Perceived Risks toward In-Vehicle Infotainment Data Services on Intelligent Connected Vehicles
Abstract
:1. Introduction
- RQ 1: What is the relationship between users’ perceived risk and trust in IVI data services of ICV?
- RQ 2: How do relevant factors affect users’ attitudes and BI towards IVI data services in ICVs?
2. Literature Review
2.1. Theoretical Background
2.2. Perceived Risk Research in ICV-Related Field
- ITS: Miltgen et al. found that perceived risk reduces users’ willingness to accept biometric systems and that more privacy-conscious consumers perceive greater risk [37]. Vandezande et al. proposed that monitoring and tracking of vehicles, data collection, storage, and other processes lead to many different privacy risks in ITS [38]. In a study of electronic speed detectors, Marell et al. confirmed that automobile traffic contains a variety of risk factors, including accident risk, public risk, personal risk, and environmental risk, and found that drivers tend to accept electronic speed detectors as a way to reduce traffic risk [39].
- Telematics: Kim et al. confirmed that perceived risk has a positive effect on user resistance to acceptance of IVI systems [40]. Maeng et al. found that compared with remote carjacking, consumers are more alert and vigilant to communication failures and unauthorized collection of personal information [41]. Walter et al. found that privacy risk was one of the most important perceived risks involving data services in connected vehicles and that it had a significant negative impact on attitudes [42].
- Autonomous Vehicles: Wu et al. found that individuals’ views on the perceived risks of autonomous buses had a significant detrimental effect on trust [43]. Lee et al. demonstrated that perceived risk negatively affects users’ willingness to use an autonomous vehicle [44]. Kapser et al. found a significant negative correlation between perceived risk and the behavioral intentions of relying on automatic delivery vehicles [45].
- Based on the theory of planned behavior and theory of reasoned action, we propose a structural equation model to explore the risk perceived by users of data services in ICVs and reveal their attitudes and behavioral intentions.
- We refine the perceived risks of IVI data services into three constructs, namely, perceived security risk (PSR), perceived privacy risk (PPR), and perceived performance risk (PFR), in order to respectively reveal their relationships with trust according to characteristics of ICVs. Herein, we find that data breach anxiety is a vital factors for perceived privacy risk.
- Despite the perceived risks involved, the respondents show high attitude and behavioral intention to use in-vehicle infotainment data services. We find that PSR reduces user trust and BI, PPR has a negative effect on trust, and DBA aggravates PPR.
Subject and Source | Research Findings |
---|---|
ITS [37] | Perceived usefulness (PU) → BI |
Compatibility (C) → BI | |
Facilitate conditions (FC) → BI | |
Perceived risks (PR) → BI | |
Trust in technology (TT) → BI | |
Innovativeness (Innov) → BI | |
Privacy concerns (PC) → Perceived risks (PR) | |
BI → Recommendation (REC) | |
IVI systems [40] | Perceived risk (PR) → Resistance (RS) |
RS → Intention to use (IU) | |
Technographics (TG) → Perceived usefulness (PU) | |
TG → Perceived complexity (PC) | |
TG → PR | |
PU → RS | |
PC → RS | |
Subjective norms (SN) → PU | |
SN → PR | |
Automotive telematics [42] | Perceived usefulness (PU) → ATT |
Perceived ease of use (PEOU) → PU | |
ATT → Behavioral Intention (UI) | |
Privacy Concerns (PC) → Perceived Risk (PR) | |
PC → Trust in Provider (TR) | |
PR → ATT | |
Information Control (IC) → PC | |
SN → UI | |
Autonomous Vehicles [47] | Performance Expectancy → Adoption |
Reliability → Trust | |
Security → Trust | |
Privacy → Trust | |
Trust → Adoption |
3. Research Model and Hypotheses
3.1. Attitude and Behavioral Intention
3.2. Trust
3.3. Perceived Security Risk
3.4. Perceived Privacy Risk
3.5. Perceived Performance Risk
3.6. Data Breach Anxiety
4. Results of Data Analysis
4.1. Data Collection and Demographic Characteristics
4.2. Data Analysis and Modeling Results
4.2.1. Reliability and Validity Measurement
4.2.2. Hypothesis Testing
5. Discussion
5.1. Implications
5.2. Limitations
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
ATT | Attitude |
BI | Behavioral Intention |
DBA | Data Breach Anxiety |
ICV | Intelligent Connected Vehicle |
IoV | Internet of Vehicles |
ITS | Intelligent Transportation System |
IVI | In-Vehicle Infotainment |
OEM | Original Equipment Manufacture |
PSR | Perceived Security Risk |
PPR | Perceived Privacy Risk |
PFR | Perceived Performance Risk |
PLS | Partial Least Squares |
SP | Service Providers |
SEM | Structural Equation Modeling |
TAM | Technology Acceptance Model |
TRA | Theory of Reasoned Action |
TPB | Theory of Planned Behavior |
UTAUT | Unified Theory of Acceptance and Use of Technology |
Appendix A. Typical ICV Models
Models | Release Time | Vehicular Sensor |
---|---|---|
Tesla Model Y | 2019 | 8 cameras |
1 Millimeter wave radar | ||
12 Ultrasonic sensors | ||
Ford EVOS | 2021 | 6 cameras |
5 Millimeter wave radar | ||
12 Ultrasonic radars | ||
BMW iX | 2021 | 5 cameras |
5 Radar sensors | ||
12 Ultrasonic sensors | ||
XPENG P5 | 2021 | 13 cameras |
2 Lidar | ||
5 Millimeter wave radars | ||
12 Ultrasonic sensors | ||
ROEVE RX5 | 2022 | 11 cameras |
3 Millimeter wave radar | ||
12 Ultrasonic sensors | ||
1 Steering wheel capacitance sensor |
Appendix B. Questionnaire Item
Construct | Item and Content | Source |
---|---|---|
