Browsing by Author "Venkatesh, Viswanath"
Now showing 1 - 20 of 53
Results Per Page
Sort Options
- Adaptation to Information Technology: A Holistic Nomological Network from Implementation to Job OutcomesBala, Hillol; Venkatesh, Viswanath (INFORMS, 2016-01-01)Information technology (IT) implementation is a major organizational change event that substantially disrupts an employee's work environment. We develop a model of technology adaptation behaviors that employees perform to cope with a new IT that causes such disruptions. Our model posits technology adaptation behaviors as a key linking mechanism between IT implementation and employee job outcomes, thus offering a holistic nomological network of technology adaptation behaviors. Two field studies conducted over a period of six months, with four waves of data collection each, in two organizations (N D211 and N D181) implementing two different ITs, supported the model. We found that employees performed four different technology adaptation behaviors-exploration-to-innovate, exploitation, exploration-to-revert, and avoidance-based on whether they appraised an IT as an opportunity or a threat and whether they had perceptions of control over an IT. Employees' experiential engagements (i.e., user participation and training effectiveness) and psychological engagements (i.e., user involvement and management support) during the implementation jointly determined their appraisal of an IT. Finally, we found that technology adaptation behaviors influenced changes in two key job outcomes, job performance and job satisfaction.
- Adoption and use of AI tools: a research agenda grounded in UTAUTVenkatesh, Viswanath (Springer, 2021-01-19)This paper is motivated by the widespread availability of AI tools, whose adoption and consequent benefits are still not well understood. As a first step, some critical issues that relate to AI tools in general, humans in the context of AI tools, and AI tools in the context of operations management are identified. A discussion of how these issues could hinder employee adoption and use of AI tools is presented. Building on this discussion, the unified theory of acceptance and use of technology is used as a theoretical basis to propose individual characteristics, technology characteristics, environmental characteristics and interventions as viable research directions that could not only contribute to the adoption literature, particularly as it relates to AI tools, but also, if pursued, such research could help organizations positively influence the adoption of AI tools.
- Being at the cutting edge of online shopping: Role of recommendations and discounts on privacy perceptionsVenkatesh, Viswanath; Hoehle, Hartmut; Aloysius, John A.; Nikkhah, Hamid Reza (Pergamon-Elsevier, 2021-08-01)Despite the explosion of selling online, customers continue to have privacy concerns about online purchases. To alleviate such concerns, shopping sites seek to employ interventions to encourage users to buy more online. Two common interventions used to promote online sales are: (1) recommendations that help customers choose the right product either based on historic purchase correlations or recommendations suggested by the retailer; and (2) discounts that increase the value of products. Building on privacy calculus, we theorize about how and why key, representative combinations of recommendations and discounts influence the effects of inhibitors and enablers on online purchase intention. Our research design incorporated recommendations coming from different sources for the recommendation (retailer and other customers’ preferences) product relatedness (related products with historic purchases correlated to the focal product and unrelated products with no historic purchase correlation to the focal product) and two types of discounts (regular and bundle). Participants completed a browsing task in a controlled online shopping environment and completed a survey (n = 496). We found mixed results of moderating effects of recommendations and product relatedness on the effect of inhibitors and enablers on purchase intention. Although recommendations did not enhance the effects of inhibitors, they did enhance the effects of enablers on online purchase intention. We also found that product relatedness did not enhance the effect of privacy enablers on online purchase intentions. The results also showed that discounts enhance the effects of enablers, and that discounts can counteract the moderating effect of recommendations on the relationship between inhibitors and purchase intention under certain circumstances. We discuss theoretical and practical implications.
- Blockchain, adoption, and financial inclusion in India: Research opportunitiesSchuetz, Sebastian; Venkatesh, Viswanath (Elsevier, 2020-06-01)The economic development of rural India requires connecting remote villages to local and global supply chains. Yet, high rates of financial exclusion inhibit rural Indians from participating in these supply networks. We review the literature on financial inclusion, adoption, and blockchain in India, and posit that to resolve financial exclusion, the four challenges of geographical access, high cost, inappropriate banking products, and financial illiteracy need to be overcome. Next, we argue that blockchain technologies hold the potential to overcome most of these challenges. However, for blockchain technologies to become the cornerstone of financial inclusion initiatives, an understanding of technology adoption in India is needed. To guide the development of such understanding, we develop a research agenda on the antecedents of adoption, adoption patterns, and outcomes of adoption. Answering these research questions will lead to a nuanced understanding of adoption of blockchain-based technologies in rural India. The practical contribution of this paper is the discussion of how blockchain can alleviate the issue of financial exclusion in rural India, thereby providing a basis for a solution that could connect rural Indians to global supply chain networks. The theoretical contribution lies in the identification of knowledge gaps that should be answered to achieve financial inclusion of rural Indians.
