The effect of risk levels on technology adoption decision: the case of online games
PurposeInformation technology is associated with psychological and physical risks such as high stress levels and antisocial behavior. The purpose of this paper is to understand why people engage in technology risk behavior, despite the negative consequences that might follow. Focusing on online game...
Saved in:
Published in | Information technology & people (West Linn, Or.) Vol. 33; no. 5; pp. 1445 - 1464 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
West Linn
Emerald Publishing Limited
03.10.2020
Emerald Group Publishing Limited |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | PurposeInformation technology is associated with psychological and physical risks such as high stress levels and antisocial behavior. The purpose of this paper is to understand why people engage in technology risk behavior, despite the negative consequences that might follow. Focusing on online games, this study identifies factors that affect individuals' intention to play online games and investigate whether the effects of these factors differ across different risk levels.Design/methodology/approachExperimental design was used as the research methodology. Subjects were randomly assigned to a single treatment with two conditions: high and low risk scenarios. A total of 597 responses were analyzed to test the research hypotheses.FindingsThe research findings reveal that subjective norms, curiosity and playfulness have a positive effect on the intention to play online games, while critical mass has no effect on the intention decisions. Further, among the three significant constructs, playfulness turned out to be the only factor that is affected by risk levels.Research limitations/implicationsThis study extends prior literature on technology adoption by examining the effect of different risk levels on adoption intention decisions. It further extends prior literature on online games by identifying the factors that drive individuals to play games while accounting for the risks associated with playing these games.Practical implicationsThe research study identifies factors that should be taken into consideration when promoting the adoption of technologies, including online games.Originality/valueThis study offers a new understanding of technology adoption decisions that takes into account the different levels of risk associated with technology use. It shows that an individual's curiosity and the pressure emanating from one's social network are powerful behavior drivers that persist regardless of the level of risk. Further, this research study is among the first to apply categorical least squares methodology combined with a procedure for a moderated structural equation model to test a structural equation model with categorical multiplicative terms in LISREL. |
---|---|
AbstractList | PurposeInformation technology is associated with psychological and physical risks such as high stress levels and antisocial behavior. The purpose of this paper is to understand why people engage in technology risk behavior, despite the negative consequences that might follow. Focusing on online games, this study identifies factors that affect individuals' intention to play online games and investigate whether the effects of these factors differ across different risk levels.Design/methodology/approachExperimental design was used as the research methodology. Subjects were randomly assigned to a single treatment with two conditions: high and low risk scenarios. A total of 597 responses were analyzed to test the research hypotheses.FindingsThe research findings reveal that subjective norms, curiosity and playfulness have a positive effect on the intention to play online games, while critical mass has no effect on the intention decisions. Further, among the three significant constructs, playfulness turned out to be the only factor that is affected by risk levels.Research limitations/implicationsThis study extends prior literature on technology adoption by examining the effect of different risk levels on adoption intention decisions. It further extends prior literature on online games by identifying the factors that drive individuals to play games while accounting for the risks associated with playing these games.Practical implicationsThe research study identifies factors that should be taken into consideration when promoting the adoption of technologies, including online games.Originality/valueThis study offers a new understanding of technology adoption decisions that takes into account the different levels of risk associated with technology use. It shows that an individual's curiosity and the pressure emanating from one's social network are powerful behavior drivers that persist regardless of the level of risk. Further, this research study is among the first to apply categorical least squares methodology combined with a procedure for a moderated structural equation model to test a structural equation model with categorical multiplicative terms in LISREL. |
