived ease of use, although it did not indirectly affect behavioral intention via perceived ease of use.

1? Introduction

Along with changes in network types, improvements in IT, innovation in network services, diversification in applications, and the continuous improvement in processing power and storage capacity of intelligent terminal equipment, people are gradually entering an era where they are always connected. Nowadays, the network has evolved from a human-oriented network pattern to an object-oriented Internet of Things (IoT) environment, forming a ubiquitous network environment [3]. Owing to an environment constructed by IoT, the combination of a wide range of wireless sensing networks, and various smart devices and network domains, network-linked objects have been extended to include objects in real life to form a gigantic network [7]. Consequently, the relevant information derived from the intelligent-object can be applied to commercial activities. IoT is not merely an expansion of the Internet or communication networks. Through the ability to link objects, more meaningful information can be collected. Hence, when IoT is combined with the precise positioning function of smart mobile devices, smart location-based personalized information can be obtained, which will eventually subvert traditional business operations.

The investigation of behavioral intention in this study is based on a technology acceptance model. Incentive theory viewpoints are added to the external variables in the model. Whether or not various external stimuli imposed upon consumers will indirectly affect user behavior through perceived usefulness and perceived ease of use can be observed. Through the model, consumer acceptance and willingness to use the store apps can be understood. This can help bring stores and their customers closer together and is helpful in improving store operation.

The objectives of this study are stated as follows:To use the technology acceptance model as a framework, with the addition of incentive theory viewpoints to discuss the effects of various external stimuli to consumers, and the acceptability and willingness to use store apps. The rest of this dissertation is organized as follows:An introduction that explains the background, and motivation, purpose of this study. Literature reference in this study that discusses IoT, incentive theory, and relevant theory of technology acceptance model. In the study method, data analysis method is employed to explore behavioral intention. The contents include research structures, objects, Study Hypothesis, Questionnaire Design and Distribution. The results and findings are also explained in this study. It includes descriptive statistics, reliability and validity analysis, and validation of the research models. Final conclusions of this study.

2? Literature Review

In this section, the relevant theories and technologies used in this study are explained. These include the Internet of Things and the technology acceptance model.

2.1? Internet of Things(IoT)

In the era of the Internet, people can interconnect and obtain information via the network. Through the combinational use of network and various wireless communication sensing networks, objects can now communicate with each other through the Internet environment [6].

The Internet of Things is not a new technology and is actually a very broad concept. "Things are made intelligent through the implantation of various micro-sensing chips in them. Wireless network is used to connect those intelligent things to the Internet. Hence, the information of things can be shared to implement dialogue between people and things, and communication between things. In this way, the things people interact with in their daily lives can automatically report their states. The things also automatically communicate with other things and people [1].

The operation of the Internet of Things is mainly divided into a three-layer structure. They are the perceived layer, network layer and application layer. These layers are described below. (1) The lowest layer is the perceived layer. It consists of sensing components, which mainly include data collection equipment. The main task of the perceived layer is to identify objects and to collect the information of various heterogeneous sensing data. (2) The middle layer is the network layer. communication networks and the Internet. Its main function is to perform tran It is built on the existing mobile smission and processing of information.(3) The top layer is the application layer. This layer combines the societal and real life usage requirements to further create an intelligent application system.

2.2? Technology Acceptance Model(TAM)

Based on TRA (Theory of Reasoned Action) with some modifications, Davis et al. [4] abandoned the ideas of subjective norm and normative beliefs and the motivation to comply, and instead proposed to add in two important facets: Perceived Usefulness (PU) and Perceived Ease of Use (PEU). Moreover, external variables were added to extend the acceptance of the system in question. The model is called the Technology Acceptance Mode (TAM), It is used to explain, predict, and diagnose the attitude and behavioral intention patterns of users facing new technologies. Since TAM is highly interpretive in the adoption of new technology, it is widely used in studies of consumer acceptance of new technology. It is used to understand the impact of external variables on users' internal beliefs, attitude, and intention, thereby affecting the use of new technology.

3? Study Method

This section explains in detail how the research was carried out, including explanation of the research framework, questionnaire design, and statistical methods used in the data analysis.

