Conference Presentations by Amita G Chin
Southern Association of Information Systems; St. Simons, GA, 2019
It has been suggested that mobile payment adoption in countries with strong financial infrastruct... more It has been suggested that mobile payment adoption in countries with strong financial infrastructures lag behind countries with weaker financial infrastructures because consumers have more choices of payment methods in strong financial infrastructure countries. Many researchers have attempted to determine the factors that influence the consumer adoption of mobile payment systems for the past decade. This paper reviews previous research that focuses on consumer mobile payment adoption and highlights the primary models used in these investigations. We identified 57 studies that matched our search criteria and found that TAM and UTAUT/UTAUT2 were the primary models utilized. We propose the use a risk/trust valence framework with security and privacy antecedents as a new way of investigating mobile payment adoption.
Papers by Amita G Chin
Informatics in education, Oct 13, 2016
The past decade has witnessed an explosion of the penetration of mobile technology through all st... more The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining security while traversing cyberspace. The purpose of this empirical study is to investigate the attitudes, behaviors, and security practices of business students using mobile devices to access online resources. One group of students surveyed received no specific training regarding mobile security while a second group was surveyed following the completion of an online training program. Results show no significant difference in the security practices of the two groups, indicating that commercially available security training programs are largely inefficacious with respect to modifying student behavior and that additional research on training efficacy is needed.
International Journal of Information Management, Apr 1, 2018
The purpose of this research is to consider how trust in and perceived risk of a mobile marketpla... more The purpose of this research is to consider how trust in and perceived risk of a mobile marketplace impact a consumer before installing a mobile application. In particular, trust is considered from the perspective of institutionalized trust, where consumers faced with ignorance rely on institutionalized mechanisms for personal safety. A bidirectional research model is presented based on trust and perceived risk as antecedents to the intent to install a mobile application. Data is collected from a survey of 214 participants and is analyzed using structural equation modeling. Results suggest that institutional loyalty plays a significant role in consumers' intent to install mobile apps. Trust and its antecedent, security, had strong significant positive relationships with the intention to install mobile apps, while risk and its antecedent, privacy, had weak and insignificant relationships. The bidirectional model's relationship between trust and risk was also insignificant in both directions, further suggesting that perception of risk is an insignificant factor in the intent to install mobile apps.
International journal of education and development using information and communication technology, 2020
In 2019, the number of smartphone users in the United States was estimated to be over 266 million... more In 2019, the number of smartphone users in the United States was estimated to be over 266 million, or 81% of the population. While smartphones, combined with a plethora of apps that are readily available, have become wholly integrated into our daily lives, they embody a multitude of risks for consumers. The purpose of this study is to assess smartphone security practices among undergraduate business students at a regional public university. In December 2019, a survey focusing on security-related practices was administered to students in multiple business classes at the university. The results of the survey show that students exhibit a high degree of care on some measures of security, but they are rather lax in other areas. Males exhibit evidence of some more risky behaviors than their female counterparts. Those who have lost their phones in the past are more likely to be familiar with some disaster preparedness phone features and they are more likely to insure their smartphones.
International Journal of Information Management, Oct 1, 2015
ABSTRACT
Information Systems Frontiers, Nov 3, 2020
The purpose of this research is to assess the impact of trust, when balanced with risk and benefi... more The purpose of this research is to assess the impact of trust, when balanced with risk and benefit, on consumer intention to adopt mobile payment systems. A research model is created to assess intent based on perceived trust, along with three antecedentsprivacy, security, and familiarityand packaged with an extended valence framework that takes into account the opposing notions of perceived risk and perceived benefit. Following a pilot study of 76 participants, data is collected from a survey of 234 respondents and is analyzed using consistent Partial Least Squares (PLSc). Results indicate that perceived benefit and perceived trust are the most important influences on the intention to use mobile payment systems, and that the perceived risk of using mobile payment systems has little or no impact on intention to use. The risk result is explained by motivational avoidance theory and institutional dependence.
