Core Research Questions - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Core Research Questions

Description:

I think I have taken adequate measures to ensure my wireless privacy. ... install, use, and maintain tools for firewalls, anti-virus, anti-spyware, etc. ... – PowerPoint PPT presentation

Number of Views:48
Avg rating:3.0/5.0
Slides: 22
Provided by: robert510
Category:

less

Transcript and Presenter's Notes

Title: Core Research Questions


1
Core Research Questions?
  • Can theory X (TAM, TPB) predict use of
    wireless? mobile? security tools?
  • Can theory X (TTF?) explain differences in wired
    versus wireless? application usage?
  • Is a new or improved theory needed to
    explain/predict mobile/wireless usage?

2
Other Research Questions?
  • Does intent to use security tools lead to (1)
    actual use and (2) effective use?
  • (Methodology) Do online experience sampling and
    adaptive sampling methods offer advantages . . .

3
Task-Technology Fit
Task Characteristics
Performance Impacts
Task-Technology Fit
Technology Characteristics
Utilization
http//www.istheory.yorku.ca/tasktechnologyfit.htm
4
Task Technology Fit Factors
5
TTF Utilization Measures
  • IS-related
  • Proportion of time users choose to utilize
  • Extent of integration into an individuals
    routine
  • Extent of users dependence on system
  • Mobile/wireless-related
  • IS-related plus
  • Number of authenticated sessions?
  • Quantity of traffic for various applications?

6
TTF Performance Measures
  • IS-related
  • User-reported perceived
  • Effectiveness
  • Productivity
  • Job performance
  • Mobile/wireless-related
  • User-reported perceived
  • Effectiveness?
  • Personal productivity?
  • Convenience?

7
Theory of Reasoned Action
Attitude Toward Act or Behavior
Behavioral Intention
Behavior
Subjective Norm
http//www.istheory.yorku.ca/theoryofreasonedactio
n.htm
8
Theory of Planned Behavior
Attitude Toward Act or Behavior
Subjective Norm
Behavioral Intention
Behavior
Perceived Behavioral Control
http//www.istheory.yorku.ca/theoryofplannedbehavi
or.htm
9
Technology Acceptance Model (Davis, Bagozzi,
Warshaw 1989)
Perceived Usefulness (U)
Attitude Toward Using (A)
Behavioral Intention to Use (BI)
External Variables
Actual System Use
Perceived Ease of Use (E)
http//www.istheory.yorku.ca/Technologyacceptancem
odel.htm
10
Unified Theory of Acceptance and Use of Technology
http//www.istheory.yorku.ca/UTAUT.htm
11
TAM For Wireless Internet (Lu, Yu, Liu, Yao 2003)
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
Facilitating Conditions
12
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
Sample of our possible survey questions Others
tell me I should be using a firewall. Smart
computer users use a firewall.
Facilitating Conditions
13
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
Sample of our possible survey questions I dont
think anyone is intercepting my wireless network
traffic. I think I have taken adequate measures
to ensure my wireless privacy. I think the campus
wireless network is safe and secure.
Facilitating Conditions
14
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
Issues for our research Do we try to measure
user perceptions of complexity? Or objective
technology characteristics such as whether WEP,
etc. is implemented? (And our entire network
would be the same on most . . .)
Facilitating Conditions
15
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
Our variables? Demographics gender, age,
etc. Experience levels Personal
innovativeness Familiarity with security tools
Facilitating Conditions
16
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
We might try to measure Availability of
training, assistance, support, etc. Availability
of tools such as free firewalls.
Facilitating Conditions
17
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
To be added!
Facilitating Conditions
18
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
We might try to measure How easy users think it
is to obtain, install, use, and maintain tools
for firewalls, anti-virus, anti-spyware, etc.
Facilitating Conditions
19
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
Sample of our possible survey questions I intend
to install and use firewall software for use on
my laptop computer when connected to wireless
networks . . .
Facilitating Conditions
20
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
Sample of our possible survey questions I think
firewalls are useful enough that I should be
using one . . .
Facilitating Conditions
21
Social Influences
Long-term Usefulness
Intention to Accept
Wireless Trust Environment
Near-term Usefulness
(Actual system use not included)
Technology Complexity
Attitude to Use
Ease of Use
Individual Differences
This is where we can determine not only what
users say they do, but what they actually are
doing We can ask them if they are implementing a
firewall, etc. We can detect whether they are
(and whether its properly implemented)
Facilitating Conditions
Write a Comment
User Comments (0)
About PowerShow.com