PSR | PSR1: I concern the overall security of privacy and data collected by ICV (e.g., driving track, location, habit and inter/intra-environment etc.). | Zhang et al. [55] |
PSR2: I concern hackers intercept or crack transmitted data via IoV and then execute wrong instructions, which lead to accidents. § | Yenisey et al. [48] | |
PSR3: When data transfer (e.g., vehicle-to-home), I concern automaker, OEM or SP will disregard the data security issue. | ||
PSR4: I concern automaker, OEM or SP don’t provide data protection and security measures (e.g., unauthorized access). | ||
PSR5: I concern the occupants are not promptly alerted to the risks when trigger data protection procedure. | Lee [98] | |
PSR6: I concern the collected and stored data from occupants has the risk of be monitored, damaged, tampered, abused. § | ||
PSR7: I concern the data (e.g., landform) collected by ICV may pose risks to national security, public interests of organizations or individuals. § | ||
PPR | PPR1: I concern automaker, OEM or SP use the collected data for other purposes without authorization. | Featherman et al. [36] |
PPR2: I concern personal sensitive or private data can’t be deleted timely when stop to use or change ICV. § | Zhang et al. [55] Kim et al. [67] | |
PPR3: I concern ICV automatically collect facial, vocal print, gait and other biometric/behavioral features of occupants and surrounding people without authorization. | ||
PPR4: I concern the collected privacy info, IVI usage and tracking recorder are shared by automaker, OEM or SP without authorization. § | ||
PPR5: I concern automaker, OEM or SP collect occupants’ movement and location records. † | ||
PPR6: I concern automaker, OEM or SP do not anonymize or encrypt the collected data of occupants when using IVI data services. † | ||
PFR | PFR1: I concern IVI data services cannot perform well and affect the personalized IVI demands of occupants. § | Featherman et al. [36] Littler et al. [79] |
PFR2: I concern the data security module of ICV is not strong enough. | ||
PFR3: I concern functions and permissions in IVI data service unable to use When declining collection, authorization requests or privacy clauses on ICV. | Zhao et al. [108] | |
PFR4: I concern the privacy protections offered by ICV will fall short of expectations. | ||
PFR5: I concern the privacy data collected by ICV cannot be normally consulted, copied, migrated and deleted, thus affecting the data rights of occupants. † | ||
DBA | DBA1: I concern hackers steal the account and password of IVI system. | Keszey [109] |
DBA2: During driving, I concern the real-time location, trajectory and other data will be leaked, which is easy to track and locate occupants. § | ||
DBA3: I concern hackers obtain the cloud data transmitted from ICV to automaker and SP. | Elhai et al. [51] | |
DBA4: I concern sensitive pictures, videos, audio (e.g., chat) collected by sensors inside and outside the car are leaked. | ||
DBA5: I concern unauthorized access to personal data from connected devices. | ||
Trust | Trust1: I think the provided IVI data service are true. § | Pillai & Sivathanu [110] |
Trust2: I think the protection mechanism of automaker and SP for collected data is reliable with the constraints of laws. | ||
Trust3: I think automaker and SP are capable to ensure the collected privacy and data security from occupants when using ICV. | ||
Trust4: I think the data security mechanisms established by automaker, OEM and SP are effective. † | ||
Trust5: I think IoV SP have established emergency mechanisms to take timely measures in case of data security incidents. † | ||
Trust6: I think personal privacy data collected by ICV will be transmitted and stored in accordance with the law and strict supervision. † | ||
ATT | ATT1: I think it is a good choice to use IVI data services on ICV. | Taylor & Todd [111] |
ATT2: I think it is a wise choice to use IVI data services of ICV when guaranteeing the data and privacy security. | ||
ATT3: I prefer to use the convenient and efficient IVI data service when perceived privacy and security risks are controllable. | ||
ATT4: I think IVI data services are satisfactory and can improve comfort level of driving when PSR and PPR are manageable. § | Wu et al. [43] | |
ATT5: I hold relatively positive attitude towards data collection for IVI, driving assistance and other functions supported by ICV. | ||
ATT6: I think ICV data collection can provide important support for personalized driving experience. § | ||
BI | BI1: Under the data security regulations, I will authorize automaker, OEM or SP to obtain driving data for better personalized IVI. | Kim et al. [40] |
BI2: For the next purchase, I’ll opt for ICV with features of IoV and IVI. § | ||
BI3: I will gradually increase the usage frequency of IVI data service on ICV to get better driving experience. | ||
BI4: With same price, I prefer to buy ICV with powerful functions of data security and privacy. § | Yu et al. [107] | |
BI5: Under the data security regulations, I will allow automakers, OEM or SP to collect data for better IVI services. | Walter et al. [42] | |
BI6: I will use IVI data service when data security and privacy are guaranteed. |
References
- Liu, J.; Liu, J. Intelligent and connected vehicles: Current situation, future directions, and challenges. IEEE Commun. Stand. Mag. 2018, 2, 59–65. [Google Scholar] [CrossRef]
- Statista, Size of the Global Connected Car Fleet in 2021, with a Forecast for 2025, 2030, and 2035, by Region. 2021. Available online: https://www.statista.com/statistics/1155517/global-connected-car-fleet-by-market/#statisticContainer (accessed on 10 June 2022).
