You are on page 1of 54

Challenges and Opportunities in the

Digital Era: 17th IFIP WG 6.11


Conference on e-Business, e-Services,
and e-Society, I3E 2018, Kuwait City,
Kuwait, October 30 – November 1, 2018,
Proceedings Salah A. Al-Sharhan
Visit to download the full and correct content document:
https://textbookfull.com/product/challenges-and-opportunities-in-the-digital-era-17th-ifi
p-wg-6-11-conference-on-e-business-e-services-and-e-society-i3e-2018-kuwait-city-k
uwait-october-30-november-1-2018-proceeding/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Challenges and Opportunities in the Digital Era: 17th


IFIP WG 6.11 Conference on e-Business, e-Services, and
e-Society, I3E 2018, Kuwait City, Kuwait, October 30 –
November 1, 2018, Proceedings Salah A. Al-Sharhan
https://textbookfull.com/product/challenges-and-opportunities-in-
the-digital-era-17th-ifip-wg-6-11-conference-on-e-business-e-
services-and-e-society-i3e-2018-kuwait-city-kuwait-
october-30-november-1-2018-proceeding/

Digital Transformation for a Sustainable Society in the


21st Century: 18th IFIP WG 6.11 Conference on
e-Business, e-Services, and e-Society, I3E 2019,
Trondheim, Norway, September 18–20, 2019, Proceedings
Ilias O. Pappas
https://textbookfull.com/product/digital-transformation-for-a-
sustainable-society-in-the-21st-century-18th-ifip-
wg-6-11-conference-on-e-business-e-services-and-e-
society-i3e-2019-trondheim-norway-september-18-20-2019/

Social Media The Good the Bad and the Ugly 15th IFIP WG
6 11 Conference on e Business e Services and e Society
I3E 2016 Swansea UK September 13 15 2016 Proceedings
1st Edition Yogesh K. Dwivedi
https://textbookfull.com/product/social-media-the-good-the-bad-
and-the-ugly-15th-ifip-wg-6-11-conference-on-e-business-e-
services-and-e-society-i3e-2016-swansea-uk-
september-13-15-2016-proceedings-1st-edition-yogesh-k-dwivedi/

Trends in E Business E Services and E Commerce Impact


of Technology on Goods Services and Business
Transactions Advances in E Business 1st Edition In Lee

https://textbookfull.com/product/trends-in-e-business-e-services-
and-e-commerce-impact-of-technology-on-goods-services-and-
business-transactions-advances-in-e-business-1st-edition-in-lee/
Testing Software and Systems 30th IFIP WG 6 1
International Conference ICTSS 2018 Cádiz Spain October
1 3 2018 Proceedings Inmaculada Medina-Bulo

https://textbookfull.com/product/testing-software-and-
systems-30th-ifip-wg-6-1-international-conference-
ictss-2018-cadiz-spain-october-1-3-2018-proceedings-inmaculada-
medina-bulo/

Relational and Algebraic Methods in Computer Science


17th International Conference RAMiCS 2018 Groningen The
Netherlands October 29 November 1 2018 Proceedings
Jules Desharnais
https://textbookfull.com/product/relational-and-algebraic-
methods-in-computer-science-17th-international-conference-
ramics-2018-groningen-the-netherlands-
october-29-november-1-2018-proceedings-jules-desharnais/

Doing Business in Chile and Peru: Challenges and


Opportunities John E. Spillan

https://textbookfull.com/product/doing-business-in-chile-and-
peru-challenges-and-opportunities-john-e-spillan/

Network and Parallel Computing 15th IFIP WG 10 3


International Conference NPC 2018 Muroran Japan
November 29 December 1 2018 Proceedings Feng Zhang

https://textbookfull.com/product/network-and-parallel-
computing-15th-ifip-wg-10-3-international-conference-
npc-2018-muroran-japan-november-29-december-1-2018-proceedings-
feng-zhang/

Advances in Bioinformatics and Computational Biology


11th Brazilian Symposium on Bioinformatics BSB 2018
Niterói Brazil October 30 November 1 2018 Proceedings
Ronnie Alves
https://textbookfull.com/product/advances-in-bioinformatics-and-
computational-biology-11th-brazilian-symposium-on-bioinformatics-
bsb-2018-niteroi-brazil-october-30-november-1-2018-proceedings-
Salah A. Al-Sharhan · Antonis C. Simintiras
Yogesh K. Dwivedi · Marijn Janssen
Matti Mäntymäki · Luay Tahat
Issam Moughrabi · Taher M. Ali
Nripendra P. Rana (Eds.)
LNCS 11195

Challenges and Opportunities


in the Digital Era
17th IFIP WG 6.11 Conference on
e-Business, e-Services, and e-Society, I3E 2018
Kuwait City, Kuwait, October 30 – November 1, 2018, Proceedings

123
Lecture Notes in Computer Science 11195
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7407
Salah A. Al-Sharhan Antonis C. Simintiras

Yogesh K. Dwivedi Marijn Janssen


Matti Mäntymäki Luay Tahat


Issam Moughrabi Taher M. Ali


Nripendra P. Rana (Eds.)

Challenges and Opportunities


in the Digital Era
17th IFIP WG 6.11 Conference on
e-Business, e-Services, and e-Society, I3E 2018
Kuwait City, Kuwait, October 30 – November 1, 2018
Proceedings

123
Editors
Salah A. Al-Sharhan Luay Tahat
Gulf University for Science and Technology Gulf University for Science and Technology
(GUST) (GUST)
Hawally, Kuwait Hawally, Kuwait
Antonis C. Simintiras Issam Moughrabi
Gulf University for Science and Technology Gulf University for Science and Technology
(GUST) (GUST)
Hawally, Kuwait Hawally, Kuwait
Yogesh K. Dwivedi Taher M. Ali
Swansea University Gulf University for Science and Technology
Swansea, UK (GUST)
Hawally, Kuwait
Marijn Janssen
Delft University of Technology Nripendra P. Rana
Delft, The Netherlands Swansea University
Swansea, UK
Matti Mäntymäki
University of Turku
Turku, Finland

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-030-02130-6 ISBN 978-3-030-02131-3 (eBook)
https://doi.org/10.1007/978-3-030-02131-3

Library of Congress Control Number: 2018957282

LNCS Sublibrary: SL1 – Theoretical Computer Science and General Issues

© IFIP International Federation for Information Processing 2018


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

This book presents the proceedings of the 17th International Federation of Information
Processing (IFIP) Conference on e-Business, e-Services, and e-Society (I3E), which
was held in Kuwait City, Kuwait, from October 30 to November 1, 2018. The annual
I3E conference is a core part of Working Group 6.11, which aims to organize and
promote exchange of information and co-operation related to all aspects of e-business,
e-services, and e-society (the three Es). The I3E conference series is truly interdisci-
plinary and welcomes contributions from both academics and practitioners alike.
The central theme of the 2018 conference was “Challenges and Opportunities in the
Digital Era” and although the framework of the I3E was maintained with the core of
papers related to e-business, e-services, and e-society, those that touched upon wider
opportunities and challenges in the digital era were welcome. Consequently, the aim
of the conference was to bring together a community of scholars for the advancement
of knowledge regarding the adoption, use, impact, and potential of social media across
e-business, e-services, and e-society along with the business models that are likely to
prevail in the digital era.
The conference provided an ideal platform for knowledge advancement and
knowledge transfer through fruitful discussions and cross-fertilization of ideas with
contributions spanning areas such as e-business, social media and networking, big data
and decision-making, adoption and use of technology, ecosystems and smart cities,
modeling and artificial intelligence, behaviors and attitudes toward information, and
information technology and education. The call for papers solicited submissions in two
main categories: full research papers and short research-in-progress papers. Each
submission was reviewed by two knowledgeable academics in the field, in a
double-blind process. The 2018 conference received 99 submissions from academics
worldwide. The final set of 53 full papers submitted to I3E 2018 appear in these
proceedings.
The success of the 17th IFIP I3E Conference was a result of the enormous efforts of
numerous people and organizations. Firstly, this conference was only made possible by
the continued support of WG 6.11 for this conference series and for selecting GUST to
host I3E 2018, and for this we are extremely grateful. We are privileged to have
received so many good-quality submissions from authors across the globe and the
biggest thank you must go to them for choosing I3E 2018 as the outlet for their current
research. We are indebted to the Program Committee, who generously gave up their
time to provide constructive reviews and facilitate enhancement of the manuscripts
submitted. We would like to thank Gulf University for Science and Technology
(GUST) and the College of Business Administration for hosting the conference as well
as the Kuwait Foundation for the Advancement of Sciences (KFAS), and That Al
Salasil Bookstore for supporting the conference. Finally, we extend our sincere grat-
itude to everyone involved in organizing the conference, to our esteemed keynote
speakers, and to Springer LNCS as the publisher of these proceedings, which we hope
VI Preface

will be of use for the continued development of research related to the three Es and
social media in particular.

August 2018 Salah A. Al-Sharhan


Antonis C. Simintiras
Yogesh K. Dwivedi
Matti Mäntymäki
Luay Tahat
Marijn Janssen
Issam Moughrabi
Taher M. Ali
Nripendra P. Rana
Organization

Conference Chairs
Salah Al-Sharhan Gulf University for Science and Technology (GUST),
Kuwait
Antonis Simintiras Gulf University for Science and Technology (GUST),
Kuwait

Program Chairs
Salah Al-Sharhan Gulf University for Science and Technology (GUST),
Kuwait
Antonis Simintiras Gulf University for Science and Technology (GUST),
Kuwait
Yogesh K. Dwivedi Swansea University, UK
Matti Mäntymäki University of Turku, Finland
Marijn Janssen Delft University of Technology, The Netherlands
Nripendra P. Rana Swansea University, UK
Luay Tahat Gulf University for Science and Technology (GUST),
Kuwait
Issam Moughrabi Gulf University for Science and Technology (GUST),
Kuwait
Taher Mohammad Ali Gulf University for Science and Technology (GUST),
Kuwait

Organization Chairs
Ahmed ElMelegy Gulf University for Science and Technology (GUST),
Kuwait
Yasean Tahat Gulf University for Science and Technology (GUST),
Kuwait
Khiyar Abdallah Gulf University for Science and Technology (GUST),
Kuwait
Khalid Kisswani Gulf University for Science and Technology (GUST),
Kuwait
Nada Al Masri Gulf University for Science and Technology (GUST),
Kuwait
Dhoha Al Saleh Gulf University for Science and Technology (GUST),
Kuwait
Ahmed ElMorshidy Gulf University for Science and Technology (GUST),
Kuwait
VIII Organization

Mohammad Al Najem Gulf University for Science and Technology (GUST),


Kuwait
Mohammad Ouakouak Gulf University for Science and Technology (GUST),
Kuwait
Gertrude Hewapathirana Gulf University for Science and Technology (GUST),
Kuwait
Saeed Askary Gulf University for Science and Technology (GUST),
Kuwait
Shobhita Kohli Gulf University for Science and Technology (GUST),
Kuwait

