scholarly journals UTAUT2 Based Predictions of Factors Influencing the Technology Acceptance of Phablets by DNP

2015 ◽  
Vol 2015 ◽  
pp. 1-23 ◽  
Author(s):  
Chi-Yo Huang ◽  
Yu-Sheng Kao

The smart mobile devices have emerged during the past decade and have become one of the most dominant consumer electronic products. Therefore, exploring and understanding the factors which can influence the acceptance of novel mobile technology have become the essential task for the vendors and distributors of mobile devices. The Phablets, integrated smart devices combining the functionality and characteristics of both tablet PCs and smart phones, have gradually become possible alternatives for smart phones. Therefore, predicting factors which can influence the acceptance of Phablets have become indispensable for designing, manufacturing, and marketing of such mobile devices. However, such predictions are not easy. Meanwhile, very few researches tried to study related issues. Consequently, the authors aim to explore and predict the intentions to use and use behaviors of Phablets. The second generation of the Unified Theory of Acceptance and Use of Technology (UTAUT2) is introduced as a theoretic basis. The Decision Making Trial and Evaluation Laboratory (DEMATEL) based Network Process (DNP) will be used to construct the analytic framework. In light of the analytic results, the causal relationships being derived by the DEMATEL demonstrate the direct influence of the habit on other dimensions. Also, based on the influence weights being derived, the use intention, hedonic motivation, and performance expectancy are the most important dimensions. The analytic results can serve as a basis for concept developments, marketing strategy definitions, and new product designs of the future Phablets. The proposed analytic framework can also be used for predicting and analyzing consumers’ preferences toward future mobile devices.

Author(s):  
Sumaiya Mushroor ◽  
Shammin Haque ◽  
Riyadh A. Amir

Background: Overuse of smart devices provides comfort and problems both physically and mentally. The aim of this study was to assess the impact of smart phone and mobile devices on human health and life.Methods: This descriptive type of cross sectional study was conducted for three months in Dhaka city among general population aged 18 to 70 years. Four hundred and forty respondents were selected by non-probability convenient sampling technique. Data were collected by face to face interview with a semi-structured pre-tested questionnaire.Results: Among 440 respondents majority (76.6%) were below 25 years where 72.0% were students. A large proportion (90.5%) used smart phones for communication, 53.4% used for less than 5 hours daily. Majority (65.7%) had other electronic devices, most common 197 (68.1%) were laptop users where 118 (40.8%) used for studying. More than half 322 (73.2%) used earphones, 91 (20.7%) had ear problems and 223 (50.7%) lacked concentration. Many 299 (68.0%) had good relationship with family members, 208 (47.3%) stated that increased use of mobile devices hampered family life, 88 (42.3%) thought it reduced quality family time. Majority users 253 (57.5%) experienced physical discomfort after prolonged use and 95 (37.7%) suffered from headache. Association between age of respondents and time spent on smart devices was statistically significant (p<0.05). There was significant (p<0.05) association between ear problem and ear phone usage.Conclusions: Excessive use of smart phones should be avoided and social awareness increased through health programmes. Potential risks of cell phones and smart devices can be avoided by limiting the use.


2019 ◽  
Vol 11 (10) ◽  
pp. 215
Author(s):  
Behan ◽  
Krejcar ◽  
Sabbah ◽  
Selamat

: Today’s digital society is interconnected and networked, with modern smart devices ubiquitously built into and embedded within smart environments and other environments, where people (their users) typically live. It is very important to mention that sensorial awareness of an environment depends on one’s current location and equipment, as well as the equipment’s real-time capabilities. Personal sensorial information is considered to be the key factor for progress in the improvement of the productivity of everyday life and creation of a smart surrounding environment. This paper describes the design, implementation, and testing process of a new sensorial framework based on the current possibilities created by ubiquitous smart mobile devices with sensors, which involves computing power and battery power issues. The two parts of the proposed framework have been designed, implemented, and tested. The client part is represented by a front-end mobile application, and the back-end part is represented by a server-side application. The analysis of the data, captured during the testing phase, involves the analysis of the processing time, battery consumption, and transmitted data amount. This analysis reveals that Transmission Control Protocol (TCP) and user datagram protocol (UDP) protocols have a comparable performance, although TCP is preferable for use in local networks. In comparison to other solutions such as MobiSense or Feel the World framework, the final solution of the proposed and developed sensorial framework has two main capabilities, which are the security support and social networking possibilities. The advantage of the MobiSense platform is the existence of several real-world applications, whereas the proposed sensorial framework needs to be verified in the massive context of many users in real time.