- European Data Protection Board, Guidelines 01/2020 on Processing Personal Data in the Context of Connected Vehicles and Mobility Related Applications. 2021. Available online: https://edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-012020-processing-personal-data-context_en (accessed on 10 June 2022).
- Official Journal of the European Union, General Data Protection Regulation. 2016. Available online: https://gdpr-info.eu/ (accessed on 10 June 2022).
- Information Commissioner Office, Data Sharing Code of Practice. 2021. Available online: https://ico.org.uk/media/for-organisations/guide-to-data-protection/ico-codes-of-practice/data-sharing-a-code-of-practice-1-0.pdf (accessed on 10 June 2022).
- H.R.3388-SELF DRIVE Act, Safely Ensuring Lives Future Deployment and Research in Vehicle Evolution Act or the SELF DRIVE Act. 2020. Available online: https://www.congress.gov/bill/115th-congress/house-bill/3388 (accessed on 5 May 2022).
- Ministry of Industry and Information Technology. 2021. Available online: https://www.miit.gov.cn/jgsj/waj/wjfb/art/2021/art_27e00721fb6441fe99e9e2243bdccc78.html (accessed on 5 May 2022).
- United States Department of Transportation, Event Data Recorder Overview. 1991. Available online: https://www.nhtsa.gov/research-data/event-data-recorder#overview-10516 (accessed on 5 May 2022).
- Young, K.L.; Regan, M.A. Intelligent Transport Systems to Support Police Enforcement of Road Safety Laws. 2007. Available online: https://www.infrastructure.gov.au/sites/default/files/migrated/roads/safety/publications/2007/pdf/Grant_Report200702.pdf (accessed on 10 May 2022).
- Ministry of Industry and Information Technology, Vehicle Event Data Recorder System (Draft for Comments). 2018. Available online: https://wap.miit.gov.cn/jgsj/zbes/gzdt/art/2020/art_b499a29f2c17447b81f41ed2af4fa2e9.html (accessed on 6 May 2022).
- Bertozzi, M.; Broggi, A.; Fascioli, A. Vision-based intelligent vehicles: State of the art and perspectives. Robot. Auton. Syst. 2000, 32, 1–16. [Google Scholar] [CrossRef]
- Fishbein, M.; Ajzen, I. Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research; Addison-Wesley: Reading, MA, USA, 1975. [Google Scholar]
- Lada, S.; Tanakinjal, G.H.; Amin, H. Predicting intention to choose halal products using theory of reasoned action. Int. J. Islam. Middle East. Financ. Manag. 2009, 2, 66–76. [Google Scholar] [CrossRef]
- Ryu, K.; Jang, S. Intention to Experience Local Cuisine in a Travel Destination: The Modified Theory of Reasoned Action. J. Hosp. Tour. Res. 2006, 30, 507–516. [Google Scholar] [CrossRef]
- Shepherd, R.; Towler, G. Nutrition knowledge, attitudes and fat intake: Application of the theory of reasoned action. J. Hum. Nutr. Diet. 1992, 5, 387–397. [Google Scholar] [CrossRef]
- Liker, J.K.; Sindi, A.A. User acceptance of expert systems: A test of the theory of reasoned action. J. Eng. Technol. Manag. 1997, 14, 147–173. [Google Scholar] [CrossRef]
- Aleassa, H.; Pearson, J.M.; McClurg, S. Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. J. Bus. Ethics 2011, 98, 663–676. [Google Scholar] [CrossRef]
- Mishra, D.; Akman, I.; Mishra, A. Theory of Reasoned Action application for Green Information Technology acceptance. Comput. Hum. Behav. 2014, 36, 29–40. [Google Scholar] [CrossRef]
- Manstead, A.S.R.; Proffitt, C.; Smart, J.L. Predicting and understanding mothers’ infant-feeding intentions and behavior: Testing the theory of reasoned action. J. Personal. Soc. Psychol. 1983, 44, 657–671. [Google Scholar] [CrossRef]
- Montano, D.E.; Taplin, S.H. A test of an expanded theory of reasoned action to predict mammography participation. Soc. Sci. Med. 1991, 32, 733–741. [Google Scholar] [CrossRef]
- Marin, B.V.; Marin, G.; Perez-Stable, E.J.; Otero-Sabogal, R.; Sabogal, F. Cultural Differences in Attitudes toward Smoking: Developing Messages Using the Theory of Reasoned Action. J. Appl. Soc. Psychol. 1990, 20, 478–493. [Google Scholar] [CrossRef]
- Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 1991, 50, 179–211. [Google Scholar] [CrossRef]
- Ajzen, I. From intentions to actions: A theory of planned behavior. In Action Control; Springer: Berlin/Heidelberg, Germany, 1985; pp. 11–39. [Google Scholar]
- Shaaban, K.; Maher, A. Using the theory of planned behavior to predict the use of an upcoming public transportation service in Qatar. Case Stud. Transp. Policy 2019, 8, 484–491. [Google Scholar] [CrossRef]