Conference Administrator
Nabae Asfar College of Business Administration, Gulf University
for Science and Technology (GUST), Kuwait

I3E 2018 Keynote Speakers


H. Raghav Rao The University of Texas San Antonio, USA
Saad Al Barrak Executive Chairman of ILA Group

I3E 2018 Program Committee


Salah Al-Sharhan GUST, Kuwait
Antonis Simintiras GUST, Kuwait
Yogesh K. Dwivedi Swansea University, UK
M. P. Gupta IIT Delhi, India
Fawaz Al-Anzi Kuwait University, Kuwait
Naser Abu-Ghazaleh GUST, Kuwait
Khaled El-Mawazini GUST, Kuwait
Omar Moufakkir GUST, Kuwait
Jean Paul Arnaout GUST, Kuwait
Matti Mantymaki University of Turku, Finland
Marjin Janssen Delft University of Technology, The Netherlands
Luay Tahat GUST, Kuwait
Issam Moughrabi GUST, Kuwait
Taher Mohammad Ali GUST, Kuwait
Nripendra P. Rana Swansea University, UK
Ahmed ElMelegy GUST, Kuwait
Yasean Tahat GUST, Kuwait
Khiyar Abdallah GUST, Kuwait
Nada Al-Masri GUST, Kuwait
Dhoha Al-Saleh GUST, Kuwait
Ahmed El-Morshidy GUST, Kuwait
Mohamad Al-Najem GUST, Kuwait
Gertrude Hewapathirana GUST, Kuwait
Organization IX

Saeed Askary GUST, Kuwait


Shobhita Kohli GUST, Kuwait
Vigneswara Ilavarasan IIT Delhi, India
Arpan Kumar IIT Delhi, India
George Balabanis City University, UK
Khalid Benali LORIA, Université de Lorraine, France
Marijn Janssen Delft University of Technology, The Netherlands
Raed Algharabat University of Jordan, Jordan
Bruno Defude The Institude of Mines-Telecom, France
Mehiddin Al-Baali Sultan Qaboos University, Sultanate of Oman
Majed A. Al-Shamari King Faisal University, Kingdom of Saudi Arabia
Hongxiu Li Turku School of Economics, Finland
Jose Machado University of Minho, Portugal
Tomi Dahlberg University of Turku, Finland
Yiwei Gong Wuhan University, China
Esma Aimeur University of Montreal, Canada
Euripidis Loukis University of the Aegean, Greece
Sajal Kabiraj Dongbei University of Finance and Economics, China
Prabhat Kumar National Institute of Technology, India
Evandro Baccarin ESCP Europe Business School, Berlin, Germany
Sven Laumer University of Bamberg, Germany
Djamal Benslimane Lyon 1 University, France
Winfried Lamersdorf University of Hamburg, Germany
Dolphy Abraham Alliance University, India
Antonio Cerone IMT Institute for Advanced Studies, Lucca, Italy
Jonna Järveläinen Turku School of Economics, Finland
Khalil Ur-Rahmen University of Sindh, Pakistan
Khoumbati
Wojciech Cellary Poznan University of Economics, Poland
Anneke Zuiderwijk Delft University of Technology, The Netherlands
Ben Lowe University of Kent, UK
Yong Liu University of Oulu, Finland
Panayiota Tsatsou University of Leicester, UK
Francois Charoy Université de Lorraine, LORIA, France
Mahmoud Elish GUST, Kuwait
Ahmed ElOualkadi National School of Applied Sciences of Tangier,
Morocco
Anand Jeyaraj Wright State University, USA
Ranjan B. Kini Indiana University Northwest, USA
Anu Manchanda Waljat College of Applied Sciences, Oman
Banita Lal Nottingham Trent University, UK
Jairo Dornelas Federal University of Pernambuco, Brazil
Hanadi Al Mubaraki Kuwait University, Kuwait
Iqbal Al Shammari GUST, Kuwait
Florentina Halimi GUST, Kuwait
Mukhtar Al Hashimi Ahlia University, Bahrain
X Organization

Jassim Al Ajmi Ahlia University, Bahrain


Esra Al Dhaen Ahlia University, Bahrain
Fida Karam GUST, Kuwait
Sarah Jack Lancaster University, UK
Lemuria Carter Virginia Commonwealth University, USA
Ahmed Abdelrahman GUST, Kuwait
Ahmed
Ahmed Al-Derbas GUST, Kuwait
Mohamed Ouakouak GUST, Kuwait
Sudhir Chawla GUST, Kuwait
Contents

Mobile Application Adoption Predictors: Systematic Review


of UTAUT2 Studies Using Weight Analysis. . . . . . . . . . . . . . . . . . . . . . . . 1
Kuttimani Tamilmani, Nripendra P. Rana, and Yogesh K. Dwivedi

The Role of Social Networks in Online Marketing and Measurement


of Their Effectiveness – The Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Hana Mohelska and Marcela Sokolova

Learning Time Analysis - Case Study in the IT Sector


in the Czech Republic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Vaclav Zubr and Hana Mohelska

Acceptance and Use of Mobile Devices and Apps by Elderly People. . . . . . . 30


Blanka Klimova

Evaluation of the Effectiveness of the Use of a Mobile Application


on Students’ Study Achievements – A Pilot Study . . . . . . . . . . . . . . . . . . . 37
Blanka Klimova and Pavel Prazak

Digital Payments Adoption Research: A Review of Factors Influencing


Consumer’s Attitude, Intention and Usage . . . . . . . . . . . . . . . . . . . . . . . . . 45
Pushp P. Patil, Nripendra P. Rana, and Yogesh K. Dwivedi

Motivations Affecting Attitude Towards Information: Development


of a Conceptual Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Daniele Doneddu

Motivations to Seek Electronic Word of Mouth Communications


and Information Adoption: Development of a Conceptual Model . . . . . . . . . 60
Daniele Doneddu

Performance Evaluation of Post-quantum Public-Key Cryptography


in Smart Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Noureddine Chikouche and Abderrahmen Ghadbane

Investigating Dual Effects of Social Networking Sites . . . . . . . . . . . . . . . . . 81


A. K. M. Najmul Islam, Matti Mäntymäki, Aaron W. Baur,
and Markus Bick

Do Business Ecosystems Differ from Other Business Networks? The Case


of an Emerging Business Ecosystem for Digital Real-Estate and Facility
Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Matti Mäntymäki, Hannu Salmela, and Marja Turunen
XII Contents

Strategic Positioning in Big Data Utilization: Towards


a Conceptual Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Milla Wirén and Matti Mäntymäki

Understanding the Value of MOOCs from the Perspectives of Students:


A Value-Focused Thinking Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Shang Gao, Ying Li, and Hong Guo

Is Ecosystem Health a Useful Metaphor? Towards a Research Agenda


for Ecosystem Health Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Sami Hyrynsalmi and Matti Mäntymäki

Implementation of Information Security in the EU Information Systems:


An Estonian Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Maris Järvsoo, Alexander Norta, Valentyna Tsap, Ingrid Pappel,
and Dirk Draheim

Bridging the Knowledge Divide in GCC Countries: The Role


of Digital Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Amer Al-Roubaie

Design of an Algebraic Concept Operator for Adaptive Feedback


in Physics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Andrew Thomas Bimba, Norisma Idris, Ahmed A. Al-Hunaiyyan,
Rohana Binti Mahmud, and Nor Liyana Bt Mohd Shuib

Smart City and Green Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191


A. Polzonetti and M. Sagratella

The Role of Data Analytics in Startup Companies: Exploring


Challenges and Barriers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Vebjørn Berg, Jørgen Birkeland, Ilias O. Pappas, and Letizia Jaccheri

What is a Minimum Viable (Video) Game? Towards a Research Agenda. . . . 217


Sami Hyrynsalmi, Eriks Klotins, Michael Unterkalmsteiner,
Tony Gorschek, Nirnaya Tripathi, Leandro Bento Pompermaier,
and Rafael Prikladnicki

How to Avoid Financial Crises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232


Eleftherios Thalassinos and Yannis Thalassinos

Modeling the Role of C2C Information Quality on Purchase Decision


in Facebook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Rafita Haque, Imran Mahmud, Md. Hasan Sharif, S. Rayhan Kabir,
Arpita Chowdhury, Farzana Akter, and Amatul Bushra Akhi
Contents XIII

What Should I Wear Today? An IoT–Based Dress Assistant


for the e–Society. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Javier Gomez

Generic Business Process Model for SMEs in M-Commerce Based


on Talabat’s Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Fadi Safieddine and Imad Nakhoul

Electronic Financial Disclosure: Islamic Banking vs Conventional


Banking in GCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Adel M. Sarea, Abdalmuttaleb M. A. Musleh Al-Sartawi,
and Azam Abdelhakeem Khalid

Business Modeling and Flexibility in Software-Intensive Product


Development - A Systematic Literature Review . . . . . . . . . . . . . . . . . . . . . 292
Magnus Wilson and Krzysztof Wnuk

Conflicts of Interest, Information Quality and Management Decision . . . . . . . 305


Saeed Askary and Shekar S. Shetty

Artificial Intelligence and Reliability of Accounting Information . . . . . . . . . . 315


Saeed Askary, Nasser Abu-Ghazaleh, and Yasean A. Tahat

Blockchain for Businesses: A Systematic Literature Review . . . . . . . . . . . . . 325


Purva Grover, Arpan Kumar Kar, and P. Vigneswara Ilavarasan

Transportation Management and Decision Support Systems within the


Supply Chain Management Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Issam A. R. Moghrabi and Fatemah O. Ebrahim

Identifying Social Media’s Capability for Recognizing Entrepreneurial


Opportunity: An Exploratory Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Abdus-samad Temitope Olanrewaju, Mohammad Alamgir Hossain,
Paul Mercieca, and Naomi Whiteside

The Influence of Social Media on Entrepreneur Motivation and Marketing


Strategies in a Developing Country . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Abdus-Samad Temitope Olanrewaju, Naomi Whiteside,
Mohammad Alamgir Hossain, and Paul Mercieca

Auditors’ Usage of Computer-Assisted Audit Techniques (CAATs):


Challenges and Opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Raed Jameel Jaber and Rami Mohammad Abu Wadi

The Use of Internet and Mobile Banking in the Czech Republic . . . . . . . . . . 376
Martina Hedvicakova and Libuse Svobodova
XIV Contents

Solutions for Higher Competence in Financial Literacy of Pupils


at Secondary School in the Czech Republic . . . . . . . . . . . . . . . . . . . . . . . . 387
Martina Hedvicakova and Libuse Svobodova

A Fuzzy Multi-criteria Decision Making Approach for Analyzing the


Risks and Benefits of Opening Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Ahmad Luthfi, Zeenat Rehena, Marijn Janssen, and Joep Crompvoets

Analysis of the Banking Sector in the Czech Republic. . . . . . . . . . . . . . . . . 413


Martina Hedvicakova and Pavel Prazak

Factors Determining Optimal Social Media Network Portfolio


for Accounting Firms: The Case of the Czech Republic . . . . . . . . . . . . . . . . 425
Libuše Svobodová and Martina Hedvičáková