Author | Dahabiyeh, Laila Najjar, Mohammad S Agrawal, Deepti |
Author_xml | – sequence: 1 givenname: Laila orcidid: 0000-0002-5946-2256 surname: Dahabiyeh fullname: Dahabiyeh, Laila email: laila.dahabiyeh@ju.edu.jo – sequence: 2 givenname: Mohammad S orcidid: 0000-0002-2459-0784 surname: Najjar fullname: Najjar, Mohammad S email: msnajjar@memphis.edu – sequence: 3 givenname: Deepti surname: Agrawal fullname: Agrawal, Deepti email: DeeptiAgrawal@MissouriState.edu |
BookMark | eNp9kU1Lw0AQhhepYKvePS54js7sR0y8SfGjUFCwnpftZrZG02zdTYX-exPqRREvM8PwPjPMOxM2akNLjJ0hXCBCcTlbPGVQZgKwzEBpfcDGeKWLTBcoR2wMpS4zWSh9xCYpvQFgrgHH7HnxSpy8J9fx4Hms0ztv6JOaxEPLO3KvbWjCasdtFTZd3fcqcnXqi2ve9aiziQYwtE3dEl_ZNaUTduhtk-j0Ox-zl7vbxfQhmz_ez6Y388xJxC6rsJJWQpX3Ab1wQooSxTL3QoIuFUihCCy5kpSQXjtEAuflEi0sHUAuj9n5fu4mho8tpc68hW1s-5VGKFWAVLkqelW-V7kYUorkjas7O5zSRVs3BsEMBpreQAOlGQw0g4E9CL_ATazXNu7-Qy73CK0p2qb6i_jxJfkF1RqB5Q |
CitedBy_id | crossref_primary_10_1080_10447318_2024_2352213 crossref_primary_10_1186_s43093_025_00468_z crossref_primary_10_1007_s12525_023_00657_0 crossref_primary_10_1108_ITP_03_2021_0219 crossref_primary_10_1016_j_entcom_2020_100398 crossref_primary_10_1108_ITP_08_2020_0603 crossref_primary_10_1108_ITSE_05_2021_0082 crossref_primary_10_24136_oc_2021_034 crossref_primary_10_1016_j_elerap_2023_101284 crossref_primary_10_1080_23311975_2024_2328317 crossref_primary_10_1108_ITP_07_2022_0498 |
Cites_doi | 10.2307/249751 10.1037/a0029315 10.1086/209386 10.2753/JEC1086-4415120101 10.2307/25750690 10.1108/JPBM-10-2015-1025 10.1287/mnsc.46.2.186.11926 10.1016/j.chb.2008.07.007 10.17705/1jais.00239 10.2307/25148720 10.1016/j.chb.2017.11.010 10.1108/09685220510589299 10.1287/mnsc.33.11.1404 10.2307/3250981 10.1057/ejis.2011.56 10.2307/20650329 10.1007/s11301-017-0133-3 10.1287/isre.2015.0612 10.1080/0965254X.2016.1148771 10.1016/j.enpol.2017.05.017 10.2753/MIS0742-1222270201 10.1080/07421222.2014.1001257 10.1504/IJMDA.2017.087624 10.1016/j.chb.2015.03.058 10.1016/j.chb.2010.11.010 10.1086/209278 10.1016/0749-5978(91)90020-T 10.1016/0747-5632(93)90032-N 10.1080/00050068108255893 10.1108/ITP-02-2016-0042 10.1016/j.im.2003.08.014 10.2307/25750694 10.1080/00223980.1975.9915803 10.1057/s41303-017-0058-x 10.1111/jasp.12148 10.1177/002224378101800104 10.1086/261409 10.1108/IntR-02-2012-0025 10.1108/10662240810912756 10.1108/ITP-06-2015-0139 10.1108/ITP-03-2018-0138 10.4018/IJTHI.2018070102 10.1287/isre.6.2.144 10.1037/0033-2909.116.1.75 10.1080/101967802320245929 10.1111/j.1460-2466.2010.01532.x 10.1108/ITP-07-2014-0156 10.17705/1jais.00122 10.1007/BF02723327 10.2307/249576 10.1111/j.1542-4774.2011.01015.x 10.1016/S0378-7206(00)00061-6 10.1016/j.dss.2007.07.001 10.1016/j.ijinfomgt.2013.04.005 10.1016/j.ijinfomgt.2017.01.006 10.1080/1475939X.2013.802991 10.1016/j.chb.2019.09.003 10.1177/109442810144002 10.1177/009365087014005003 10.1057/palgrave.ejis.3000358 10.1177/0956797616631733 10.1080/10864415.2003.11044275 |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited Emerald Publishing Limited 2020 |
Copyright_xml | – notice: Emerald Publishing Limited – notice: Emerald Publishing Limited 2020 |
DBID | AAYXX CITATION 7RQ 7SC 7WY 7WZ 7XB 8AO 8BJ 8FD 8FE 8FG 8FI ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU CNYFK DWQXO E3H F2A FQK FYUFA F~G GNUQQ GUQSH HCIFZ JBE JQ2 K6~ L.- L.0 L7M L~C L~D M0C M1O M2M M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQEST PQGLB PQQKQ PQUKI PRQQA PSYQQ Q9U |
DOI | 10.1108/ITP-09-2019-0455 |
DatabaseName | CrossRef Career & Technical Education Database Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection International Bibliography of the Social Sciences (IBSS) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College Library & Information Science Collection ProQuest Central Korea Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) International Bibliography of the Social Sciences Health Research Premium Collection ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection International Bibliography of the Social Sciences ProQuest Computer Science Collection ProQuest Business Collection ABI/INFORM Professional Advanced ABI/INFORM Professional Standard Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Library Science Database Psychology Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Social Sciences ProQuest One Psychology ProQuest Central Basic |
