NRC - TR - 2009 - 005 Trust Behaviors of Mobile Application Usage - A Formal Experiment Report
نویسندگان
چکیده
A mobile application is a software package that can be installed and executed on a mobile device. Which mobile application is more trustworthy for a user to purchase, download, install, consume or recommend becomes a crucial issue that impacts its final success. This report explores trust of mobile applications based on users’ behaviors. It proposes a conceptual trust model according to trust behavior study. We achieve our model through Principal Component Analysis (PCA), reliability analysis, Confirmatory Factor Analysis (CFA) based on data collected from a questionnaire survey. It is indicated that a user’s trust behavior is a multidimensional construct composed of four main aspects: using behavior, reflection behavior, and correlation behavior, as well as management behavior. They are further delineated into thirteen measurable sub-constructs and relate to a number of external factors. The data analysis showed that the questionnaire has positive psychometric properties with respect to model construct validity and reliability. Particularly, the limitations of current empirical study and future work are also discussed.
منابع مشابه
A Control Architecture for a Heterogeneous Swarm of Robots
We propose a software architecture that can ease and speed up the development process of controllers for heterogeneous swarm systems. It is inherently modular and allows behaviors to be combined in layers and reused in multiple controllers. This can potentially speedup the development process of controllers since they become much more readable and well structured. We validated the architecture ...
متن کاملNRC - TR - 2007 - 011 Mobile Games 2010 Elina Koivisto
The Mobile Games 2010 report looks at how mobile gaming could be like in year 2010 from three points of view: games and players, technology, and business. The study was done by interviewing about 20 mobile game publishers, developers, operators, and inviting experts to write articles on the topic. The invited articles are attached in the end. The report reflects the opinions of the interviewees...
متن کاملTrust-Based Usage Control in Collaborative Environment
Most access control models have formal access control rules to govern the authorization of a request from a principal. In pervasive and collaborative environments, the behaviors of a principal are uncertain due to partial information. Moreover, the attributes of a principal, requested objects, and contexts of a request are mutable during the collaboration. A variety of such uncertainty and muta...
متن کاملMobile, L2 vocabulary learning, and fighting illiteracy: A case study of Iranian semi-illiterates beyond transition level
As mobile learning simultaneously employs both handheld computers and mobile telephones and other devices that draw on the same set of functionalities, it throws open the door for swift connection between learners and teachers. This study examined and articulated the impact of the application of mobile devices for teaching English vocabulary items to 123 Iranian semi-illitera...
متن کاملSecond Formal Report: SoccerFan
----------------------------------------------------------------------2 Introduction ------------------------------------------------------------------2 Integrated System -----------------------------------------------------------2 Mobile Platform -------------------------------------------------------------3 The CMU Camera ----------------------------------------------------------4 Behaviors -...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009