Mix method analysis for analyzing user behavior on logistic company mobile pocket software

نویسندگان

چکیده

The present study emphasizes mixed-method analysis, integrating the partial least square structural equation model (PLS-SEM) and customer journey for mobile pocket office improvement in logistic XYZ company. extension of unified theory acceptance use technology (UTAUT 2) by incorporating perceived risk (PR), personal innovativeness (PI), trust (TR) variables are used. sample this consisted 243 res­pondents. Based on results PLS-SEM two eleven tested hypotheses were determined to be rejected. In application usage, proposed effectively explained 85.7 per cent influence beha­vioral intention (BI) 72.1 behavior (UB). mapping (CJM) investigation's findings show that fluctuations field generally brought a lot data entry, sluggish internet connections, overworked operations. company may acquire sugges­tions knowledge developing further applications due inquiry.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Sequential User Behavior on the Web

This tutorial aims at outlining fundamental methods for studying categorical sequences on the Web. Categorical sequences can refer to any kind of transitional data between a set of states, for example human navigation (transitions) between Web sites (states). Presented methods focus on sequential pattern mining, modeling and inference aiming at better understanding the production of sequences. ...

متن کامل

Analyzing User Demographics and User Behavior for Trust Assessment

In many systems, the determination of trust is reduced to reputation estimation. However, reputation is just one way of determining trust. The estimation of trust can be tackled from a variety of other perspectives. In this chapter, we model trust relying on user reputation, user demographics and from provenance. We then explore the effects of combining trust computed through these different me...

متن کامل

Analysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)

Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis.    Methods: The method of this research is log anal...

متن کامل

Logging and Analyzing Mobile User Behaviors

With the rapid evolution of mobile devices, the usage patterns of applications on these devices also change over time. The topic of user behaviors on mobile devices such as smart phones has attracted much attention in recent years. In this work, we have developed an experimental platform that can log and analyze all user operations on a smart phone that is used freely over a long period of time...

متن کامل

Analyzing User Behavior to Rank Desktop Items

Existing desktop search applications, trying to keep up with the rapidly increasing storage capacities of our hard disks, are an important step towards more efficient personal information management, yet they offer an incomplete solution. While their indexing functionalities in terms of different file types they are able to cope with are impressive, their ranking capabilities are basic, and rel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Sistem dan Manajemen Industri

سال: 2023

ISSN: ['2580-2887', '2580-2895']

DOI: https://doi.org/10.30656/jsmi.v7i1.5937