How Can Technology Support Education in War – WarAware


Education Platform for Syria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Nada Almasri, Luay Tahat, and Laila Al Terkawai

Information Technology Governance and Electronic Financial Disclosure. . . . 449


Abdalmuttaleb M. A. Musleh Al-Sartawi, Rami Mohammad Abu Wadi,
and Azzam Hannoon

Examining the Factors Affecting Behavioural Intention to Adopt


Mobile Health in Jordan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Ali Alalwan, Abdullah M. Baabdullah, Nripendra P. Rana,
Yogesh K. Dwivedi, Fadia Hudaib, and Ahmad Shammout

The Determinants of RFID Use and Its Benefits in Hospitals:


An Empirical Study Examining Beyond Adoption. . . . . . . . . . . . . . . . . . . . 468
Mohammad Alamgir Hossain and Azizah Ahmad

Assimilation of Business Intelligence Systems: The Mediating Role


of Organizational Knowledge Culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Azizah Ahmad and Mohammad Alamgir Hossain

The Relationship Between Audit Committee Characteristics


and the Level of Sustainability Report Disclosure . . . . . . . . . . . . . . . . . . . . 492
Amina Mohammed Buallay and Esra Saleh AlDhaen

Relating Big Data and Data Quality in Financial Service Organizations . . . . . 504
Agung Wahyudi, Adiska Farhani, and Marijn Janssen

Representational Quality Challenges of Big Data: Insights


from Comparative Case Studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
Agung Wahyudi, Samuli Pekkola, and Marijn Janssen
Contents XV

ERP Adoption and Use in Production Research: An Archival Analysis


and Future Research Directions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Samuel Fosso Wamba, Jean Robert Kala Kamdjoug, Shahriar Akter,
and Kevin Carillo

Solving Location Based Inventory Routing Problem in E-Commerce


Using Ant Colony Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Reema Aswani, Arpan Kumar Kar, P. Vigneswara Ilavarasan,
and Rohan Krishna

Machine Learning Approach to Analyze and Predict the Popularity


of Tweets with Images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Nimish Joseph, Amir Sultan, Arpan Kumar Kar,
and P. Vigneswara Ilavarasan

A Critical Review of Empirical Research Examining SMEs Adoption


from Selected Journals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
S. S. Abed

Advantages and Drawbacks of Social Network Sites Utilization


in Travel and Tourism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
Jaroslav Kacetl and Blanka Klimova

Raising a Model for Fake News Detection Using Machine Learning


in Python . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Gerardo Ernesto Rolong Agudelo, Octavio José Salcedo Parra,
and Julio Barón Velandia

Design of a System for Melanoma Detection Through the Processing


of Clinical Images Using Artificial Neural Networks . . . . . . . . . . . . . . . . . . 605
Marco Stiven Sastoque Mahecha, Octavio José Salcedo Parra,
and Julio Barón Velandia

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617


Mobile Application Adoption Predictors:
Systematic Review of UTAUT2 Studies Using
Weight Analysis

Kuttimani Tamilmani(&), Nripendra P. Rana, and Yogesh K. Dwivedi

School of Management, Emerging Markets Research Centre (EMaRC), Swansea


University Bay Campus, Swansea SA1 8EN, UK
kuttimani.tamilmani@gmail.com, ykdwivedi@gmail.com,
{n.p.rana,y.k.dwivedi}@swansea.ac.uk

Abstract. Mobile phone subscriptions are the largest form of consumer tech-
nology adopted across the world. Despite their potential, the research is very
scant in understanding various predictors of consumer adoption towards mobiles
technologies in particular mobile applications. This study intend to fulfil this
purpose through weight analysis on mobile application adoption based studies
that utilized UTAUT2 model. Studies needed for weight analysis were located
through cited reference search method in Scopus and Web of Science biblio-
graphic databases. The results of weight analysis revealed performance
expectancy/perceived usefulness, trust and habit as best predictors of consumer
behavioural intention to mobile applications adoption whereas behavioural
intention was the best predictor of use behaviour. There were also two
promising predictors with perfect weight of one such as perceived risk on
behavioural intention and habit on use behaviour. Further steps of this research
involves meta-analysis to develop comprehensive conceptual model concurrent
with weight analysis results for empirical evaluation on various mobile
applications.

Keywords: UTAUT2  Weight analysis  Systematic review

1 Introduction

Marketing is an indispensable business function that serves as lifeline for any organ-
isations survival since its core objective is to attract and retain customers to generate
revenue [1]. Recent years has seen rapid explosion of mobile devices (mdevices) with a
number of unique mobile subscribers reaching 5 billion in 2017 encompassing two
thirds of global population elevating mobile to the highest scale of consumer tech-
nology worldwide [2]. Apart from providing entertainment to user’s, mobile devices
such as smartphones and tablets improves their productivity through plethora of mobile
apps [3]. Examples of such applications include but are not limited to project man-
agement (slack), shopping (Amazon), business card (camcard), news organizer (flip-
board), health/fitness (fitbit), note taking (evernote), transportation (uber), payment
(square) and so on [4]. Unlike traditional advertising medium such as newspapers,
televisions, magazine and radio, the unique characteristics of mobile platform enable

© IFIP International Federation for Information Processing 2018


Published by Springer Nature Switzerland AG 2018. All Rights Reserved
S. A. Al-Sharhan et al. (Eds.): I3E 2018, LNCS 11195, pp. 1–12, 2018.
https://doi.org/10.1007/978-3-030-02131-3_1
2 K. Tamilmani et al.

marketers to reach right consumers anytime anywhere. This phenomenon is popularly


referred as mobile advertising [5, 6]. The continuous advancement of wireless com-
munication and network technologies such as 3G, 4G and 5G will make mobile
advertising a popular form of advertising medium in the near future. The market
research firm Statista’s report reveals companies spend a whopping 105.95 billion USD
on mobile advertising in 2017 and it is expected to reach 175.64 billion in 2020 [7].
However, despite the rise in mobile technologies, a research on Fortune 500 compa-
nies’ mobile websites for their mobile readiness revealed just one-quarter of them had
mobile-responsive websites and majority of the companies were unprepared [8].
Given the preceding discussion on centrality of mobile advertising in marketing
function to organisations, it would be impeccable to evaluate various predicators of
consumer intention to adopt/use IT enabled mobile applications. The extended unified
theory of acceptance and use of technology (UTAUT2) is the most comprehensive
research model in the IS arena as on date in understanding various predictors
influencing individuals to accept and make use of information technologies [see 9 for
review]. Despite UTAUT2 model recent introduction in the year 2012, it has already
garnered more than 3000 citations in Google Scholar alone spanning from IS field and
beyond emphasising on its predictive ability. Thus, the objective of this study is to
undertake weight analysis on consumer adoption/diffusion research of various mobile
applications using UTAUT2 theory to evaluate the cumulative performance of various
predictors. The study involves following steps to fulfil the objective:
• Locate empirical studies that utilized UTAUT2 model in understanding consumer
intention/use behaviour of mobile applications.
• Conduct weight analysis of the empirical studies to understand the significance and
insignificance of various relationships and their performance.
• Represent the predictors of consumer adoption to mobile applications in the form of
sundial.
The next section of this paper describes the research method employed in this
study; Sect. 3 presents the findings of weight analysis and systematic literature review
followed by discussion in Sect. 4 and conclusion in Sect. 5.

2 Research Method

Since the purpose of this study is to synthesize the existing research findings on
consumer adoption of mobile applications, a combination of “systematic review”,
“citation reference search” and “weight-analysis” approach were deemed appropriate
[10–12]. Cited reference search for Venkatesh et al. [9] article in Scopus and Web of
Science database from March 2012 to March 2017 resulted in 1,320 papers (823 from
Scopus; 497 from Web of Science). On further scrutiny, we found 452 citations were
common in both databases resulting in 868 unique citations for UTAUT2. Out of 868
articles, 16 empirical studies were found pertinent to mobile applications with relevant
data for weight analysis. Weight analysis determines indicative predictive power of an
independent variable over dependant variable. A weight is ratio between the number of
times an independent variable found as significant predictor of dependant variable
Mobile Application Adoption Predictors: Systematic 3

(a) to the total number of times an independent variable is examined as a predictor of


dependant variable (b) and thus is calculated using formula (a)/(b) [13].

3 Findings

This section presents and explains the findings from the systematic review and weight
analysis

3.1 Literature Synthesis


The 16 mobile applications related studies included ten different countries: Malaysia
was the most studied country with four empirical examination; whereas Jordon, China
and the USA with two examinations each emerged as the second most studied coun-
tries. This is followed by six countries in third position such as Mozambique, France,
Bangladesh, Portugal, Chile and the UK with one study each. Six major themes
emerged based on the technology examined: (1) Mobile payments as a broader theme
was the most examined technology with nine studies. Out of nine studies, six directly
examined mobile payments, whereas three studies examined technologies such as NFC
payments, mobile wallet and remote mobile payment to broadly fall under mobile
payment classification. (2) Mobile banking was the second most popular technology
examined with three studies, and finally the remaining four themes: (3) Mobile Apps

Table 1. Summary of mobile application studies


SN Author name D.V Technology Examined Country
1 Alalwan et al. [18] UB Mobile Banking Jordon
2 Baptista and Oliveira [19] UB Mobile Banking Mozambique
3 Hew et al. [14] BI Mobile Apps Malaysia
4 Jia et al. [19] BI Mobile Payment China
5 Jia et al. [20] BI Mobile Payment China
6 Koenig-Lewis et al. [21] UB Mobile Payment France
7 Mahfuz et al. [22] UB Mobile Banking Bangladesh
8 Morosan and Defranco [23] BI NFC Payments USA
9 Oliveira et al. [24] BI Mobile Payment Portugal
10 Qasim and Abu-Shanab [25] BI Mobile Payment Jordon
11 Ramírez-Correa et al. [14] UB Mobile Internet Chile
12 Shaw [26] BI Mobile Wallet USA
13 Slade et al. [27] BI Remote Mobile Payment UK
14 Teo et al. [28] BI Mobile Payment Malaysia
15 Wong et al. [15] BI Mobile TV Malaysia
16 Wong et al. [16] BI Mobile Advertising Malaysia
LEGEND: BI: Behavioural Intention; D.V: Independent Variable; UB: Use
Behaviour
4 K. Tamilmani et al.

[14]; (4) Mobile Internet [15]; (5) Mobile TV [16] and 6) Mobile advertising [17] were
examined on one instance each. It was also found that only five studies employed Use
behaviour (UB) as their outcome/dependant variable with all having behavioural
intention (BI) as their immediate antecedent whereas BI was the most operated
outcome/dependant variable with 11 studies (see Table 1).

