2017
DOI: 10.17705/1jais.00474
|View full text |Cite
|
Sign up to set email alerts
|

Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
30
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(43 citation statements)
references
References 65 publications
5
30
0
Order By: Relevance
“…This is in line with prior studies (Breward et al, 2017;Warkentin, Goel, & Menard, 2017) that showed that there is a predisposition to view emerging and/or controversial solutions with greater scepticism and worry as when risks and returns are more predictable to users. As we mentioned above, there is a considerable emphasis on constraints across all mental models.…”
Section: Discussionsupporting
confidence: 90%
See 1 more Smart Citation
“…This is in line with prior studies (Breward et al, 2017;Warkentin, Goel, & Menard, 2017) that showed that there is a predisposition to view emerging and/or controversial solutions with greater scepticism and worry as when risks and returns are more predictable to users. As we mentioned above, there is a considerable emphasis on constraints across all mental models.…”
Section: Discussionsupporting
confidence: 90%
“…The limiting factors shaped the worldviews of our respondents much more than the action potentials. This is in line with prior studies (Breward et al, 2017;Warkentin, Goel, & Menard, 2017) that showed that there is a predisposition to view emerging and/or controversial solutions with greater scepticism and worry as when risks and returns are more predictable to users. All mental models we discovered exhibit a certain level of controversy and hesitant attitude towards physiolytics, since multiple constraints become salient in the people's appraisals.…”
Section: Discussionsupporting
confidence: 90%
“…Similar to lab experiments, vignette methodology comes with downsides such as artificial simplifications and hypothetical linear usage scenarios; however, it enables precisely employing manipulations, accurately examining the effects on dependent variables, and identifying hypothesized causal relationships. This technique has also been demonstrated to be valid and effective in assessing individuals' perceptions of and reactions to specific information privacy‐ and security‐related conditions (Lowry, Moody, & Chatterjee, ; Warkentin, Goel, & Menard, ). Our fictional vignettes described a discussion among family members at dinner in the presence of an SHA called Ingenium ; the discussion concerned an upcoming holiday trip.…”
Section: Research Studies and Resultsmentioning
confidence: 99%
“…Following an analysis of the publication outlets of the articles, the findings indicated that majority of the articles (17 articles) originated from journals, whereas the several remaining ones (14 articles) originated from conferences, one from a book. Tables 3 and 4 tabulate that only a single article (19) came from the Journal of the Association of Information Systems, as majority of the articles have yet to be appended to top IS journals and conferences, identified by the Association for Information Systems (AIS) like MISQ, ISR and EJIS journals or conferences including ICIS, AMCIS and PACIS. The review of the 32 articles are categorized further according to theory/ framework/model used in each article.…”
Section: Resultsmentioning
confidence: 99%