You are on page 1of 9

Journal of Computer Information Systems

ISSN: 0887-4417 (Print) 2380-2057 (Online) Journal homepage: https://www.tandfonline.com/loi/ucis20

Facilitating Conditions, Wireless Trust and


Adoption Intention

June Lu, Chun-Sheng Yu & Chang Liu

To cite this article: June Lu, Chun-Sheng Yu & Chang Liu (2005) Facilitating Conditions, Wireless
Trust and Adoption Intention, Journal of Computer Information Systems, 46:1, 17-24, DOI:
10.1080/08874417.2005.11645865

To link to this article: https://doi.org/10.1080/08874417.2005.11645865

Published online: 05 Jan 2016.

Submit your article to this journal

Article views: 212

View related articles

Citing articles: 2 View citing articles

Full Terms & Conditions of access and use can be found at


https://www.tandfonline.com/action/journalInformation?journalCode=ucis20
FACILITATING CONDITIONS, WIRELESS. TRUST
AND ADOPTION INTENTION
JUNELU CHUN-SHENG YU CHANGLIU
University of Houston-Victoria University of Houston-Victoria Northern Illinois University
Sugar Land, Texas 77479 Sugar Land, Texas 77479 DeKalb, Illinois 60115-2897

ABSTRACT features. Training, support and maintenance services in terms of


security and privacy protection may be critical for developing
For wireless Internet services via mobile technology and sustaining trust toward wireless mobile channels for serious
(WIMT), are there any unique determinants for user acceptance data services. On the other hand, encouraging a humanitarian
of this technology innovation? Based on literature review, this environment seems also critical. Effectively implementing the
paper proposes a model of three latent constructs: Facilitating Wireless Fidelity (Wi-Fi) telecommunications technology in the
Conditions, Wireless Trust, and intention to adopt WIMT, where U.S. means meeting the legal and regulatory challenges to
Facilitating Conditions influences perceived trust in the wireless ensure the expected benefits (28). Wi-Fi is the commercially
mobile environment which, in turn, influences user intention to certified name for 802.11 b. Wi-Fi products are tested and
adopt wireless mobile technology. A sample of 357 MBA certified by the Wireless Ethernet Capability Alliance (WECA),
students from a regional university was used for model testing. which has done an important work of certifying interoperable
Structural equation modeling procedures were employed for wireless standards. As the framework for mobile commercial
data analysis. The hypothesized model revealed an acceptable transactions is getting increasingly complex, more attention has
fit. Path analysis of the postulated relationships demonstrated a been devoted to the development of applicable laws, rules and
large direct causal effect from Facilitating Conditions to regulations to ensure safe and secure commercial activities (43).
Wireless Trust and a medium direct effect from Wireless Trust To sum up, the availability of technical training and support as
to Intention to Adopt WIMT. Some findings for the first time well as a protective legal and regulatory environment helps
provided empirical support to the literature and important enhance trust perception toward wireless mobile technology and
implications for further research and large-scope implementation services.
of wireless mobile technology. The Technology Acceptance Model (TAM) has been the
Keywords: Wireless Trust, facilitating conditions, intention foundation for many ITIIS acceptance studies since it was first
to adopt, wireless Internet services via mobile technology, data introduced (32). Based on this model, the perceptions of ease of
security, privacy protection, system reliability, TAM. use and usefulness are the important indicators for consumers'
behavioral intention to adopt a new technology. However,
INTRODUCTION customers must evaluate the ease of use and usefulness of a new
technology by making a 'leap of faith' to commit to a new
Along with the increasing popularity of mobile devices and technology. This 'leap of faith' is trust (4). Ease of use and
wireless data services in this country, people are getting used to usefulness are necessary for adoption of the WIMT, but trust in
using mobile devices like web phones, Palm Pilots and personal WIMT and its provider are the impetus for the adoption
digital assistants (PDAs) in their personal and professional lives decision.
for easier accessibility and efficiency. More and more business It is proposed that the trust issue can impact user intention
firms now rely on the mobile forces equipped with laptops and to adopt wireless mobile technology for important data services
PDAs to conduct transactions. However, user adoption of and commercial activities (35, 34). A theoretical construct of
mobile data services and commerce is still restricted to simple Wireless Trust was developed by Lu and her colleagues (35) and
data transmission with a low-level of importance and validated for empirical testing (34). As a continuing effort, this
confidentiality. Many organizations still hesitate to use Internet paper is mainly purported empirically to test the possible
services via wireless networks and mobile devices. Why? An relationship between Wireless Trust perceptions and intention to
important impacting factor, based on the literature, is the user adopt WIMT. As a secondary objective, this paper will examine
trust level for the wireless mobile environment and for m- the impact of Facilitating Conditions as the leverage manipulator
commerce (3, 12, 21, 36, 46, 49). Wireless mobile Internet of perceptual beliefs such as Wireless Trust toward the wireless
services need to win trust in terms of data transmission security, mobile environment.
privacy protection, and system reliability. A wireless mobile For explicit communication of the research findings, this
environment is meaningless unless it is reliable, secure and paper will first present a review of the current literature
privacy protected (32, 34). concerning the concepts of Wireless Trust and Facilitating
The literature reveals that naive deployment of off-the-shelf Conditions, followed by a description of the theoretical
products like PDAs and mobile phones has been recognized as framework for the study. This paper then describes the methods
the fastest-growing threat in some organizations and can only be used for carrying out the study and the data analysis results. It
managed by user-friendly security tools and user training then concludes with a discussion of the findings, conclusions,
initiated by security and privacy services (10). Trust, for and recommendations for implementation practices and further
wireless Internet services via mobile technology (WIMT), is the research.
combined effect of a number of technical and non-technical