- Children's Internet Addiction, Family-to-Work Conflict, and Job Outcomes: A Study of Parent-Child DyadsVenkatesh, Viswanath; Sykes, Tracy Ann; Chan, Frank K. Y.; Thong, James Y. L.; Hu, Paul Jen-Hwa (Society for Information Management, 2019-09-01)This paper examines the role of parenting behaviors in influencing children’s Internet addiction and the consequences of children’s Internet addiction on parents’ job outcomes. First, we draw on attachment theory to theorize that five parenting behaviors (i.e., parental control, monitoring, unstructured time, dissuasion, and rationalization) affect children’s Internet addiction and their effects are moderated by the children’s views of parent–child attachment. Second, we draw on research on the work–family interface to theorize that children’s Internet addiction affects parents’ job outcomes (i.e., job satisfaction, organizational commitment, and work exhaustion) and the effects are mediated by family-to-work conflict. We tested our hypotheses using an integrated research approach that includes quantitative and qualitative data. We conducted an online survey to collect quantitative responses from 776 parent–child dyads. The results of our model showed that the effects of parenting behaviors on children’s Internet addiction, except for dissuasion, were moderated by the children’s views of parent–child attachment. Also, family-to-work conflict mediated the effects of children’s Internet addiction on parents’ job satisfaction, organizational commitment, and work exhaustion. We collected qualitative data via interviews from 50 parents to cross-validate the results from the quantitative study.
- Combating COVID-19 fake news on social media through fact checking: antecedents and consequencesSchuetz, Sebastian W.; Sykes, Tracy Ann; Venkatesh, Viswanath (Taylor & Francis, 2021-06-02)The onset of the COVID-19 pandemic was accompanied with a pandemic of fake news spreading over social media (SM). Fact checking might help combat fake news and a plethora of fact-checking platforms exist, yet few people actually use them. Moreover, whether fact checking is effective in preventing citizens from falling for fake news, particularly COVID-19 related, is unclear. Against this backdrop, we examine potential antecedents to fact checking that can be a target for interventions and establish that fact checking is actually effective for preventing the public from falling for harmful COVID-19 fake news. We use a representative U.S. sample collected in April of 2020 and find that awareness of fake news and patterns of active SM use (e.g., commenting on content instead of reading it) increases the fact checking of COVID-19 fake news, whereas SM homophily reduces fact checking and the effects of SM use as users are trapped in “echo chambers”. We also find that fact checking helps users identify accurate information on how to protect themselves against COVID-19 instead of false and often harmful claims propagated on SM. These findings highlight the importance of fact checking for combating COVID-19 fake news and help identify potential interventions.
- Combating Infant Mortality in Rural India: Evidence From a Field Study of eHealth Kiosk ImplementationsVenkatesh, Viswanath; Rai, Arun; Sykes, Tracy Ann; Aljafari, Ruba (Society for Information Management, 2016-06-01)The United Nations' Millennium Development Goals listed high infant mortality rates as a major problem in developing countries, especially in rural areas. Given the powerful information dissemination capabilities, information and communication technologies (ICTs) have been suggested as interventions to build infant care awareness and to modify healthcare behaviors. We examine how the use of one ICT intervention-specifically, eHealth kiosks disseminating authenticated and accessible medical information-can alleviate the problem of high infant mortality in rural India. We investigate how mothers' social networks affect their use of eHealth kiosks, seeking professional medical care for their infants and, ultimately, infant mortality. Drawing on the social epidemiology and social networks literatures, we focus on advice and hindrance from both strong and weak ties as the conduit of social influence on mothers' health-related behaviors for the care of their infants. Over a period of 7 years, we studied 4,620 infants across 10 villages where the eHealth kiosks were implemented along with support resources for proxy use. The results revealed that (1) eHealth kiosk use promotes seeking professional medical care and reduces infant mortality, (2) mothers are especially vulnerable to hindrance from both strong and weak ties as they choose to maintain the status quo of traditional infant healthcare practices (e.g., reliance on untrained personnel, superstitions, fatalism) in villages, and (3) advice from both strong and weak ties offers the potential to break down misplaced beliefs about infant healthcare practices and to develop literacy on seeking professional medical care. In contrast, in a comparative group of 10 neighboring villages, the reduction in infant mortality was not as pronounced and the effect of professional medical care in reducing infant mortality was lower. Our findings suggest that an ICT intervention can effectively address one of society's most important problems (i.e., infant mortality) even in parts of the world with limited resources and deep suspicion of technology and change. Overall, we believe such an ICT intervention will complement other investments being made, including the facilitation of use (proxy use) and provision of professional medical facilities to reduce infant mortality.