DatabaseTitle | CrossRef ProQuest One Psychology Research Library Prep ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ABI/INFORM Complete ProQuest One Applied & Life Sciences Health Research Premium Collection Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection ProQuest Business Collection ProQuest Career and Technical Education ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science International Bibliography of the Social Sciences (IBSS) ABI/INFORM Professional Standard ProQuest Central Korea ProQuest Research Library Advanced Technologies Database with Aerospace ProQuest One Social Sciences ProQuest Central Basic ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest Psychology Journals |
DatabaseTitleList | ProQuest One Psychology |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Library & Information Science Business |
EISSN | 1758-5813 |
EndPage | 1464 |
ExternalDocumentID | 10_1108_ITP_09_2019_0455 10.1108/ITP-09-2019-0455 |
GroupedDBID | 0R 29I 3FY 4.4 5GY 5VS 70U 77K 7RQ 7WY 8AO 8FE 8FG 8FI 8FW 8R4 8R5 9E0 9F- AACOY AADTA AADXL AAGBP AAMCF AAPBV AAPSD AAUDR ABEAN ABIJV ABIVO ABSDC ABUWG ACGFS ACHQT ACMTK ADBBV ADOMW AEBZA AEDOK AEMMR AETHF AEUCW AFKRA AFNZV AFZLO AHUOY AIAFM AJEBP AJFKA ALMA_UNASSIGNED_HOLDINGS ALSLI APPLU ARAPS ASMFL ASPJK ATGMP AUCOK AVELQ AZQEC BBAFP BENPR BEZIV BGLVJ BLEHN BPHCQ BUONS BVXVI CNYFK CS3 DU5 DWQXO EBS ECCUG FNNZZ FYUFA GEA GEB GEC GEI GMM GMN GMX GNUQQ GQ. GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GUQSH H13 HCIFZ HZ IJT IPNFZ J1Y JI- JL0 K6 KBGRL LXL LXN M0C M1O M2M M2O O9- P2P P62 PADUT PQBIZ PQEST PQQKQ PQUKI PRG PRINS PROAC Q2X Q3A RIG RXW SLOBJ TDQ TEM TET TGG TMD TMF TMI TMK TMT V1G WU Z11 Z12 Z21 ZYZAG .DC .WU 0R~ AAKOT AAXBI AAYXX ABJNI ABXQL ABYQI ACBMB ACGFO ACTSA ACZKX ADFRT ADMHG ADQHX ADWNT AFNTC AGTVX AHMHQ AILOG ALIPV AODMV CCPQU CITATION EOXHF HZ~ K6~ M42 PHGZM PHGZT PQGLB PRQQA PSYQQ SCAQC SDURG TAF UKHRP 7SC 7XB 8BJ 8FD AAVEV E3H F2A FQK JBE JQ2 L.- L.0 L7M L~C L~D MBDVC PKEHL Q9U |
ID | FETCH-LOGICAL-c311t-d1d3a30d6a301f2c232912b6f2305940324e0aec9e423f5c11e0cf3b1a0bc0063 |
IEDL.DBID | BENPR |
ISSN | 0959-3845 |
IngestDate | Sat Aug 23 14:37:10 EDT 2025 Thu Jul 31 00:38:52 EDT 2025 Thu Apr 24 22:59:04 EDT 2025 Tue Feb 15 19:18:51 EST 2022 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Keywords | Technology risks Social influence Categorical least squares Curiosity Playfulness Online games Critical mass Moderated structural equation model |
Language | English |
License | Licensed re-use rights only https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c311t-d1d3a30d6a301f2c232912b6f2305940324e0aec9e423f5c11e0cf3b1a0bc0063 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-2459-0784 0000-0002-5946-2256 |
PQID | 2448034648 |
PQPubID | 3983 |
PageCount | 20 |
ParticipantIDs | crossref_citationtrail_10_1108_ITP_09_2019_0455 proquest_journals_2448034648 emerald_primary_10_1108_ITP-09-2019-0455 crossref_primary_10_1108_ITP_09_2019_0455 |
PublicationCentury | 2000 |
PublicationDate | 2020-10-03 |
PublicationDateYYYYMMDD | 2020-10-03 |
PublicationDate_xml | – month: 10 year: 2020 text: 2020-10-03 day: 03 |
PublicationDecade | 2020 |
PublicationPlace | West Linn |
PublicationPlace_xml | – name: West Linn |
PublicationTitle | Information technology & people (West Linn, Or.) |
PublicationYear | 2020 |
Publisher | Emerald Publishing Limited Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Publishing Limited – name: Emerald Group Publishing Limited |
References | (key2021043009572309400_ref026) 2019 (key2021043009572309400_ref022) 1994; 21 (key2021043009572309400_ref038) 2018; 14 (key2021043009572309400_ref018) 1989 (key2021043009572309400_ref048) 2000; 9 (key2021043009572309400_ref063) 1975; 91 (key2021043009572309400_ref042) 2008; 44 (key2021043009572309400_ref057) 1981; 16 (key2021043009572309400_ref017) 2001; 4 (key2021043009572309400_ref036) 2016; 27 (key2021043009572309400_ref011) 2010; 11 (key2021043009572309400_ref023) 1975 (key2021043009572309400_ref033) 2020; 102 (key2021043009572309400_ref054) 1987; 14 (key2021043009572309400_ref070) 2000; 24 (key2021043009572309400_ref065) 2013; 33 (key2021043009572309400_ref052) 1992; 18 (key2021043009572309400_ref043) 2009; 25 (key2021043009572309400_ref035) 2020; 33 (key2021043009572309400_ref051) 2017; 26 (key2021043009572309400_ref027) 2018; 68 (key2021043009572309400_ref040) 1999; 23 (key2021043009572309400_ref024) 1981; 18 (key2021043009572309400_ref077) 2013; 14 (key2021043009572309400_ref016) 2011; 61 (key2021043009572309400_ref076) 2012; 21 (key2021043009572309400_ref014) 2015; 31 (key2021043009572309400_ref002) 1991; 50 (key2021043009572309400_ref008) 2019; 11 (key2021043009572309400_ref045) 2018; 31 (key2021043009572309400_ref056) 2001; 38 key2021043009572309400_ref020 (key2021043009572309400_ref031) 2018; 80 (key2021043009572309400_ref003) 2010; 34 (key2021043009572309400_ref032) 2017; 107 (key2021043009572309400_ref062) 2018 (key2021043009572309400_ref019) 1971 (key2021043009572309400_ref055) 2017; 26 (key2021043009572309400_ref061) 2012; 17 (key2021043009572309400_ref012) 2013; 22 (key2021043009572309400_ref041) 1986; 94 (key2021043009572309400_ref025) 2018 (key2021043009572309400_ref071) 2003 (key2021043009572309400_ref046) 2017; 30 (key2021043009572309400_ref044) 2018 key2021043009572309400_ref006 (key2021043009572309400_ref021) 2011; 9 (key2021043009572309400_ref001) 2000; 4 (key2021043009572309400_ref073) 2002; 12 (key2021043009572309400_ref015) 2016; 29 (key2021043009572309400_ref066) 2011; 27 (key2021043009572309400_ref067) 1995; 6 (key2021043009572309400_ref005) 2007; 8 (key2021043009572309400_ref050) 2005; 13 (key2021043009572309400_ref037) 2004; 41 (key2021043009572309400_ref072) 2016; 27 (key2021043009572309400_ref049) 2008; 18 (key2021043009572309400_ref064) 2017; 25 (key2021043009572309400_ref068) 2009; 33 (key2021043009572309400_ref069) 2000; 46 (key2021043009572309400_ref009) 2010; 27 (key2021043009572309400_ref059) 2006; 30 (key2021043009572309400_ref075) 1993; 9 (key2021043009572309400_ref004) 1988; 16 (key2021043009572309400_ref007) 1990; 3 (key2021043009572309400_ref074) 1992; 16 (key2021043009572309400_ref028) 1998 (key2021043009572309400_ref029) 2017; 1 (key2021043009572309400_ref047) 1994; 116 (key2021043009572309400_ref010) 2010; 34 (key2021043009572309400_ref058) 2016 (key2021043009572309400_ref060) 2003; 7 (key2021043009572309400_ref034) 2013; 43 (key2021043009572309400_ref053) 2007; 12 (key2021043009572309400_ref039) 1996 (key2021043009572309400_ref013) 2014; 24 (key2021043009572309400_ref030) 2017; 37 (key2021043009572309400_ref079) 1987; 33 (key2021043009572309400_ref078) 2015; 50 |
References_xml | – volume: 33 start-page: 272 issue: 1 year: 2020 ident: key2021043009572309400_ref035 article-title: Understanding Facebook to Instagram migration: a push-pull migration model perspective publication-title: Information Technology and People – volume-title: Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research year: 1975 ident: key2021043009572309400_ref023 – volume: 23 start-page: 183 issue: 2 year: 1999 ident: key2021043009572309400_ref040 article-title: Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs publication-title: MIS Quarterly doi: 10.2307/249751 – volume: 17 start-page: 354 issue: 3 year: 2012 ident: key2021043009572309400_ref061 article-title: When can categorical variables be treated as continuous? A comparison of robust continuous and categorical SEM estimation methods under suboptimal conditions publication-title: Psychological Methods doi: 10.1037/a0029315 – volume: 21 start-page: 119 issue: 1 year: 1994 ident: key2021043009572309400_ref022 article-title: A model of perceived risk and intended risk-handling activity publication-title: Journal of Consumer Research doi: 10.1086/209386 – volume: 12 start-page: 7 issue: 1 year: 2007 ident: key2021043009572309400_ref053 article-title: The effects of personality traits and optimum stimulation level on text-messaging activities and m-commerce intention publication-title: International Journal of Electronic Commerce doi: 10.2753/JEC1086-4415120101 – volume-title: Multivariate Data Analysis year: 1998 ident: key2021043009572309400_ref028 – volume: 34 start-page: 523 issue: 3 year: 2010 ident: key2021043009572309400_ref010 article-title: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness publication-title: MIS Quarterly doi: 10.2307/25750690 – start-page: 319 year: 1989 ident: key2021043009572309400_ref018 article-title: Perceived usefulness, perceived ease of use, and user acceptance of information technology publication-title: MIS Quarterly – volume: 26 start-page: 42 issue: 1 year: 2017 ident: key2021043009572309400_ref051 article-title: Social network sites: early adopters' personality and influence publication-title: The Journal of Product and Brand Management doi: 10.1108/JPBM-10-2015-1025 – volume: 46 start-page: 186 issue: 2 year: 2000 ident: key2021043009572309400_ref069 article-title: A theoretical extension of the technology acceptance model: four longitudinal field studies publication-title: Management Science doi: 10.1287/mnsc.46.2.186.11926 – volume: 25 start-page: 103 issue: 1 year: 2009 ident: key2021043009572309400_ref043 article-title: Towards an understanding of the behavioral intention to use 3G mobile value-added services publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2008.07.007 – year: 2018 ident: key2021043009572309400_ref062 article-title: How do IT-related traits drive the internet use of mature adults? The interplay of curiosity and control – start-page: 57 volume-title: Advanced Structural Equation Modeling: Issues and Techniques year: 1996 ident: key2021043009572309400_ref039 article-title: Nonlinear structural equation models: the Kenny-Judd model with interaction effects – volume: 11 start-page: 519 issue: 10 year: 2010 ident: key2021043009572309400_ref011 article-title: Modeling citizen satisfaction with mandatory adoption of an e-government technology publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00239 – volume: 30 start-page: 115 issue: 1 year: 2006 ident: key2021043009572309400_ref059 article-title: Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior publication-title: MIS Quarterly doi: 10.2307/25148720 – volume: 80 start-page: 197 year: 2018 ident: key2021043009572309400_ref031 article-title: Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers' use of social media for transactions publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2017.11.010 – volume: 13 start-page: 106 issue: 2 year: 2005 ident: key2021043009572309400_ref050 article-title: An empirical study of the effect of perceived risk upon intention to use online applications publication-title: Information Management and Computer Security doi: 10.1108/09685220510589299 – volume: 11 start-page: 308 issue: 3 year: 2019 ident: key2021043009572309400_ref008 article-title: Profiles of playful men and playful women: personality and humor-related attributes publication-title: American Journal of Play – start-page: 14 year: 2018 ident: key2021043009572309400_ref044 article-title: Recognizing and mitigating the negative effects of information technology use: a systematic review of persuasive characteristics in information systems – volume: 33 start-page: 1404 issue: 11 year: 1987 ident: key2021043009572309400_ref079 article-title: Managerial perspectives on risk and risk taking publication-title: Management Science doi: 10.1287/mnsc.33.11.1404 – volume: 24 start-page: 115 issue: 1 year: 2000 ident: key2021043009572309400_ref070 article-title: Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior publication-title: MIS Quarterly doi: 10.2307/3250981 – volume: 21 start-page: 321 issue: 3 year: 2012 ident: key2021043009572309400_ref076 article-title: Online game addiction among adolescents: motivation and prevention factors publication-title: European Journal of Information Systems doi: 10.1057/ejis.2011.56 – volume: 33 start-page: 827 issue: 4 year: 2009 ident: key2021043009572309400_ref068 article-title: Nonlinearities between attitude and subjective norms in information technology acceptance: a negative synergy? publication-title: MIS Quarterly doi: 10.2307/20650329 – volume: 68 start-page: 37 issue: 1 year: 2018 ident: key2021043009572309400_ref027 article-title: Social influence in technology adoption: taking stock and moving forward publication-title: Management Review Quarterly doi: 10.1007/s11301-017-0133-3 – volume: 27 start-page: 87 issue: 1 year: 2016 ident: key2021043009572309400_ref072 article-title: Managing citizens' uncertainty in e-government services: the mediating and moderating roles of transparency and trust publication-title: Information Systems Research doi: 10.1287/isre.2015.0612 – volume: 25 start-page: 418 issue: 5-6 year: 2017 ident: key2021043009572309400_ref064 article-title: Predicting Internet banking adoption in India: a perceived risk perspective publication-title: Journal of Strategic Marketing doi: 10.1080/0965254X.2016.1148771 – ident: key2021043009572309400_ref020 – volume: 107 start-page: 472 year: 2017 ident: key2021043009572309400_ref032 article-title: Personality traits and renewable energy technology adoption: a policy case study from China publication-title: Energy Policy doi: 10.1016/j.enpol.2017.05.017 – volume: 27 start-page: 9 issue: 2 year: 2010 ident: key2021043009572309400_ref009 article-title: Predicting collaboration technology use: integrating technology adoption and collaboration research publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222270201 – volume: 31 start-page: 49 issue: 4 year: 2015 ident: key2021043009572309400_ref014 article-title: The behavioral roots of information systems security: exploring key factors related to unethical IT use publication-title: Journal of Management Information Systems doi: 10.1080/07421222.2014.1001257 – start-page: 77 volume-title: Intrinsic Motivation year: 1971 ident: key2021043009572309400_ref019 article-title: The measurement of specific curiosity – volume: 1 start-page: 107 issue: 2 year: 2017 ident: key2021043009572309400_ref029 article-title: PLS-SEM or CB-SEM: updated guidelines on which method to use publication-title: International Journal of Multivariate Data Analysis doi: 10.1504/IJMDA.2017.087624 – volume: 50 start-page: 9 year: 2015 ident: key2021043009572309400_ref078 article-title: Exploring consumer perceived risk and trust for online payments: an empirical study in China's younger generation publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2015.03.058 – volume: 27 start-page: 852 issue: 2 year: 2011 ident: key2021043009572309400_ref066 article-title: Why do people play social network games? publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2010.11.010 – volume: 18 start-page: 519 issue: 4 year: 1992 ident: key2021043009572309400_ref052 article-title: How does motivation moderate the impact of