Fall 2005 Journal of Computer Information Systems 17


LITERATURE REVIEW Privacy, the ability to determine the circumstances and
extent that information about an individual is exposed to others,
Mobile communications and mobile commerce continue to is recognized as being at risk, especially in a wireless mobile
receive rapidly increasing attention from business practitioners environment (37). More than 90 percent of 436 wireless and
and scholars alike. While information and communication wireless Internet users surveyed by the National Emergency
technology (lCT) can enable people to transcend distance and Number Association last year on location-based services wanted
time barriers through the use of Wi-Fi, the Internet and mobile the ability to tum the location-tracking capability of a wireless
handhelds, it cannot motivate people to seriously communicate phone on or off at will. Additionally, most respondents noted
and conduct business. The biggest obstacle is not implementing that it was extremely important to have the ability to be able to
a cutting-edge ICT solution, but getting people to use it actively control how their location information was used by their service
and effectively (34). Hence we must realize that unless members providers and others (18). Wireless mobile Internet creates at
of the society are motivated to go wireless and mobile, no ICT least the possibility of privacy intrusion everywhere. Research
solution can deliver desired benefits. Research findings and also suggests that consumer privacy concerns associated with
implementation practices indicate that trustworthiness of the the mobile Internet and mobile commerce are different from
wireless mobile networks and devices could be the single those in traditional and online contexts. Privacy risks in the
greatest challenge confronting adoption of mobile data and mobile context include unwanted phone calls and contextual
commercial services. offers pushed to mobile consumers, unsolicited information
capture and transfer, disclosure oftheir precise purchase context
Wireless Trust and physical locations because of location-based services,
inadequate privacy protection at the WAP gateway and the
The first contributing factor to the level of trust is data origin server's, failure to communicate the level of protection
security. Due to the open nature of wireless networks, scanning offered, and trans-border data flow involving countries with no
and intercepting data transmitted in the open air is made much adequate personal data protection (11, 12, 36). However,
easier, which opens a window for malicious eavesdropping. consumers are weighing the benefits of the mobile world against
Further, security is more difficult to implement for the resource the potential for privacy violations. An increasing number of
limitation of mobile handheld devices in computing power. The mobile users is utilizing the wireless Internet for less sensitive
encryption on most wireless devices is comparatively weak. The data services. Using personal information to provide timely
SIM key on a GSM phone carrying the user's account offers and valued services in the mobile channel would benefit
information and the secret key for billing purposes can be easily both firms and customers. Firms seeking a foothold in the
removed from one phone and placed in another, which makes mobile world must realize the importance of finding a good
cloning much easier. On the transport layer of digital data balance point.
transmission, the identified security hole in wireless application Meanwhile we have to admit that for all the security and
protocol (WAP), the protocol widely accepted for mobile privacy concerns, the reliability of a wireless mobile system is
commerce by mobile service providers (MSP) and producers of most fundamental for establishing user trust. Reliability here
mobile phones and network equipment, fails to provide end-to- refers to the probability that the system remain successful in
end security between the customer and the merchant. The achieving its intended objectives within a given period of time
decrypted data at a WAP gateway may be compromised by and under a given set of conditions (61). Wireless data
anyone with privileged access. Data transmission using COMA transmissions are sensitive to weather conditions and geographic
is commonly recognized as harder to detect or jam; however, a environment. The existence of a number of standards and
technically sophisticated criminal can still do it. Decoder proprietary networks also hinders connectivity and accessibility.
software is available allover the Internet and often for free, not Concerns are emerging about the reliability of information,
to mention that those wireless Internet service providers (lSPs) data transmission, and transactions via wireless mobile services:
chosen to use unlicensed spectrum for their service offerings are The problem of intermittent communication links and resource
out of reach offederal regulation (3, 13, 27). constraints on wireless devices as well as limited bandwidth
Recently, more efforts have been made in designing a (53); the need for protocol and middleware support to overcome
security infrastructure for mobile commerce systems including differences in bit rates, channel quality, resources, location
new security standards and software upgrades to meet security management, reliability, and security (12); the convergence of
needs in the face of resource constraints (e.g., (23, 30, & 4 I ». the Internet, traditional telephony networks, and consumer
Many proposed mechanisms are proving to be practical in real electronics and the infrastructure for organizing and accessing
deployment environment. On the other hand, much improved m-services in broadcast environments (60); the expectation for
location-awareness or context-awareness in wireless mobile wireless Internet to achieve its full potential on mobile
devices will be able to provide better wireless security either this computing devices to support a broad range of 2.5 generation
year or next year (19, 21, 27). Knowledge of the end user's and third-generation mobile devices and networks at a
location can be used to deliver relevant, timely, and high-quality reasonable price (6). The results of a report by U.s. Congress's
service and information. For mobile network operators, location- General Accounting Office on cellular telephone system
based services represent an additional stream of revenue (42). reliability indicate cell phone users experience a higher
Technically speaking, mobile commerce is ready to take a unreliability rate than the industry strives for (5).
qualitative leap. As Lu, et al. (34) pointed out, users must be confident that
However, the ramifications could be that a number of the network and the software applications it depends on for data
stakeholders have ready access to communications data on the transmission and services are available and reliable 24 hours a
wireless Internet and to a map of the consumer's or the user's day and 7 days a week and that all the data transferred on the
daily movements. Therefore, in addition to the identified system is correct, properly protected, and continuously
vulnerabilities in terms of wireless data transmission security, available. Without such confidence in the system and the
concerns about privacy might also lead to increased suspicion services provided, it will be highly doubtful whether mobile data
for trustworthiness and possible rejection of this innovation for services and commerce will be perceived as useful to trigger
any serious commercial use. adoption intention. Hence, we propose the following hypothesis:

Fall 2005 Journal of Computer Information Systems 18


Hypothesis I: Trustworthiness of the wireless mobile importance of security, using passwords, and constant auditing
environment will have a significant effect on of wireless security system. An analysis of scenarios regarding
intention to adopt WIMT. wireless mobile Internet services indicates .that intellectual
property rights, privacy, and contracts are the legal areas most
Facilitating Conditions likely to affect user trust of the mobile Internet and hence
influence their adoption of this ICT innovation (20, 40). Trust
With the rapid technological advancements in data reflects the feelings of security of one party because of the
transmission capacity, network reliability, and security, some presence of guarantees/trainings or other structures acting as
major soft factors such as immediacy, personalization, safety net (59).
membership, and localization offer much incentive for using To sum up, certain facilitating conditions are needed on a
wireless communication devices for shopping activities (1). regular basis to maintain a Wireless Trust environment. Hence,
Research confirmed that shopping motivating factors and we propose our second hypothesis:
lifestyle indicators had significant effect on consumers'
willingness to purchase online using wireless communication Hypothesis 2: Facilitating conditions in terms of technical
devices (25). Therefore, it is necessary to examine certain assistance and legal and regulatory frameworks
facilitating conditions for using wireless communication will have a significant effect on user-perceived
devices. Wireless Trust ofWIMT.
Facilitating conditions, according to Triandis's (52) notion,
include the extent and type of support provided to individuals Intention to Use WIMT
that influence their use of the technology. In the context of
workplace technology use, facilitating conditions are believed to In this study, user acceptance is examined by intention to
include the availability of training and provision of support. This use due to the fact that WIMT is still at an early stage,
variable was tested in a number of technology acceptance characterized by early adoption and limited use. This construct
studies, and empirical supports were found on the proposed comes from the TAM model. We believe that investigation of
effect on perceived usefulness or perceived ease of use (24, 50, intention to use would enhance the predicting power of the
51,55). Recently, facilitating conditions have been identified as research model at this stage. Since the intention construct and its
having an effect on infusion or adoption of a number of new relationship to actual adoption has been well discussed in the
information system innovations (9, 26). A study on the adoption TAM model and other related studies (2,8, 14), our proposition
of WAP services in Taiwan as an important content of mobile of the research model will concentrate on the theoretical
commerce also revealed facilitating conditions as one critical rationale for the other two constructs and their causal
factor influencing WAP services adoption behavior (22). relationships to intention, the primary dependent variable. Study
In addition to a supportive technical environment, specially of these external variables has important pragmatic value for
designed training programs and control procedures to ensure leading to the emergence of appropriate managerial
data transmission security and protection over sensitive and interventions.
confidential information should receive primary attention. For
this purpose, policies, regulations, and legal environments are Research Model
most critical to technology acceptance. Further, when mobile
users travel abroad, their usage patterns are dependent on Based on a relevant literature review, this paper proposes a
international regulations and standardization of the physical and model of three latent constructs (Figure 1): Facilitating
data-link layers of telecommunication in another country. We Conditions, Wireless Trust, and Intention to Use WIMT, where
thus postulated in the Wireless Internet via Mobile Technology Facilitating Conditions is hypothesized to influence Wireless
Acceptance Model (WIMTAM) that facilitating conditions Trust which, in turn, will impact Intention to Use WIMT. The
should also include non-technical external controls in terms of emphasis of this model is on explaining the antecedent beliefs of
favorable legal and regulatory protection, guidance and control the intention.
(35). The proposed model is built to explore non-work related
In the United States, people are still gaining experience in individual WIMT adoption in particular, with a strong focus on
managing wireless mobile technology. However, more people probable impacts of Wireless Trust and Facilitating Conditions.
are beginning to recognize the role of corporate policies in This model includes Facilitating Conditions as an important
protecting wireless networks and the importance of cooperation latent construct and hypothesizes a theoretical relationship
between government and businesses. Recently, more joint between Facilitating Conditions and Wireless Trust that is not
efforts by the government, companies, security experts and trade contained in the WIMTAM (35) or any other TAM related
groups are being made to disconnect some critical computer models. Therefore, the proposed model has a unique value to fill
systems from the Internet and run them on private networks to in the gap in the ISIIT literature. The tests of the hypothesized
prevent attacks (38, 48). States like California and New York relationships are described next.
have taken an aggressive stance in regulating wireless networks
and services for internal security control, consumer rights METHODOLOGY AND RESULTS
protection, and service quality (44, 45). At the corporate level,
"chief privacy officer" as a new job title indicates the increasing To empirically test this model, 357 MBA students from a
attention to establishing policies and regulations regarding regional university in Texas were surveyed in the academic year
privacy protection at the business level (31, 57, 58). Some of 2003. Conducting a survey regarding users' perceptions and
companies are planning to develop a wireless security policy to intentions is appropriate since it is the most direct way to get the
define what is and what is not allowed with wireless technology desired data. Data collected each semester were compared and
(47). Various security procedures and practices are being no statistically significant differences were identified. Survey
specified in more corporate policies, including controlled use of items on Intention to Use were derived from Davis' TAM model
unprotected wireless client devices (58). More organized (14, 15). Items on Wireless Trust were adapted from those from
training sessions are being provided to employees on the

