Access the full text.
Sign up today, get DeepDyve free for 14 days.
I. Ajzen (1991)
The theory of planned behaviorOrganizational Behavior and Human Decision Processes, 50
V. Venkatesh, Fred Davis (2000)
A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field StudiesManagement Science, 46
R. Rogers (1975)
A Protection Motivation Theory of Fear Appeals and Attitude Change1.The Journal of psychology, 91 1
Merrill Warkentin, D. Gefen, P. Pavlou, G. Rose (2002)
Encouraging Citizen Adoption of eGovernment by Building TrustElectron. Mark., 12
Scott MacKenzie, Richard Spreng (1992)
How Does Motivation Moderate the Impact of Central and Peripheral Processing on Brand Attitudes and IntentionsJournal of Consumer Research, 18
(1971)
The measurement of specific curiosity
R. Rockmann, Heiko Gewald (2018)
How Do IT-related Traits Drive the Internet Use of Mature Adults? The Interplay of Curiosity and Control
Abdou Illia, Assion Lawson-Body, Simon Lee, Gurkan Akalin (2018)
The Moderating Effect of Motivation to Comply and Perceived Critical Mass in Smartphones' AdoptionInt. J. Technol. Hum. Interact., 14
Hsi-Peng Lu, Shu-ming Wang (2008)
The role of Internet addiction in online game loyalty: an exploratory studyInternet Res., 18
Ying-Feng Kuo, Shieh-Neng Yen (2009)
Towards an understanding of the behavioral intention to use 3G mobile value-added servicesComput. Hum. Behav., 25
Sutirtha Chatterjee, Suprateek Sarker, J. Valacich (2015)
The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT UseJournal of Management Information Systems, 31
International Journal of Multivariate Data Analysis, 1
G. Dowling, R. Staelin (1994)
A Model of Perceived Risk and Intended Risk-handling ActivityJournal of Consumer Research, 21
Hichang Cho (2011)
Theoretical Intersections Among Social Influences, Beliefs, and Intentions in the Context of 3G Mobile Services in Singapore: Decomposing Perceived Critical Mass and Subjective NormsJournal of Communication, 61
Hsi-Peng Lu, Chin-Lung Hsu, Hsiu-Ying Hsu (2005)
An empirical study of the effect of perceived risk upon intention to use online applicationsInf. Manag. Comput. Security, 13
Juho Hamari, Lauri Keronen (2017)
Why do people play games? A meta-analysisInt. J. Inf. Manag., 37
J. Moon, Young-Gul Kim (2000)
Extending the TAM for a World-Wide-Web contextInf. Manag., 38
Zorah Hilvert-Bruce, J. Neill (2020)
I'm just trolling: The role of normative beliefs in aggressive behaviour in online gamingComput. Hum. Behav., 102
I-Cheng Chang, Chuang-Chun Liu, Kuanchin Chen (2014)
The effects of hedonic/utilitarian expectations and social influence on continuance intention to play online gamesInternet Res., 24
M. Rhemtulla, Patricia Brosseau‐Liard, V. Savalei (2012)
When can categorical variables be treated as continuous? A comparison of robust continuous and categorical SEM estimation methods under suboptimal conditions.Psychological methods, 17 3
C. Oehlhorn, C. Maier, Jakob Wirth, Sven Laumer, Sebastian Dürr (2016)
A Temptation to Stalk: The Impact of Curiosity on User Acceptance of Social Networking Sites
F. Chan, J. Thong, V. Venkatesh, Susan Brown, P. Hu, K. Tam (2011)
Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology
F. Naylor (1981)
A State‐Trait Curiosity InventoryAustralian Psychologist, 16
Aihui Chen, Yao-bin Lu, Bin Wang (2016)
Enhancing perceived enjoyment in social games through social and gaming factorsInf. Technol. People, 29
Hao Lou, Wenhong Luo, D. Strong (2000)
Perceived critical mass effect on groupware acceptanceEuropean Journal of Information Systems, 9
Q. Yang, Chuan Pang, L. Liu, David Yen, J. Tarn (2015)
Exploring consumer perceived risk and trust for online payments: An empirical study in China's younger generationComput. Hum. Behav., 50
(1990)
Definition, design, and measurement
Donghee Shin, Youn-Joo Shin (2011)
Why do people play social network games?Comput. Hum. Behav., 27
Zhengchuan Xu, Ofir Turel, Yufei Yuan (2012)
Online game addiction among adolescents: motivation and prevention factorsEuropean Journal of Information Systems, 21
P. Mahatanankoon (2007)
The Effects of Personality Traits and Optimum Stimulation Level on Text-Messaging Activities and M-commerce IntentionInternational Journal of Electronic Commerce, 12
Liisa Kuonanoja, H. Oinas-Kukkonen (2018)
Recognizing and Mitigating the Negative Effects of Information Technology Use: A Systematic Review of Persuasive Characteristics in Information Systems
Lorenz Graf‐Vlachy, Katharina Buhtz, A. König (2018)