- Conducting Mixed-Methods Research: From Classical Social Sciences to the Age of Big Data and AnalyticsVenkatesh, Viswanath; Brown, Susan; Sullivan, Yulia (Virginia Tech Publishing, 2023-12-19)Scholars in the social sciences are increasingly expected to incorporate both quantitative and qualitative techniques and methods into their research. The growth of “mixed-methods” research is evident in social science disciplines ranging from psychology and management to marketing and information systems. This book is designed to provide principles, strategies, and guidance specifically for researchers in these disciplines so that they can use mixed-methods research more effectively. In thirteen chapters, Conducting Mixed-Methods Research takes readers through the research process, from defining research questions to writing articles using a mixed-methods approach. For those who are well trained in either qualitative or quantitative methods, the book shows them how to think about the purposes of mixed-methods research, design mixed-methods studies, and develop meta-inferences by integrating findings from both methods. Throughout, the discussion is grounded in examples taken from published research, carefully chosen to highlight best practices, thus opening a window into a broad body of mixed-methods research applications. A paperback print version (in color) is available for order here.
- A cultural contingency model of knowledge sharing and job performanceVenkatesh, Viswanath; Davis, Fred D.; Zhu, Yaping (Elsevier, 2022-02-01)Drawing from the knowledge management literature, we developed and tested a nomological network related to knowledge sharing – i.e., knowledge seeking and knowledge providing using knowledge management systems. We investigated the effect of cultural contingencies on the prediction of both knowledge seeking and knowledge providing. In addition, we examined the effect of knowledge sharing using a KMS on employee job performance. We conducted a study using a field survey of 224 employees in an organization in the People's Republic of China and United States. We found that sensitivity to image and sensitivity to organizational incentives influenced both knowledge seeking and knowledge providing, and the effect was varied across individuals with different cultural values. For example, our findings suggested that the negative relationship between sensitivity to image and knowledge seeking was stronger for individuals with collectivistic values than for those with individualistic values. We also found that both knowledge seeking and knowledge providing led to better job performance.
- Customers' tolerance for validation in omnichannel retail stores: Enabling logistics and supply chain analyticsHoehle, Hartmut; Aloysius, John A.; Chan, Frank; Venkatesh, Viswanath (Emerald, 2018-01-01)Purpose: Mobile technologies are increasingly used as a data source to enable big data analytics that enable inventory control and logistics planning for omnichannel businesses. The purpose of this paper is to focus on the use of mobile technologies to facilitate customers’ shopping in physical retail stores and associated implementation challenges. Design/methodology/approach: First, the authors introduce three emerging mobile shopping checkout processes in the retail store. Second, the authors suggest that new validation procedures (i.e. exit inspections) necessary for implementation of mobile-technology-enabled checkout processes may disrupt traditional retail service processes. The authors propose a construct labeled “tolerance for validation” defined as customer reactions to checkout procedures. The authors define and discuss five dimensions – tolerance for: unfair process; changes in validation process; inconvenience; mistrust; and privacy intrusion. The authors develop a measurement scale for the proposed construct and conduct a study among 239 customers. Findings: The results show that customers have higher tolerance for validation under scenarios in which mobile technologies are used in the checkout processes, as compared to the traditional self-service scenario in which no mobile technology is used. In particular, the customers do not show a clear preference for specific mobile shopping scenarios. Originality/value: These findings contribute to our understanding of a challenge that omnichannel businesses may face as they leverage data from digital technologies to enhance collaborative planning, forecasting, and replenishment processes. The proposed construct and measurement scales can be used in future work on omnichannel retailing.
