Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Johnson (2010)
Internet Use and Child Development: The Techno-Microsystem.Australian Journal of Educational and developmental psychology, 10
(2016)
5 Reasons why your Wi-Fi is slow (and how to fix it)
Irena Stepanikova, N. Nie, Xiaobin He (2010)
Time on the Internet at home, loneliness, and life satisfaction: Evidence from panel time-diary dataComput. Hum. Behav., 26
(2013)
Why do people seek anonymity on the internet?
Dhruv Grewal, Jerry Gotlieb, H. Marmorstein (1994)
The Moderating Effects of Message Framing and Source Credibility on the Price-perceived Risk RelationshipJournal of Consumer Research, 21
(2019)
Wi-Fi alliance® celebrates world Wi-Fi® day
C. Cobanoglu, Anil Bilgihan, K. Nusair, K. Berezina (2012)
The Impact of Wi-Fi Service in Restaurants on Customers' Likelihood of Return to a RestaurantJournal of Foodservice Business Research, 15
Ying-Feng Kuo, Chi-Ming Wu, W. Deng (2009)
The relationships among service quality, perceived value, customer satisfaction, and post-purchase intention in mobile value-added servicesComput. Hum. Behav., 25
F. Callegati, W. Cerroni, M. Ramilli (2009)
Man-in-the-Middle Attack to the HTTPS ProtocolIEEE Security & Privacy Magazine, 7
Ann Rensel, June Abbas, H. Rao (2006)
Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site UseJ. Assoc. Inf. Syst., 7
Paramaporn Thaichon, A. Lobo, A. Mitsis (2014)
An empirical model of home internet services quality in ThailandAsia Pacific Journal of Marketing and Logistics, 26
A. Larner (2006)
Searching the Internet for medical information: frequency over time and by age and gender in an outpatient population in the UKJournal of Telemedicine and Telecare, 12
Tung-Mou Yang, T. Maxwell (2011)
Information-sharing in public organizations: A literature review of interpersonal, intra-organizational and inter-organizational success factorsGov. Inf. Q., 28
R. Mayer, J. Davis, F. Schoorman (1995)
An Integrative Model Of Organizational TrustAcademy of Management Review, 20
D. Nield (2017b)
How to stay safe on public Wi-Fi [online]
P. Ratnasingam (2005)
E‐Commerce relationships: The impact of trust on relationship continuityInternational Journal of Commerce and Management, 15
Tamara Dinev, Paul Hart (2004)
Internet privacy concerns and their antecedents - measurement validity and a regression modelBehaviour & Information Technology, 23
(2000)
Report: Women enjoy E-Shopping less than men [online]
(2017)
How a Wi-Fi pineapple can steal your data (and how to protect yourself from it)
M. Cunche, M. Kâafar, R. Boreli (2014)
Linking wireless devices using information contained in Wi-Fi probe requestsPervasive Mob. Comput., 11
G. Oldham (1988)
Effects of changes in workspace partitions and spatial density on employee reactions: A quasi-experiment.Journal of Applied Psychology, 73
D. Nield (2018)
Simple steps to protect yourself on public Wi-Fi [online]
S. Forsythe, Bo Shi (2003)
Consumer patronage and risk perceptions in Internet shoppingJournal of Business Research, 56
(2015)
Is “public” safer than “private” (or home) when setting up windows?
J. Wolak, K. Mitchell, D. Finkelhor (2003)
Escaping or connecting? Characteristics of youth who form close online relationships.Journal of adolescence, 26 1
B. Corbitt, T. Thanasankit, Han Yi (2003)
Trust and e-commerce: a study of consumer perceptionsElectron. Commer. Res. Appl., 2
Ted Roselius (1971)
Consumer Rankings of Risk Reduction MethodsJournal of Marketing, 35
(2007)
How secure is your Wi-Fi connection?