3.1? Research Structure

The framework is shown in Figure 1:

3.2? Study Objects, Questionnaire Design and Distribution

The study objects were set as the shops with iBeacon sensors installed and the users who had downloaded the app. The internet questionnaires were distributed, and the survey was conducted using Convenience Sampling. To reduce the number of invalid questionnaires, prior to filling the questionnaire, the consumers were asked whether they had downloaded the app and whether they had experience with the app. A total of 210 questionnaires were collected during the survey period. After lie checking, 21 invalid questionnaires were excluded, leaving 189 valid samples. The effective questionnaire rate was 90%. The questionnaires were measured using the 5-point Likert-Format Scale and the respondents were asked to select their opinions on the items (1 for strongly disagree, 5 for strongly agree). The higher the score, the higher the agreement.

3.3? Data Analysis Methods and Tools

In this study, SPSS version 22 and Smart PLS version 2.0 statistics software were used as data analysis tools. Smart PLS version 2.0 uses the PLS (Partial Least Squares) method to conduct mode analysis. [2]. At the same time, it provides a structural model for the verification of the relationship between structural concepts, and verification of the reliability and validity of a model.

4? Data Analysis

This section will explain the narrative statistical analysis, reliability and validity analysis, and verification of the research model of this study.

4.1 Narrative Statistical Analysis

In this study, basic data analysis was conducted on the valid questionnaire samples. There were more males (n=104, 55%) than females (n=85, 45%) among the respondents. The age distribution ranged from 18 to 39 years old and the majority were between 18 and 29 years old. The majoritys marital status was unmarried (n=101, 53.4%). The majoritys education level was university level (n=135, 71.4%). Their professions were mainly in the service sector (n=84, 44.4%) and in the military, police, government and education sector (n=33, 17.5%), followed by the information industry sector (n=21, 11.1%). The majority had monthly average incomes between $30,001 and $40,000 (n=78, 41.3%), followed by $40,001 and $50,000 (n=28, 14.8%). The majority had monthly average expenditure of between $5,001 and $10,000 (n=64, 33.9%), followed by $10,001 and $20,000 (n= 60, 31.7%).

4.2? Reliability and Validity Analysis

In this section, reliability analysis and factor analysis are described respectively.

4.2.1? Reliability Analysis

In questionnaire reliability testing, the reliability of the scale was tested by using Cronbach's α value proposed by Hair et al. [5] to measure the internal consistency of each facet. If α was larger than 0.7, the scale had high reliability. The reliability of the questionnaire was acceptable. The Cronbach's α values for all the study facets ranged from 0.713 to 0.953. They all attained Cronbach's α value criterion of 0.7. Hence, all facets of this study had good reliability level and each facet had high internal consistency.

4.2.2? Factor Analysis

In this study, we first performed a Bartlett's Sphericity Test. The test result was 5947.683 (Sig.= 0.000 <0.05) in Chi-square value, approaching 0.00, and it reached the significant level. This means that the items had a strong correlation between each other and the data were suitable for factor analysis. Furthermore, the result of Kaiser-Meyer-Olkin (KMO) test was 0.855. This means that each question had a high common variance, and the variations were very low in uniqueness.

The cross-loading scale for each facet shows that all factor loadings of all questions were greater than 0.5 and the other non-facet factor loadings were less than 0.5. Hence, the cross-loading analysis for each facet had reached the standard proposed by Chin [2]. The above analysis results prove that the study questionnaire had a good construct validity.

4.3? Research Model Validation

In the parameter estimation of SmartPLS, the bootstrapping method was used for analysis. Resampling of samples was used to estimate the distribution of statistical amounts. The settings for resampling was based on the suggestion of Chin [2]. To verify the significance of the estimated values of model structural paths, the resampling number was set to 500.

The research model verification results, except for the hypotheses H1, H5, H7, H9, H10, and H13, which received a significant level of verification support, the other hypotheses did not receive verification support. The model verification shows in Figure 2; the structural model path coefficient diagram shows in Figure 3:

4.4? Hypothesis Verification and Results

The results of model validation show that convenience, information, entertainment and interactive incentives all had a positive effect on perceived usefulness; and perceived usefulness had a positive effect on behavioral intention. As to the influence of convenience, promotion, information, entertainment, and interactive incentives on the perceived ease of use, only interactive incentive had significant effect. However, it did not indirectly affect behavioral intention via perceived ease of use.

5? Conclusions

The investigation of behavioral intention is to understand users acceptance and using willingness of the store app which can help narrow the gap between stores and consumers, and help improve operations. This study uses TAM as a framework and applies incentive theory to the external variables to determine whether consumers behavioral intention in using the app can be indirectly affected via perceived usefulness and perceived ease of use when the consumers are under various external stimuli and incentives.

