scholarly journals Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias

2020 ◽  
Vol 12 (12) ◽  
pp. 220
Author(s):  
David Harborth ◽  
Sebastian Pape

Pokémon Go is one of the most successful mobile games of all time. Millions played and still play this mobile augmented reality (AR) application, although severe privacy issues are pervasive in the app due to its use of several sensors such as location data and camera. In general, individuals regularly use online services and mobile apps although they might know that the use is associated with high privacy risks. This seemingly contradictory behavior of users is analyzed from a variety of different perspectives in the information systems domain. One of these perspectives evaluates privacy-related decision making processes based on concepts from behavioral economics. We follow this line of work by empirically testing one exemplary extraneous factor within the “enhanced APCO model” (antecedents–privacy concerns–outcome). Specific empirical tests on such biases are rare in the literature which is why we propose and empirically analyze the extraneous influence of a positivity bias. In our case, we hypothesize that the bias is induced by childhood brand nostalgia towards the Pokémon franchise. We analyze our proposition in the context of an online survey with 418 active players of the game. Our results indicate that childhood brand nostalgia influences the privacy calculus by exerting a large effect on the benefits within the trade-off and, therefore, causing a higher use frequency. Our work shows two important implications. First, the behavioral economics perspective on privacy provides additional insights relative to previous research. However, the effects of several other biases and heuristics have to be tested in future work. Second, relying on nostalgia represents an important, but also double-edged, instrument for practitioners to market new services and applications.

2020 ◽  
Vol 6 (2) ◽  
pp. 205630512092847
Author(s):  
Yu-Hao Lee ◽  
Chien Wen Yuan

Relationship building through social network sites (SNSs) requires privacy disclosure that involves a calculus of potential benefits against privacy risks. Tie formation (e.g., friending, following, or connecting) on SNSs is one of the most significant forms of privacy disclosure that not only communicate one’s willingness to disclose but can also reveal past activity history and invite future interactions. Based on the communication privacy management theory, the current study examines how users consider the privacy calculus and tie-formation affordances of the SNSs to manage ties across multiple SNSs. Using an online survey of 630 Facebook and/or Instagram users, the study revealed that individuals with higher privacy concerns strategically manage their privacy by connecting with different relationship ties through different SNSs as a way to construct sociotechnical boundaries between networks. The findings have implications for understanding privacy management online and provide a potential explanation for the privacy paradox.


2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


2010 ◽  
Vol 25 (2) ◽  
pp. 109-125 ◽  
Author(s):  
Hanna Krasnova ◽  
Sarah Spiekermann ◽  
Ksenia Koroleva ◽  
Thomas Hildebrand

On online social networks such as Facebook, massive self-disclosure by users has attracted the attention of Industry players and policymakers worldwide. Despite the Impressive scope of this phenomenon, very little Is understood about what motivates users to disclose personal Information. Integrating focus group results Into a theoretical privacy calculus framework, we develop and empirically test a Structural Equation Model of self-disclosure with 259 subjects. We find that users are primarily motivated to disclose Information because of the convenience of maintaining and developing relationships and platform enjoyment. Countervailing these benefits, privacy risks represent a critical barrier to information disclosure. However, users’ perception of risk can be mitigated by their trust in the network provider and availability of control options. Based on these findings, we offer recommendations for network providers.


2021 ◽  
pp. 1-15
Author(s):  
Constantina Costopoulou ◽  
Maria Ntaliani ◽  
Filotheos Ntalianis

Local governments are increasingly developing electronic participation initiatives, expecting citizen involvement in local community affairs. Our objective was to assess e-participation and the extent of its change in local government in Greece. Using content analysis for 325 Greek municipal websites, we assessed e-participation status in 2017 and 2018 and examined the impact of change between these years. The assessment regards two consecutive years since the adoption of digital technologies by municipalities has been rapid. The main findings show that Greek local governments have made significant small- to medium-scale changes, in order to engage citizens and local societies electronically. We conclude that the integration of advanced digital technologies in municipalities remains underdeveloped. We propose that Greek municipalities need to consider incorporating new technologies, such as mobile apps, social media and big data, as well as e-decision making processes, in order to eliminate those obstacles that hinder citizen engagement in local government. Moreover, the COVID-19 outbreak has highlighted the need for enhancing e-participation and policymakers’ coordination through advanced digital technologies.