Social influence in technology adoption: taking stock and moving forwardManagement Review Quarterly, 68
Dell (2017)
Dell end-user security survey 2017
J. Hollingdale, Tobias Greitemeyer (2013)
The changing face of aggression: the effect of personalized avatars in a violent video game on levels of aggressive behaviorJournal of Applied Social Psychology, 43
Ryad Titah, H. Barki (2009)
Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy?MIS Q., 33
V. Venkatesh, Michael Morris, G. Davis, Fred Davis (2003)
User Acceptance of Information Technology: Toward a Unified ViewInstitutions & Transition Economics: Microeconomic Issues eJournal
J. Cortina, Gilad Chen, W. Dunlap (2001)
Testing Interaction Effects in LISREL: Examination and Illustration of Available ProceduresOrganizational Research Methods, 4
D. Kim, D. Ferrin, H. Rao (2008)
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedentsDecis. Support Syst., 44
K. Jöreskog, Fan Yang (1996)
Nonlinear structural equation models: The Kenny-Judd model with Interaction effects
Xiang Gong, Kem Zhang, Chongyang Chen, Christy Cheung, Matthew Lee (2019)
Antecedents and consequences of excessive online social gaming: a social learning perspectiveInf. Technol. People, 33
Xiuyuan Gong, Matthew Lee, Zhiying Liu, Xiabing Zheng (2020)
Examining the Role of Tie Strength in Users’ Continuance Intention of Second-Generation Mobile Instant Messaging ServicesInformation Systems Frontiers, 22
MIS Quarterly
M. Katz, C. Shapiro (1986)
Technology Adoption in the Presence of Network ExternalitiesJournal of Political Economy, 94
Susan Brown, A. Dennis, V. Venkatesh (2010)
Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration ResearchJournal of Management Information Systems, 27
Chuang-Chun Liu (2017)
A model for exploring players flow experience in online gamesInf. Technol. People, 30
C. Fornell, D. Larcker (1981)
Evaluating Structural Equation Models with Unobservable Variables and Measurement ErrorJournal of Marketing Research, 18
Chin-Lung Hsu, Hsi-Peng Lu (2004)
Why do people play on-line games? An extended TAM with social influences and flow experienceInf. Manag., 41
Pan He, M. Veronesi (2017)
Personality traits and renewable energy technology adoption: A policy case study from ChinaEnergy Policy, 107
Christopher Hsee, Bowen Ruan (2016)
The Pandora EffectPsychological Science, 27
J. Webster, Joseph Martocchio (1992)
Microcomputer playfulness: development of a measure with workplace implicationsManagement Information Systems Quarterly, 16
Elena Karahanna, D. Straub, N. Chervany (1999)
Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption BeliefsMIS Q., 23
Theodore Lynn, Laurent Muzellec, Barbara Caemmerer, D. Turley (2017)
Social network sites: early adopters personality and influenceJournal of Product & Brand Management, 26
P. Pavlou, Mendel Fygenson (2006)
Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior
Catherine Anderson, Ritu Agarwal (2010)
Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral IntentionsMIS Q., 34
M. Markus (1987)
Toward a “Critical Mass” Theory of Interactive MediaCommunication Research, 14
Joseph Hair, L. Matthews, Ryan Matthews, M. Sarstedt (2017)
PLS-SEM or CB-SEM: updated guidelines on which method to use, 1
L. Barnett (2019)
Profiles of Playful Men and Playful Women: Personality and Humor-Related Attributes.American Journal of Play, 11
Yanni Liu, Dongsheng Liu, Yufei Yuan, N. Archer (2018)
Examining situational continuous mobile game play behavior from the perspectives of diversion and flow experienceInf. Technol. People, 31
S. Roy, M. Balaji, Ankit Kesharwani, Harjit Sekhon (2017)
Predicting Internet banking adoption in India: a perceived risk perspectiveJournal of Strategic Marketing, 25
J. Webster, L. Treviño, Lisa Ryan (1993)
The Dimensionality and Correlates of Flow in Human-Computer Interactions.Computers in Human Behavior, 9
Fred Davis (1989)
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information TechnologyMIS Q., 13
Kiseol Yang, J. Forney (2013)
The Moderating Role of Consumer Technology Anxiety in Mobile Shopping Adoption: Differential Effects of Facilitating Conditions and Social InfluencesJournal of Electronic Commerce Research, 14
iao-Liang Shena, Christy Cheungb, Matthew Leec (2013)
erceived critical mass and collective intention in social edia-supported small group communication
Shirley Taylor, P. Todd (1995)
Understanding Information Technology Usage: A Test of Competing ModelsInf. Syst. Res., 6
Gregory Moody, D. Galletta, B. Dunn (2017)