3.2 External Variables


Thirteen out of sixteen studies employed UTAUT2 constructs in combination with
external variables. Whereas the remaining three studies (i.e. Jia, Hall [20];
RamírezCorrea, Rondán-Cataluña [15]; Wong, Wei-Han Tan [16] adapted only
UTAUT2 based constructs in understanding consumer intention to use various mobile
applications. Table 2 presents findings of external variables analysis across thirteen

Table 2. Summary of external variables


SN External constructs Frequency Citations
1 Trust 5 Alalwan et al. [18]; Jia et al. [21];
Qasim and Abu-shanab [26]; Shaw
[27]; Slade et al. [28]
2 Perceived risk 2 Koenig-lewis et al. [22]; slade et al.
[28]
3 Perceived security 2 Morosan and Befranco [24]; oliveira
et al. [25]
4 Innovativeness 2 Oliveira et al. [25]; wong et al. [17]
5 Exposure 1 Jia et al. [21]
6 Information searching 1 Jia et al. [21]
7 Knowledge 1 Koenig-lewis et al. [22]
8 General privacy 1 Morosan and Defranco [24]
9 System-related privacy 1 Morosan and Defranco [24]
10 Compatibility 1 Oliveira et al. [25]
11 Behavioural intention to 1 Oliveira et al. [25]
recommend
12 Network externalities 1 Qasim and Abu-shanab [26]
13 Self-efficacy 1 Shaw [27]
14 Informal learning 1 Shaw [27]
15 Perceived transaction speed 1 Teo et al. [29]
16 Perceived transaction 1 Teo et al. [29]
convenience
17 Mobile skilfulness 1 Wong et al. [17]
18 Website quality 1 Mahfuz et al. [23]
SN External moderators Frequency Citations
1 Hofstede cultural moderators 2 Baptista and Oliveira [19]; Mahfuz
et al. [23]
2 Educational level 1 Hew et al. [14]
Mobile Application Adoption Predictors: Systematic 5

studies to reveal eighteen unique external constructs and two unique external moder-
ators. Trust was the most frequently utilised external construct with five studies fol-
lowed by the second most used external constructs such as perceived risk, perceived
security and innovativeness that were used on two occasions each. In addition, there
were 14 more external constructs like: (1) exposure, (2) information searching,
(3) knowledge, (4) website quality, (5) general privacy, (6) system-related privacy,
(7) behavioural intention to recommend, (8) compatibility, (9) network externalities,
(10) informal learning, (11) self-efficacy, (12) perceived transaction convenience,
(13) perceived transaction speed and (14) mobile skilfulness that were used on one
instance each. The hypothesis from all external constructs to consumer behavioural
intention/use behaviour of various mobile applications were positive apart from per-
ceived risk and system related privacy variable that were hypothesized negatively to BI.
A (-) sign in Table 3 indicates the negative path relationship among the independent
and dependant variable in examining consumer adoption of mobile applications.
Finally, the two external moderators: Hofstede’s cultural moderators and educational
level were used together on three instances with two studies the former one was the
most used.

4 Weight-Analysis

4.1 Coding Independent and Dependent Variables


This study employed generalized coding scheme adapted from Jeyaraj et al. [13] to
uniformly code findings between various independent and dependant variables. The
coding template was organised into ‘rows’ and ‘columns’. Each row represents one of
the 16 studies, whereas each column represents the path relationship between an
independent and dependant variable. The intersection points between studies in “row”
and path relationship in “column” represent the significance of the particular path
relationship corresponding to that study. The coding scheme has four different values:
(1) ‘+1’ in the case where the path relationship examined was significant and
hypothesized in positive direction; (2) ‘−1’ in the case where the path relationship
examined was significant and hypothesized in negative direction; (3) ‘0’ in the case
where the path relationship examined was insignificant; and (4) “Blank” when the
relationship was not studied [13]. The thorough examination of 16 articles uncovered
63 unique path relationships employed among 31 independent and 12 dependent
variables. However, the findings of this study is limited only to 31 path relationships on
two dependant variables i.e. behavioural intention (comprising 27 independent vari-
ables) and use behaviour (comprising four independent variables) (see Table 3).
Since the objective of this study is to understand various predictors of consumer
behavioural intention and use of mobile applications.

4.2 Consumer Mobile Applications Predictor’s Findings


Table 3 presents the summary on weight-analysis findings of 16 studies mobile
application studies. An independent variable is termed as well-utilized when examined
6 K. Tamilmani et al.

by researchers in five or more studies and termed as experimental variable in case of


less than five examinations. Furthermore, the independent variable qualifies as the best
predicator of dependant variable when they are used in five or more studies (welluti-
lized) and have a weight of 0.80 or more. On the other hand, independent variable can
be considered as a promising predicator when it is used in less than five studies
(experimental) and have perfect weight of one [12].
Table 3 lists 27 independent variables on behavioural intention and four on use
behaviour in understanding consumer adoption towards mobile applications. There were
eight well-utilized independent variables/predictors (examined five or more instances)
of behavioural intention such as performance expectancy/perceived usefulness (exam-
ined 16 times), effort expectancy/perceived ease of use (examined 14 times), social
influence (examined 12 times), facilitating conditions (examined 9 times), hedonic
motivation/perceived enjoyment (examined 9 times), price value (examined 7 times),
habit (examined 7 times) and trust (examined 7 times). Out of eight well-utilized pre-
dictors the best predictors of behavioural intention are the one with weights  0.80
which are performance expectancy/perceived usefulness (0.81), trust (0.80) and habit
(1.00). However, some independent variables, despite being used more than five times,
yielded non-significant results consistently to emerge as the worst predictors of con-
sumer behavioural intention towards mobile payment with weight < 0.80. The label of
worst predictors may not necessarily appeal to the well utilized predicators having
weight in between the range of 0.80 and 0.50 such as social influence (0.67), facilitating
conditions(0.78) and hedonic motivation/perceived enjoyment (0.78) are worth of future
examination [13].
Instances of worst predictors with weight < 0.50 comprise effort
expectancy/perceived ease of use (0.43) and price value (0.29). Furthermore, there were
19 experimental variables used in understanding consumer behavioural intention
towards mobile payment. Out of nineteen experimental variables only three variables:
1) perceived risk, 2) perceived security and 3) innovativeness were examined on two
instances each with rest sixteen variables were examined on once instance each. The
discussion is restricted to experimental variables examined more than one instance.
Perceived Risk emerged as the promising predicator with weight of one.
There were four independent variables in understanding consumer use behaviour
towards mobile applications. Among the four, behavioural intention was the only well
utilized and best predicator with significant values on all five occasions. The remaining
three: 1) facilitating conditions (examined 4 times, significant 3 times), habit (examined
2 times, significant 2 times) and website quality (examined 1 times, significant 1 times)
are experimental variables. Habit emerged as the promising predicator with weight of
one among experimental variables examined more than one instance. Figure 1 presents
sundial of consumer mobile applications adoption predictors and their corresponding
weight. Surprisingly none of the sixteen studies on consumer mobile applications
employed UTAUT2 moderator’s relationships in their original form.
Mobile Application Adoption Predictors: Systematic 7

Table 3. Weight analysis summary approach adapted from Jeyaraj et al. [13]
SN Independent Variable DV Sig In- Total Weight
(a) Sig (b) (a/b)
1 Performance expectancy/Perceived BI 13 3 16 0.81
Usefulness
2 Effort expectancy/Perceived ease of 6 8 14 0.43
use
3 Social Influence 8 4 12 0.67
4 Facilitating Conditions 7 2 9 0.78
5 Hedonic motivation/Perceived 7 2 9 0.78
enjoyment
6 Price Value 2 5 7 0.29
7 Habit 5 0 5 1
8 Trust 4 1 5 0.8
9 Perceived Risk(-) 2 0 2 1
10 Perceived security 1 1 2 0.5
11 Innovativeness 1 1 2 0.5
12 Informal learning 1 0 1 1
13 Online shopping habit 0 1 1 0
14 Mobile shopping habit 1 0 1 1
15 Cell phone Usage habit 0 1 1 0
16 Mobile payment usage habit 1 0 1 1
17 Masculinity Vs Femininity 0 1 1 0
18 Information searching 1 0 1 1
19 General privacy 0 1 1 0
20 System-related privacy(-) 1 0 1 1
21 Compatibility 1 0 1 1
22 Power distance 0 1 1 0
23 Uncertainty avoidance 0 1 1 0
24 Website quality 0 1 1 0
25 Network externalities 1 0 1 1
26 Perceived Transaction Convenience 0 1 1 0
27 Perceived Transaction Speed 1 0 1 1
28 Behavioural Intention UB 5 0 5 1
29 Facilitating Conditions 3 1 4 0.75
30 Habit 2 0 2 1
31 Website quality 1 0 1 1
Legend: D.V: Independent Variable; In. Sig: Number of insignificant path values; Sig (a):
Number of significant path values
8 K. Tamilmani et al.

[LEGEND: CUH: Cell Phone Usage Habit; COM: Compatibility; EE/PEOU: Effort
Expectancy/Perceived Ease Of Use; FC: Facilitating Conditions; GP: General Privacy; HA: Habit;
HM/PEJ: Hedonic Motivation/ Perceived Enjoyment; IL: Informal Learning; IS: Information Searching;
IN: Innovativeness; MF: Masculinity Vs Femininity; MPU: Mobile Payment Usage Habit; MSH: Mobile
Shopping Habit; NE: Network Externalities; OSH: Online Shopping Habit; PR: Perceived Risk; PS:
Perceived Security; PTC: Perceived Transaction Convenience; PTS: Perceived Transaction Speed;
PE/PU: Performance Expectancy/ Perceived Usefulness; PD: Power Distance; PV: Price Value; SI: Social
Influence; SRP: System-Related Privacy; TR: Trust; UA: Uncertainty Avoidance; WQ: Website Quality.]

