Professional Documents
Culture Documents
To cite this article: June Lu, Chun-Sheng Yu & Chang Liu (2005) Facilitating Conditions, Wireless
Trust and Adoption Intention, Journal of Computer Information Systems, 46:1, 17-24, DOI:
10.1080/08874417.2005.11645865
FIGURE 1
The Research Model
Descriptive Data Analysis as an indicator of the internal consistency of scale items for each
of the three constructs. The alpha value for each of the three
Of the participants, 49 percent were males, 51 percent, constructs was above 0.80, a level generally deemed highly
females. With an average age of 3 I, the age range extends from satisfactory for multi-item scales (39). Based on the 7-point
20 to 59. Eighty-four percent of the respondents hold full-time scale used in the study, the mean values on both items of the
or part- time jobs. Over seventy-seven percent (277) of the intention construct surpass the cutoff value for fair agreement
respondents had no experience accessing wireless Internet (Mean >= 5.5). The general mean levels of the items on
services via mobile handhelds such as PDAs and Web phones. Wireless Trust are a bit lower -varying between fairly disagree
Of those who had some experience, only one third had six and neutral. The means on three items "I am sure that I will be
>
months' or longer experience with WIMT. The participants in notified if personal information is collected (M=3.01)," "I will
this study represent a sample of potential and early adopters. be allowed to access the data collected from me (M=3.37),"
Given the current status of WIMT use in the U. S., the reported "certain managerial and technical procedures exist to protect my
demographics of the respondents indicate a representative personal information (M=2.83)" - seem to reflect obvious
sample. skepticism in those aspects. In comparison, Facilitating
Table I lists the basic descriptive statistics on the Conditions tend to have a higher average level but reveals
theoretical constructs under study. Cronbach's alpha is provided obvious uncertainty.
TABLE 1
Scale Statistics and Pearson Correlations of the Constructs
Structural Equation Modeling followed to test the proposed model. Amos version 4 was used
as the model-fitting program. SEM is commonly regarded as a
Structural equation modeling (SEM) procedures were then comprehensive method for testing theoretical constructs and
FIGURE 2
The Structural Path Analysis
As an additional interest to test the magnitude of influence the number one blockage for WIMT adoption as expressed in a
from either the regulatory or the technical support sector of number of wireless mobile literatures.
Facilitating Conditions, this construct was then split and The findings specifically expose that the respondents
remodeled to see how each impacts Wireless Trust. The SEM possess a lack of confidence whether they will be notified when
procedures yield the same model fit indexes. The coefficient their personal information is collected, whether they will be
value on the path from technical support sector is not small allowed to access the data collected from them, whether sound
(0.17, p=O.055). The positive relationship between the managerial and technical procedures exist to protect data and
regulatory sector and Wireless Trust, however, is significantly their personal information. Business vendors involved in
strong (0.61, p<O.OOO). Obviously the 60% variance on Wireless providing wireless data services need to put in more effort
Trust is mostly accounted for by the regulatory sector. providing/communicating such protection and to offer
awareness training to mobile users on how to use the privacy
DISCUSSIONS AND CONCLUSIONS protection techniques and the current data security techniques in
practice.
The descriptive statistics indicate that most respondents of The study reveals that technical facilitation and regulatory
the survey study intend to use WIMT when the services are facilitation in the wireless mobile environment are still doubtful.
available, since the mean values on intention construct are above The finding on the strong causal relationship between Wireless
the cutoff point for fair agreement. However, the mean levels on Trust and Facilitating Conditions supports the opinion in the
Wireless Trust were lower - the mean values varied between the literature that Facilitating Conditions in terms of technical
scale units for fairly disagree and neutral. This may reflect the training, online support as well as a protective legal and
respondents' uncertainties or suspicions about the regulatory framework directly influence the level of trust toward
trustworthiness of the current WIMT in terms of data WIMT. This finding for the first time provides empirical
transmission security, privacy protection and system reliability, evidence to the postulated relationship in literature, providing us
and such perceived distrust mostly comes from the low level of an important perspective in examining the formation of trust
perceived regulation from a policy and legal framework. In fact, perception toward WIMT. Further, the regulatory sector of
the empirical data in this study supported the concerns for Facilitating Conditions appears much more important for
inadequate security, privacy protection and system reliability as fostering trust, compared to technical support. This finding
APPENDIX 1
Survey Items
Intention to Adopt
Assuming I have access to WIMD, I intend to use it (Intendl).
Given that I have access to WIMD, I predict that I would use it (Intend2).
Wireless Trust
When using WIMD, I am sure that I will be notified if personal information is collected (Trustl).
When using WIMD, I am sure that I will be allowed to access the data collected from me (Trust2).
When using WIMD, I am sure that I have a choice to opt-in and/or opt-out to share my personal information with third parties (Trust3).
When using WIMD, I am sure that certain managerial and technical procedures exist to secure all the data being transmitted on this system
(Trust4).
When using WIMD, I am sure that certain managerial and technical procedures exist to protect my personal information (TrustS).
Mobile telecommunication is reliable all the time (Trust6).
Facilitating Conditions
Government/Corporate policies encourage use of wireless Internet via mobile devices (Facilitating\).
Legal protections are available for using wireless Internet via mobile devices (Facilitating2).
Help is available for assistance with WIMD (Facilitating3).
Specialized instruction is available to me concerning WIMD (Facilitating4).
Training for WIMD is available to me (Facilitating5).
Overall, the use of WIMD is very supportive (Facilitating6).