central and peripheral processing on brand attitudes and intentions? publication-title: Journal of Consumer Research doi: 10.1086/209278 – volume: 50 start-page: 179 issue: 2 year: 1991 ident: key2021043009572309400_ref002 article-title: The theory of planned behavior publication-title: Organizational Behavior and Human Decision Processes doi: 10.1016/0749-5978(91)90020-T – volume: 9 start-page: 411 issue: 4 year: 1993 ident: key2021043009572309400_ref075 article-title: The dimensionality and correlates of flow in human-computer interactions publication-title: Computers in Human Behavior doi: 10.1016/0747-5632(93)90032-N – volume: 16 start-page: 172 issue: 2 year: 1981 ident: key2021043009572309400_ref057 article-title: A state‐trait curiosity inventory publication-title: Australian Psychologist doi: 10.1080/00050068108255893 – volume: 31 start-page: 948 issue: 4 year: 2018 ident: key2021043009572309400_ref045 article-title: Examining situational continuous mobile game play behavior from the perspectives of diversion and flow experience publication-title: Information Technology and People doi: 10.1108/ITP-02-2016-0042 – year: 2016 ident: key2021043009572309400_ref058 article-title: A temptation to stalk: the impact of curiosity on user acceptance of social networking sites – volume: 41 start-page: 853 issue: 7 year: 2004 ident: key2021043009572309400_ref037 article-title: Why do people play on-line games? An extended TAM with social influences and flow experience publication-title: Information and Management doi: 10.1016/j.im.2003.08.014 – volume: 34 start-page: 613 issue: 3 year: 2010 ident: key2021043009572309400_ref003 article-title: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions publication-title: MIS Quarterly doi: 10.2307/25750694 – volume: 91 start-page: 93 issue: 1 year: 1975 ident: key2021043009572309400_ref063 article-title: A protection motivation theory of fear appeals and attitude change1 publication-title: Journal of Psychology doi: 10.1080/00223980.1975.9915803 – volume: 26 start-page: 564 issue: 6 year: 2017 ident: key2021043009572309400_ref055 article-title: Which phish get caught? An exploratory study of individuals′ susceptibility to phishing publication-title: European Journal of Information Systems doi: 10.1057/s41303-017-0058-x – ident: key2021043009572309400_ref006 – volume: 43 start-page: 1862 issue: 9 year: 2013 ident: key2021043009572309400_ref034 article-title: The changing face of aggression: the effect of personalized avatars in a violent video game on levels of aggressive behavior publication-title: Journal of Applied Social Psychology doi: 10.1111/jasp.12148 – volume: 18 start-page: 39 issue: 1 year: 1981 ident: key2021043009572309400_ref024 article-title: Evaluating structural equation models with unobservable variables and measurement error publication-title: Journal of Marketing Research doi: 10.1177/002224378101800104 – volume: 94 start-page: 822 issue: 4 year: 1986 ident: key2021043009572309400_ref041 article-title: Technology adoption in the presence of network externalities publication-title: Journal of Political Economy doi: 10.1086/261409 – volume: 24 start-page: 21 issue: 1 year: 2014 ident: key2021043009572309400_ref013 article-title: The effects of hedonic/utilitarian expectations and social influence on continuance intention to play online games publication-title: Internet Research doi: 10.1108/IntR-02-2012-0025 – volume: 18 start-page: 499 issue: 5 year: 2008 ident: key2021043009572309400_ref049 article-title: The role of internet addiction in online game loyalty: an exploratory study publication-title: Internet Research doi: 10.1108/10662240810912756 – volume: 30 start-page: 139 issue: 1 year: 2017 ident: key2021043009572309400_ref046 article-title: A model for exploring players flow experience in online games publication-title: Information Technology and People doi: 10.1108/ITP-06-2015-0139 – year: 2019 ident: key2021043009572309400_ref026 article-title: Antecedents and consequences of excessive online social gaming: a social learning perspective publication-title: Information Technology and People doi: 10.1108/ITP-03-2018-0138 – volume: 14 start-page: 21 issue: 3 year: 2018 ident: key2021043009572309400_ref038 article-title: The moderating effect of motivation to comply and perceived critical mass in smartphones' adoption publication-title: International Journal of Technology and Human Interaction doi: 10.4018/IJTHI.2018070102 – volume: 6 start-page: 144 issue: 2 year: 1995 ident: key2021043009572309400_ref067 article-title: Understanding information technology usage: a test of competing models publication-title: Information Systems Research doi: 10.1287/isre.6.2.144 – volume: 116 start-page: 75 issue: 1 year: 1994 ident: key2021043009572309400_ref047 article-title: The psychology of curiosity - a review and reinterpretation publication-title: Psychological Bulletin doi: 10.1037/0033-2909.116.1.75 – volume: 12 start-page: 157 issue: 3 year: 2002 ident: key2021043009572309400_ref073 article-title: Encouraging citizen adoption of e-government by building trust publication-title: Electronic Markets doi: 10.1080/101967802320245929 – volume: 61 start-page: 283 issue: 2 year: 2011 ident: key2021043009572309400_ref016 article-title: Theoretical intersections among social influences, beliefs, and intentions in the context of 3G mobile services in Singapore: decomposing perceived critical mass and subjective norms publication-title: Journal of Communication doi: 10.1111/j.1460-2466.2010.01532.x – volume: 29 start-page: 99 issue: 1 year: 2016 ident: key2021043009572309400_ref015 article-title: Enhancing perceived enjoyment in social games through social and gaming factors publication-title: Information Technology and People doi: 10.1108/ITP-07-2014-0156 – volume: 8 start-page: 244 issue: 4 year: 2007 ident: key2021043009572309400_ref005 article-title: The legacy of the technology acceptance model and a proposal for a paradigm shift publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00122 – start-page: 425 year: 2003 ident: key2021043009572309400_ref071 article-title: User acceptance of information technology: toward a unified view publication-title: MIS Quarterly – volume: 16 start-page: 74 issue: 1 year: 1988 ident: key2021043009572309400_ref004 article-title: On the evaluation of structural equation models publication-title: Journal of the Academy of Marketing Science doi: 10.1007/BF02723327 – volume: 16 start-page: 201 issue: 2 year: 1992 ident: key2021043009572309400_ref074 article-title: Microcomputer playfulness: development of a measure with workplace implications publication-title: MIS Quarterly doi: 10.2307/249576 – volume: 14 start-page: 334 issue: 4 year: 2013 ident: key2021043009572309400_ref077 article-title: The moderating role of consumer technology anxiety in mobile shopping adoption: differential effects of facilitating conditions and social influences publication-title: Journal of Electronic Commerce Research – volume: 9 start-page: 522 issue: 3 year: 2011 ident: key2021043009572309400_ref021 article-title: Individual risk attitudes: measurement, determinants, and behavioral consequences publication-title: Journal of the European Economic Association doi: 10.1111/j.1542-4774.2011.01015.x – volume: 38 start-page: 217 issue: 4 year: 2001 ident: key2021043009572309400_ref056 article-title: Extending the TAM for a world-wide-web context publication-title: Information and Management doi: 10.1016/S0378-7206(00)00061-6 – volume: 44 start-page: 544 issue: 2 year: 2008 ident: key2021043009572309400_ref042 article-title: A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents publication-title: Decision Support Systems doi: 10.1016/j.dss.2007.07.001 – volume: 33 start-page: 707 issue: 5 year: 2013 ident: key2021043009572309400_ref065 article-title: Perceived critical mass and collective intention in social media-supported small group communication publication-title: International Journal of Information Management doi: 10.1016/j.ijinfomgt.2013.04.005 – volume: 37 start-page: 125 issue: 3 year: 2017 ident: key2021043009572309400_ref030 article-title: Why do people play games? A meta-analysis publication-title: International Journal of Information Management doi: 10.1016/j.ijinfomgt.2017.01.006 – volume: 22 start-page: 373 issue: 3 year: 2013 ident: key2021043009572309400_ref012 article-title: The influence of perceived convenience and curiosity on continuance intention in mobile English learning for high school students using PDAs publication-title: Technology, Pedagogy and Education doi: 10.1080/1475939X.2013.802991 – start-page: 1 year: 2018 ident: key2021043009572309400_ref025 article-title: Examining the role of tie strength in users' continuance intention of second-generation mobile instant messaging services publication-title: Information Systems Frontiers – volume: 102 start-page: 303 year: 2020 ident: key2021043009572309400_ref033 article-title: I'm just trolling: the role of normative beliefs in aggressive behaviour in online gaming publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2019.09.003 – volume: 4 start-page: 324 issue: 4 year: 2001 ident: key2021043009572309400_ref017 article-title: Testing interaction effects in LISREL: examination and illustration of available procedures publication-title: Organizational Research Methods doi: 10.1177/109442810144002 – volume: 3 start-page: 319 year: 1990 ident: key2021043009572309400_ref007 article-title: Definition, design, and measurement publication-title: Play and Culture – volume: 14 start-page: 491 issue: 5 year: 1987 ident: key2021043009572309400_ref054 article-title: Toward a ‘critical mass’ theory of interactive media: universal access, interdependence and