International Journal of Information Management, Jun 1, 2016
We survey and assess undergraduate students regarding smartphone and tablet usage.We assess facto... more We survey and assess undergraduate students regarding smartphone and tablet usage.We assess factors that influence consumers to install mobile apps.Few previous studies have investigated factors that influence consumers intention to install mobile apps.Perceived security familiarity are significant factors that influence consumers intention to install mobile apps.Results show that consumers that perceive more security have greater trust and reduced perceived risk. The purpose of this research is to explore the factors that influence a consumer before installing a mobile application. A research model is created based on perceived risk, trust, perceived benefit, and intent to install. Seven antecedents of trust and risk include perceived security, perceived reputation, application characteristics, familiarity, desensitization, consumer disposition to trust, and consumer disposition to risk. Partial least squares (PLS) is used to test the research model. Only significant antecedents are retained and a new research model is created, which includes the antecedents of perceived security and familiarity. Results show that consumers that perceive more security have greater trust and reduced perceived risk. Furthermore, consumers that feel more familiar with finding, purchasing, downloading, and installing applications have greater trust and reduced perceived risk. More than half (R2=.505) of the variability in the intention to install an app is explained.
Journal of International Technology and Information Management, Oct 1, 2016
The explosive growth and rapid proliferation of smartphones and other mobile devices that access ... more The explosive growth and rapid proliferation of smartphones and other mobile devices that access data over communication networks has necessitated advocating and implementing security constraints for the purpose of abetting safe computing. Remote data access using mobile devices is particularly popular among students at institutions of higher education. To ensure safe harbor for constituents, it is imperative for colleges and universities to establish, disseminate, and enforce mobile device security artifacts, where artifacts is defined as policies, procedures, guidelines or other documented or undocumented protocols. The purpose of this study is to explore the existence of, specific content of, and the general current state of published mobile device artifacts at higher education institutions. Results show that such artifacts are only sparsely available through public university websites, and even when available, rarely address mobile device security specifically.
Journal of International Technology and Information Management, 2015
The purpose of this research is to investigate precautions that consumers take before installing ... more The purpose of this research is to investigate precautions that consumers take before installing mobile apps and consumer's potential desensitization to excessive app permission requests. Through a survey of 209 participants, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. However, the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding with the support of Communication Theory and the CHIP Model is that some consumers have become desensitized to excessive permission requests. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before, they trust the market, or they really want the app. The security implications of permission desensitization and inadequate precautions are discussed.
Journal of Computer Information Systems, Feb 1, 2016
Journal of International Technology and Information Management
The purpose of this research is to investigate precautions that consumers take before installing ... more The purpose of this research is to investigate precautions that consumers take before installing mobile apps and consumer's potential desensitization to excessive app permission requests. Through a survey of 209 participants, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. However, the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding with the support of Communication Theory and the CHIP Model is that some consumers have become desensitized to excessive permission requests. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before, they trust the market, or they really want the app. The security implications of permission desensitization and inadequate precautions are discussed.
International journal of education and development using information and communication technology, 2020
In 2019, the number of smartphone users in the United States was estimated to be over 266 million... more In 2019, the number of smartphone users in the United States was estimated to be over 266 million, or 81% of the population. While smartphones, combined with a plethora of apps that are readily available, have become wholly integrated into our daily lives, they embody a multitude of risks for consumers. The purpose of this study is to assess smartphone security practices among undergraduate business students at a regional public university. In December 2019, a survey focusing on security-related practices was administered to students in multiple business classes at the university. The results of the survey show that students exhibit a high degree of care on some measures of security, but they are rather lax in other areas. Males exhibit evidence of some more risky behaviors than their female counterparts. Those who have lost their phones in the past are more likely to be familiar with some disaster preparedness phone features and they are more likely to insure their smartphones.
Information Systems Frontiers, 2020
The purpose of this research is to assess the impact of trust, when balanced with risk and benefi... more The purpose of this research is to assess the impact of trust, when balanced with risk and benefit, on consumer intention to adopt mobile payment systems. A research model is created to assess intent based on perceived trust, along with three antecedentsprivacy, security, and familiarityand packaged with an extended valence framework that takes into account the opposing notions of perceived risk and perceived benefit. Following a pilot study of 76 participants, data is collected from a survey of 234 respondents and is analyzed using consistent Partial Least Squares (PLSc). Results indicate that perceived benefit and perceived trust are the most important influences on the intention to use mobile payment systems, and that the perceived risk of using mobile payment systems has little or no impact on intention to use. The risk result is explained by motivational avoidance theory and institutional dependence.
