A1 Vertaisarvioitu alkuperäisartikkeli tieteellisessä lehdessä
Exploring trust of mobile applications based on user behaviors: an empirical study
Tekijät: Yan Z, Dong Y, Niemi V, Yu GL
Kustantaja: WILEY-BLACKWELL
Julkaisuvuosi: 2013
Journal: Journal of Applied Social Psychology
Tietokannassa oleva lehden nimi: JOURNAL OF APPLIED SOCIAL PSYCHOLOGY
Lehden akronyymi: J APPL SOC PSYCHOL
Numero sarjassa: 3
Vuosikerta: 43
Numero: 3
Aloitussivu: 638
Lopetussivu: 659
Sivujen määrä: 22
ISSN: 0021-9029
DOI: https://doi.org/10.1111/j.1559-1816.2013.01044.x
Tiivistelmä
This paper explores trust of mobile applications based on users' behaviors. It proposes a trust behavior construct through principal component analysis, reliability analysis, and confirmatory factor analysis based on the data collected from a questionnaire survey with more than 1,500 participants. It is indicated that a user's trust behavior is composed of three principal constructs: using behavior, reflection behavior, and correlation behavior. They are further delineated into 12 measurable sub-constructs and relate to a number of external factors. The data analysis showed that the questionnaire has positive psychometric properties with respect to construct validity and reliability. We also discuss the practical significance and limitations of our work toward usable trust management.
This paper explores trust of mobile applications based on users' behaviors. It proposes a trust behavior construct through principal component analysis, reliability analysis, and confirmatory factor analysis based on the data collected from a questionnaire survey with more than 1,500 participants. It is indicated that a user's trust behavior is composed of three principal constructs: using behavior, reflection behavior, and correlation behavior. They are further delineated into 12 measurable sub-constructs and relate to a number of external factors. The data analysis showed that the questionnaire has positive psychometric properties with respect to construct validity and reliability. We also discuss the practical significance and limitations of our work toward usable trust management.