The study results revealed that the external variables of convenience, information, entertainment and interactive incentives indirectly affect consumers behavioral intention through perceived usefulness. As to the influence of convenience, promotion, information, entertainment and interactive incentives on the perceived ease of use, only interactive incentive is significant, yet it does not indirectly affect behavioral intention through perceived ease of use.

Reference:

[1]張志勇,翁仲銘,石貴平,廖文華(2013),物聯(lián)網(wǎng)概論,碁峰信息股份有限公司.

[2]Chin, W.W. (1998), “The Partial Least Squares Approach to Structural Equation Modeling,” In G. A. Marcoulides (Ed.), Modern Methods for Business Research. Mahwah, New Jersey: Lawrence Erlbaum Associates, pp. 295-336.

[3]Coetzee, L., & Eksteen, J. (2011), “The Internet of Things-promise for the Future an Introduction,” Proceedings of the IST- Africa Conference, pp. 1-9.

[4]Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, Vol. 35, No. 8, pp. 982-1003.

[5]Hair, J.F., Anderson, R.E., Tatham, R.L., & Black, W.C. (1998), Multivariate Data Analysis (5th ed.), New Jersey: Prentice-Hall, Inc.

[6]ITU Internet Reports(2005), The Internet of Things, International Telecommunication Union.

[7]Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., & Borriello, G. (2009), “Building the Internet of Things Using RFID: The RFID Ecosystem Experience,” Proceedings of the IEEE Internet Computing, Vol. 13, No. 3, pp. 48-55.

猜你喜歡
信息
訂閱信息
中華手工(2017年2期)2017-06-06 23:00:31
展會信息
中外會展(2014年4期)2014-11-27 07:46:46
信息超市
展會信息
展會信息
展會信息
展會信息
展會信息
信息
健康信息
祝您健康(1987年3期)1987-12-30 09:52:32
主站蜘蛛池模板: 福利在线不卡一区| 91精品专区国产盗摄| 国产区精品高清在线观看| 蜜臀av性久久久久蜜臀aⅴ麻豆| 国产精品人成在线播放| 国产一区三区二区中文在线| 色婷婷国产精品视频| 欧美国产日韩一区二区三区精品影视| 99er精品视频| 久久亚洲国产一区二区| 国产视频一区二区在线观看 | 亚洲国产日韩在线成人蜜芽| 午夜色综合| 亚洲水蜜桃久久综合网站| 在线免费无码视频| 免费A级毛片无码无遮挡| 日韩A级毛片一区二区三区| 亚洲欧洲日韩综合| 国产一区二区免费播放| 国产欧美日韩精品第二区| a免费毛片在线播放| 成人福利在线看| 亚洲一区国色天香| 久久99国产乱子伦精品免| 高清精品美女在线播放| 一级毛片免费观看久| 久久久久亚洲精品成人网| 2021天堂在线亚洲精品专区 | 丁香婷婷久久| 国产福利微拍精品一区二区| 国产午夜不卡| 女人18一级毛片免费观看| 国产一级小视频| 毛片一区二区在线看| 久久精品66| 久久中文无码精品| 午夜丁香婷婷| 国产麻豆永久视频| 国产在线一区视频| 亚洲第一国产综合| 日本一区二区三区精品国产| 欧美精品二区| 国产成人AV大片大片在线播放 | 国产一级毛片yw| 日韩国产另类| 永久免费精品视频| 免费无码又爽又黄又刺激网站| 国产麻豆精品在线观看| 欧美不卡二区| 国产精品99一区不卡| 亚亚洲乱码一二三四区| 亚洲一区无码在线| 欧美成人精品在线| 成人免费视频一区二区三区| 国产肉感大码AV无码| 性欧美精品xxxx| 91色爱欧美精品www| 亚洲最新地址| 97国产精品视频自在拍| 婷婷开心中文字幕| 日本不卡视频在线| 欧美在线一级片| 999精品色在线观看| 国产成人精品高清不卡在线| 国产亚洲精品无码专| 波多野结衣视频一区二区| 一级黄色片网| 亚洲午夜天堂| 成人蜜桃网| 成人国产精品视频频| 国产aⅴ无码专区亚洲av综合网| 国产欧美日韩91| 一本一道波多野结衣av黑人在线| 免费国产黄线在线观看| 欧美日本激情| 69视频国产| 色久综合在线| 99九九成人免费视频精品| 无码国产偷倩在线播放老年人 | 亚洲成人福利网站| 色婷婷综合在线| 又爽又黄又无遮挡网站|