Mobile financial services (MFS) have the potential to impact developing countries by making financial services more accessible. To realize this potential, it is imperative to illuminate why and how people use these new platforms to accomplish their goals. Using affordance theory as a guiding tool, this study aims to uncover the underlying goal directed affordances and actualization techniques used by MFS users in Bangladesh. The data are collected through in‐depth interviews with MFS users and analyzed using thematic analysis to uncover affordances along with actualization techniques that are embedded in everyday social contexts of the users. The study finds that users in their attempts to accomplish specific goals uncover various latent affordances of MFS platforms such as financial services accessibility, self‐controlling ability, spatial and temporal mobility, disintermediation ability, self‐sustainability, secrecy maintainability, and networkability, and employ several techniques to actualize those affordances. These results have implications for utilizing MFS platforms to promote ICT4D goals.
Purpose The next phase of hardware technology development is focused on alternative ways to manage and store consumers’ personal content. However, even consumers who have adopted Cloud-based services have demonstrated a reluctance to move all of their personal content into the Cloud and continue to resist giving up local hard drives. This paper aims to investigate the characteristics of local hard drives and the Cloud that lead to simultaneous use. Design/methodology/approach This paper uses content analysis of online comments and ten depth interviews with simultaneous users of local hard drives and the Cloud. Findings Three factors influence the resistance to giving up local hard drives. Simultaneous users utilize local hard drives as a redundancy system and as a way to ensure the permanence of their digital content. They are unsure of the Cloud’s ability to support their content creation, management and storage activities (task-technology fit). Research limitations/implications Study findings are based on qualitative methods and thus the results cannot be considered conclusive. Practical implications The authors speculate that it is unlikely that Cloud-only will fully replace hard drives until these factors are understood and addressed by information technology developers. Cloud service providers may not be aware of how little that users understand the Cloud. In contrast to their certainty and confidence in local hard drives, simultaneous users are confused as to what the Cloud is and how it functions. This uncertainty exacerbates their risk perception and need for control. Originality/value This is the first study exploring simultaneous use of local hard drives and the Cloud with a view to understanding this behaviour in terms of the relative advantage of the incumbent technology over the new technology.
Purpose While online classes have enabled many universities to carry out their regular academic activities, they have also given rise to new and unanticipated ethical concerns. We focus on the “dark side” of online class settings and attempt to illuminate the ethical problems associated with them. The purpose of this study is to investigate the affordances stemming from the technology-user interaction that can result in negative outcomes. We also attempt to understand the context in which these deleterious affordances are actualized. Design/methodology/approach We obtain the data from narratives written by students at a top private university in Bangladesh about their experiences of online classes and exams and from focus group discussions with them. We use the lens of affordance theory to identify the abilities that goal-oriented actors – primarily students – obtain from the technology-user interactions, which result in negative outcomes. We also attempt to understand the contextual actualization of those affordances through the lens of Routine Activity Theory (RAT). Findings We find three deleterious affordances and three associated deviant outcomes. Non-monitorability which results in academic dishonesty, disguiseability which results in cyber-truancy, and intrudeability which results in embarrassment and harassment. Our findings reveal a deeper underlying problem with the existing educational approach in the universities of Bangladesh and suggest that there is a need to introduce more modern teaching techniques focused on issues such as student engagement and interactive learning. Originality/value To the best of our knowledge, this is the first paper that combines affordance theory with RAT to identify unethical practices observed in online class settings in the context of a least developed country like Bangladesh and to examine the environmental components that give rise to the pre-conditions for the unethical practices to surface.
This study sets out to analyze the technology acceptance decisions by the users of one smartphone (iPhone). Variations of the Technology Acceptance Model (TAM), after first proposed by Davis (1986), have been widely used in the field of information systems research. This paper proposes extensions to TAM from user experience perspective. Hassenzahl (2003), in his user experience model, finds product attributes as important in forming the character of the product and influencing the user’s behavior. Using the extended version of TAM, I find that manipulation function of pragmatic attributes influences usefulness. I also find stimulation and identification functions of hedonic attributes to impact attitude and actual use. However, evocation has not been found important for either attitude or actual use. This research also develops an ethnographic decision tree model (EDTM) to predict the iPhone acceptance decisions for the sample and the model provides an acceptable success rate. Both the studies (extension of TAM and EDTM) utilize qualitative procedures as the research approach.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.