diffusion publication-title: Communication Research doi: 10.1177/009365087014005003 – volume: 4 start-page: 665 issue: 4 year: 2000 ident: key2021043009572309400_ref001 article-title: Time flies when you're having fun: cognitive absorption and beliefs about information technology usage publication-title: MIS Quarterly – volume: 9 start-page: 91 issue: 2 year: 2000 ident: key2021043009572309400_ref048 article-title: Perceived critical mass effect on groupware acceptance publication-title: European Journal of Information Systems doi: 10.1057/palgrave.ejis.3000358 – volume: 27 start-page: 659 issue: 5 year: 2016 ident: key2021043009572309400_ref036 article-title: The pandora effect: the power and peril of curiosity publication-title: Psychological Science doi: 10.1177/0956797616631733 – volume: 7 start-page: 101 issue: 3 year: 2003 ident: key2021043009572309400_ref060 article-title: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model publication-title: International Journal of Electronic Commerce doi: 10.1080/10864415.2003.11044275 |
SSID | ssj0016501 |
Score | 2.2982569 |
Snippet | PurposeInformation technology is associated with psychological and physical risks such as high stress levels and antisocial behavior. The purpose of this paper... |
SourceID | proquest crossref emerald |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1445 |
SubjectTerms | Antisocial behavior Behavior Computer & video games Critical mass Curiosity Decisions Design of experiments Games Influence Information technology Methodology Model testing Multivariate statistical analysis Norms Playfulness Research methodology Risk behavior Risk levels Social networks Structural equation modeling Technology Acceptance Model Technology adoption Technology utilization |
SummonAdditionalLinks | – databaseName: Emerald Management eJournals dbid: ZYZAG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB7xkCo40LKAWB6VDwiVQ1g7jvPghqpSygEhARJwiWzHblG3u1U3e-HXM5M4y0OIUy-5xI4Uz2jmm_E3MwB7CDqUtrqKTJJaGmGmI-2kj4QxksoGRGBbnKen18nZjbqZg_OuFqahVbbpmMZO348mFKQOiLiNVnjWcICm1_y4uqCbe3RhlN9XakAZ68Gv-s9wHhZjkXLU8sW727vj77N7BcQjou2-V0QyT1R3cfnG1144qlfVuk8Wu3FDJx9h3P1Ayz75fTitzaF9eNXb8f_94SdYCYiVHbcqtgpzbtSDDx1hvgfLz1oa9mA3FEKwfRYqnUjyLJiQNbhEvWQtiYSNPSNmOxsScWnCcFk9S_QzXY0ba8aqMAXoiCFWZRa9Lm1sO3ywn0TyXYfrk29XX0-jMNghslKIOqpEJbXkVYoP4WOLqK4QsUk9xkOqSDiCPMe1s4VDsOeVFcJx66URmhtLoGoDFkbjkdukknM0kD7PTJbZJK5ykyrPVc4znZkqdr4Pg06KpQ1dz2n4xrBsoh-el3jGJS9KOuOSzrgPB7Mdf9uOH--s_RJE-dbSF6Lrw06nOWUwE5MSsVXOZZIm-db7r7dhKaZAn5gLcgcW6n9Tt4toqDafg4o_Am-NAiA priority: 102 providerName: Emerald |
Title | The effect of risk levels on technology adoption decision: the case of online games |
URI | https://www.emerald.com/insight/content/doi/10.1108/ITP-09-2019-0455/full/html https://www.proquest.com/docview/2448034648 |
Volume | 33 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTxsxEB6VICF6QDSAGgjIh6qih1Xs9T68XFCoCLRSARWQgMvKz15QQkn4_8xkvQGqistK1toXz3jms-ebGYAvCDpybbVLTFZYamGmE-1lSIQxktIGRGRbnBWn19nPm_wmPrhNI62ytYlzQ-0mlt7IB-iGFJdZkanDh78JdY2i6GpsobEEy2iClerA8tHx2cXvRRwB8Ydoqu1ViVRZ3gYquRr8uLqguD86QIoOUKrfK8f0T3bui4Weu53ROqxFvMiGjYA_wQc_7sJKS1fvwsdXBQW7sBvTENhXFvOMaN9ZPMAbcIlawRoKB5sERrxydk-0oSnDabPFMzvTbjK3JczFHjwHDJEis-jzaGFTX4P9IYrtJlyPjq--nyaxrUJipRCzxAknteSuwI8IqUVMVYnUFAFvI3mVcYRYnmtvK49QK-RWCM9tkEZobixBmi3ojCdj_5kSvtE8BVWasrRZ6pQp8sBzxUtdGpf60INBu6e1jTXHqfXFfT2_e3BVoxRqXtUkhZqk0INvixUPTb2Nd-buRzH9b-ob4fag38qxjod0Wr-o1Pb7v3dgNaVrNvEGZB86s8cnv4tYZGb2YEmNTvai2uHolzjH0d3t3fDkGRNP3CU |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxRBEK4gJIoHg6uGlYd9UKOHyXZPz5PEGAOuu4LExCXh1vbTC9lFd43xT_EbqZrpWcAYblzmMt1zmKpUfd31fVUALxF05Npql5issDTCTCfay5AIYyTJBkRkWxwXo5Ps82l-ugIXnRaGaJVdTGwCtZtZuiMfYBqquMyKrHp__jOhqVFUXe1GaLRucej__sEj2_zd-ADt-ypNhx8n-6MkThVIrBRikTjhpJbcFfgQIbUIKWqRmiIgGM_rjCPC8Fx7W3tEGiG3QnhugzRCc2Mpo-N378FaJjGTkzJ9-GlZtUC0I9refnUiqyzvyqK8GownX4llgOmWahEkLLyWBv_RAl_lgybJDTfgUUSn7EPrTo9hxU97cL8jx_fg4bX2hT3YiaIH9ppFVRNZmcVw8QS-oQ-yljDCZoERi52dEUlpznDZYnmpz7SbNZGLuTjxZ48hLmUWMyxtbLt5sB9E6H0KJ3fyu5_B6nQ29ZskL8dgGKrSlKXNUleZIg88r3ipS-NSH_ow6P6psrHDOQ3aOFPNSYdXCq2geK3ICoqs0Ie3yx3nbXePW9a-iWb639Ibxu3DdmdHFUPCXF058PPbX7-AB6PJlyN1ND4-3IL1lA74xFiQ27C6-PXb7yAKWpjdxvUYfL9rX78EibYS9g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+effect+of+risk+levels+on+technology+adoption+decision%3A+the+case+of+online+games&rft.jtitle=Information+technology+%26+people+%28West+Linn%2C+Or.%29&rft.au=Dahabiyeh%2C+Laila&rft.au=Najjar%2C+Mohammad+S&rft.au=Agrawal%2C+Deepti&rft.date=2020-10-03&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=0959-3845&rft.eissn=1758-5813&rft.volume=33&rft.issue=5&rft.spage=1445&rft.epage=1464&rft_id=info:doi/10.1108%2FITP-09-2019-0455 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0959-3845&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0959-3845&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0959-3845&client=summon |