2021 ◽  
Author(s):  
Stephanie Maria Jansen-Kosterink ◽  
Marian Hurmuz ◽  
Marjolein den Ouden ◽  
Lex van Velsen

UNSTRUCTURED Background: eHealth applications have been recognized as a valuable tool to reduce COVID-19’s effective reproduction number. In this paper, we report on an online survey among Dutch citizens with the goal to identify antecedents of acceptance of a mobile application for COVID-19 symptom recognition and monitoring, and a mobile application for contact tracing. Methods: Next to the demographics, the online survey contained questions focussing on perceived health, fear of COVID-19 and intention to use. We used snowball sampling via posts on social media and personal connections. To identify antecedents of acceptance of the two mobile applications we conducted multiple linear regression analyses. Results: In total, 238 Dutch adults completed the survey. Almost 60% of the responders were female and the average age was 45.6 years (SD±17.4). For the symptom app, the final model included the predictors age, attitude towards technology and fear of COVID-19. The model had an R2 of 0.141. The final model for the tracing app included the same predictors and had an R2 of 0.156. The main reason to use both mobile applications was to control the spread of the COVID-19 virus. Concerns about privacy was mentioned as the main reason not to use the mobile applications. Conclusion: Age, attitude towards technology and fear of COVID-19 are important predictors of the acceptance of COVID-19 mobile applications for symptom recognition and monitoring and for contact tracing. These predictors should be taken into account during the development and implementation of these mobile applications to secure acceptance. Discussion: Age, attitude towards technology and fear of COVID-19 are important predictors of the acceptance of COVID-19 mobile applications for symptom recognition and monitoring and for contact tracing. These predictors should be taken into account during the development and implementation of these mobile applications to secure acceptance. Age, attitude towards technology and fear of COVID-19 are important predictors of the acceptance of COVID-19 mobile applications for symptom recognition and monitoring and for contact tracing. These predictors should be taken into account during the development and implementation of these mobile applications to secure acceptance.


2021 ◽  
Vol 8 ◽  
Author(s):  
Jing Yuan ◽  
Chunying Shen ◽  
Chengnan Wang ◽  
Gang Shen ◽  
Bing Han

Background: Drug interactions are the most common preventable cause of adverse drug reaction, which may result in drug toxicity or undesired therapeutic effect with harmful outcomes to patients. Given the rising use of combination therapies, the main objectives of this study were to estimate the degree to which physicians can identify potential drug-drug interactions (PDDIs) correctly and to describe the common source of information used by physicians when they need to check PDDIs.Methods: A cross-sectional survey utilizing a self-administered online questionnaire was conducted among physicians in China. Participants were asked to classify 20 drug pairs as “no interaction,” “may be used together with monitoring,” “contraindication,” and “not sure.” We also collected data on the physician's source of information and altitude toward the PDDIs. An ordinary least square regression model was performed to investigate the potential predictors of PDDI knowledge.Results: Eligible questionnaires were obtained from 618 physicians. The respondents classified correctly 6.7 out of 20 drug pairs, or 33.4% of the drug interactions investigated. The number of drug pairs recognized by respondents was ranged from 0 to 16. The percentage of physicians who recognized specific drug pairs ranged from 8.3% for no interactions between conjugated estrogens and raloxifene, to 64.0% for the interaction between dopamine and phenytoin. When the respondents want to check PDDI information, the most commonly used source of information was package inserts (n = 572, 92.6%), followed by the Internet or mobile Apps (n = 424, 68.6%), consultation with clinical pharmacists (n = 384, 62.1%), medical textbooks (n = 374, 60.5%), knowledge base in Chinese (n = 283, 45.8%), and other physicians (n = 366, 59.2%). In the multiple regression analysis, the significant predictors of a higher number of recognized drug pairs were years of practice and altitudes toward PDDIs.Conclusion: In this online survey accessing physician's ability to detect PDDIs, less than half of the drug pairs were recognized, indicating unsatisfactory level of knowledge about the clinically significant drug interactions. Continuing education and accessible electronic database can help physicians detecting PDDIs and improve drug safety.