- Cyberslacking in the Workplace: Antecedents and Effects on Job PerformanceVenkatesh, Viswanath; Cheung, Christy M. K.; Davis, Fred D.; Lee, Zach W. Y. (2021-11-07)Employees’ nonwork use of information technology (IT), or cyberslacking, is of growing concern due to its erosion of job performance and other negative organizational consequences. Research on cyberslacking antecedents has drawn on diverse theoretical perspectives, resulting in a lack of cohesive explanation of cyberslacking. Further, prior studies generally overlooked IT-specific variables. To address the cyberslacking problems in organizations and research gaps in the literature, we used a combination of a literature-based approach and a qualitative inquiry to develop a model of cyberslacking that includes a 2x2 typology of antecedents. The proposed model was tested and supported in a three-wave field study of 395 employees in a Fortune-100 US organization. For research, this work organizes antecedents from diverse research streams and validates their relative impact on cyberslacking, thus providing a cohesive theoretical explanation of cyberslacking. This work also incorporates contextualization (i.e., IT-specific factors) into theory development and enriches IS literature by examining the nonwork aspects of IT use and their negative consequences to organizations. For practice, the results provide practitioners with insights into nonwork use of IT in organizations, particularly on how they can take organizational action to mitigate cyberslacking and maintain employee productivity.
- The "Darth" Side of Technology Use: An Inductively Derived Typology of CyberdevianceVenkatraman, Srinivasan; Cheung, Christy MK K.; Lee, Zach WY Y.; Davis, Fred D.; Venkatesh, Viswanath (Routledge, 2018-01-01)Cyberdeviance, intentional use of information technology (IT) in the workplace that is contrary to the explicit and implicit norms of the organization and that threatens the well-being of the organization and/or its members, is an important research stream that has gained attention in academia and industry. Prior studies have treated different forms of cyberdeviance as different phenomena, resulting in a lack of a collective underlying conceptualization of cyberdeviance. This work inductively and empirically derives a typology of cyberdeviance with 439 respondents across three phases. Our results suggest that cyberdeviance varies along 3 dimensions: cyberdeviant behaviors that are minor versus serious; cyberdeviant behaviors that target individuals versus organizations; and cyberdeviant behaviors that require low versus high technical skill. We thus provide a comprehensive framework that fosters a logical linkage of various research programs related to cyberdeviance to guide future research investigation. The typology will help managers to distinguish different cyberdeviant behaviors and implement suitable interventions depending on the behavior.
- Deviant Affordances: When Tensions, Deadlocks and Noncompliance Generate Job PerformanceHaag, Steffi; Eckhardt, Andreas; Venkatesh, Viswanath (Management Information Systems Research Center, 2023-01-01)Novel information technologies (ITs), such as mobile devices or third-party cloud services, offer users an increasing variety of action possibilities, i.e., affordances. Organizational IT policies, however, often specify their actualization, i.e., turning those affordances into action, as undesired. Organizations face the challenge that their employees, to reach their goals, still frequently take advantage of those affordances by using those very ITs and thereby deviate from the IT policies. Although prior work has extensively studied how goal-oriented users actualize affordances that are associated with outcomes that support organizational goals, little attention has been paid to the structures, mechanisms, and conditions underlying affordances that deviate from organizational IT policies. We conceptualize those affordances as deviant affordances. Leveraging the orders of change framework and using a multimethod research design integrating interview and experimental studies, we identify three key mechanisms underlying deviant affordances—i.e., tension, deadlock, and actualization mechanisms—that can link together to produce a deviant outcome supporting the individual goal and an organizational goal. Our work explains the importance of users’ perceived deadlock in stimulating the generation of deviant outcomes that support the organizational goals through improving task, contextual, and innovative job performance.
- Deviant Affordances: When Tensions, Deadlocks and Nonconformance Generate PerformanceHaag, Steffi; Eckhardt, Andreas; Venkatesh, Viswanath (2022-03-17)Novel information technologies (ITs), such as mobile devices and third-party cloud services, offer users an increasing variety of action possibilities, i.e., affordances. Organizational IT policies, however, often specify their actualization—i.e., turning those affordances into action—as undesired. Organizations face the challenge that to reach their goals, employees still frequently take advantage of these affordances by using undesired ITs and thereby deviate from IT policies. Although prior work has extensively studied how goal-oriented users actualize affordances that are associated with outcomes that support organizational goals, little attention has been paid to the structures, mechanisms, and conditions underlying affordances that deviate from organizational IT policies. We conceptualize these affordances as deviant affordances. Leveraging the orders of change framework and using a multimethod research design integrating interview and experimental studies, we identify three key mechanisms underlying deviant affordances—i.e., tension, deadlock, and actualization mechanisms—that can link together to produce a deviant outcome supporting both the users’ individual goal and an organizational goal. Our work explains the importance of users’ perceived deadlock in stimulating the generation of deviant outcomes that support organizational goals through improving task, contextual, and innovative job performance.