Fig. 1. Consumer mobile applications adoption predictors a Sundial

5 Discussion

Literature synthesis reveals the deployment of UTAUT2 theory to understand con-


sumer adoption of six different mobile applications in ten different countries under-
scoring generalizability of UTAUT2 theory across various technological and cultural
contexts. Utilitarian value based mobile applications were the most studied with mobile
payments (9 studies) and mobile banking (3 studies) together comprising 12 out of 16
studies. The findings revealed that only five (around 31%) studies employed UB as
endogenous variable whereas the remaining 11 studies comprising (69%) employed BI
Mobile Application Adoption Predictors: Systematic 9

as endogenous variable. This pattern is comprehensible since popular mobile appli-


cations are still evolving and it is difficult to measure actual consumer use of these
technologies, in such cases BI can be good indicator of future technology use. How-
ever, Wu and Du’s [30] meta-analysis on BI and UB caution the researchers notion of
considering BI as surrogate of UB as it’s not appropriate for studies to report user
behaviour without assessing actual system usage. In addition, they caution all stake-
holders in research community should be circumspect of such studies not investigating
user behaviour but only behavioural intention [30].
The two independent variables of technology acceptance model (TAM) i.e. per-
ceived usefulness similar to performance expectancy (16 studies) and perceived ease of
use (14 studies) similar to effort expectancy emerged as the most utilized variables
emphasising TAM’s dominance in individual adoption research. However, the most
frequently used predicators does not necessarily translate into best predicators [13]. For
instance, effort expectancy, despite being the second most examined independent
variable on 14 instances, was significant on just six occasions with weight of 0.43 to
become the worst predictor of consumer behavioural intention to mobile applications.
Surprisingly price value the latest addition to the UTAUT2 model was the worst
predicator of BI with lowest weight of 0.29 among relationships that are examined five
or more times. A meta-analytic study on price value construct found the construct
inappropriate to examine mobile applications that are available to users free of cost as
they were prone to insignificant results in determining consumer adoption to those
technology [31]. Researchers need compelling reason to include the worst predicators
as independent variables in evaluating consumer adoption towards mobile payment. On
the other hand, researchers should continue using four best predictors in understanding
consumer adoption of mobile applications three of them performance
expectancy/perceived usefulness (0.81), trust (0.80) and habit (1.00) were on beha-
vioural intention, whereas behavioural intention (1.00) the fourth and final one was on
use behaviour all having weights of  0.80. Moreover, there were only two promising
predictors with perfect weight of one used more than one instance such as perceived
risk (1) and habit (1). Adoption to innovative product such as mobile applications that
are entirely new to market can involve great element of risk. However, UTAUT and
TAM, the most popular theoretical models in understanding individual technology
adoption, have often overlooked constructs such as perceived risk, privacy concerns
and trust [21]. Weight analysis finding confirms the notion of Koenig-Lewis et al. [21]
with trust emerging as best predicator and perceived risk as promising predicator of
consumer adoption to mobile applications. Researchers should continue using
promising predicators in future studies to enable more testing and ascertain their
suitability as the best predicator.
As far as habit is concerned, it emerged as best predictor of behavioural intention
and promising predictor of use behaviour. HA ! BI path was the most examined habit
based relationship with all five significant instances and the remaining two significant
relationships were for the path HA ! UB. UB is less utilized as dependant variable of
HA than BI, since HA ! UB is better hypothesis in understanding consumer adoption
of well-established and mature technologies, whereas BI is better predictor of habit and
subsequent UB for new and rarely used technology applications such as our case under
investigation i.e. mobile applications [32]. Moreover this belief is strengthened through
10 K. Tamilmani et al.

meta-analysis study that focussed on habit construct which revealed habit as not an
optimal construct to examine technology users at early stage of adoption where suf-
ficient time hasn’t elapsed in using technologies to form habit [33].

6 Conclusion

This paper aimed to understand the predictors of consumer adoption to mobile appli-
cation through weight analysis. The results of weight analysis divulged the
most/least/best/worst and promising predictors of consumer adoption for mobile
applications and provided comprehensive review on this subject. The results also
revealed that more than 80% of the studies employed external variables since UTAUT2
and other popular technology acceptance theories have disregarded predictors such as
trust (best predictor) and perceived risk (promising predictor) in consumer adoption for
mobile applications. Moreover, none of the studies employed UTAUT2 moderating
variables due to the complexity of their relationship amongst various constructs. In
addition, despite being the most frequently used predictor; effort expectancy produced
the most insignificant results. This calls for researchers to be more cautious while
operationalizing their constructs from existing theory/model to make necessary adap-
tations or omit irrelevant constructs depending upon context rather than having obli-
gation to replicate all the constructs in underpinning model/theory. Despite
precautionary measures taken for coding and analysis the findings of the study is not
without its limitations. The studies involved for weight analysis were limited only to
two databases such as Web of Science and Scopus restricting the number of empirical
studies. Future weight analysis should include a large number of studies from wider
range of databases to minimize publication bias. Although weight analysis is good
indicator on significance of predictors it does not take sample size into consideration
like meta-analysis to provide true effect size. Thus, the next stage of this research is as
follows: (1) to conduct meta-analysis and develop research model in combination with
weight analysis; (2) to collect data on selected mobile applications through question-
naires; and (3) to analyse the collected data and empirically examine the research model
through statistical techniques.

References
1. Srivastava, R.K., Shervani, T.A., Fahey, L.: Marketing, business processes, and shareholder
value: an organizationally embedded view of marketing activities and the discipline of
marketing. J. Mark. 63, 168–179 (1999)
2. Gsmaintelligence. (2017). Global Mobile Trends 2017. Retrieved from: https://www.
gsmaintelligence.com/research/?file=3df1b7d57b1e63a0cbc3d585feb82dc2&download,
Last accessed 2018/05/01
3. Keith, M.J., Thompson, S.C., Hale, J., Lowry, P.B., Greer, C.: Information disclosure on
mobile devices: Re-examining privacy calculus with actual user behavior. Int. J. Hum
Comput Stud. 71(12), 1163–1173 (2013)
4. Patel, S.: 21 Apps to Boost Productivity, Accountability, and Success. Retrieved from:
https://www.entrepreneur.com/article/244945, Last accessed 2018/05/10
Mobile Application Adoption Predictors: Systematic 11

5. Maneesoonthorn, C., Fortin, D.: Texting behaviour and attitudes toward permission mobile
advertising: an empirical study of mobile users’acceptance of sms for marketing purposes.
Int. J. Mob. Mark. 1(1), 66–72 (2006)
6. Yang, K.C.: Exploring factors affecting consumer intention to use mobile advertising in
Taiwan. J. Int. Consum. Mark. 20(1), 33–49 (2007)
7. Statista.: Mobile advertising spending worldwide from 2010 to 2020 (in million U.S dollars)
https://www.statista.com/statistics/303817/mobile-internetadvertising-revenue-worldwide/.
Accessed 20 May 2018
8. McCorkindale, T., Morgoch, M.: An analysis of the mobile readiness and dialogic principles
on Fortune 500 mobile websites. Public Relat. Rev. 39(3), 193–197 (2013)
9. Venkatesh, V., Thong, J.Y., Xu, X.: Consumer acceptance and use of information
technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1),
157–178 (2012)
10. Venkatesh, V., Thong, J.Y., Xu, X.: Unified theory of acceptance and use of technology: a
synthesis and the road ahead. J. Assoc. Inf. Syst. 17(5), 328–376 (2016)
11. King, W.R., He, J.: A meta-analysis of the technology acceptance model. Inf. Manag. 43(6),
740–755 (2006)
12. Dwivedi, Y.K., Rana, N.P., Jeyaraj, A., Clement, M., Williams, M.D.: Reexamining the
unified theory of acceptance and use of technology (UTAUT): towards a revised theoretical
model. Inf. Syst. Front. 1–16 (2017). https://doi.org/10.1007/s10796-017-9774-y
13. Jeyaraj, A., Rottman, J.W., Lacity, M.C.: A review of the predictors, linkages, and biases in
IT innovation adoption research. J. Inf. Technol. 21(1), 1–23 (2006)
14. Hew, J.-J., Lee, V.-H., Ooi, K.-B., Wei, J.: What catalyses mobile apps usage intention: an
empirical analysis. Ind. Manag. Data Syst. 115(7), 1269–1291 (2015)
15. Ramírez-Correa, P.E., Rondán-Cataluña, F.J., Arenas-Gaitán, J.: An empirical analysis of
mobile Internet acceptance in Chile. Inf. Res. 19(3), 1–19 (2014)
16. Wong, C.-H., Wei-Han Tan, G., Loke, S.P., Ooi, K.-B.: Mobile TV: a new form of
entertainment? Ind. Manag. Data Syst. 114(7), 1050–1067 (2014)
17. Wong, C.-H., Tan, G.W.-H., Tan, B.-I., Ooi, K.-B.: Mobile advertising: the changing
landscape of the advertising industry. Telemat. Inform. 32(4), 720–734 (2015)
18. Alalwan, A.A., Dwivedi, Y.K., Rana, N.P.: Factors influencing adoption of mobile banking
by Jordanian bank customers: extending UTAUT2 with trust. Int. J. Inf. Manage. 37(3), 99–
110 (2017)
19. Baptista, G., Oliveira, T.: Understanding mobile banking: The unified theory of acceptance
and use of technology combined with cultural moderators. Comput. Hum. Behav. 50, 418–
430 (2015)
20. Jia, L., Hall, D., Sun, S.: The effect of technology usage habits on consumers’ intention to
continue use mobile payments. In: Proceedings of the 20th Americas Conference on
Information Systems, Savannah, AIS (2014)
21. Jia, L., Hall, D., Sun, S.: Trust building in consumer learning process and its effect on
consumers’ behavioral intention toward mobile payments. In: Proceedings of Twenty-first
Americas Conference on Information Systems, Puerto Rico (2015)
22. Koenig-Lewis, N., Marquet, M., Palmer, A., Zhao, A.L.: Enjoyment and social influence:
predicting mobile payment adoption. Serv. Ind. J. 35(10), 537–554 (2015)
23. Mahfuz, M. A., Hu, W., Khanam, L.: The influence of cultural dimensions and website
quality on m-banking services adoption in bangladesh: applying the UTAUT2 model using
PLS. In: WHICEB (2016)
24. Morosan, C., DeFranco, A.: It’s about time: Revisiting UTAUT2 to examine consumers’
intentions to use NFC mobile payments in hotels. Int. J. Hosp. Manag. 53, 17–29 (2016)
12 K. Tamilmani et al.

25. Oliveira, T., Thomas, M., Baptista, G., Campos, F.: Mobile payment: Understanding the
determinants of customer adoption and intention to recommend the technology. Comput.
Hum. Behav. 61, 404–414 (2016)
26. Qasim, H., Abu-Shanab, E.: Drivers of mobile payment acceptance: the impact of network
externalities. Inf. Syst. Front. 18(5), 1021–1034 (2016)
27. Shaw, N.: The mediating influence of trust in the adoption of the mobile wallet. J. Retail.
Consum. Serv. 21(4), 449–459 (2014)
28. Slade, E., Williams, M., Dwivedi, Y., Piercy, N.: Exploring consumer adoption of proximity
mobile payments. J. Strat. Mark. 23(3), 209–223 (2015)
29. Teo, A.-C., Tan, G.W.-H., Ooi, K.-B., Hew, T.-S., Yew, K.-T.: The effects of convenience
and speed in m-payment. Ind. Manag. Data Syst. 115(2), 311–331 (2015)
30. Wu, J., Du, H.: Toward a better understanding of behavioral intention and system usage
constructs. Eur. J. Inf. Syst. 21(6), 680–698 (2012)
31. Tamilmani, K., Rana, N.P., Dwivedi, Y.K., Sahu, P.G., Roderick, S.: Exploring the role of
‘price value’ for understanding consumer adoption of technology: a review and meta-
analysis of utaut2 based empirical studies. In: Twenty-Second Pacific Asia Conference on
Information Systems, Japan (2018)
32. Ouellette, J.A., Wood, W.: Habit and intention in everyday life: the multiple processes by
which past behavior predicts future behavior. Psychol. Bull. 124(1), 54–74 (1998)
33. Tamilmani, K., Rana, N. P., Dwivedi, Y. K.: Use of ‘Habit’ is not a habit in understanding
individual technology adoption: a review of UTAUT2 based empirical studies, forthcoming.
In: Proceedings of IFIP WG 8.6 Working Conference - Smart Working, Living And
Organising 25th June, Portsmouth, UK (2018)
The Role of Social Networks in Online
Marketing and Measurement of Their
Effectiveness – The Case Study

Hana Mohelska and Marcela Sokolova(&)

Faculty of Informatics and Management, Department of Management, University


of Hradec, Hradec Kralove 3, Rokitanskeho 62, Kralove, Czech Republic
{hana.mohelska,marcela.sokolova}@uhk.cz

Abstract. This paper is devoted to online marketing tools and primarily


focuses on the use of social networks and measuring their effectiveness. The
theoretical part briefly presents the topic of online marketing and selected tools.
The next section deals with the case study that analyses the use of social net-
works on a particular project, including measuring the efficiency of social net-
works by comparing the planned and actual state according to the selected
metrics. In conclusion, there is a discussion on the results obtained and the
possible directions, which would increase the efficiency of social networks, i.e.
online marketing, are outlined. The results of assessing the current state of
online marketing for the surveyed project in 2017, by comparing the planned
and actual metric values, largely fail to meet the targets. With measuring social
networking tools, the planned numbers of website visits and social networking
orders didn’t reach their planned values. Regarding the number of fans on
individual social networks, the planned status was only achieved with the
Pinterest and Instagram social networks.