2021 ◽  
Vol 10 (3) ◽  
pp. 283-306
Author(s):  
Yannic Meier ◽  
Johanna Schäwel ◽  
Nicole C. Krämer

Using privacy-protecting tools and reducing self-disclosure can decrease the likelihood of experiencing privacy violations. Whereas previous studies found people’s online self-disclosure being the result of privacy risk and benefit perceptions, the present study extended this so-called privacy calculus approach by additionally focusing on privacy protection by means of a tool. Furthermore, it is important to understand contextual differences in privacy behaviors as well as characteristics of privacy-protecting tools that may affect usage intention. Results of an online experiment (N = 511) supported the basic notion of the privacy calculus and revealed that perceived privacy risks were strongly related to participants’ desired privacy protection which, in turn, was positively related to the willingness to use a privacy-protecting tool. Self-disclosure was found to be context dependent, whereas privacy protection was not. Moreover, participants would rather forgo using a tool that records their data, although this was described to enhance privacy protection.


10.2196/31664 ◽  
2022 ◽  
Vol 24 (1) ◽  
pp. e31664
Author(s):  
Jaegyeong Lee ◽  
Jung Min Lim

Background The prevalence and economic burden of dementia are increasing dramatically. Using information communication technology to improve cognitive functions is proven to be effective and holds the potential to serve as a new and efficient method for the prevention of dementia. Objective The aim of this study was to identify factors associated with the experience of mobile apps for cognitive training in middle-aged adults. We evaluated the relationships between the experience of cognitive training apps and structural variables using an extended health belief model. Methods An online survey was conducted on South Korean participants aged 40 to 64 years (N=320). General characteristics and dementia knowledge were measured along with the health belief model constructs. Statistical analysis and logistic regression analysis were performed. Results Higher dementia knowledge (odds ratio [OR] 1.164, P=.02), higher perceived benefit (OR 1.373, P<.001), female gender (OR 0.499, P=.04), and family history of dementia (OR 1.933, P=.04) were significantly associated with the experience of cognitive training apps for the prevention of dementia. Conclusions This study may serve as a theoretical basis for the development of intervention strategies to increase the use of cognitive training apps for the prevention of dementia.


2020 ◽  
Author(s):  
Philipp Schröder ◽  
Charly Gaul ◽  
Attyla Drabik ◽  
Albrecht Molsberger

Abstract Background and Objective:Applying local treatments like neuromodulation or injections for cluster headache, requires exact knowledge of the anatomical structures and pain topography. However studies with emphasis on exact pain localization are rare although local treatments are increasingly used for patients in whom systemic pharmacotherapy is ineffective or contraindicated. Here, survey results with emphasis on exact pain location in cluster headache attacks for onset of pain, peak pain and radiation of pain, are presented. Methods: Data from 631 respondents were collected for 23 months using an online survey composed of 117 questions on pain location, epidemiology, and clinical features. 5260 datapoints on 44 pain locations were analyzed.Results: There is a periorbital concentration of pain during onset and peak phases of attacks. Pain locations outside the periorbital region were reported more frequently during radiation when compared to the onset and peak of attacks. Dorsal (occipital/nuchal) pain is more frequent during onset and radiation compared to peak: onset pain (13%) vs. peak pain (6%), p < 0,001. Pain radiation (22%) vs. peak pain (6%), p < 0,001. There is no significant difference in dorsal pain frequencies for pain radiation (22%) vs. onset (13%), p = 0,552. Furthermore, single pain spots differ significantly in frequency during the three attack phases.Conclusions: Analysis of the pain location data shows phase specific frequencies and distributions of pain location during the three stages of a cluster headache attack. Single pain spots differ significantly in frequency during the three attack phases. Dorsal pain is more frequent during onset and radiation, compared to peak. Extra-orbital pain locations are more frequent during pain radiation. These findings will help to better understand cluster headache and might help to identify further target structures for local treatments.


2011 ◽  
pp. 3987-4012
Author(s):  
Jeff Baker ◽  
Jaeki Song

Internet auctions have received a considerable amount of attention from researchers. We review recent empirical literature pertaining to single-item Internet auctions and observe that existing work has examined the roles of the auctioneer, bidder, and seller in Internet auctions. As this stream of research matures, research will necessarily move from concept discovery and process explanation to theory deepening. As a first step towards synthesis of findings in Internet auctions, we compile a comprehensive list of the various factors that have been examined in empirical studies and note their general impact upon auction outcome. Based upon this extant research, we propose a conceptual model of Internet auctions as a framework for structuring future work into Internet auctions. We then note the existing economic, psychological, sociological, and cognitive theoretical bases for work on Internet auctions. We conclude by highlighting the potential for behavioral economics to bring unity to Internet auction research and by calling researchers to engage in the work of forging a comprehensive theory of Internet auctions.


Sign in / Sign up

Export Citation Format

Share Document