Fall 2005 Journal of Computer Information Systems 19


Lu and her colleagues' study (34). Facilitating Conditions items items on legal and regulatory protection as suggested by Lu, et
were adapted from those in Jiang, Hsu, Klein and Lin's study on al. (35). Relevant survey items are listed in Appendix I.
e-commerce user behavior model (24), with the addition of

FIGURE 1
The Research Model

Facilitating Wireless Intention to


Conditions Trust UseWIMT

Descriptive Data Analysis as an indicator of the internal consistency of scale items for each
of the three constructs. The alpha value for each of the three
Of the participants, 49 percent were males, 51 percent, constructs was above 0.80, a level generally deemed highly
females. With an average age of 3 I, the age range extends from satisfactory for multi-item scales (39). Based on the 7-point
20 to 59. Eighty-four percent of the respondents hold full-time scale used in the study, the mean values on both items of the
or part- time jobs. Over seventy-seven percent (277) of the intention construct surpass the cutoff value for fair agreement
respondents had no experience accessing wireless Internet (Mean >= 5.5). The general mean levels of the items on
services via mobile handhelds such as PDAs and Web phones. Wireless Trust are a bit lower -varying between fairly disagree
Of those who had some experience, only one third had six and neutral. The means on three items "I am sure that I will be
>

months' or longer experience with WIMT. The participants in notified if personal information is collected (M=3.01)," "I will
this study represent a sample of potential and early adopters. be allowed to access the data collected from me (M=3.37),"
Given the current status of WIMT use in the U. S., the reported "certain managerial and technical procedures exist to protect my
demographics of the respondents indicate a representative personal information (M=2.83)" - seem to reflect obvious
sample. skepticism in those aspects. In comparison, Facilitating
Table I lists the basic descriptive statistics on the Conditions tend to have a higher average level but reveals
theoretical constructs under study. Cronbach's alpha is provided obvious uncertainty.

TABLE 1
Scale Statistics and Pearson Correlations of the Constructs

Constructs Items Mean SD Cronbach Alnha Factor Loadine


Intention to Adopt 0.81
WIMT
Intentl 5.55 1.60 0.82
Intent2 5.68 1.41 0.93
Wireless Mobile Trust 0.84
Trustl 3.01 1.79 0.79
Trust2 3.37 1.73 0.79
Trust3 3.75 1.84 0.73
Trust4 4.13 1.71 0.72
Trust5 2.83 1.62 0.47
Trust6 3.94 1.56 0.51
Facilitating Conditions 0.86
Technical Aspect 0.86
Regulatory Aspect 0.75
Facilitating 1 3.69 1.60 0.69
Facilitating2 3.81 1.60 0.69
Facilitating3 4.03 2.02 0.62
Facilitating4 3.97 1.84 0.82
Facilitating5 3.87 1.87 0.84
Facilitating6 3.48 1.88 0.75
Facilitating7 4.15 1.76 0.79

Structural Equation Modeling followed to test the proposed model. Amos version 4 was used
as the model-fitting program. SEM is commonly regarded as a
Structural equation modeling (SEM) procedures were then comprehensive method for testing theoretical constructs and