- Godin, G.; Kok, G. The theory of planned behavior: A review of its applications to health-related behaviors. Americun J. Health Promot. 1996, 11, 87–98. [Google Scholar] [CrossRef] [PubMed]
- Conner, M.; McMillan, B. Interaction effects in the theory of planned behavior: Studying cannabis use. Br. J. Soc. Psychol. 1999, 38, 195–222. [Google Scholar] [CrossRef]
- Hsu, M.H.; Yen, C.H.; Chiu, C.M.; Chang, C.M. A longitudinal investigation of continued online shopping behavior: An extension of the theory of planned behavior. Int. J. Hum.-Comput. Stud. 2006, 64, 889–904. [Google Scholar] [CrossRef]
- Yang, K. Consumer technology traits in determining mobile shopping adoption: An application of the extended theory of planned behavior. J. Retail. Consum. Serv. 2012, 19, 484–491. [Google Scholar] [CrossRef]
- Klöckner, C.A. A comprehensive model of the psychology of environmental behaviour—A meta-analysis. Glob. Environ. Chang. 2013, 23, 1028–1038. [Google Scholar] [CrossRef]
- Han, H.; Hsu, L.; Sheu, C. Application of the theory of planned behavior to green hotel choice: Testing the effect of environmental friendly activities. Tour. Manag. 2010, 31, 325–334. [Google Scholar] [CrossRef]
- Ring, T. Connected cars—The next targe tfor hackers. Netw. Secur. 2015, 11, 11–16. [Google Scholar] [CrossRef]
- Cowart, K.O.; Fox, G.L.; Wilson, A.E. A structural look at consumer innovativeness and self-congruence in new product purchases. Psychol. Mark. 2008, 25, 1111–1130. [Google Scholar] [CrossRef]
- Jacoby, J.; Kaplan, L.B. The components of perceived risk. Adv. Consum. Res. 1972, 3, 382–393. [Google Scholar]
- Roselius, T. Consumer Rankings of Risk Reduction Methods. J. Mark. 1971, 35, 56–61. [Google Scholar] [CrossRef]
- Bhatnagar, A.; Misra, S.; Rao, H.R. On risk, convenience, and internet shopping behavior. Commun. ACM 2000, 43, 98–105. [Google Scholar] [CrossRef]
- Featherman, M.S.; Pavlou, P.A. Predicting e-services adoption: A perceived risk facets perspective. Int. J. Hum.-Comput. Stud. 2003, 59, 451–474. [Google Scholar] [CrossRef]
- Miltgen, C.L.; Popovič, A.; Oliveira, T. Determinants of end-user acceptance of biometrics: Integrating the “big 3” of technology acceptance with privacy context. Decis. Support Syst. 2013, 56, 103–114. [Google Scholar] [CrossRef]
- Vandezande, N.; Janssen, K. The its directive: More than a timeframe with privacy concerns and a means for access to public data for digital road maps? Comput. Law Secur. Rev. 2012, 28, 416–428. [Google Scholar] [CrossRef]
- Marell, A.; Westin, K. Intelligent transportation system and traffic safety—Drivers perception and acceptance of electronic speed checkers. Transp. Res. Part C 1999, 7, 131–147. [Google Scholar] [CrossRef]
- Kim, J.; Kim, S.; Nam, C. User resistance to acceptance of in-vehicle infotainment (ivi) systems. Telecommun. Policy 2016, 40, 919–930. [Google Scholar] [CrossRef]
- Maeng, K.; Kim, W.; Cho, Y. Consumers’ attitudes toward information security threats against connected and autonomous vehicles. Telemat. Inform. 2021, 63, 101646. [Google Scholar] [CrossRef]
- Walter, J.; Abendroth, B. On the role of informational privacy in connected vehicles: A privacy-aware acceptance modelling approach for connected vehicular services. Telemat. Inform. 2020, 49, 101361. [Google Scholar] [CrossRef]
- Wu, Z.; Zhou, H.; Xi, H.; Wu, N. Analysing public acceptance of autonomous buses based on an extended tam model. IET Intell. Transp. Syst. 2021, 15, 1318–1330. [Google Scholar] [CrossRef]
- Lee, J.; Lee, D.; Park, Y.; Lee, S.; Ha, T. Autonomous vehicles can be shared, but a feeling of ownership is important: Examination of the influential factors for intention to use autonomous vehicles. Transp. Res. Part C 2019, 107, 411–422. [Google Scholar] [CrossRef]
- Kapser, S.; Abdelrahman, M. Acceptance of autonomous delivery vehicles for last-mile delivery in germany—Extending utaut2 with risk perceptions. Transp. Res. Part C 2020, 111, 210–225. [Google Scholar] [CrossRef]
- Laghari, A.A.; Wu, K.; Laghari, R.A.; Ali, M.; Khan, A.A. A Review and State of Art of Internet of Things (IoT). Arch. Comput. Methods Eng. 2022, 2022 29, 1395–1413. [Google Scholar] [CrossRef]