Author(s):  
Brian C. Lovell ◽  
Daniel F. Smith

Biometric systems are generally restricted to specialist deployments and require expensive equipment. However, the world has recently experienced the widespread rollout of cheap biometric devices in the form of smart phones and tablets. One of the main drivers for mainstream adoption of biometric technologies is the need to address continuing problems with authenticating to online systems. These mobile devices may now be suitable to provide biometric-based authentication to a wide user population. This chapter discusses the different ways that face recognition can be used on smart mobile devices. The authors highlight the online authentication problem and show how three-factor authentication can address many pressing issues. They also discuss the ways that such a system could be attacked, and focus on replay attacks which have yet to be seriously addressed in the literature. The authors conclude with a brief examination of the current research into addressing replay attacks.


2014 ◽  
Vol 539 ◽  
pp. 460-463 ◽  
Author(s):  
Jiang Tao Geng ◽  
Xiao Bo Xiong

The paper design mobile information collection system based on Internet of Things, implemented access gateway by smart mobile devices through a variety of ways, such as Wi-Fi and access the underlying perceptual information based on ZigBee wireless sensor networks. On the one hand, For information sensitivity of the sensor network, we design the mobile terminal through the gateway access authentication protocol, and effective solute the authentication and information between mobile devices and gateways, gateway and sensor network nodes obtain permission problem; on the other hand, according to the practical application of mobile information collection characteristics, the paper proposed information collection strategy based on historical data movement path to solve the problem for too long the device connection is established when the mobile smart devices collecting information along fixed lines, increasing the actual data transmission time and improve the efficiency of information transmission.


2014 ◽  
Vol 32 (2) ◽  
pp. 170-182
Author(s):  
Hsien-Tang Lin ◽  
Lawrence W. Lan

Purpose – The purpose of this paper was to develop a new interactive guiding system allowing people to use their own smart mobile devices, such as smart phones or tablet PCs, to activate the guiding services at the art gallery. The system provided interactions between visitors and exhibit items. It focused on the highly interactive functions between visitors and artworks authors as well as among visitors at both exhibition sites and social network sites (SNSs). Design/methodology/approach – The system used quick response (QR) codes as the context aware elements, Facebook as the platform of SNSs, and smart mobile devices as the human-machine interfaces. Visitors carrying their own smart phones or tablet PCs can activate the guiding services by scanning the QR codes of the interested exhibit items. A system usability scale (SUS) survey was conducted to understand the visitors' perceptions on system usability. A questionnaire survey was conducted to collect the visitors' and authors' attitudes on releasing messages through Facebook. Findings – The system was implemented at an art centre where lacquer artworks were on display. The SUS survey showed that 94 per cent of the participated visitors have satisfactorily rated this new guiding system, indicating rather high usability of the system. Most participated visitors agreed on Facebook as an ideal channel to release messages and they would pay more attention to the highly-recommended exhibit items. All the artworks authors consented to this new guiding system with potential power to disseminate their works over the cyberspace. Originality/value – This new system possesses some important features in blending real world and cyberspace activities. Visitors at exhibit sites can become more informed and captivated because the interactive guiding system enables them to share knowledge and commentary opinions with others who were, are or will be at the same exhibition. It also allows people to share with their cyberspace friends who may have no times or opportunities to visit the exhibition. Most importantly, the new system may immensely expand the number of potential visitors in ways to make the authors and their artworks rapidly recognized.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Tahsin YAGCI

