Mobile Game Players’ Behavioral Intention to Use Facial Recognition Login System in Shanghai, China

Authors

  • Qizhen Gu

DOI:

https://doi.org/10.14456/shserj.2023.21
CITATION
DOI: 10.14456/shserj.2023.21
Published: 2023-06-09

Keywords:

Facial Recognition, Behavioral Intention, Mobile Game, The Technology Acceptance Model

Abstract

Purpose: This research was designed to study the influences of perceived effectiveness of privacy policy, perceived privacy risk, perceived privacy self-efficacy, privacy concern, perceived usefulness, perceived ease of use, and the behavioral intention of mobile game players toward facial recognition login systems. Research design, data, and methodology: This research has applied a quantitative method to distribute questionnaires to mobile game players (n=701) in Shanghai, China. The sample techniques involve judgmental and convenience sampling. The index of item-objective congruence (IOC) and pilot test were employed before the data collection. Confirmatory factor analysis (CFA), and structural equation model (SEM) were implemented to analyze the data and test the overall model along with the proposed research hypotheses. Result: The analysis showed that perceived effectiveness of privacy policy, perceived privacy risk, perceived privacy self-efficacy, privacy concern, perceived usefulness, and perceived ease of use significantly impact behavioral intention. Privacy concern has the strongest impact on behavioral intention. Conclusion: Mobile game services need to provide a comprehensive and reliable privacy policy statement to reduce users’ privacy concerns. For the system, promoters need to emphasize how facial recognition login systems is safer and more convenient than the other sign-in system.

Author Biography

Qizhen Gu

Ph.D. Candidate of Innovative Technology, Management, Graduate School of Business and Advanced Technology Management, Assumption University.

References

Abdullah, D., Jayaraman, K., Shariff, D. N., Bahari, K. A., & Nor, N. M. (2017). The Effects of Perceived Interactivity, Perceived Ease of Use and Perceived Usefulness on Online Hotel Booking Intention: A Conceptual Framework. International Academic Research Journal of Social Science, 3(1), 16-23.

Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.

Akhter, S. H. (2014). Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. Journal of Consumer Marketing, 31(2), 118-125.

Ali, F., Zhou, Y., Hussain, K., Nair, P. K., & Ragavan, N. A. (2016). Does Higher Education Service Quality Effect Student Satisfaction, Image and Loyalty? A Study of International Students in Malaysian Public Universities. Quality Assurance in Education, 24, 70-94. https://doi.org/10.1108/QAE-02-2014-0008

Aljukhadar, M., Senecal, S., & Ouellette, H. (2010). Can the media richness of a privacy disclosure enhance outcome? A multifaceted view of trust in rich media environments. International Journal of Electronic Commerce, 14(4), 103-126.

Al-Sharafi, M. A., Arshah, R. A., Herzallah, F. A., & Alajmi, Q. (2017). The effect of perceived ease of use and usefulness on customers intention to use online banking services: the mediating role of perceived trust. International Journal of Innovative Computing, 7(1), 9-14.

Anic, I.-D., Budak, J., Rajh, E., Recher, V., Skare, V., & Skrinjaric, B. (2019). Extended model of online privacy concern: what drives consumers’ decisions?. Online Information Review, 43(5), 799-817. https://doi.org/10.1108/oir-10-2017-0281

Anton, A. I., Bertino, E., Li, N., & Yu, T. (2007). A roadmap for comprehensive online privacy policy management. Communications of the ACM, 50(7), 109-116.

Apple. (2021, April 26). Retrieved from About Face ID advanced technology: https://support.apple.com/en-us/HT208108

Arpaci, I. (2016). Understanding and predicting students’ intention to use mobile cloud storage services. Computers in Human Behavior, 58, 150-157.

Aslam, W., Ham, M., & Arif, I. (2017). Consumer behavioral intentions towards mobile payment services: An empirical analysis in Pakistan. Trziste Market, 29(2), 161-176.

Awad, N. F., & Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly, 30(1), 13-28.

Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94.

Bandura, A., Weiner, I. B., & Craighead, W. E. (2010). Self-Efficacy. In I. B. Weiner & W. E. Craighead (Eds.), The Corsini Encyclopedia of Psychology. Published Online (pp. 1-3). John Wiley. https://doi.org/10.1002/9780470479216.corpsy0836

Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication, 67(1), 26-53.

Bhatia, R. (2013). Biometrics and Face Recognition Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 93-99.

Burton-Jones, A., & Hubona, G. S. (2005). Individual differences and usage behavior: Revisiting a technology acceptance model assumption. ACM SIGMIS Database, 36(2), 58-77.

Chang, Y., Wong, S. F., & Lee, H. (2015). Understanding perceived privacy: A privacy boundary management model [Paper presentation]. The 19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore.

Chao, C.-M. (2019). Factors determining the behavioral intention to use mobile learning: An application and extension of the UTAUT model. Frontiers in psychology, 10, 1652.