- Kaur, K.; Rampersad, G. Trust in driverless cars: Investigating key factors influencing the adoption of driverless cars. J. Eng. Technol. Manag. 2018. [Google Scholar] [CrossRef]
- Yenisey, M.M.; Ozok, A.A.; Salvendy, G. Perceived security determinants in e-commerce among turkish university students. Behav. Inf. Technol. 2005, 24, 259–274. [Google Scholar] [CrossRef]
- Jarvenpaa, S.L.; Todd, P.A. Consumer reactions to electronic shopping on the World Wide Web. Int. J. Electron. Commer. 1996, 1, 59–88. [Google Scholar] [CrossRef]
- Grewal, D.; Gotlieb, J.; Marmorstein, H. The moderating effects of message framing and source credibility on the price-perceived risk relationship. J. Consum. Res. 1994, 21, 145–153. [Google Scholar] [CrossRef]
- Elhai, J.D.; Hall, B.J. Anxiety about internet hacking: Results from a community sample. Comput. Hum. Behav. 2016, 54, 180–185. [Google Scholar] [CrossRef]
- Gefen, D.; Karahanna, E.; Straub, D.W. Trust and TAM in online shopping: An integrated model. MIS Q. 2003, 27, 51–90. [Google Scholar] [CrossRef]
- Wu, B.; Zhang, C. Empirical study on continuance intentions towards E-Learning 2.0 systems. Behav. Inf. Technol. 2014, 33, 1027–1038. [Google Scholar] [CrossRef]
- Liljamo, T.; Liimatainen, H.; Pöllänen, M. Attitudes and concerns on automated vehicles. Transp. Res. Part F 2018, 59, 24–44. [Google Scholar] [CrossRef]
- Zhang, T.; Tao, D.; Qu, X.; Zhang, X.; Lin, R.; Zhang, W. The roles of initial trust and perceived risk in public’s acceptance of automated vehicles. Transp. Res. Part C 2019, 98, 207–220. [Google Scholar] [CrossRef]
- Vijayasarathy, L.R. Predicting consumer intentions to use on-line shopping: The case for an augmented technology acceptance model. Inf. Manag. 2004, 41, 747–762. [Google Scholar] [CrossRef]
- Hoffman, D.L.; Novak, T.P.; Peralta, M. Building consumer trust online. Commun. ACM 1999, 42, 80–85. [Google Scholar] [CrossRef]
- Yang, H.; Lee, H.; Zo, H. User acceptance of smart home services: An extension of the theory of planned behavior. Ind. Manag. Data Syst. 2017, 117, 68–89. [Google Scholar] [CrossRef]
- Jarvenpaa, S.L.; Tractinsky, N.; Saarinen, L. Consumer trust in an Internet store: A cross-cultural validation. J. Comput.-Mediat. Commun. 1999, 5, 59–88. [Google Scholar] [CrossRef]
- Fang, J.; Shao, P.; Lan, G. Effects of innovativeness and trust on web survey participation. Comput. Hum. Behav. 2009, 25, 144–152. [Google Scholar] [CrossRef]
- Muangmee, C.; Kot, S.; Meekaewkunchorn, N.; Kassakorn, N.; Khalid, B. Factors Determining the Behavioral Intention of Using Food Delivery Apps during COVID-19 Pandemics. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 1297–1310. [Google Scholar] [CrossRef]
- Pavlou, P.A. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 2003, 7, 101–134. [Google Scholar] [CrossRef]
- Bansal, P.; Kockelman, K.M.; Singh, A. Assessing public opinions of and interest in new vehicle technologies: An austin perspective. Transp. Res. Part C 2016, 67, 1–14. [Google Scholar] [CrossRef]
- Kolsaker, A.; Payne, C. Engendering trust in e-commerce: A study of gender-based concerns. Mark. Intell. Plan. 2002, 20, 206–214. [Google Scholar] [CrossRef]
- König, M.; Neumayr, L. Users’ resistance towards radical innovations: The case of the self-driving car. Transp. Res. Part F 2017, 44, 42–52. [Google Scholar] [CrossRef]
- Ponte, E.B.; Carvajal-Trujillo, E.; Escobar-Rodriguez, T. Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents. Tour. Manag. 2015, 47, 286–302. [Google Scholar] [CrossRef]
- Kim, D.J.; Ferrin, D.L.; Rao, H.R. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decis. Support Syst. 2008, 44, 544–564. [Google Scholar] [CrossRef]
- Miyazaki, A.D.; Fernandez, A. Consumer perceptions of privacy and security risks for online shopping. J. Consum. Aff. 2001, 35, 27–44. [Google Scholar] [CrossRef]
- Kyriakidis, M.; Happee, R.; Winter, J.D. Public opinion on automated driving: Results of an international questionnaire among 5000 respondents. Transp. Res. Part F 2015, 32, 127–140. [Google Scholar] [CrossRef]
- Glancy, D.J. Privacy in autonomous vehicles. Santa Clara Law Rev. 2012, 52, 1171–1239. [Google Scholar]
- Martin, D.K.; Borah, A.; Palmatier, R.W. Data Privacy: Effects on Customer and Firm Performance. J. Mark. 2016. [Google Scholar] [CrossRef]