Fall 2005 Journal of Computer Information Systems 20


models. With SEM, we can specify and test any hypothesized fit can only be tested when it is embedded in a multi-factor CFA
conceptual construct comprising a set of variables, while model (26). Therefore, the hypothesized multi-factor CFA
controlling for errors of measurement and other irrelevant model was set up first. Factor loading values of the intention
sources of variance (7). According to this approach, a construct are listed in Table I.
measurement model was first built for Facilitating Conditions The multi-factor CFA model was found to present an
and Wireless Trust one by one. All the factor loading values are acceptable goodness of fit (X2/dt=2.364; GFI=O.93I;
listed in Table I as a common indicator of construct validity. AGFI=O.902; NFI=0.918; TLI=0.938; CFI=0.95I;
Six indicators were used to specify a measurement model SRMR=0.062). The correlation coefficient values among the
for Wireless Trust. Measures used to assess goodness of fit latent variables are 0.77 between Wireless Trust and Facilitating
included Chi-square (14.624), degree of freedom (8), the X2/df Conditions, 0.21 between Wireless Trust and Intention to Use
ratio (1.828), Goodness-of-Fit (GFI=0.986), Adjusted WIMT, and 0.39 between Facilitating Conditions and Intention
Goodness-of-Fit Index (AGFI=0.963), Normed Fit Index to Use WIMT. Since none of the values is above 0.85 or below
(NFI=O.981), Tucker-Lewis Index (TLI=O.984), Comparative 0.10, the limits for acceptable discriminant validity (29), this
Fit Index (CFI=O.99I), and Standardized Root Mean Squared model is regarded valid for further structural path analysis.
Residual (RMSR=O.024). All the selected index values indicated The hypothesized structural model also revealed an
a very strong model fit, meeting the recommended criterion of acceptable fit (X2/dt=2.370; GFI=O.929; AGFI=O.899;
0.90 or above (e.g., (7, 29)). NFI=O.918; TLI=O.938; CFI=O.950; SRMR=O.065). Path
Seven items were used to build a second-order analysis of the postulated relationships demonstrated a large
Confirmatory Factor Analysis (CFA) model for Facilitating direct positive effect from Facilitating Conditions to Wireless
Conditions: five on technical measures, two on regulatory Trust (0.77) and a medium direct effect from Wireless Trust to
measures. The same measures were used to estimate the model Intention to Use WIMT (0.25), both were significant at 0.001
fit. All the selected indexes revealed another highly satisfactory (Please see Figure 2). The hypothesized theoretical model and
fit (X2=31.390; DF=13; X2/dt=2.415; GFI=0.976; AGFI=0.948; the relationships are therefore supported by the empirical data.
NFI=O.971; TLI=0.972; CFI=O.983; SRMR=0.026). Sixty percent of the variance of Wireless Trust was explained by
Intention to Use WIMT construct only has two items. Facilitating Conditions. The variance explained by Wireless
According to the assumption of the AMOS program, the model Trust was only 6 percent.

FIGURE 2
The Structural Path Analysis

0.77- Wireless 0.25**· Intention to


Facilitating
Conditions ~
~
Trust UseWIMT

Note: ·**indicates p<O.ool.

As an additional interest to test the magnitude of influence the number one blockage for WIMT adoption as expressed in a
from either the regulatory or the technical support sector of number of wireless mobile literatures.
Facilitating Conditions, this construct was then split and The findings specifically expose that the respondents
remodeled to see how each impacts Wireless Trust. The SEM possess a lack of confidence whether they will be notified when
procedures yield the same model fit indexes. The coefficient their personal information is collected, whether they will be
value on the path from technical support sector is not small allowed to access the data collected from them, whether sound
(0.17, p=O.055). The positive relationship between the managerial and technical procedures exist to protect data and
regulatory sector and Wireless Trust, however, is significantly their personal information. Business vendors involved in
strong (0.61, p<O.OOO). Obviously the 60% variance on Wireless providing wireless data services need to put in more effort
Trust is mostly accounted for by the regulatory sector. providing/communicating such protection and to offer
awareness training to mobile users on how to use the privacy
DISCUSSIONS AND CONCLUSIONS protection techniques and the current data security techniques in
practice.
The descriptive statistics indicate that most respondents of The study reveals that technical facilitation and regulatory
the survey study intend to use WIMT when the services are facilitation in the wireless mobile environment are still doubtful.
available, since the mean values on intention construct are above The finding on the strong causal relationship between Wireless
the cutoff point for fair agreement. However, the mean levels on Trust and Facilitating Conditions supports the opinion in the
Wireless Trust were lower - the mean values varied between the literature that Facilitating Conditions in terms of technical
scale units for fairly disagree and neutral. This may reflect the training, online support as well as a protective legal and
respondents' uncertainties or suspicions about the regulatory framework directly influence the level of trust toward
trustworthiness of the current WIMT in terms of data WIMT. This finding for the first time provides empirical
transmission security, privacy protection and system reliability, evidence to the postulated relationship in literature, providing us
and such perceived distrust mostly comes from the low level of an important perspective in examining the formation of trust
perceived regulation from a policy and legal framework. In fact, perception toward WIMT. Further, the regulatory sector of
the empirical data in this study supported the concerns for Facilitating Conditions appears much more important for
inadequate security, privacy protection and system reliability as fostering trust, compared to technical support. This finding