Keywords: Online marketing  Social networks  Efficiency measurement


Facebook  Twitter  Instagram

1 Introduction

The rapid development of information and communication technologies, in which, the


Internet plays an important role, has been an important trend in the recent years.
Nowadays, only a few people can imagine life without Internet. The possibilities of
using the Internet include real-time communication between people, access to a wide
range of information and services and it has a great potential mainly for
entrepreneurship, even for businesses that normally operate outside the Internet. Today,
the vast majority of businesses are presented on the Internet. Thanks to online mar-
keting, they have a better chance of entering people’s awareness and increasing their
sales.
The present time brings enhanced possibilities of marketing communication
through the Internet. Communication on the Internet is characterized by a number of
positive characteristics, particularly through the ability to accurate target, personalize,
interact and measure, and all with relatively low costs [1, 2].
© IFIP International Federation for Information Processing 2018
Published by Springer Nature Switzerland AG 2018. All Rights Reserved
S. A. Al-Sharhan et al. (Eds.): I3E 2018, LNCS 11195, pp. 13–20, 2018.
https://doi.org/10.1007/978-3-030-02131-3_2
Another random document with
no related content on Scribd:
Although no one could be surprised that the President and his
Cabinet hesitated to put themselves without reserve in the hands of
an adventurer, Eaton’s anger was extreme at finding the
Government earnest for peace rather than war. Himself a
Connecticut Federalist, a close friend of Timothy Pickering, he
expressed his feelings in his private letters with the bitterness as well
as with the humor of his class.[314]
“I waited on the President and the Attorney-General. One of them
was civil, and the other grave.... I endeavored to enforce conviction on
the mind of Mr. Lincoln of the necessity of meeting the aggressions of
Barbary by retaliation. He waived the subject, and amused me with
predictions of a political millennium which was about to happen in the
United States. The millennium was to usher in upon us as the
irresistible consequence of the goodness of heart, integrity of mind,
and correctness of disposition of Mr. Jefferson. All nations, even
pirates and savages, were to be moved by the influence of his
persuasive virtue and masterly skill in diplomacy.”
Eaton’s interviews probably took place at the moment when the
Louisiana treaty confirmed the Cabinet in its peace policy and in
reliance on diplomacy. In March, 1804, Eaton succeeded in returning
to the Mediterranean as naval agent, but without special powers for
the purpose he had in mind.
“The President becomes reserved; the Secretary of War ‘believes
we had better pay tribute,’—he said this to me in his own office.
Gallatin, like a cowardly Jew, shrinks behind the counter. Mr. Madison
‘leaves everything to the Secretary of the Navy Department.’ And I am
ordered on the expedition by Secretary Smith,—who, by the by, is as
much of a gentleman and a soldier as his relation with the
Administration will suffer,—without any special instructions to regulate
my conduct.”
With no other authority to act as a military officer than a vague
recommendation from the President as a man who was likely to be
extremely useful to Barron, Eaton returned with Barron’s large
squadron. He felt himself ill-treated, for he was irritable and self-
asserting by nature, and was haunted by a fixed idea too
unreasonable for the President to adopt; but he chose to act without
authority rather than not act at all, for he was born an adventurer,
and difficulties which seemed to cooler heads insurmountable were
nothing in his eyes. Sept. 5, 1804, he arrived at Malta, and thence
sailed to Alexandria; for in the meanwhile Hamet had been driven to
take refuge in Egypt, and Eaton on reaching Cairo, Dec. 8, 1804,
found that the object of his search was shut up in Minyeh on the Nile
with some rebellious Mamelukes, besieged by the viceroy’s troops.
After infinite exertions and at no little personal danger, Eaton brought
Hamet to Alexandria, where they collected some five hundred men,
of whom one hundred were Christians recruited on the spot. Eaton
made a convention with Hamet, arranged a plan of joint operations
with Barron, and then at about the time when President Jefferson
was delivering his second Inaugural Address, the navy agent led his
little army into the desert with the courage of Alexander the Great, to
conquer an African kingdom.
So motley a horde of Americans, Greeks, Tripolitans, and Arab
camel-drivers had never before been seen on the soil of Egypt.
Without discipline, cohesion, or sources of supply, even without
water for days, their march of five hundred miles was a sort of
miracle. Eaton’s indomitable obstinacy barely escaped ending in his
massacre by the Arabs, or by their desertion in a mass with Hamet at
their head; yet in about six weeks they succeeded, April 17, 1805, in
reaching Bomba, where to Eaton’s consternation and despair he
found no American ships.[315]
“Nothing could prevail on our Arabs to believe that any had been
there. They abused us as impostors and infidels, and said we had
drawn them into that situation with treacherous views. All began now
to think of the means of individual safety; and the Arabs came to a
resolution to separate from us the next morning. I recommended an
attempt to get into Derne. This was thought impracticable. I went off
with my Christians, and kept up fires upon a high mountain in our rear
all night. At eight the next morning, at the instant when our camp was
about breaking up, the Pacha’s casnadar, Zaid, who had ascended
the mountain for a last look-out, discovered a sail! It was the ‘Argus;’
Captain Hull had seen our smokes, and stood in. Language is too
poor to paint the joy and exultation which this messenger of life
excited in every breast.”
Drawing supplies from the brig the little army rested a few days;
and then, April 25, moved against Derne, where they found the town
held by a garrison of eight hundred men who had thrown up
earthworks and loopholed the terraces and houses for musketry.
Eaton sent to the governor a flag of truce, which was sent back with
the Eastern message,—“My head, or yours!” Three cruisers, the
“Nautilus,” “Argus,” and “Hornet,” acted in concert with Eaton, and a
vigorous combined attack, April 27, drove the governor and his
garrison from the town. Eaton received a ball through the left wrist,
but could not afford to be disabled, for on the news of his arrival a
large force was sent from Tripoli to dislodge him; and he was obliged
to fight another little battle, May 13, which would have been a
massacre had not the ships’ guns held the Tripolitans in awe.
Skirmishing continued another month without further results. Eaton
had not the force to advance upon Tripoli, which was nearly seven
hundred miles to the westward, and Hamet found no such popular
support at Derne as he had hoped.
What influence Eaton’s success at Derne had on the Pacha at
Tripoli was never perfectly understood; but the Pacha knew that
Rodgers was making ready for an assault, beside which the hottest
of Preble’s bombardments would seem gentle; Eaton at Derne with
Hamet was an incessant and indefinite threat; his own subjects were
suffering, and might at any moment break into violence; a change of
ruler was so common a matter, as Yusuf had reason to remember,
that in the alternative of losing his throne and head in one way or the
other, he decided that peace was less hazardous than war.
Immediately upon hearing that his troops had failed to retake Derne,
he entered into negotiations with Tobias Lear, the American Consul-
General at Algiers, who had come to Tripoli for the purpose; and on
this occasion the Pacha negotiated with all the rapidity that could be
wished. June 3, 1805, he submitted to the disgrace of making peace
without being expressly paid for it, and Lear on his side consented to
ransom the crew of the “Philadelphia” for sixty thousand dollars.
When Eaton learned what Lear had done, his anger was great
and not unreasonable. That Lear should have made a treaty which
sacrificed Eaton’s Mahometan allies, and paid sixty thousand dollars
for the imprisoned seamen at a moment when Eaton held Derne,
and could, as he thought, with two hundred marines on shore and an
immense fleet at sea drive the Pacha out of his dominions within six
weeks, was astonishing. Lear’s only excuse was the fear of causing
a massacre of the “Philadelphia’s” crew,—a reason which Eaton
thought unfounded and insufficient, and which was certainly, from a
military point of view, inadmissible. The treaty left the Mahometan
allies at Derne to be massacred, and threw Hamet on Eaton’s hands.
Deposited at Syracuse with a suite of thirty persons without means
of support, Caramelli became a suppliant for alms to the United
States Congress. Eaton declared the treaty disgraceful, and
thenceforth his grievances against the government took an acute
form. The settlement of his accounts was slow and difficult. He
returned to America and received great attentions, which made him
none the less loud in complaint, until at last he died in 1811 a victim
to drink and to craving for excitement. Eaton was beyond question a
man of extraordinary energies and genius; he had even the rare
courage to displease his own Federalist friends in 1807, because of
defending Jefferson who had done nothing for him, but who at a
critical moment represented in his eyes the Union.
Meanwhile peace with Tripoli was obtained without tribute, but at
the cost of sixty thousand dollars, and at the expense of Eaton and
his desperate band of followers at Derne. Hamet Caramelli received
at last a small sum of money from Congress, and through American
influence was some years afterward made governor of Derne. Thus
after four years of unceasing effort the episode of the Tripolitan war
came to a triumphant end. Its chief result was to improve the navy
and give it a firmer hold on popular sympathy. If the once famous
battles of Truxton and the older seamen were ignored by the
Republicans, Preble and Rodgers, Decatur and Hull, became brilliant
names; the midnight death of Somers was told in every farmhouse;
the hand-to-hand struggles of Decatur against thrice his numbers
inflamed the imagination of school-boys who had never heard that
Jefferson and his party once declaimed against a navy. Even the
blindest could see that one more step would bring the people to the
point so much dreaded by Jefferson, of wishing to match their forty-
fours against some enemy better worthy of their powers than the
pirates of Tripoli.
There was strong reason to think that this wish might soon be
gratified; for on the same day when Lear, in the “Essex,” appeared
off Tripoli and began his negotiation for peace, Monroe’s travelling-
carriage rumbled through the gates of Madrid and began its dusty
journey across the plains of Castile, bearing an angry and
disappointed diplomatist from one humiliation to another.
INDEX TO VOLS. I. AND II.
Abolition Society, an early, i. 128.
Acts of Congress, of Sept. 24, 1789, to establish the Judiciary, i,
259, 260, 275, 276;
of June 13, 1798, to suspend intercourse with France, 383;
of June 25, 1798, concerning aliens, 140, 141, 206, 207, 259,
286;
of July 14, 1798, concerning sedition, 140, 141, 206, 207,
259, 261, 286;
of Feb. 9, 1799, further to suspend intercourse with France,
384;
of Feb. 13, 1801, to provide for the more convenient
organization of the courts, 274–276, 278, 280, 288, 293,
297;
of Jan. 14, 1802, for the apportionment of representatives,
301;
of March 8, 1802, to repeal the Judiciary Act of 1801, 280,
281, 284–298;
of March 16, 1802, fixing the military peace establishment,
301;
of April 6, 1802, to repeal the internal taxes, 272;
of April 29, 1802, for the redemption of the public debt, 272;
of April 29, 1802, to amend the judicial system, 298;
of April 30, 1802, to enable Ohio to form a State government,
302;
of Feb. 28, 1803, for building four sloops-of-war and fifteen
gunboats, ii. 77;
of Oct. 31, 1803, to take possession of Louisiana, 119, 120;
of Feb. 24, 1804, for collecting duties within the territories
ceded to the United States, 257, 260–263, 291, 293, 304,
380;
of March 25, 1804, to establish the Mediterranean Fund, 141;
of March 26, 1804, for the temporary government of
Louisiana, 120–129;
of Jan. 19, 1805, to erect a dam from Mason’s island, 209;
of March 2, 1805, further providing for the government of
Orleans Territory, 401;
of March 3, 1805, for the more effectual preservation of peace
in the ports and harbors of the United States, 397, 398.
Acts of Parliament, on navigation, ii. 319, 320, 327;
on naturalization, 338, 413, 414;
on merchant-shipping, 345.
Adams, John Quincy, senator from Massachusetts, ii. 110, 117,
184, 379;
proposes draft of Constitutional amendment, 118, 160, 164.
Addington ministry, ii. 358, 416.
Addington, Henry (Lord Sidmouth), succeeds Pitt, ii. 342, 347;
retires from office, 418.
Addison, Judge, impeached, ii. 195.
Admiralty courts in the West Indies, ii. 340.
Albany in 1800, i. 3.
Alien and sedition laws, i. 140, 206, 259.
(See Acts of Congress.)
Allston, Washington, i. 149.
Alquier, French minister at Madrid, i. 363, 368.
Alsop, Richard, i. 102.
Amendment to the Constitution, the twelfth, ii. 132.
“American Citizen,” the, i. 331.
Ames, Fisher, i. 82, 83;
his opinion of democracy, 84;
in conversation, 86;
speech of, on the British treaty, 88, 93;
his language toward opponents, 119; ii. 164.
Amiens, peace of, i. 370; ii. 59, 290, 326, 347, 385.
(See Treaties.)
Amusements in 1800, in New England, i. 50;
in Virginia, 51.
Anderson, Joseph, senator from Tennessee, ii. 157.
“Aristides.” Pamphlet by W. P. Van Ness, ii. 73, 172.
Armstrong, General John, senator from New York, i. 108, 113,
230, 234, 281; ii. 157;
succeeds Livingston at Paris, 291, 308.
Army, chaste reformation of, i. 238;
peace establishment in 1801, 242, 261, 272, 301.
Ashe, an English traveller, i. 43, 52, 53, 54.
Astor, John Jacob, i. 28.
“Aurora” newspaper, i. 118, 121.