R. Pennington, H. Wilcox, V. Grover (2003)
The Role of System Trust in Business-to-Consumer TransactionsJournal of Management Information Systems, 20
H. McKnight, Michelle Carter, Paul Clay (2009)
TRUST IN TECHNOLOGY: DEVELOPMENT OF A SET OF CONSTRUCTS AND MEASURES
P. Kuhn, Hani Mansour (2014)
Is Internet Job Search Still Ineffective?Labor: Supply & Demand eJournal
D. Kim, D. Ferrin, H. Rao (2008)
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedentsDecis. Support Syst., 44
(2018)
Mobile internet usage in the United States – Statistics and facts
Lakshman Mahadevan, J. Kaleta (2018)
Free Wi-Fi: To Buy or Not to BuyJournal of Computer Information Systems, 60
Sunny Consolvo, Jaeyeon Jung, Ben Greenstein, P.S. Powledge, Gabriel Maganis, Daniel Avrahami (2010)
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-FiProceedings of the 12th ACM international conference on Ubiquitous computing
S. Jarvenpaa, N. Tractinsky, L. Saarinen (2006)
Consumer Trust in an Internet Store: A Cross-Cultural ValidationJ. Comput. Mediat. Commun., 5
(2015)
Are public Wi-Fi hotspots a security risk?
(2017)
How to find free and safe public Wi-Fi
(2018)
Frequency with which adults in the United States access the internet via free public Wi-Fi as of July 2016
(2018)
Number of fixed broadband subscriptions in the United States from 2000 to 2017 (in millions)
(2011)
Wardriving burglars hacked business Wi-Fi networks
T. Sobh (2013)
Wi-Fi Networks Security and Accessing ControlInternational Journal of Computer Network and Information Security, 5
Li Li (2005)
The effects of trust and shared vision on inward knowledge transfer in subsidiaries' intra- and inter-organizational relationshipsInternational Business Review, 14
(2018)
How 'free' Wi-Fi hotspots can track your location even when you aren't connected
(2015)
Why do internet speeds slow down at certain times during the day?
F. Selnes (1998)
Antecedents and consequences of trust and satisfaction in buyer‐seller relationshipsEuropean Journal of Marketing, 32
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan (2016)
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi SignalsProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
V. Mitchell (1992)
Understanding Consumers’ Behaviour: Can Perceived Risk Theory Help?Management Decision, 30
P. Pavlou, Mendel Fygenson (2006)
Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior
(2019)
Broadband access isn’t just a problem in rural America
(2017)
Ask jack: how can I use airport and hotel wifi safely?
Shushuang Man, Dawei Hong, M. Matthews (2003)
A Shoulder-Surfing Resistant Graphical Password Scheme - WIW
Kassem Fawaz, K. Shin (2014)
Location Privacy Protection for Smartphone UsersProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Tamara Dinev, Paul Hart (2006)
An Extended Privacy Calculus Model for E-Commerce TransactionsInf. Syst. Res., 17
D. Goldschlag, Michael Reed, P. Syverson (1999)
Onion Routing for Anonymous and Private Internet Connections
(2018)
The fastest free nationwide Wi-Fi of 2018
(2019)
World Wi-Fi
James Lee, Merrill Warkentin, Allen Johnston (2016)
A Broader View of Perceived Risk during Internet TransactionsCommun. Assoc. Inf. Syst., 38
S. Jarvenpaa, N. Tractinsky, M. Vitale (2000)
Consumer trust in an Internet storeInformation Technology and Management, 1
Minkyong Kim, J. Fielding, D. Kotz (2006)
Risks of Using AP Locations Discovered Through War Driving
Benjamin Kern (2004)
Whacking, Joyriding and War-Driving: Roaming Use of Wi-Fi and the LawSanta Clara High Technology Law Journal, 21
M. Bateni, Ahmad Baraani (2013)
Time Window Management for Alert Correlation using Context Information and ClassificationInternational Journal of Computer Network and Information Security, 5
Matthew Lee, E. Turban (2001)