- Bhattacherjee, A. Individual Trust in Online Firms: Scale Development and Initial Test. J. Manag. Inf. Syst. 2002, 19, 211–241. [Google Scholar] [CrossRef]
- Metzger, M.J. Privacy, trust, and disclosure: Exploring barriers to electronic commerce. J. Comput.-Mediat. Commun. 2004, 9, JCMC942. [Google Scholar] [CrossRef]
- Kaplan, L.B.; Szybillo, G.J.; Jacoby, J. Components of perceived risk in product purchase: A cross-validation. J. Appl. Psychol. 1974, 59, 287–291. [Google Scholar] [CrossRef]
- Cunningham, L.F.; Gerlach, J.H.; Harper, M.D.; Young, C.E. Perceived risk and the consumer buying process: Internet airline reservations. Int. J. Serv. Ind. Manag. 2005, 16, 357–372. [Google Scholar] [CrossRef]
- Cunningham, S.M. The major dimensions of perceived risk. In Risk Taking and Information Handling in Consumer Behavior; Cox, D.F., Ed.; Harvard University Press: Cambridge, MA, USA, 1967. [Google Scholar]
- Bhattacherjee, A. Individual Trust in Online Firms: The Relative and Temporal Effects of Antecedent Beliefs. Int. J. E-Bus. Res. 2006, 2, 21–38. [Google Scholar] [CrossRef]
- George, O.J.; Ogunkoya, O.A.; Lasisi, J.O.; Elumah, L.O. Risk and Trust in Online Shopping: Experience from Nigeria. Int. J. Afr. Asian Stud. 2015, 11, 71–77. [Google Scholar]
- Littler, D.; Melanthiou, D. Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: The case of internet banking. J. Retail. Consum. Serv. 2006, 13, 431–443. [Google Scholar] [CrossRef]
- Forsythe, S.; Liu, C.; Shannon, D.; Liu, C.G. Development of a scale to measure the perceived benefits and risks of online shopping. J. Interact. Mark. 2006, 20, 55–75. [Google Scholar] [CrossRef]
- Park, J.; Lennon, S.J.; Stoel, L. On-line product presentation: Effects on mood, perceived risk, and purchase intention. Psychol. Mark. 2005, 22, 695–719. [Google Scholar] [CrossRef]
- Lee, H.H.; Kim, J.; Fiore, A.M. Affective and Cognitive Online Shopping Experience: Effects of Image Interactivity Technology and Experimenting with Appearance. Cloth. Text. Res. J. 2010, 28, 140–154. [Google Scholar] [CrossRef]
- Igbaria, M.; Parasuraman, S. A path analytic study of individual characteristics, computer anxiety and attitudes toward microcomputers. J. Manag. 1989, 15, 373–388. [Google Scholar] [CrossRef]
- Meuter, M.L.; Bitner, M.J.; Ostrom, A.L.; Brown, S.W. Choosing among alternative service delivery modes: An investigation of customer trial of self-service technologies. J. Mark. 2005, 69, 61–83. [Google Scholar] [CrossRef]
- Dinev, T.; Hart, P. Internet privacy concerns and their antecedents—Measurement validity and a regression model. Behav. Inf. Technol. 2004, 23, 413–422. [Google Scholar] [CrossRef]
- Solove, D.J.; Citron, D.K. Risk and anxiety: A theory of data breach harms. SSRN Electron. J. 2016, 96, 737–786. [Google Scholar] [CrossRef]
- Chakraborty, R.; Lee, J.; Bagchi-Sen, S.; Upadhyaya, S.; Rao, H.R. Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decis. Support Syst. 2016, 83, 47–56. [Google Scholar] [CrossRef]
- Cheyun, The ICV Sales beyond 2.7 Million in 2021. 2022. Available online: http://www.cheyun.com/articleDetail/45431 (accessed on 15 May 2022).
- Ketchen, D.J., Jr. A primer on partial least squares structural equation modeling. Long Range Plan. 2013, 46, 184–185. [Google Scholar] [CrossRef]
- Chin, W.W.; Marcolin, B.L.; Newsted, P.R. A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Inf. Syst. Res. 2003, 14, 189–217. [Google Scholar] [CrossRef]
- Lee, L.; Petter, S.; Fayard, D.; Robinson, S. On the use of partial least squares path modeling in accounting research. Int. J. Account. Inf. Syst. 2011, 12, 305–328. [Google Scholar] [CrossRef]
- do Valle, P.O.; Assaker, G. Using Partial Least Squares Structural Equation Modeling in Tourism Research: A Review of Past Research and Recommendations for Future Applications. J. Travel Res. 2015, 55, 1–14. [Google Scholar] [CrossRef]
- Hair, J., Jr.; Sarstedt, M.; Hopkins, L.; Kuppelwieser, V. Partial Least Squares Structural Equation Modeling (PLS-SEM): An Emerging Tool for Business Research. Eur. Bus. Rev. 2014, 26, 106–121. [Google Scholar] [CrossRef]
- Hair, J.F.; Risher, J.J.; Sarstedt, M.; Ringle, C.M. When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. 2019, 31, 2–24. [Google Scholar] [CrossRef]
- Hair, J.F.; Hult, G.T.M.; Ringle, C.; Sarstedt, M. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2nd ed.; SAGE Publications, Inc.: Thousand Oaks, CA, USA, 2017. [Google Scholar]