Fall 2005 Journal of Computer Information Systems 21


points out the direction for businesses to actively move for the same time, identify if personal experience in using WIMT
strengthening trust perceptions toward the wireless mobile makes any difference.
environment - developing targeting policies and regulations to Second, further research effort is needed in organizational
govern the wireless mobile part of the Internet and providing use of WIMT. Organizations and businesses are the most
active management and guidance to the mobile users. important users of WIMT. If the research findings can be
The finding on the tie between Wireless Trust and Intention compared with those obtained from the general individual users,
to Use WIMT echoed similar findings in Liu, Marchewka, Lu it may be valuable for generating pertinent strategies for WIMT
and Yu's study (33) of trust issues in e-commerce acceptance. It implementation in both. If WIMT can promote effectiveness and
seems that despite the djfference in context, trust becomes a productivity in organizations, it will be a significant contribution
critical issue in any virtual environment when serious data to society.
communications and commercial activities are involved. The Third, further research effort can be conducted to
fact that the variance explained by Wireless Trust in this study is investigate a specific WIMT service and its adoption. More
limited seems to imply that for all the doubts about the specific and useful information can be gathered for providing
trustworthiness of the environment, potential and early users of more useful implications to the academy as well as to business
mobile Internet services still intend to use the WIMT services. practitioners.
This phenomenon may be due to the existence of a number of Finally, Wireless Trust and its influencing factor
determinants for adoption of WIMT. According to Lu, Yao and Facilitating Conditions need to be examined together with other
Yu's study (in press), social influences and personal identified or possible determinants of WIMT adoption. Further
innovativeness also impact user intention to adopt WIMT. study in this direction will unquestionably deepen our
Usefulness and ease of use perceptions have been recognized as understanding of the real influences of Wireless Trust and
important determinants of intention in a number of studies (15, Facilitating Conditions and the complexity of the determinants
16, 17, 54, 55 56). It will be very interesting to see how a of intention to adopt WIMT.
number of such factors impact adoption of WIMT. Another
explanation might be that data security is more of a concern to REFERENCES
the business and organization use of wireless mobile data
services than to individuals. For the individual users, trust will I. Adler, T.R. "Member Trust in Teams: A Synthesized
only be a concern when more data services of commercial or Analysis of Contract Negotiation in Outsourcing IT Work,"
critical nature are popular in the wireless mobile environment. Journal of Computer Information Systems, 44:2, 2004,
Many mobile users only use their mobile devices for common pp.6-16.
email communications and short message services and may not 2. Agarwal, R. and J. Prasad. "Are Individual Differences
regard trust as a major issue in this domain. Germane to the Acceptance of New Information
Based on the findings, we would like to make the following Technologies?" Decision Sciences, 30:2, 1999, pp. 361-
conclusions: (1) Individual consumers have the intention to use 391.
the wireless Internet services via mobile devices, such as PDAs 3. Anil, S., L.T. Ting, L.H. Moe, and G.P.G. Jonathan.
and web-based phones; (2) Potential users and early adopters of "Overcoming Barriers to the Successful Adoption of
WIMT have certain concerns for data transmission security, Mobile Commerce in Singapore," International Journal
privacy protection, and system reliability; (3) User trust of Mobile Communications, I: 1/2, 2003, pp. 194-231.
perception toward WIMT is related to their intention to adopt 4. Bahmanziari, T., J.M. Pearson, and L. Crosby. "Is Trust
this system for serious communications and commercial Important in Technology Adoption? A Policy Capturing
activities; (4) User trust perception toward WIMT is related to a Approach," Journal of Computer Information Systems,
great extent to the facilitating conditions and especially the legal 43:4, Summer 2003, pp. 46-54.
and regulatory environment. 5. Berman, D.K. and J. Drucker. "Static, Problems are
To improve WIMT implementation practices, great efforts Hampering Wireless Growth," Wall Street Journal-
must be made to build relevant policies, regulations and legal Eastern Edition, 242:103, 2003, pp. BI-2.
frameworks, and to provide active management and support. 6. Boritz, J.E. and J.E. Hunton. "Investigating the Impact of .
Meanwhile, business practitioners ought to make greater effort Auditor-provided Systems Reliability Assurance on
to improve their services in data transmission security, privacy Potential Service Recipients," Journal of Information
protection and system reliability. They should examine on a Systems (Supplement), 2002, pp. 69-87.
regular basis whether sound managerial and technical 7. Byrne, B.M. Structural Equation Modeling with AMOS:
procedures exist to protect their critical data and personal Basic Concepts, Applications, and Programming. New
information. Meanwhile, special training to enhance user Jersey: Lawrence Erlbaum, 2001.
awareness and certain technical support is also needed among 8. Chau, P.Y.K. and PJ.H. Hu. "Information Technology
the potential and early mobile data services users. Acceptance by Individual Professionals: A Model
To confirm the study findings and further the research Comparison Approach," Decision Sciences, 32:4, 2001, pp.
effort in the area of wireless trust and WIMT adoption, we make 699-719.
the following recommendations. 9. Cheung, W. and M.K. Chang. "Prediction of Internet and
First, this study needs to be replicated to confirm the World Wide Web Usage at Work: A Test of an Extended
research findings. This study used an MBA student sample. For Triandis Model," Decision Support Systems, 30:1, 2000,
the purpose of investigating the individual perceptions toward pp.83-101.
WIMT, this sample is more or less representative of the 10. Coffee, P. "Making a Privacy Investment," eWeek, 20:16,
population. The most obvious neglect is the teenage group. 2003, p. 49.
Teenagers are often reported as the most ardent user group of II. Coursaris, C. and K. Hassanein. "Understanding M-
mobile data services. Further research is recommended to get commerce," Quarterly Journal of Electronic Commerce,
beyond the limit of the student sample and use non-users and 3:3,2002, pp. 247-272.
users based on random sampling procedures. This may help to 12. Coursaris, C., K. Hassanein, and M. Head. "M-eommerce
generate higher credibility and stronger persuasive power, and at in Canada: An Interation Framework for Wireless Privacy,"