Chi, T. (2018). Understanding Chinese consumer adoption of apparel mobile commerce: An extended TAM approach. Journal of Retailing and Consumer Services, 44, 274-284.

Cooper, D., & Schindler, P. (2011). Business Research Methods. (11th ed.). McGraw Hill.

Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: balancing economic and justice considerations. Journal of Social Issues, 59(2), 323-342.

Culnan, M., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104-115.

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.

Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.

Dong, J. Q. (2011). User acceptance of information technology innovations in the remote areas of China. Journal of Knowledge-based Innovation in China, 3(1), 44-53.

Featherman, M., & Pavlou, P. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451-474.

Gravetter, F., & Wallnau, L. (2000). Statistics for the behavioral sciences. Wadsworth /Thomson Learning.

Gu, J., Xu, Y., Xu, H., Zhang, C., & Ling, H. (2016). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28. https://doi.org/10.1016/j.dss.2016.10.00

Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate Data Analysis (7th ed.). Pearson Prentice Hall.

Hair, J. F., Sarstedt, M., Ringle, C. M., & Gudergan, S. P. (2016). Advanced Issues in Partial Least Squares Structural Equation Modeling. London: SAGE Publication, 8(6), 1-10.

Hair, J. J., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis (1st ed.). Prentice Hall.

Hansen, J. M., Saridakis, G., & Benson, V. (2018). Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers’ use of social media for transactions. Computers in Human Behavior, 80, 197-206.

Henseler, J. (2011). Why generalized structured component analysis is not universally preferable to structural equation modeling. Journal of the Academy of Marketing Science, 40(3), 402-413.

Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55.

James, T., Pirim, T., Boswell, K., Reithel, B., & Barkhi, R. (2006). Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing, 18(3), 1-24.

Kabir, S. M. (2016). Measurement Concepts: Variable, Reliability, Validity, and Norm. Basic Guidelines for Research: An Introductory Approach for All Disciplines, 10(1), 72-110.

Kim, J., & Bernhard, B. (2014). Factors influencing hotel customers’ intention to use a fingerprint system. Journal of Hospitality and Tourism Technology, 5(2), 98-125.

King, N. J., & Jessen, P. W. (2010). Profiling the mobile customer-Privacy concerns when behavioural advertisers target mobile phones-Part I. Computer Law & Security, 26(5), 455-478.

Koul, S., & Eydgahi, A. (2018). Utilizing technology acceptance model (TAM) for driverless car technology adoption. Journal of Technology Management & Innovation, 13(4), 37-46.

Lai, P. C. (2018). Security as an Extension to TAM Model: Consumers’ Intention to Use a Single Platform E-Payment. Asia-Pacific Journal of Management, 13(3-4), 110-119.

Lee, H. H., & Hill, J. T. (2013). Moderating effect of privacy self-efficacy on location-based mobile marketing. International. Journal of Mobile Communications, 11(4), 330-350.

Lee, W. Y., Tan, C.-S., & Siah, P. C. (2017). The Role of Online Privacy Concern as a Mediator between Internet Self-Efficacy and Online Technical Protection Privacy Behavior. Sains Humanika, 3(2), 37-43.

Li, Y. (2012). Theories in online information privacy research: a critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.

Liebana-Cabanillas, F., Ramos de Luna, I., & Monroto-Rios, J. F. (2015). User behavior in QR mobile payment system: the QR Payment Acceptance Model. Technology Analysis & Strategic Management, 27(9), 1031-1049.

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems, 15(4), 336-355.

McClellan, E. (2020). Facial Recognition Technology: Balancing the Benefits and Concerns. Journal of Business & Technology Law, 15(2), 363-380.

Miller, V. A., Feudtner, C., & Jawad, A. F. (2017). Children’s decision-making involvement about research participation: associations with perceived fairness and self-efficacy. Journal of Empirical Research on Human Research Ethics, 12(2), 87-96.

Mohamed, N., & Ahmad, I. H. (2012). Information Privacy Concerns, Antecedents, And Privacy Measure Use in Social Networking Sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375.

Moslehpour, M., Pham, V., Wong, W. K., & Bilgiçli, I. (2018). E-purchase intention of Taiwanese consumers: Sustainable mediation of perceived usefulness and perceived ease of use. Sustainability, 10(1), 234.

Nam, C., Song, C., Lee, E., & Park, C. I. (2006). Consumers' Privacy Concerns and Willingness to Provide Marketing-Related Personal Information Online. Advances in Consumer Research, 33, 212-217.

Nayanajith, G., Damunupola, K. A., & Ventayen, R. J. (2019). Impact of Innovation and Perceived Ease of Use on E-Learning Adoption. Asian Journal of Business and Technology, 2(1), 19-27.

Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure (1st ed.). Suny Press.

Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 27-41.

Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy Magazine, 1(2), 33-42.

Ramlall, I. (2017). Applied Structural Equation Modelling for Researchers and Practitioners, Using R and Stata for Behavioral Research (1st ed.). Emerald Group Publishing Limited.

Saunders, M., Lewis, P., & Thornhill, A. (2016). Research Methods for Business Students (7th ed.). Pearson.