- Employees' reactions to IT-enabled process innovations in the age of data analytics in healthcareBala, Hillol; Venkatesh, Viswanath (Emerald, 2017-01-01)Purpose: Interorganizational business process standards (IBPS) are IT-enabled process specifications that standardize, streamline, and improve business processes related to interorganizational relationships. There has been much interest in IBPS as organizations from different industries implement these process standards that lead to successful organizational outcomes by integrating and standardizing intra- and inter-organizational business processes. These process standards enable data analytics capabilities by facilitating new sources of interorganizational process data. The purpose of this paper is to unearth employees’ reactions to a new type of supply chain process innovations that involved an implementation of new IBPS, a supply chain management (SCM) system, and associated analytics capabilities. Design/methodology/approach: The authors gathered and analyzed qualitative data for a year from the employees of a healthcare supplier, a high-tech manufacturing organization, during the implementation of a SCM system and RosettaNet-based IBPS. Findings: In what the authors termed the initiation stage, there was quite a bit of confusion and unrest among employees regarding the relevance of the new process standards and associated analytics capabilities. With the passage of time, in the institutionalization stage, although the situation improved slightly, employees found workarounds that allowed them to appropriate just part of specific processes and the analytics capabilities. Finally, once routinized, employees felt comfortable in the situation but still did not appropriate the new supply chain processes faithfully. Overall, employees’ reactions toward the SCM system and associated analytics capabilities were different from their reactions toward the new business processes. Originality/value: The paper contributes to the literature by offering novel insights on how employees react to and appropriate process innovations that change their work processes.
- Empowering physicians with health information technology: An empirical investigation in Chinese hospitalsChen, Yang; Aljafari, Ruba; Xiao, Bo; Venkatesh, Viswanath (Oxford University Press, 2021-05-01)OBJECTIVE: Few studies examine physicians' use of different features of health information technology (HIT) in relation to their psychological empowerment and stress, especially in China, where many hospitals are being pushed to share digitized medical information. Further, there are mixed findings about the impact of HIT on stress, with some studies suggesting that HIT increases stress and others suggesting no effect. Hence, there is a need for a nuanced view of HITs to incorporate different features, regions, and outcomes. This work seeks to extend the existing body of knowledge on HIT by assessing the effects of basic (data-related) and advanced (clinical) HIT features on physician empowerment, stress, and ultimately, job satisfaction in Chinese hospitals. MATERIALS AND METHODS: We surveyed 367 physicians at 5 class 3 hospitals (ie, regional hospitals that provide specialist medical and healthcare services and carry out high levels of teaching and scientific research tasks) in 5 provinces in China. We specified and estimated a structural equation model using partial least squares. RESULTS: Physicians who used advanced features experienced improvement in all dimensions of physician empowerment and significant reduction in stress. Physicians who used basic technology, however, experienced improvement in fewer dimensions of physician empowerment and no significant change in stress. Except for efficacy, all dimensions of physician empowerment and stress predicted job satisfaction. CONCLUSIONS: Healthcare professionals should assess the purpose of HIT features and expect different effects on intermediate and ultimate outcomes. The nuanced view of HIT features and processes leading to outcomes sheds light on their differential effects and resolves inconsistencies in prior findings on HIT effects.
- Enterprise System Implementation and Employee Job Performance: Understanding the Role of Advice NetworksSykes, Tracy Ann; Venkatesh, Viswanath; Johnson, Jonathan L. (Society for Information Management, 2014-03-01)The implementation of enterprise systems, such as enterprise resource planning (ERP) systems, alters business processes and associated workflows, and introduces new software applications that employees must use. Employees frequently find such technology-enabled organizational change to be a major challenge. Although many challenges related to such changes have been discussed in prior work, little research has focused on postimplementation job outcomes of employees affected by such change. We draw from social network theoryspecifically advice networks- to understand a key post-implementation job outcome (i.e., job performance). We conducted a study among 87 employees, with data gathered before and after the implementation of an ERP system module in a business unit of a large organization. We found support for our hypotheses that workflow advice and software advice are associated with job performance. Further, as predicted, we found that the interactions of workflow and software get-advice, workflow and software give-advice, and software get- and give-advice were associated with job performance. This nuanced treatment of advice networks advances our understanding of post-implementation success of enterprise systems.