Fall 2005 Journal of Computer Information Systems 22


Canadian Journal of Administrative Sciences, 20:1, 42:1,2004, pp. 127-142.
2003, pp. 54-74. 34. Lu, J., C. Liu, C.S. Yu, and C.Y. Ku. "Wireles Trust:
13. Cronkhite, C. and J. McCullough. Access Denied: The Conceptual and Operational Definition," International
Complete Guide to Protecting Your Business Online. Journal of Mobile Communications, 2:1, 2004, PP. 38-
New York: OsbornelMcGraw-Hill, 2002. 50.
14. Davis, F.D. "Perceived Usefulness, Perceived Ease of Use, 35. Lu, J., C.S. Yu, C. Liu, and 1 Yao. "Technology
and User Acceptance of Information Technology," MIS Acceptance Model for Wireless Internet," Journal of
Quarterly, 13:3, 1989, pp. 319-340. Internet Research, 13:2,2003, pp. 206-222.
15. Davis, F.D. "User Acceptance of Information Technology: 36. Milne, G.R. and AJ. Rohm. "The 411 on Mobile Privacy,"
System Characteristics, User Perceptions, and Behavioral Marketing Management, 12:4,2003, pp. 40-46.
Impacts," International Journal of Man-Machine 37. Ng-Kruelle, G., P.A. Swatman, D.S. Rebne, and J.F.
Studies, 38, 1993, pp. 475-487. Hampe. "The Price of Convenience: Privacy and Mobile
16. Davis, F.D., R.P. Bagozzi, and P.R. Warshaw. "User Commerce," Quarterly Journal of Electronic
Acceptance of Computer Technology: A Comparison of Commerce, 3:3, 2002, pp. 273-285.
Two Theoretical Models," Management Science, 35:8, 38. No Name. "Reliability and Security Depend More on
1989,pp.982-1oo3. Corporate Policies than Technology," Manufacturing
17. Davis, F.D. and V. Venkatesh. "A Critical Assessment of Systems (MSI), 22:5, 2004, p. 56.
Potential Measurement Biases in the Technology 39. Nunnally, lC. Psychometric Tbeory, 2nd ed. New York:
Acceptance Model: Three Experiments," International McGraw-Hill, 1978.
Journal of Human-Computer Studies, 45, 1996, pp. 19- 40. Pitkanen, 0., M. Mantyla, M. Valimaki, and J. Kemppinen.
45.1 "Assessing Legal Challenges on the Mobile Internet,"
18. Diercks, B. "Location-based Services: Finding their Place International Journal of Electronic Commerce, 8:1,
in the Market," Wireless Week, 9:7, March 2003, p. 56. 2003, pp. 101-121.
19. Harkin, J. "Who Trusts Track Phones?" Computer 41. Quah, IT.S. and G.L. Lim. "Push Selling-Multicast
Weekly, July 22, 2003, p. 23. Messages to Wireless Devices Based on the Publici
20. Hong-sun, K. "Information Security-Now and Beyond," Subscribe Model," Electronic Commerce Research &
Asia-Pacific Review, 10:2, 2003, pp. 89-120. Applications, 1:3/4,2002, pp. 235-247.
21. Howard, B. and C. Elison. "Wireless Reaches More and 42. Rao, B. and L. Minakakis. "Evolution of Mobile Location-
Gets a Security Boost," PC Magazine, 23:3, 2004, p. 100. based Services," Communications of the ACM, 46:12,
22. Hung, S.Y., C.Y. Ku, and C.M. Chang. "Critical Factors of 2003, pp. 61-66.
WAP Services Adoption: An Empirical Study," Electronic 43. Rawson, S. "E-commerce-Mobile Transactions: Mobility
Commerce Research & Applications, 2:1, Spring 2003, and Liability: The Hazards of Handhelds," Computer Law
pp.42-61. & Security Report, 18:3, 2002, pp. 164-172.
23. Itani, W. and A. Kayssi. "J23ME Application-layer End-to- 44. Rockwell, M. "CTIA Ramps Up for State-level Lobbying,"
end Security for M-commerce," Journal of Network & Wireless Week, 9:6, 2003, pp. 22-24.
Computer Applications, 1, January 27,2004, pp. 13-33. 45. Rothke, B. "Security via Compliance," eWeek, 21:17,
24. Jiang, J.J., M.K. Hus, G. Klein, and B. Lin. "E-commerce 2004, p. 40.
User Behavior Model: An Empirical Study," Human 46. Soriano, M. and D. Ponce. "A Security and Usability
Systems Management, 19:4, 2000, pp. 265-276. Proposal for Mobile Electronic Commerce," IEEE
25. Jih, WJ.K. and S.F. Lee. "An Exploratory Analysis of Communications Magazine, 40:8, 2002, pp. 62-68.
Relationships between Cellular Phone Users' Shopping 47. Strom, D. "Wireless Networks at Risk," VARBusiness,
Motivators and Lifestyle Indicators," Journal of 18:11,2002, pp. 43-45.
Computer Information Systems, 44:6, 2002, pp. 145-157. 48. Swartz, 1 and T. Squitieri. "Plan to Protect Computer
26. Jones, E., S. Sundaram, and W. Chin. "Factors Leading to Systems Expected Today," USA Today, September 18,
Sales Force Automation Use: A Longitudinal Analysis," 2002.
Journal of Personal Selling & Sales Management, 22:3, 49. Tan, J., HJ. Wen, and T. Gyires. "M-commerce Security:
Summer 2002, pp. 145-157. The Impact of Wireless Application Protocol (WAP),"
27. Juuly, N.C. and N. Jorgensen. "The Security Hole in WAP: Security Services on E-business and E-health Solutions,
An Analysis of the Network and Business Rationales 1:4, 2003, pp. 409-424.
Underlying a Failure," International Journal of 50. Taylor, S. and P.A. Todd. "Understanding Information
Electronic Commerce, 7:4, Summer 2003, pp. 73-93. Technology Usage: A Test of Competing Models,"
28. Kerben, J. "Cutting WiFi's Red Tape," Mobile Radio Information Systems Research, 6:2,1995, pp. 144-174.
Tecbnology, 21:2, 2003, pp. 30-36. 51. Thompson, R.L., C.A. Higgins, and J.M. Howell.
29. Kline, R.B. Principles and Practice of Structural "Influence of Experience on Personal Computer
Equation Modeling. New York: Guilford, 1998. Utilization: Testing a Conceptual Model," Journal of
30. Lam, K.Y., S.L. Chung, M. Gu, and J.G. Sun. "Lightweight Management Information Systems, 1:1, 1994, pp. 167-
Security for Mobile Commerce Transaction," Computer 187.
Communications, 26:18, December 2003, pp. 2052-2061. 52. Triandis, H. "Values, Attitudes, and Interpersonal
31. Linder, C. "B of A Official on FACT Act," American Behavior," Nebraska Symposium on Motivation, 1979:
Banker, 169:28, February 11,2004, p. 4. Beliefs, Attitudes, and Values, University of Nebraska
32. Liu, C. and K.P. Arnet. "Raising a Red Flag on Global Press, Lincoln, NE, 1979, pp. 195-259.
WWW Privacy Policies," Journal of Computer 53. Varshney, U. "Multicast Over Wireless Networks,"
Information Systems, 43:1,2002, pp. 117-127. Communications oftbe ACM, 45:12, 2002, pp. 31-38.
33. Liu, C., IT. Marchewka, J. Lu, and C.S. Yu. "Beyond 54. Venkatesh, V. and F.D. Davis. "A Model of the
Concern: A Privacy-Trust-Behavioral Intention Model of Antecedents of Perceived Ease of Use: Development and
Electronic Commerce," Information & Management, Test," Decision Sciences, 27:3, 1996, pp. 451-481.