Bailey, Theodorus, i. 231, 266, 296.


Bainbridge, Captain, ii. 137, 426.
Baldwin, Abraham, senator from Georgia, i. 305.
Ballston Spa, i. 92.
Baltimore in 1800, i. 29, 131.
Banks, in Boston in 1800, i. 22;
in New York, 25;
in the South, 31;
hostility to, 65.
Baptists in New England, i. 89.
Barbary Powers, war with the, i. 244 et seq.; ii. 425 et seq.
Baring, Alexander, ii. 358.
Barlow, Joel, i. 69, 99;
his “Columbiad,” 103 et seq., 106, 182.
Barron, Commodore Samuel, at Tripoli, ii. 428;
yields the command to Rodgers, 429.
Bartram, William, i. 124.
Bayard, James A., member of Congress from Delaware, i. 269,
271;
his reply to Giles, 291 et seq.;
beaten by Cæsar A. Rodney, retires to the Senate, ii. 76;
re-elected to the House, 201;
moves the form of question in the Chase impeachment, 237,
241.
Beaujour, Felix de, quoted, i. 46, 165.
Belknap, Jeremy, i. 93.
Bernadotte, General, appointed minister at Washington, ii. 10;
Talleyrand’s instructions to, 11.
Berthier, General, Napoleon’s agent for the retrocession of
Louisiana, i. 366.
Beurnonville, French ambassador at Madrid, ii. 59, 277.
Bishop, Abraham, collector of New Haven, i. 226.
Blockade, law of, ii. 385;
of Martinique and Guadeloupe, 381;
of New York, 396.
Bonaparte. (See Napoleon.)
Bonaparte, Jerome, his marriage to Miss Patterson and his
reception by the President, ii. 377 et seq.
Bonaparte, Joseph, negotiates treaty of Morfontaine, i. 360, 362;
scene of, with Napoleon, ii. 35 et seq.
Bonaparte, Lucien, appointed ambassador at Madrid, i. 371,
373;
opposes the cession of Louisiana, ii. 34;
scene of, with Napoleon, 35 et seq.
Boston, population and appearance of, in 1800, i. 20;
business, 21;
an intellectual centre in 1800, 75;
sentiment of, 87;
social customs of, in 1800, 91;
a summer watering-place, 92.
Bowditch, Nathaniel, i. 93.
Boyle, John, ii. 228.
Brackenridge, H. H., author of “Modern Chivalry,” i. 124; ii. 195.
Bradley, Captain, of the “Cambrian,” ii. 393, 396.
Bradley, Stephen R., senator from Vermont, ii. 157, 218, 238,
259.
Breckenridge, John, senator from Kentucky, i. 269;
moves the repeal of the Judiciary Act, 278, 280; ii. 85, 94;
on the admission of Louisiana to the Union, 108;
his bill for the territorial government of Louisiana, 120.
British claims, ii. 339.
Brown, Charles Brockden, i. 123.
Brown, James, secretary of the Louisiana Territory, ii. 220.
Bryant, William Cullen, i. 110, 133.
Buckminster, Joseph, i. 81.
Buckminster, Joseph Stevens, i. 90, 162.
Bülow, Heinrich Wilhelm, i. 41, 48.
Burr, Aaron, Vice-President, i. 65, 93, 109, 112;
his character, 195;
centre of intrigue, 229 et seq.;
his hatred of Virginia, 279;
his toast at the Federalist dinner, 282;
attacked by the “American Citizen” and “Aurora,” 283; ii. 154;
invoked by Pickering and Griswold, 171;
his defence by “Aristides,” 172;
his interview with Jefferson, 175;
nominated for governor of New York, 177;
confers with Griswold, 183;
defeated, 185;
his hostility to Hamilton, 185;
his duel with Hamilton, 187 et seq.;
presides at the Chase impeachment, 227, 238, 368;
communicates with Merry, 395;
his plan of creating a western confederacy, 402;
asks the aid of the British government, 403;
Turreau’s opinion of, 407;
his plan, 408.
Butler, Pierce, ii. 95.

Cabot, George, his opinion of democracy, i. 84, 86 et seq.;


letter of, opposing Pickering’s scheme, ii. 164;
inclines to Burr, 182.
Calhoun, John C., i. 154.
Callender, James T., his libels on Jefferson, i. 322 et seq.
Calvinism, popular reaction against, in New England, i. 82.
Campbell, George W., member of Congress from Tennessee, ii.
123;
impeachment of Judge Chase, 224, 228, 230.
Campbell, Justice, on the Louisiana case, ii. 127.
Campbell, Thomas, borrows from Freneau, i. 126.
Canals in 1800, i. 8–10, 26, 29, 38, 94.
Canning, George, rise of, ii. 417.
“Canons of Etiquette,” the, ii. 365.
Capitol at Washington in 1800, i. 30, 198;
designed by Dr. Thornton, 111.
Caramelli, Hamet, ii. 430, 436.
Cevallos, Don Pedro de, i. 371; ii. 23;
remonstrates against the sale of Louisiana, 58;
refuses to pay for French spoliations, 276, 279;
his conditions on ratification of Spanish claims convention,
280;
his comments on the Americans, 282, 283;
alarmed, 284;
complains of Pinckney’s conduct, 294.
Channing, William Ellery, i. 90;
his impressions of Virginia manners, 132, 171.
Charles IV. of Spain, his character, i. 341;
refuses papal territory, 354;
his delight at the offer of Tuscany, 369;
refuses to sell Florida, 401;
delivers Louisiana to Napoleon, 401;
distressed by Napoleon, ii. 56;
his demands on Napoleon, 59;
withdraws protest against the sale of Louisiana, 277;
declares war on England, 309.
Charleston, S. C., in 1800, i. 37 et seq., 92, 149.
Chase, Justice Samuel, his charge to the Baltimore grand jury,
ii. 147;
his impeachment, 149 et seq., 158;
scene of impeachment, 227;
his counsel, 229;
the managers of his impeachment, 229;
articles of impeachment, 229;
the trial, 230 et seq.;
votes on the articles, 238;
his acquittal, 239.
Chauncey, Isaac, at Tripoli, ii. 428.
Cheetham, editor of the “American Citizen and Watchtower,” i.
121;
attacks Burr, 331.
Chillicothe in 1800, i. 2.
Christophe, i. 416.
Cincinnati in 1800, i. 2.
Claiborne, William Charles Cole, appointed governor of
Mississippi Territory, i. 295, 403;
receives possession of Louisiana, ii. 256;
governor of Orleans Territory, 400.
Claims, American, on France. (See French spoliations.)
Claims, American, on Spain. (See Pinckney.)
Clark, Christopher, ii. 228.
Clay, Henry, i. 133.
Cleveland in 1800, i. 3.
Clifton, William, i. 98.
Clinton, De Witt, i. 112, 228, 233;
resigns his senatorship to become mayor of New York, 266,
281;
attacks Burr through Cheetham, 331;
his duel with Swartwout, 332; ii. 206.
Clinton, George, i. 114;
governor of New York, 228; ii. 173;
nominated for Vice-President, 180.
Cobbett, William, i. 46;
in Philadelphia, 118.
Cocke, William, senator from Tennessee, ii. 113;
censures Randolph, 240.
Coleman, William, editor of the New York “Evening Post,” i. 119.
Colonial System of the European Powers, ii. 323.
Colonial trade, ii. 319, 322, 327–329;
direct and indirect, 324, 325;
West Indian, value of, 331, 332.
Columbia College, i. 101.
“Columbiad,” the, of Joel Barlow, i. 103 et seq.
Commerce, foreign and domestic, in 1800, i. 5, 14.
Congregational clergy, i. 79.
Congress, the Seventh, first session of, i. 264–307;
second session, 427–433; ii. 74–77;
the Eighth, first session of, 92, 96–159;
second session, 206–242, 396.
(See Acts of Congress.)
Connecticut, i. 105.
“Constitution,” the, ii. 426.
Cooper, Dr. Charles D., ii. 178;
letter, 186.
Cooper, James Fenimore, i. 110;
quotation from “Chainbearer,” 43.

