A Longitudinal Study on e-Auction Adoption

被引:0
|
作者
Fang, Kwoting [1 ]
Tu, Chien-Chung [1 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Dept Informat Management, Douliou City, Taiwan
关键词
Sensemaking; schema; cognitive; ground theory;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There are 2,565 auction websites on Online-auction List reports. Therefore, to understand consumers intention in using online auction and royalty is a critical issue. Yet, few studies have made on users intention to use on-line auction. Even though extensive researches focus on on-line shopping intention, however, we can not consider they both are same on use intention. Because on-line auction is involve three different counterparts: bidder, auctioneer, and on-line auction website, including dynamic bidding price. This paper is a step forward in using qualitative method trying to understand the in C2C on-line auction behavior. Specifically, the purpose of this study is using longitudinal approach in data collection in order to explore possible theoretical constructs to explain users schema change. The data collection involved three rounds and every round takes 5 weeks. Our findings highlight the importance of transaction cost economics perspective, trust, perceived risk, and information asymmetric after on-line auction usage. Implications of the results are discussed.
引用
收藏
页码:9581 / 9584
页数:4
相关论文
共 50 条
  • [1] Theoritical Model for e-Auction
    Khan, Hameed Ullah
    Al-Faifi, Abdullah M.
    Diab, Diab Mahmoud
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (04): : 116 - 120
  • [2] Antecedents of Intention to Use E-Auction: An Empirical Study
    Masa'deh, Ra'ed
    A. AlMajali, Dmaithan
    AlSokkar, Abdullah A. M.
    Alshinwan, Mohammad
    Shehadeh, Maha
    [J]. SUSTAINABILITY, 2023, 15 (06)
  • [3] Efficiency Improvement of Homomorphic E-Auction
    Peng, Kun
    Bao, Feng
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 238 - 249
  • [4] Secure Cryptographic E-Auction System
    Heng, Swee-Huay
    Tan, Soo -Chin
    [J]. INTERNATIONAL JOURNAL OF TECHNOLOGY, 2022, 13 (06) : 1222 - 1230
  • [5] KLEPTOGRAPHIC ATTAKS ON E-AUCTION SCHEMES
    Gogolewski, Marcin
    Gomulkiewicz, Marcin
    Grzaslewicz, Jaroslaw
    Kubiak, Przemyslaw
    Kutylowski, Miroslaw
    Lauks, Anna
    [J]. TATRACRYPT '07 - 7TH CENTRAL EUROPE CONFERENCE OF CRYPTOLOGY, 2008, 41 : 47 - +
  • [6] Formal Verification of e-Auction Protocols
    Dreier, Jannik
    Lafourcade, Pascal
    Lakhnech, Yassine
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 247 - 266
  • [7] Customers' perception on attitude towards e-auction
    Tu, Chien-Chung
    Lin, Chwen-Yea
    Fang, Kwoting
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1044 - 1048
  • [8] E-auction web assessment model in China
    Lu, June
    Wang, Lu-Zhuang
    Yu, Chun-Sheng
    Wu, Jia-Ying
    [J]. ELECTRONIC COMMERCE RESEARCH, 2009, 9 (03) : 149 - 172
  • [9] Modeling the Trust with ECT in E-Auction Loyalty
    Lin, Chwen-Yea
    Tu, Chien-Chung
    Fang, Kwoting
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 851 - 855
  • [10] E-auction web assessment model in China
    June Lu
    Lu-Zhuang Wang
    Chun-Sheng Yu
    Jia-Ying Wu
    [J]. Electronic Commerce Research, 2009, 9 : 149 - 172