Description
Location-based mobile applications (LBAs) has emerged as one of the most used feature of smartphones. Although several prior researchers have studied the location sharing behavior, there is limited study of the risks and benefits of using LBAs. We showed two main usage behavior on LBAs are unrestricted and restricted. In this study, we explore different aspects of related risks (financial, privacy, time) and benefits (utilitarian, hedonic) in the context of LBAs. In addition, building upon the theory of planned behavior (TPB) we propose a theoretical risk/benefit model to anticipate LBA two usage behaviors. We collected two sets of data (survey and online reviews of LBA) and then we used the text mining approach to analyze location-based (spatial) behavioral information. The results of our study contribute to both theory and practice in information systems (IS) literature.
Recommended Citation
Koohikamali, Mehrdad and Peak, Dan, "Location-Based Mobile Applications Usage Behavior: Beware the Power of the Dark Side" (2015). AMCIS 2015 Proceedings. 6.
https://aisel.aisnet.org/amcis2015/BizAnalytics/GeneralPresentations/6
Location-Based Mobile Applications Usage Behavior: Beware the Power of the Dark Side
Location-based mobile applications (LBAs) has emerged as one of the most used feature of smartphones. Although several prior researchers have studied the location sharing behavior, there is limited study of the risks and benefits of using LBAs. We showed two main usage behavior on LBAs are unrestricted and restricted. In this study, we explore different aspects of related risks (financial, privacy, time) and benefits (utilitarian, hedonic) in the context of LBAs. In addition, building upon the theory of planned behavior (TPB) we propose a theoretical risk/benefit model to anticipate LBA two usage behaviors. We collected two sets of data (survey and online reviews of LBA) and then we used the text mining approach to analyze location-based (spatial) behavioral information. The results of our study contribute to both theory and practice in information systems (IS) literature.