- Ajenaghughrure, I.B.; Sousa, S.; Lamas, D. Risk and Trust in artificial intelligence technologies: A case study of Autonomous Vehicles. In Proceedings of the 2020 13th International Conference on Human System Interaction (HSI), Tokyo, Japan, 6–8 June 2020; pp. 118–123. [Google Scholar] [CrossRef]
- Yu, Z.; Jin, D.; Zhai, C.; Ni, W.; Wang, D. Internet of vehicles empowered mobile media: Research on mobile-generated content (mogc) for intelligent connected vehicles. Sustainability 2021, 13, 3538. [Google Scholar] [CrossRef]
- Lee, M.C. Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electron. Commer. Res. Appl. 2009, 8, 130–141. [Google Scholar] [CrossRef]
- Waung, M.; Mcauslan, P.; Lakshmanan, S. Trust and intention to use autonomous vehicles: Manufacturer focus and passenger control. Transp. Res. Part F 2021, 80, 328–340. [Google Scholar] [CrossRef]
- Wolf, R.D. Contextualizing how teens manage personal and interpersonal privacy on social media. New Media Soc. 2020, 22, 1058–1075. [Google Scholar] [CrossRef]
- Petronio, S.; Altman, I. Boundaries of Privacy: Dialectics of Disclosure; State University of New York Press: Albany, NY, USA, 2002. [Google Scholar]
- Tang, J.; Zhang, B.; Xiao, S. Examining the Intention of Authorization via Apps: Personality Traits and Expanded Privacy Calculus Perspectives. Behav. Sci. 2022, 12, 218. [Google Scholar] [CrossRef]
- Osatuyi, B. Personality traits and information privacy concern on social media platforms. J. Comput. Inf. Syst. 2015, 55, 11–19. [Google Scholar] [CrossRef]
- Xu, Z.; Zhang, K.; Min, H.; Zhen, W.; Zhao, X.; Liu, P. What drives people to accept automated vehicles? findings from a field experiment. Transp. Res. Part C 2018, 95, 320–334. [Google Scholar] [CrossRef]
- Dai, J.; Li, R.; Liu, Z. Does initial experience affect consumers’ intention to use autonomous vehicles? evidence from a field experiment in beijing. Accid. Anal. Prev. 2021, 149, 105778. [Google Scholar] [CrossRef]
- Erskine, M.A.; Brooks, S.; Greer, T.H.; Apigian, C. From driver assistance to fully-autonomous: Examining consumer acceptance of autonomous vehicle technologies. J. Consum. Mark. 2020, 37, 883–894. [Google Scholar] [CrossRef]
- Yu, Z.; Jin, D. Determinants of Users’ Attitude and Intention to Intelligent Connected Vehicle Infotainment in the 5G-V2X Mobile Ecosystem. Int. J. Environ. Res. Public Health 2021, 18, 10069. [Google Scholar] [CrossRef]
- Zhao, A.L.; Hanmer-Lloyd, S.; Ward, P.; Goode, M. Perceived risk and chinese consumers’ internet banking services adoption. Int. J. Bank Mark. 2008, 26, 505–525. [Google Scholar] [CrossRef]
- Keszey, T. Behavioural intention to use autonomous vehicles: Systematic review and empirical extension. Transp. Res. Part C. 2020, 119, 102732. [Google Scholar] [CrossRef]
- Pillai, R.; Sivathanu, B. Adoption of ai-based chatbots for hospitality and tourism. Int. J. Contemp. Hosp. Manag. 2020, 32, 3199–3226. [Google Scholar] [CrossRef]
- Taylor, S.; Todd, P.A. Understanding information technology usage: A test of competing models. Inf. Syst. Res. 1995, 6, 144–176. [Google Scholar] [CrossRef]
Construct | Definition | Reference |
---|---|---|
PSR | The degree to which ICV drivers or passengers are concerned about security risks when using IVI data services. | Yenisey et al. (2005) [48] |
PPR | The degree to which ICV drivers or passengers envisage potential loss of personal privacy when using IVI data services. | Jarvenpaa and Todd (1996) [49] |
PFR | The possibility that IVI data services in ICVs may not perform as well as expected in data security and privacy protection or fail to provide the desired benefit. | Grewal et al. (1994) [50] |
DBA | The perceived stress or anxiety associated with hacking or electronic data breaches. | Elhai and Hall (2016) [51] |
Trust | Users’ general belief in ICV data services providers, resulting in BI. | Gefen et al. (2003) [52] |
ATT | The degree to which users perceive positive or negative feelings concerning IVI data services in ICVs. | Wu and Zhang (2014) [53] |
BI | The subjective probability of drivers or passengers using data-related services in ICVs. | Walter and Abendroth (2020) [42] |
Cronbach’s | KMO | p Values |
---|---|---|
0.898 | 0.961 | 0.000 |
Profile Category | Number | Percentage | |
