Advertisement

Social Perceptions About Adopting Smartphone Applications in the Context of Collaborative Security

  • Mateus de Oliveira
  • Adriana Prest Mattedi
  • Rodrigo Duarte SeabraEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 800)

Abstract

Currently, virtual and real social networks overlap through a wide access to Internet-connected devices, which use software and websites that promote interactions among individuals, groups and networks of dynamic relationships. However, it is important to investigate the acceptance and appropriateness of these alternatives in relation to different users’ profiles. This research aims to investigate the perception of a users’ group facing the possible adoption of the Life360 application seeking improvement of family safety. It is a qualitative study conducted by means of questionnaires and interviews with people from the city of Itajubá – MG. The perceptions collected were analyzed from the perspective of the Diffusion of Innovation Theory and the progressive model of adoption. As a result, a low-cost model that allows evaluating critical points in the process of adoption was obtained. It is concluded that Life360 is more suitable for people with higher income and education, given the features found in the progressive model of adoption.

Keywords

Social Perceive Diffusion of Innovation Theory Collaborative Security Mobile Devices Life360 

References

  1. 1.
    Castells, M., Cardoso, G.: A Sociedade em Rede: Do Conhecimento à Acção Política. Imprensa Nacional - Casa da Moeda, Belém (2005)Google Scholar
  2. 2.
    Egler, T.T.C.: Redes tecnossociais e democratização das políticas públicas. Sociologias. 12(23), 208–236 (2010)CrossRefGoogle Scholar
  3. 3.
    Antoun, H., Malini, F.: A internet e a rua: ciberativismo e mobilização nas redes sociais. Editora Sulina, Porto Alegre (2013)Google Scholar
  4. 4.
    Fawcett, S.B., et al.: Using empowerment theory in collaborative partnerships for community health and development. Am. J. Community Psychol. 23(5), 677–697 (1995)CrossRefGoogle Scholar
  5. 5.
    Rand, D.G., Arbesman, S., Christakis, N.A.: Dynamic social networks promote cooperation in experiments with humans. Proc. Natl. Acad. Sci. 108(48), 19193–19198 (2011)CrossRefGoogle Scholar
  6. 6.
    McLoughlin, C., Lee, M.J.W.: Social software and participatory learning: Pedagogical choices with technology affordances in the Web 2.0 era. ICT: Providing choices for learners and learning. Proceedings Singapore. pp. 664–675 (2007)Google Scholar
  7. 7.
    Robbins, S.P., Judge, T.A., Sobral, F.: Comportamento organizacional: teoria e prática no contexto brasileiro. Pearson Prentice Hall (2010)Google Scholar
  8. 8.
    The World Bank.: DataBank – World Development Indicators. Available in: http://databank.worldbank.org/data/reports.aspx?source=world-development-indicators (2017). Accessed 29 Nov 2017
  9. 9.
    Cetic.: TIC Domicílios. Available in: http://cetic.br/pesquisa/domicilios/indicadores (2016). Accessed 12 Oct 2017
  10. 10.
    Van Dijk, J.A.G.M.: Digital divide research, achievements and shortcomings. Poetics. 34(4-5), 221–235 (2006)CrossRefGoogle Scholar
  11. 11.
    Rogers, E.M.: Diffusion of Innovations. Simon and Schuster (2010)Google Scholar
  12. 12.
    Sadeh, N., et al.: Understanding and capturing people’s privacy policies in a mobile social networking application. Pers. Ubiquit. Comput. 13(6), 401–412 (2009)CrossRefGoogle Scholar
  13. 13.
    Toch, E., et al.: Empirical models of privacy in location sharing. Proceedings of the 12th ACM international conference on Ubiquitous Computing, pp 129–138 (2010)Google Scholar
  14. 14.
    Duh, H.B., et al.: Usability evaluation for mobile device: a comparison of laboratory and field tests. Proceedings of the 8th conference on human-computer interaction with mobile devices and services, pp. 181–186, (2006)Google Scholar
  15. 15.
    Pavlou, P.A.: Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003)CrossRefGoogle Scholar
  16. 16.
    Save, S., et al.: Applying human computer interaction to individual security using mobile application. In: Communication, Information & Computing Technology (ICCICT), pp. 1–6 (2015)Google Scholar
  17. 17.
    Czeskis, A., et al.: Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, p. 15. ACM (2010)Google Scholar
  18. 18.
    Rodrigues, G.J., et al.: Métodos, Técnicas e Ferramentas de Processos de Usabilidade Alinhado com as Diretrizes de Acessibilidade: Uma Revisão Sistemática da Literatura. Anais do XIII Brazilian symposium on information systems, pp. 182–189 (2017)Google Scholar
  19. 19.
    Life360.: Welcome to your new family circle. Available in: https://www.life360.com/. Accessed 31 Jan 2018
  20. 20.
    Gil, A.C.: Métodos e técnicas de pesquisa social, p. 216. Atlas, São Paulo (2008)Google Scholar
  21. 21.
    Günther, H.: Pesquisa qualitativa versus pesquisa quantitativa: esta é a questão. Psicologia: teoria e pesquisa. 22(2), 201–210 (2006)Google Scholar
  22. 22.
    Lewis, J.R.: Psychometric evaluation of the PSSUQ using data from five years of usability studies. Int. J. Hum. Comput. Interact. 14(3-4), 463–488 (2002)CrossRefGoogle Scholar
  23. 23.
    Perez, G.: Adoção de inovações tecnológicas: Um estudo sobre o uso de sistemas de informação na área de saúde. Tese de Doutorado. Universidade de São Paulo (2006)Google Scholar
  24. 24.
    Rossetto, A.M., et al.: Implicações de variáveis organizacionais na adoção de inovações tecnológicas em organizações públicas: estudo de caso de implantação de sistema de informações geográficas em prefeitura de médio porte. Revista de Administração Pública. 38(1), 109–136 (2004)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mateus de Oliveira
    • 1
  • Adriana Prest Mattedi
    • 2
  • Rodrigo Duarte Seabra
    • 2
    Email author
  1. 1.Institute of Production and Management Engineering, Federal University of ItajubáItajubáBrazil
  2. 2.Institute of Mathematics and Computing, Federal University of ItajubáItajubáBrazil

Personalised recommendations