In recent years advances in social networking and rapid developments in wireless internet technologies stimulated all of us to integrate and use them in our lives. Smart mobile technology industries are racing with each other to launch the newest model for their consumers. The biggest market beyond the dispute is teenagers and young generation. Of course, the adults cannot be ignored, either. The general aim to use the social network is for communication and sharing information. During the daytime students want to keep in touch with their peers. The most common electronic devices are smart mobile phones and the top rate for social networking website is Facebook. This study aims to seek for and clarify the perceptions and the attitudes of undergraduate students in Northern Iraq, using electronic devices, in particular, smart mobile devices. What kinds of social media tools and platforms they are registered to? How often do they benefit from their accounts? What is their frequency to login to internet access and what part of the day do students use their mobile devices? What are students’ general purposes to use social media? – these were the questions asked in the research. This article emphasizes the diversity according to gender, faculty, grade, universities, etc. In addition, it seeks for the distribution of social media accounts. An online survey, conducted among different university students to recognize the ratio between various institutions, came to a conclusion that undergraduate students in Northern Iraq are equipped with sufficient smart devices to get involved in mobile learning via using social platforms such as Facebook, Instagram, Twitter, etc.  


2020 ◽  
Vol 14 (4) ◽  
Author(s):  
Indriyanti, Tri Wahyuni, Erni Ermawati, Nurul Ichsan , Haerul Fatah

AbstrakBerkembangnya teknologi informasi memberikan pengaruh yang cukup bagi masyarakat, tetapi terkadang ada beberapa teknologi yang kurang diterima oleh masyarakat karena beberapa faktor. Penelitian ini bertujuan untuk menganalisis rasio metode TAM dan UTAUT dalam mengukur keberhasilan penggunaan aplikasi Ojek Online di Sleman, Yogyakarta. Metode yang paling banyak digunakan untuk menganalisis keberhasilan penggunaan teknologi adalah metode TAM dan UTAUT. Metode TAM dan UTAUT juga merupakan metode terbaik karena mampu menjelaskan perilaku pengguna terhadap penggunaan teknologi. Responden dalam penelitian ini adalah pengguna aplikasi Ojek Online di Kabupaten Sleman di Yogyakarta yang terdiri dari siswa dan masyarakat umum. Responden dalam penelitian ini diambil secara acak dari seluruh populasi. Data yang dikumpulkan diolah menggunakan SPSS agar mudah dianalisis lebih lanjut. Metode yang digunakan adalah metode korelasional. Hasil dari penelitian ini adalah bahwa metode TAM dan UTAUT mampu menganalisis penerimaan aplikasi Ojek Online meskipun nilai beberapa konstruk yang digunakan dalam penelitian ini hanya mempengaruhi penggunaan aktual sebesar 8% dan 5,2%. Kata kunci: Analisa Model, Technology Acceptance Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT), Aplikasi Ojek Online, Uji Determinasi


Author(s):  
Dr. Abu Turab Alam

A useful Information System is difficult to conceive and develop. Research on technology has revealed that end-user likes or dislikes may matter towards the success or failure of information system (IS). A highly complicated system in which developers have put lots of development efforts may fail if the end-user dislikes it after its initial installation. In software engineering literature it is claimed that system rejection is mostly caused by not meeting the non-functional requirements. In this paper, a study is being done on ‘turnitin®’ as technology and its acceptance to a group of students in order to find out confirmation of result as claimed by TAM while it is a post implementation research activity for technology acceptance.


2017 ◽  
Vol 2 (2) ◽  
pp. 31-35
Author(s):  
Akshada Abnave ◽  
Charulata Banait ◽  
Mrunalini Chopade ◽  
Supriya Godalkar ◽  
Soudamini Pawar ◽  
...  

M-learning or mobile learning is defined as learning through mobile apps, social interactions and online educational hubs via Internet or network using personal mobile devices such as tablets and smart phones. However, in such open environment examination security is most challenging task as students can exchange mobile devices or also can exchange information through network during examination. This paper aims to design secure examination management system for m- learning and provide appropriate mechanism for anti- impersonation to ensure examination security. The users are authenticated through OTP. To prevent students from exchanging mobile devices during examination, system re-authenticates students automatically through face recognition at random time without interrupting the test. The system also provides external click management i.e. prevent students from accessing online sites and already downloaded files during examination.


Sign in / Sign up

Export Citation Format

Share Document