Information & Computer Security, 2016
Purpose This paper aims to investigate Google’s top developers’ apps with trust badges to see if ... more Purpose This paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated by Google. Design/methodology/approach Risky app permissions and in-app purchases (IAP) from Google’s top developers and traditional developers were investigated in several Google Play top app categories, including Editor’s Choice apps. Analysis was performed between categories and developer types. Findings Overall, Google’s top developers’ apps request more risky permissions and IAP than do traditional developers. Other results indicate that free apps are more dangerous than paid apps and star ratings do not signify safe apps. Research limitations/implications Because of a limited number of Google’s top developers and Editor’s Choice apps, conclusions are drawn from a small sample of apps and not the entire market. Practical implications Google’s top developers’ apps are suited well for increasing revenue...
Informatics in Education, 2016
The past decade has witnessed an explosion of the penetration of mobile technology through all st... more The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining security while traversing cyberspace. The purpose of this empirical study is to investigate the attitudes, behaviors, and security practices of business students using mobile devices to access online resources. One group of students surveyed received no specific training regarding mobile security while a second group was surveyed following the completion of an online training program. Results show no significant difference in the security practices of the two groups, indicating that commercially available security training programs are largely inefficacious with respect to modifying student behavior and that additional research on training efficacy is needed.
International Journal of Information Management, 2015
ABSTRACT
TechTrends, 2014
The increase in smartphone adoption has been no less than astounding. Unfortunately, the explosiv... more The increase in smartphone adoption has been no less than astounding. Unfortunately, the explosive growth has been accompanied by a rash of security problems. A contributing factor to the growing security problem is a lack of education, training, and awareness. In addition, "bring your own device" (BYOD) policies often leave security responsibilities to the competencies of device owners, which compromises security. Today's students are tomorrow's employees with responsibilities for protecting their work environment. They need to understand and practice a full-range of mobile security practices so that they can safely access the information assets of their organizations. If students are not engaging in such practices, educational institutions have a responsibility to ensure that students understand how to keep information assets secure. This paper investigates the smartphone security practices of undergraduate college students. Five hundred students in business classes at a regional public university were surveyed to determine their use of recommended smartphone security practices. The study found that many smartphone users did employ some security measures, but a high percentage of them were ignoring potential risks. This suggests a need for increased education, training, and awareness.
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile devices that access ... more The explosive growth and rapid proliferation of smartphones and other mobile devices that access data over communication networks has necessitated advocating and implementing security constraints for the purpose of abetting safe computing. Remote data access using mobile devices is particularly popular among students at institutions of higher education. To ensure safe harbor for constituents, it is imperative for colleges and universities to establish, disseminate, and enforce mobile device security artifacts, where artifacts is defined as policies, procedures, guidelines or other documented or undocumented protocols. The purpose of this study is to explore the existence of, specific content of, and the general current state of published mobile device artifacts at higher education institutions. Results show that such artifacts are only sparsely available through public university websites, and even when available, rarely address mobile device security specifically.
The purpose of this research is to investigate precautions that consumers take before installing ... more The purpose of this research is to investigate precautions that consumers take before installing mobile apps and consumer’s potential desensitization to excessive app permission requests. Through a survey of 209 participants, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. However, the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding with the support of Communication Theory and the C-HIP Model is that some consumers have become desensitized to excessive permission requests. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before, they trust the market, or they really want the app. The security implications of permission desensitization and inadequate precautions are discussed.
It has been suggested that mobile payment adoption in countries with strong financial infrastruct... more It has been suggested that mobile payment adoption in countries with strong financial infrastructures lag behind countries with weaker financial infrastructures because consumers have more choices of payment methods in strong financial infrastructure countries. Many researchers have attempted to determine the factors that influence the consumer adoption of mobile payment systems for the past decade. This paper reviews previous research that focuses on consumer mobile payment adoption and highlights the primary models used in these investigations. We identified 57 studies that matched our search criteria and found that TAM and UTAUT/UTAUT2 were the primary models utilized. We propose the use a risk/trust valence framework with security and privacy antecedents as a new way of investigating mobile payment adoption.
Uploads
Conference Presentations by Amita G Chin
Papers by Amita G Chin