- An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usabilityHoehle, Hartmut; Zhang, Xiaojun; Venkatesh, Viswanath (Taylor & Francis, 2015-05-01)As most mobile applications are tailored for worldwide consumption, it is a significant challenge to develop applications that satisfy individuals with various cultural backgrounds. To address this issue, we drew on a recently developed conceptualization and associated instrument of mobile application usability to develop a model examining the impact of mobile social media application usability on continued intention to use. Drawing on Hofstede's five cultural values, we incorporated espoused cultural values of masculinity/femininity, individualism/collectivism, power distance, uncertainty avoidance, and long-term orientation into our model as moderators. To test the model, we collected data from 1,844 consumers in four countries - the U.S., Germany, China, and India - who use mobile social media applications on their smartphones. The results provided support for the role of espoused national cultural values in moderating the impact of mobile social media application usability on continued intention to use and the model, with espoused cultural values explaining significantly more variance in continued intention to use (i.e., 38%) than the main effects-only model (i.e., 19%). Interestingly, our results demonstrated that culture at the national level did not play a significant role in affecting the relationship between usability constructs and continued intention to use, thus underscoring the importance of espoused culture.
- Expectation Confirmation in Information Systems Research: A Test of Six Competing ModelsBrown, Susan A.; Venkatesh, Viswanath; Goyal, Sandeep (Society for Information Management, 2014-09-01)Expectation confirmation research in general, and in information systems (IS) in particular, has produced conflicting results. In this paper, we discuss six different models of expectation confirmation: assimilation, contrast, generalized negativity, assimilation-contrast, experiences only, and expectations only. Relying on key constructs from the technology acceptance model (TAM), we test each of these six models that suggests different roles for expectations and experiences of the key predictor-here, perceived usefulness- and their impacts on key outcomes-here, behavioral intention, use, and satisfaction. Data were collected in a field study from 1,113 participants at two points in time. Using polynomial modeling and response surface analysis, we provide the analytical representations for each of the six models and empirically test them to demonstrate that the assimilation-contrast is the best existing model in terms of its ability to explain the relationships between expectations and experiences of perceived usefulness and important dependent variables-namely, behavioral intention, use, and satisfaction-in individual-level research on IS implementations.
- Exploiting big data for customer and retailer benefits: A study of emerging mobile checkout scenariosAloysius, John A.; Hoehle, Hartmut; Venkatesh, Viswanath (Emerald, 2016-01-01)Purpose – Mobile checkout in the retail store has the promise to be a rich source of big data. It is also a means to increase the rate at which big data flows into an organization as well as the potential to integrate product recommendations and promotions in real time. However, despite efforts by retailers to implement this retail innovation, adoption by customers has been slow. The paper aims to discuss these issues. Design/methodology/approach – Based on interviews and focus groups with leading retailers, technology providers, and service providers, the authors identified several emerging in-store mobile scenarios; and based on customer focus groups, the authors identified potential drivers and inhibitors of use. Findings – A first departure from the traditional customer checkout process flow is that a mobile checkout involves two processes: scanning and payment, and that checkout scenarios with respect to each of these processes varied across two dimensions: first, location – whether they were fixed by location or mobile; and second, autonomy – whether they were assisted by store employees or unassisted. The authors found no evidence that individuals found mobile scanning to be either enjoyable or to have utilitarian benefit. The authors also did not find greater privacy concerns with mobile payments scenarios. The authors did, however, in the post hoc analysis find that mobile unassisted scanning was preferred to mobile assisted scanning. The authors also found that mobile unassisted scanning with fixed unassisted checkout was a preferred service mode, while there was evidence that mobile assisted scanning with mobile assisted payment was the least preferred checkout mode. Finally, the authors found that individual differences including computer self-efficacy, personal innovativeness, and technology anxiety were strong predictors of adoption of mobile scanning and payment scenarios. Originality/value – The work helps the authors understand the emerging mobile checkout scenarios in the retail environment and customer reactions to these scenarios.
- «
- 1 (current)
- 2
- 3
- »