Schreiber, J. B., Nora, A., Stage, F. K., Barlow, E. A., & King, J. (2006). Reporting structural equation modeling and confirmatory factor analysis results: A review. The Journal of educational research, 99(6), 323-338.

Sharma, S., Pradhan, K., Satya, S., & Vasudevan, P. (2005). Potentiality of earthworms for waste management and in other uses - a review. Journal of American Science, 1(1), 4-16.

Smith, H. J., Milburg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167-196.

Stanton, J. M., & Stam, K. R. (2003). Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives. Surveillance & Society, 1(2), 152-190.

Steinfeld, N. (2016). I agree to the terms and conditions:(How) do users read privacy policies online? An eye-tracking experiment. Computers in human behavior, 55, 992-1000.

Sutanto, J., Palme, E., Tan, C., & Phang, C. W. (2013). Addressing the personalization privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37(4), 1141-1164.

Symanovich, S. (2021, April 25). How does facial recognition work?. Norton Life Lock Inc.

https://us.norton.com/internetsecurity-iot-how-facial-recognition-software-works.html

Tan, G. W.-H., Ooi, K.-B., Leong, L.-Y., & Lin, B. (2014). Predicting the drivers of behavioral intention to use mobile learning: A hybrid SEM-Neural Networks approach. Computers in Human Behavior, 36, 198-213.

Tan, X., Qin, L., Kim, Y., & Hsu, J. (2012). Impact of privacy concern in social networking website. Internet Research, 22(2), 211-233.

Tao, L. (2021, April 25). The facial recognition company that supplies China’s Skynet surveillance system. https://www.scmp.com/tech/science-research/article/3005733/what-you-need-know-about-sensenets-facial-recognition-firm

Thomala, L. L. (2021, March 20). Average monthly mobile game playing frequency in China from April 2018 to June 2020. Statista. https://www.statista.com/statistics/1036019/china-monthly-mobile-gaming-frequency/

Tolmie, A., Muijs, D., & Mcateer, E. (2011). Quantitative methods in educational and social research using SPSS. (1st ed.). Open University Press.

Triggs, R. (2021, April 26). Facial recognition technology explained. Android Authority. https://www.androidauthority.com/facial-recognition-technology-explained-800421/

Tsou, H. T., Chen, J. S., Chou, Y., & Chen, T. W. (2019). Sharing Economy Service Experience and Its Effects on Behavioral Intention. Sustainability, 11(18), 5-15.

Venkatesh, C. R. (2021, July 16). Recent Mobile Game Market Trends. https://www.dotcominfoway.com/blog/infographic-mobile-game-market-trends-2020/

Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186-204.

Wang, E. S. (2019). Effects of Brand Awareness and Social Norms on User-Perceived Cyber Privacy Risk. International Journal of Electronic Commerce, 23(2), 272-293.

Wang, L., Sun, Z., Dai, X., Zhang, Y., & Hu, H.-H. (2019). Retaining users after privacy invasions: The roles of institutional privacy assurances and threat-coping appraisal in mitigating privacy concerns. Information Technology & People, 32(6), 1679-1703.

West, R. L., Turner, L. H., & Zhao, G. (2004). Introducing Communication Theory: Analysis and Application. McGraw-Hill.

Woodward, J. D., Horn, C., Gatune, J., & Thomas, A. (2003). Biometrics: A look at facial recognition (1st ed.). Rand Corp.

Wu, J., Liu, L., & Huang, L. (2017). Consumer acceptance of mobile payment across time: Antecedents and moderating role of diffusion stages. Industrial Management & Data Systems, 117(8), 1761-1776.

Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information System, 12(12), 798-824.

Youn, S. (2009). Determinants of online privacy concerns and Its Influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389-418.

Zhou, T. (2020). The effect of information privacy concern on users' social shopping intention. Online Information Review, 44(5), 1119-1133. https://doi.org/10.1108/OIR-09-2019-0298

Zhu, R., Srivastava, A., & Sutanto, J. (2020). Privacy-deprived e-commerce: the efficacy of consumer privacy policies on China's e-commerce websites from a legal perspective. Information Technology & People, 4(5), 1119-1133. https://doi.org/10.1108/ITP-03-2019-0117

Zhu, Y., & Bao, Z. S. (2018). The role of negative network externalities in SNS fatigue: an empirical study based on impression management concern, privacy concern, and social overload. DataTechnologies and Applications, 52(3), 313-328.

Zikmund, W. G. (2008). Business research methods (8th ed.). South-Western Cengage Learning.

Zikmund, W. G., Carr, B. J. C., Griffin, M., & Babin, B. J. (2013). Business Research Method (8th ed.). Dryden Press.

Downloads

Published

2023-06-09

How to Cite

Gu, Q. (2023). Mobile Game Players’ Behavioral Intention to Use Facial Recognition Login System in Shanghai, China. Scholar: Human Sciences, 15(1), 199-210. https://doi.org/10.14456/shserj.2023.21