---|---|---|---|
Gender (N = 500) | Male | 269 | 53.8 |
Female | 231 | 46.2 | |
Age | 18–25 | 113 | 22.6 |
26–35 | 268 | 53.6 | |
36–45 | 91 | 18.2 | |
46–60 | 28 | 5.6 | |
Education | Junior high and below | 3 | 0.6 |
High school | 15 | 3.0 | |
College | 62 | 12.4 | |
Undergraduate | 352 | 70.4 | |
Graduate and above | 68 | 13.6 | |
Driving experience | 0 years (with license) | 9 | 1.8 |
1–2 years | 108 | 21.6 | |
3–5 years | 163 | 32.6 | |
6–10 years | 152 | 30.4 | |
11–15 years | 45 | 9.0 | |
16–20 years | 16 | 3.2 | |
Over 20 years | 7 | 1.4 | |
Income (USD/month) | Under 300 | 16 | 3.2 |
300.15–450 | 18 | 3.6 | |
450.15–600 | 24 | 4.8 | |
600.15–750 | 49 | 9.8 | |
750.15–900 | 44 | 8.8 | |
900.15–1050 | 31 | 6.2 | |
1050.15–1200 | 49 | 9.8 | |
1200.15–1350 | 53 | 10.6 | |
1350.15–1500 | 71 | 14.2 | |
Above 1500 | 145 | 29 | |
Area | Northeastern China | 26 | 5.2 |
Eastern China | 326 | 65.2 | |
Central of China | 85 | 17 | |
Western China | 63 | 12.6 | |
Exchange rate: | 1 CNY = 0.15 USD |
Construct | Item | Loading | VIF | Cronbach’s | CR | AVE |
---|---|---|---|---|---|---|
BI | BI1 | 0.729 | 1.332 | 0.673 | 0.802 | 0.504 |
BI3 | 0.715 | 1.217 | ||||
BI5 | 0.714 | 1.347 | ||||
BI6 | 0.681 | 1.237 | ||||
DBA | DBA1 | 0.859 | 2.817 | 0.903 | 0.932 | 0.774 |
DBA3 | 0.896 | 3.350 | ||||
DBA4 | 0.886 | 2.776 | ||||
DBA5 | 0.878 | 2.622 | ||||
ATT | ATT1 | 0.741 | 1.385 | 0.69 | 0.811 | 0.518 |
ATT2 | 0.743 | 1.330 | ||||
ATT3 | 0.666 | 1.226 | ||||
ATT5 | 0.728 | 1.296 | ||||
PFR | PFR2 | 0.904 | 3.247 | 0.902 | 0.932 | 0.773 |
PFR3 | 0.805 | 1.941 | ||||
PFR4 | 0.915 | 3.326 | ||||
PFR5 | 0.889 | 2.695 | ||||
PPR | PPR1 | 0.904 | 3.037 | 0.911 | 0.938 | 0.79 |
PPR3 | 0.886 | 2.772 | ||||
PPR5 | 0.876 | 2.556 | ||||
PPR6 | 0.889 | 2.829 | ||||
PSR | PSR1 | 0.88 | 2.564 | 0.904 | 0.933 | 0.778 |
PSR3 | 0.901 | 3.090 | ||||
PSR4 | 0.911 | 3.235 | ||||
PSR5 | 0.833 | 2.141 | ||||
Trust | Trust2 | 0.785 | 1.708 | 0.832 | 0.881 | 0.598 |
Trust3 | 0.768 | 1.723 | ||||
Trust4 | 0.799 | 1.870 | ||||
Trust5 | 0.751 | 1.621 | ||||
Trust6 | 0.763 | 1.563 |
BI | DBA | ATT | PFR | PPR | PSR | Trust | |
---|---|---|---|---|---|---|---|
BI | 0.71 | ||||||
DBA | −0.188 | 0.88 | |||||
ATT | 0.633 | −0.192 | 0.72 | ||||
PFR | −0.163 | 0.844 | −0.189 | 0.879 | |||
PPR | −0.211 | 0.866 | −0.227 | 0.877 | 0.889 | ||
PSR | −0.229 | 0.824 | −0.222 | 0.835 | 0.872 | 0.882 | |
Trust | 0.511 | −0.409 | 0.537 | −0.405 | −0.447 | −0.443 | 0.773 |
Hypothesis | Path | T Statistics | p Values | Path Coefficient | Bca (2.5; 97.5 )% | Result | |
---|---|---|---|---|---|---|---|
H1 | ATT → BI | 0.323 | 11.73 | 0.000 | 0.501 | (0.411; 0.578) | Supported |
H2a | Trust → ATT | 0.356 | 14.09 | 0.000 | 0.550 | (0.469; 0.621) | Supported |
H2b | Trust → BI | 0.063 | 5.071 | 0.000 | 0.242 | (0.145; 0.333) | Supported |
H3a | PSR → Trust | 0.015 | 2.585 | 0.010 | −0.227 | (−0.393; −0.050) | Supported |
H3b | PSR → BI | 0.007 | 2.060 | 0.039 | −0.118 | (−0.236; −0.012) | Supported |
H4 | PPR → Trust | 0.014 | 2.608 | 0.009 | −0.262 | (−0.466; −0.073) | Supported |
H5a | PFR → Trust | 0.000 | 0.181 | 0.856 | 0.014 | (0.145; 0.163) | Not |
H5b | PFR → ATT | 0.001 | 1.002 | 0.316 | 0.033 | (−0.034; 0.097) | Not |
H5c | PFR → BI | 0.009 | 2.253 | 0.024 | 0.128 | (0.016; 0.242) | Not |
H6 | DBA → PPR | 3.011 | 47.853 | 0.000 | 0.866 | (0.825; 0.896) | Supported |
Adjusted | |||
---|---|---|---|
BI | 0.447 | 0.443 | 0.218 |
ATT | 0.289 | 0.286 | 0.146 |
PPR | 0.751 | 0.750 | 0.588 |
Trust | 0.212 | 0.207 | 0.123 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, Z.; Cai, K. Perceived Risks toward In-Vehicle Infotainment Data Services on Intelligent Connected Vehicles. Systems 2022, 10, 162. https://doi.org/10.3390/systems10050162
Yu Z, Cai K. Perceived Risks toward In-Vehicle Infotainment Data Services on Intelligent Connected Vehicles. Systems. 2022; 10(5):162. https://doi.org/10.3390/systems10050162
Chicago/Turabian StyleYu, Zhiyuan, and Kexin Cai. 2022. "Perceived Risks toward In-Vehicle Infotainment Data Services on Intelligent Connected Vehicles" Systems 10, no. 5: 162. https://doi.org/10.3390/systems10050162
APA StyleYu, Z., & Cai, K. (2022). Perceived Risks toward In-Vehicle Infotainment Data Services on Intelligent Connected Vehicles. Systems, 10(5), 162. https://doi.org/10.3390/systems10050162