Dallas, Alexander James, i. 127, 281; ii. 198;


letter of, to Gallatin, 198.
Dana, Samuel, member of Congress from Connecticut, i. 269,
271.
Davis, John, an English traveller, i. 122;
his account of Jefferson’s inauguration, 197.
Davis, Matthew L., i. 231 et seq., 296.
Dayton, Jonathan, senator from New Jersey, i. 280; ii. 105.
Dearborn, Henry, appointed Secretary of War, i. 219; ii. 2, 431.
Debt, public. (See Finances.)
Decatur, James, killed at Tripoli, ii. 427.
Decatur, Stephen, burns the “Philadelphia,” ii. 139;
at Tripoli, 427.
Decrès, Napoleon’s Minister of Marine, instructions of, to
Richepanse and Leclerc, re-establishing slavery, i. 397;
defining the boundaries of Louisiana and its administration, ii.
5.
Democrats, denounced by New England clergy, i. 79 et seq.;
social inferiority, 92;
the Northern, 264.
Dennie, Joseph, on democracy, i. 85;
editor of the “Portfolio,” 119, 121.
Deposit at New Orleans, the right of, granted by treaty, i. 349;
taken away, 418;
restored, ii. 3.
Derbigny, Pierre, ii. 401, 406, 408.
Desertion of British Seamen, ii. 333–335, 345, 346, 392.
Dessalines, i. 416.
Destréhan, Jean Noel, ii. 401, 406.
Dexter, Samuel, i. 93, 192, 219.
Dickens, Charles, i. 56.
“Diomed,” stallion, i. 51.
Drayton, Governor, of South Carolina, i. 151.
Dry-dock, Jefferson’s plan of, i. 428; ii. 77.
Duane, William, editor of the “Aurora,” i. 118;
his influence in Pennsylvania, ii. 194.
Duponceau, Peter S., i. 127; ii. 259.
Dupont de Nemours, commissioned by Jefferson to treat
unofficially with Bonaparte, i. 411;
letter to, ii. 254.
Dwight, Theodore, i. 101;
his attack on democracy, 225.
Dwight, President Timothy, quoted, i. 21, 23;
his travels, 41;
describes popular amusements, 49, 56;
lack of roads in Rhode Island, 64;
his poem, “The Conquest of Canaan” cited, 96 et seq.;
his “Greenfield Hill,” 98;
value of his Travels, 100, 310.

Early, Peter, member of Congress from Georgia, ii. 228, 230.


Eaton, William, his character and career, ii. 429 et seq.;
his interviews with Jefferson and the Cabinet, 430;
attacks Derne, 433.
Education in New England, i. 76, 77;
in New York, 110;
in New Jersey and Pennsylvania, 129;
in Virginia, 136.
Election of 1800, i. 152, 163;
of 1801, 294; ii. 202;
of 1802, 308, 329, 330;
of 1803, 76;
of 1804, 163, 176, 185, 197, 201, 202, 204.
Embargo imposed by Washington, ii. 323.
Emerson, Ralph Waldo, i. 171.
“Emmanuel,” case of, ii. 327.
England, colonial policy of, ii. 317;
cordiality with, 347;
change of tone toward, 356, 387.
“Enterprise,” United States schooner, captures Tripolitan corsair,
i. 245.
Eppes, John W., member of Congress from Virginia, ii. 95.
Erie Canal, the, i. 112.
Essex Junto, the, i. 89, 314.
Etiquette at Washington, ii. 362 et seq., 380.
Eustis, Dr. William, member of Congress from Boston, i. 93,
281.
Evans, Oliver, his inventions, i. 68, 71, 182.
“Evening Post,” the New York, i. 119, 120; ii. 366.
“Experiment,” sloop, i. 6.

Federalists. (See Party.)


Fight, the “rough-and-tumble,” in the South, i. 52 et seq.
Finances in 1801, i. 239 et seq., 253, 270, 272;
in 1802, ii. 75, 77;
in 1803, 135, 136, 141;
in 1804, 206.
Fitch, John, his inventions, i. 66 et seq., 181.
Florida restored by England to Spain, i. 353;
Bonaparte’s demand for, refused by Charles IV., 369;
Bonaparte’s attempts to secure, 401;
Livingston’s attempt to secure, ii. 44.
Florida, West, ii. 7;
claimed by Livingston as part of the Louisiana purchase, 68;
Jefferson’s anxiety to secure, 245;
scheme for seizing, 255;
claim to, 273, 311, 312;
claim adopted by the President, 302.
Foster, Augustus, his description of Jefferson, i. 186;
of Madison, 190.
Fox, Charles James, ii. 418.
Franklin, Benjamin, i. 60 et seq., 181;
citation from Poor Richard, 44.
French Revolution, i. 82.
French spoliations, i. 350, 361-363; ii. 30, 31, 40–42, 46–50, 61.
Freneau, Philip, i. 125.
Frere, John Hookham, i. 402.
Fugitive-Slave Bill, i. 300.
Fulton, Robert, i. 69, 71, 182.

Gaillard, John, senator from South Carolina, ii. 238.


Gallatin, Albert, his opinion of the Connecticut River district, i.
19;
on Indian corn, 58;
his political doctrines, 72, 115 et seq., 163, 177;
personal characteristics of, 190;
appointed Secretary of the Treasury, 218;
supports M. L. Davis, 232;
opposes removals from office, 235; ii. 194;
his financial measures, i. 239;
his financial schemes adopted, 272;
inserts school and road contract into the Ohio Constitution,
302;
the Yazoo sale, 304;
underestimates the product of the taxes, ii. 75;
his opinion on the acquisition of territory, 79, 131;
success of the Treasury Department under, 135;
asks Congress for a special tax for the Barbary war, 141, 261;
attacked by Duane, 194, 196;
by Eaton, 431.
Gelston, Daniel, i. 231.
George III., character of, i. 342.
Georgia, state of, in 1800, i. 4, 39;
surrenders territory to the United States, 303;
land speculation in, 303;
Rescinding Act, 304.
Gerry, Elbridge, i. 358.
Giles, William B., member of Congress from Virginia, i. 209,
261, 267;
his political career, 284 et seq.;
debate on the Judiciary Bill, 286 et seq., 299; ii. 142;
supports the impeachment of Judge Chase, 221;
his view of impeachment, 223, 235, 237, 238, 241.
Goddard, Calvin, member of Congress from Connecticut, ii. 160.
Godoy, Don Manuel, Prince of Peace, i. 346 et seq.;
treaty of 1795 negotiated by, 348, 369, 371;
baffles Bonaparte, 374;
attempts to conciliate the United States, ii. 21;
protests against the sale of Louisiana, 57;
conciliates Napoleon, 277.
Goodrich, Elizur, i. 226.
Gore, Christopher, ii. 347.
Granger, Gideon, appointed Postmaster-General, i. 308;
an active politician, ii. 192;
agent for the Yazoo claims, 212;
attacked by Randolph, 213.
Graydon, Alexander, i. 127.
Gregg, Andrew, member of Congress from Pennsylvania, ii.
123.
Grégoire, Abbé, i. 105.
Grenville, Lord, ii. 316, 418.
Griswold, Gaylord, member of Congress from New York, ii. 96.
Griswold, Roger, member of Congress from Connecticut, i. 269,
299; ii. 99, 101, 133, 142, 160;
his letters to Oliver Wolcott, 162, 169, 180;
conference of, with Burr, 183, 390, 391.

Hamilton, Alexander, i. 85, 86, 108, 277;


Talleyrand’s remark concerning, 352; ii. 168;
opposes Burr for governor, 176;
not in favor of disunion, 177;
projects, 184;
his opposition to Burr, 185 et seq.;
his duel with Burr, 186 et seq.;
mourned by the Federalists, 190.
Harper, Robert G., ii. 154, 228, 232.
Harrowby, Lord, British Foreign Secretary, ii. 418;
receives Monroe, 420;
instructions as to impressments and the boundary convention,
423 et seq.
“Hartford wits,” i. 101.
Harvard College, i. 77, 78, 90.
Hastings, Warren, trial of, ii. 226.
Hawkesbury, Lord, British Foreign Secretary, ii. 344, 410.
Henry, Patrick, i. 143.
Higginson, Stephen, ii. 164.
Hillhouse, James, senator from Connecticut, ii. 160.
Hopkins, Lemuel, i. 102.
Hopkinson, Joseph, ii. 228, 231.
Horses and horse-racing in New England, i. 50;
in New York and Virginia, 51.
Hosack, Dr. David, i. 111.
Hospitals and asylums in 1800, i. 128.
Hull, Isaac, at Tripoli, ii. 428.
Hunt, Samuel, member of Congress from New Hampshire, ii.
160.

Impeachment. (See Pickering and Chase.)


Impeachment, a scarecrow, ii. 243.
Impressment of seamen, ii. 335 et seq., 358, 384, 393, 394,
421, 423;
Act of Congress punishing, ii. 397, 420.
Indian corn, i. 58.
Indian tribes in 1800, i. 4.
Ingersoll, C. J., i. 123.
Ingersoll, Jared, ii. 259.
Inns of New England and New York, i. 21.
Inquisitiveness, American, i. 55.
Insane, the, treatment of, in 1800, i. 128.
Irving, Peter, editor of the “Morning Chronicle,” i. 121.
Irving, Washington, i. 110.

Jackson, Andrew, i. 54.


Jackson, Francis James, his reputation, ii. 360.
Jackson, James, senator from Georgia, and the Yazoo sale, i.
305; ii. 95, 238.
Jackson, John G., member of Congress from Virginia, ii. 211;
replies to Randolph’s attack on Madison, 215.
Jackson, Mr., editor of the “Political Register,” ii. 265;
discloses Yrujo’s attempt to use him, 266.
Jacmel, siege of, i. 385.
Jay, Chief-Justice, i. 108;
sent to England by Washington, ii. 323;
negotiates treaty with Lord Grenville, 326.
Jay’s treaty. (See Treaties.)
Jefferson, Thomas, i. 13, 32, 59, 65, 67, 72, 73;
Federalist opinion of, 80 et seq., 83, 112, 114;
opposed to manufactures, 138;
chief author of the Kentucky Resolutions, 140 et seq.;
leader of the Virginia school, 143;
characteristics of, 144 et seq.;
his political doctrines, 146 et seq., 156;
Thomas Moore’s verses on, 167;
visionary, 170;
his ideas of progress, 178, 179;
personal characteristics, 185 et seq.;
his dress, 187;
social pre-eminence, 188;
his inauguration, 191;
his antipathy to Marshall, 192, 194;
purity of his life, 196;
his inaugural address, 199 et seq.;
his conception of government, 210 et seq.;
his foreign policy, 214 et seq.;
his Cabinet, 218 et seq.;
his plans for the navy, 222 et seq.;
his treatment of patronage, 224, 294;
his New Haven letter, 226;
his first annual message, 248;
his course with regard to the Judiciary, 255 et seq.;
his abnegation of power, 262;

You might also like