Which phish get caught? An exploratory study of individuals′ susceptibility to phishingEuropean Journal of Information Systems, 26
Burcu Bulgurcu, H. Cavusoglu, I. Benbasat (2010)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security AwarenessMIS Q., 34
V. Venkatesh, J. Thong, F. Chan, P. Hu (2016)
Managing Citizens' Uncertainty in E-Government Services: The Mediating and Moderating Roles of Transparency and TrustInf. Syst. Res., 27
Chi-Cheng Chang, K. Tseng, Chaoyun Liang, Chi-Fang Yan (2013)
The influence of perceived convenience and curiosity on continuance intention in mobile English learning for high school students using PDAsTechnology, Pedagogy and Education, 22
R. Bagozzi (2007)
The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm ShiftJ. Assoc. Inf. Syst., 8
J. March, Z. Shapira (1987)
Managerial perspectives on risk and risk takingManagement Science, 33
Avus Hou, Wen-Lung Shiau (2019)
Understanding Facebook to Instagram migration: a push-pull migration model perspectiveInf. Technol. People, 33
J. Hansen, G. Saridakis, Vladlena Benson (2018)
Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers' use of social media for transactionsComput. Hum. Behav., 80
G. Loewenstein (1994)
The psychology of curiosity: A review and reinterpretation.Psychological Bulletin, 116
R. Bagozzi, Youjae Yi (1988)
On the evaluation of structural equation modelsJournal of the Academy of Marketing Science, 16
V. Venkatesh, Michael Morris (2000)
Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage BehaviorWGSRN: Gender Equality
P. Pavlou (2003)
Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance ModelInternational Journal of Electronic Commerce, 7
P. Banerjee (2017)
The 50 tasks of fatality: is blue whale challenge really killing youngsters in India?
Thomas Dohmen, A. Falk, David Huffman, U. Sunde, Jürgen Schupp, G. Wagner (2009)
Individual Risk Attitudes: Measurement, Determinants and Behavioral Consequencesresearch memorandum
Ritu Agarwal, Elena Karahanna (2000)
Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology UsageMIS Q., 24
Information technology is associated with psychological and physical risks such as high stress levels and antisocial behavior. The purpose of this paper is to understand why people engage in technology risk behavior, despite the negative consequences that might follow. Focusing on online games, this study identifies factors that affect individuals' intention to play online games and investigate whether the effects of these factors differ across different risk levels.Design/methodology/approachExperimental design was used as the research methodology. Subjects were randomly assigned to a single treatment with two conditions: high and low risk scenarios. A total of 597 responses were analyzed to test the research hypotheses.FindingsThe research findings reveal that subjective norms, curiosity and playfulness have a positive effect on the intention to play online games, while critical mass has no effect on the intention decisions. Further, among the three significant constructs, playfulness turned out to be the only factor that is affected by risk levels.Research limitations/implicationsThis study extends prior literature on technology adoption by examining the effect of different risk levels on adoption intention decisions. It further extends prior literature on online games by identifying the factors that drive individuals to play games while accounting for the risks associated with playing these games.Practical implicationsThe research study identifies factors that should be taken into consideration when promoting the adoption of technologies, including online games.Originality/valueThis study offers a new understanding of technology adoption decisions that takes into account the different levels of risk associated with technology use. It shows that an individual's curiosity and the pressure emanating from one's social network are powerful behavior drivers that persist regardless of the level of risk. Further, this research study is among the first to apply categorical least squares methodology combined with a procedure for a moderated structural equation model to test a structural equation model with categorical multiplicative terms in LISREL.
Information Technology and People – Emerald Publishing
Published: Oct 3, 2020
Keywords: Technology risks; Online games; Social influence; Curiosity; Critical mass; Playfulness; Moderated structural equation model; Categorical least squares
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.