The reasons why elderly mobile users adopt ubiquitous mobile social service

被引:50
|
作者
Yang, Heng-Li [1 ]
Lin, Shiang-Lin [1 ]
机构
[1] Natl Chengchi Univ, Dept Management Informat Syst, Taipei, Taiwan
关键词
Elderly mobile users; Ubiquitous mobile social service; Uses and gratification theory; Media richness theory; Perceived interactive richness; Apps self-efficacy; Inertia; CHANNEL EXPANSION THEORY; SELF-EFFICACY; MEDIA RICHNESS; OLDER-ADULTS; SWITCHING COSTS; PERCEIVED INTERACTIVITY; GENDER-DIFFERENCES; COMMUNICATION; GRATIFICATIONS; SATISFACTION;
D O I
10.1016/j.chb.2018.12.005
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Ubiquitous mobile social service allows users to interact and communicate with others at any time and place, which is different from the mobile social service in the past. It has become the mobile service most widely used by consumers since various mobile applications (abbreviated as "apps") were introduced into the market. Recently, the number of elderly users of ubiquitous mobile social service aged over 60 has largely increased. However, the needs and the adoption motivations of the elderly people for this service seemed to have been neglected in the development of mobile devices or services, even in the academic research. For the purpose of understanding what factors make the elderly mobile users willing to adopt ubiquitous mobile social service, this study conducted an empirical research the integrating uses and gratification theory and the media richness theory. Totally, 226 effective questionnaires were obtained, among these questionnaires, there are 193 samples over the age of 60. The analysis results indicated that social, enjoyment and fashion motivations have influences on elderly mobile users' adoption of ubiquitous mobile social service. Furthermore, users' perceived interactive richness and apps self-efficacy also have strong influences on elderly mobile users' adoption of the service. However, the required high expenses make the elderly mobile users keep using their habitual ways to socialize with others, and therefore have a negative influence on elderly mobile users' intention to adopt ubiquitous mobile social service.
引用
收藏
页码:62 / 75
页数:14
相关论文
共 50 条
  • [31] A ubiquitous mobile telemedicine system for the elderly using RFID
    Raad M.W.
    International Journal of Security and Networks, 2010, 5 (2-3) : 156 - 164
  • [32] Ubiquitous use of mobile social network services
    Nikou, Shahrokh
    Bouwman, Harry
    TELEMATICS AND INFORMATICS, 2014, 31 (03) : 422 - 433
  • [33] A Ubiquitous Mobile Telemedicine System for Elderly using RFID
    Raad, M. W.
    RFID TECHNOLOGY - CONCEPTS, APPLICATIONS, CHALLENGES, PROCEEDINGS, 2009, : 109 - 116
  • [34] DAYS Mobile: A Location based Data Broadcast Service for Mobile Users
    Acharya, Debopam
    Kumar, Vijay
    Yang, Gi-Chul
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 901 - +
  • [35] Optimal media service selection scheme for mobile users in mobile cloud
    Li Chunlin
    Meng Chuanli
    Chen Yi
    Luo Youlong
    WIRELESS NETWORKS, 2019, 25 (06) : 3179 - 3192
  • [36] Optimal media service selection scheme for mobile users in mobile cloud
    Li Chunlin
    Meng Chuanli
    Chen Yi
    Luo Youlong
    Wireless Networks, 2019, 25 : 3179 - 3192
  • [37] Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
    Li, Zhenjiang
    Li, Mo
    Wang, Jiliang
    Cao, Zhichao
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2246 - 2254
  • [38] Understanding the factors affecting elderly users' intention to use mobile social networks: a study of elderly Chinese WeChat users
    Wang, Xiwei
    Jia, Ruonan
    Li, Jiaxing
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2022, 20 (04) : 385 - 405
  • [39] A service framework for mobile ubiquitous sensor networks and RFID
    Sanchez Lopez, Tomas
    Kim, Daeyoung
    Park, Taesoo
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 36 - +
  • [40] Mobile-PKI service model for ubiquitous environment
    Jeun, Inkyung
    Chun, Kilsoo
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 118 - 124