Impact of Security and Trust as Factors that influence the Adoption and Use of Digital Technologies that Generate, Collect and Transmit User Data
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28120%2F20%3A63524877" target="_blank" >RIV/70883521:28120/20:63524877 - isvavai.cz</a>
Result on the web
<a href="https://search.proquest.com/docview/2390159752?pq-origsite=gscholar" target="_blank" >https://search.proquest.com/docview/2390159752?pq-origsite=gscholar</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.34190/ICCWS.20.016" target="_blank" >10.34190/ICCWS.20.016</a>
Alternative languages
Result language
angličtina
Original language name
Impact of Security and Trust as Factors that influence the Adoption and Use of Digital Technologies that Generate, Collect and Transmit User Data
Original language description
Among several factors that influence users' decision to adopt technology, studies have shown that the perception users attach to “security” and “trust” have a significant influence on their willingness to adopt such technology. Also, “social influence” plays an important role, the conceptual framework adopted for this study shows the relationship among these factors. The assurance of security and trustworthiness of technology is relevant in building the confidence of users towards technology adoption and use, as it reduces their level of anxiety towards such technology. The study aimed to contribute to the body of scientific evidence by filling the theoretical and empirical gap associated with users’ behavioural intentions towards the adoption and use of technological artifacts that collect, store and transmit users' private data. The study took inspirations from theoretical frameworks such as TAM, UTAUT, and the IUIPC in proposing the conceptual framework adopted for the study. The study investigated the effect of security, trust and social influence in the adoption and usage of digital technologies that handle user private data. To test the hypothesized relationships in the research framework, a positivist research paradigm was adopted, precisely a quantitative approach. More specifically, a variance-based structural equation modelling (i.e., PLS-SEM) was employed in testing the research hypotheses. The research concluded by establishing that security and trust considerations as well as social influence impact user behavioural intentions to adopt these technologies, and how they prioritize each of these three factors. The research contributes to the existing body of knowledge on technology adoption by exploring how security and trust influence the behavioural intention of a user to adopt any technological artifact which handles their personal.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
50204 - Business and management
Result continuities
Project
—
Continuities
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Others
Publication year
2020
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020)
ISBN
978-1-71380-880-0
ISSN
—
e-ISSN
—
Number of pages
12
Pages from-to
363-372
Publisher name
Academic Conferences Ltd.
Place of publication
Sonning Common
Event location
Norfolk
Event date
Mar 12, 2020
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000560067200043