Fall 2005 Journal of Computer Information Systems 23


55. Venkatesh, V. and F.D. Davis. "A Theoretical Extension of 59. Wakefield, R.L., M.B. Stocks, and W.M. Wilder. "The
the Technology Acceptance Model: Four Longitudinal Role of Web Site Characteristics in Initial Trust
Field Studies," Management Science, 46:2, 2000, pp. 186- Formation," Journal of Computer Information Systems,
204. 45:1,2004, pp. 94-103.
56. Venkatesh, V., M.G. Morris, G.B. Davis, and F.D. Davis. 60. Yang, X., A. Bouguettaya, B. Medjahed, H. Long, and
"User Acceptance of Information Technology: Toward a W.P. He. "Organizing and Accessing Web Services on
Unified View," MIS Quarterly, 27:3, 2003, pp. 425-478. Air," IEEE Transactions on Systems, Man &
57. Vijayan, J. "Gartner Sees Growing Need for Wireless Cybernetics, Part A, 33:6, 2003, pp. 742-758.
Security Policies," Computerworld, 38:24, 2004, p. 8. 61. Zahedi, F. "Reliability of Information Systems Based on
58. Vijayan, J. "Privacy Potholes," Computerworld, 38:1 I, the Critical Success Factors-Formulation," MIS Quarterly,
2004, pp. 36-37. 11:2,1987, pp. 186-204.

APPENDIX 1
Survey Items

Intention to Adopt
Assuming I have access to WIMD, I intend to use it (Intendl).
Given that I have access to WIMD, I predict that I would use it (Intend2).

Wireless Trust
When using WIMD, I am sure that I will be notified if personal information is collected (Trustl).
When using WIMD, I am sure that I will be allowed to access the data collected from me (Trust2).
When using WIMD, I am sure that I have a choice to opt-in and/or opt-out to share my personal information with third parties (Trust3).
When using WIMD, I am sure that certain managerial and technical procedures exist to secure all the data being transmitted on this system
(Trust4).
When using WIMD, I am sure that certain managerial and technical procedures exist to protect my personal information (TrustS).
Mobile telecommunication is reliable all the time (Trust6).

Facilitating Conditions
Government/Corporate policies encourage use of wireless Internet via mobile devices (Facilitating\).
Legal protections are available for using wireless Internet via mobile devices (Facilitating2).
Help is available for assistance with WIMD (Facilitating3).
Specialized instruction is available to me concerning WIMD (Facilitating4).
Training for WIMD is available to me (Facilitating5).
Overall, the use of WIMD is very supportive (Facilitating6).

Fall 2005 Journal of Computer Information Systems 24

You might also like