A Trust Model for Consumer Internet ShoppingInternational Journal of Electronic Commerce, 6
Lisa Abrams, Rob Cross, Eric Lesser, D. Levin (2003)
Nurturing interpersonal trust in knowledge-sharing networksAcademy of Management Perspectives, 17
ACM Computing Surveys, 43
M. Reiter, A. Rubin (1998)
Crowds: anonymity for Web transactionsACM Trans. Inf. Syst. Secur., 1
K. Dirks (1999)
The effects of interpersonal trust on work group performance.The Journal of applied psychology, 84 3
Hairong Li, Cheng Kuo, Martha Russell (2006)
The Impact of Perceived Channel Utilities, Shopping Orientations, and Demographics on the Consumer's Online Buying BehaviorJ. Comput. Mediat. Commun., 5
(1975)
The environment and social behavior: privacy
D. Gefen, Elena Karahanna, D. Straub (2003)
Trust and TAM in Online Shopping: An Integrated ModelMIS Q., 27
Shawn Tseng, B. Fogg (1999)
Credibility and computing technologyCommun. ACM, 42
Mauricio Featherman, P. Pavlou (2002)
Predicting E-Services Adoption: A Perceived Risk Facets Perspective
S. Kalichman, L. Weinhardt, E. Benotsch, C. Cherry (2002)
Closing the digital divide in HIV/AIDS care: development of a theory-based intervention to increase Internet accessAIDS Care, 14
A. Zaheer, Bill McEvily, V. Perrone (1998)
Does Trust Matter? Exploring the Effectsof Interorganizational and Interpersonaltrust on PerformanceOrganization Science, 9
J. Thatcher, Michelle Carter, Xin Li, Guang Rong (2013)
A Classification and Investigation of Trustees in B-to-C e-Commerce: General vs. Specific TrustCommun. Assoc. Inf. Syst., 32
P. Klasnja, Sunny Consolvo, Jaeyeon Jung, Ben Greenstein, Louis Legrand, P.S. Powledge, D. Wetherall (2009)
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi useProceedings of the SIGCHI Conference on Human Factors in Computing Systems
P. Michell, J. Reast, J. Lynch (1998)
Exploring The Foundations Of TrustJournal of Marketing Management, 14
Jingchao Sun, Xiaocong Jin, Yimin Chen, Jinxue Zhang, Yanchao Zhang, Rui Zhang (2016)
VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion
P. Beatty, I. Reay, S. Dick, James Miller (2011)
Consumer trust in e-commerce web sitesACM Computing Surveys (CSUR), 43
Research of people’s perceptions of trust, privacy and risk on the internet has generally neglected the impact of the variety of channels used to access the internet. People primarily access the internet using internet channels at home, work, public Wi-Fi (hotspots) or through their mobile data network. The technology infrastructure of each of these channels combined with the vulnerabilities of the environment may form different perceptions, as it relates to trust, privacy and risk. The purpose of this study is to understand how people perceive the home and public Wi-Fi channel from a trust, privacy and risk perspective.Design/methodology/approachAdapting existing trust, privacy and risk scales, the authors conducted a survey of people’s perceptions, as it relates to home and public Wi-Fi internet channels.FindingsThe results of this study suggest significant differences in people’s perception of trust and risk depending on an internet channel. However, with regard to privacy, the results of this study provide non-conclusive, yet intriguing, outcomes motivating the need for future studies.Originality/valueTo the best of the authors’ knowledge, this is the first study that parses out people’s perceptions of trust, privacy and risk, as it pertains to specific internet channels. The authors expect future research to benefit from their findings of how different channel perceptions influence people’s online activities.
Journal of Systems and Information Technology – Emerald Publishing
Published: Dec 11, 2020
Keywords: Internet channels; Trust; Risk; Privacy; Home internet; Public Wi-Fi; e-Commerce
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.