Adoption of Web 3.0: Factors Affecting Behavioral Intention
Abstract
In the present study, we explore the landscape of web 3.0 technology, a pivotal phase in the digital domain. Multiple factors have been identified that influence the behavioral intention of the users and further the adoption of web 3.0 technology. By employing a deductive approach, we collected 200 samples from the IT professionals. To draw the sample, non-probability purposive sampling techniques were used. The PLS-SEM technique was used to predict the causal relationship between the studied variables, as it has the ability to provide meaningful results for complex models with a minimal sample. Results revealed the factors that are influencing the behavioral intention of the users. Among others, digital dexterity plays a crucial role in affecting the behavioral intention of Web 3.0 technology users. In addition, the electronic word of mouth also plays an important in enhancing the behavioral intention of the users which further enhances the adoption of web 3.0 technology. Data privacy security and perceived ease of use both have a positive and significant impact on the user's behavioral intention. Interestingly, performance expectancy was found to be an insignificant element that increases user intention. These findings serve as valuable resources for developers and marketers, allowing them to leverage their potential for strengthening user privacy and data security
References
Alpert, J., & Hajaj, N. (2008). We knew the web was big (2008). https://googleblog.blogspot.com/2008/07/we-knew-web-was-big.html
Ahmad, P., Hussain, A., & Aqil, M. (2013). Use of web 2.0 in Saudi Arabia universities. International Journal of Information Dissemination and Technology, 3(3), 158-166.
Atzori, M., Koutrika, G., Pes, B. and Tanca, L. (2020). Special issue on ‘Data Exploration in the Web 3.0 Age’. Future Generation Computer Systems, 112, pp.1177–1179.
Ahmed, W., Akter, H. and Ali, J. (2021). Crafting the digital competence behavior among female students in developing countries context. 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). doi:https://doi.org/10.1109/3ict53449.2021.9581717
Alabdulwahhab, F.A. (2018). Web 3.0: The decentralized web blockchain networks and protocol innovation. 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). doi:https://doi.org/10.1109/cais.2018.8441990
Agarwal, R., & Prasad, J. (1998). The antecedents and consequents of user perceptions in information technology adoption. Decision support systems, 22(1), 15-29.
Ab Hamid, M. R., Sami, W., & Sidek, M. M. (2017, September). Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion. In Journal of Physics: Conference Series (Vol. 890, No. 1, p. 012163). IOP Publishing.
Brynjolfsson, E., & Hitt, L. M. (2000). Beyond computation: Information technology, organizational transformation and business performance. Journal of Economic perspectives, 14(4), 23-48.
Berners-Lee, T. (1998). Semantic web road map.https://www.researchgate.net/publication/200034151_The_Semantic_Web_road_map
Cheung, G. W., & Wang, C. (2017). Current approaches for assessing convergent and discriminant validity with SEM: Issues and solutions. In Academy of management proceedings (Vol. 2017, No. 1, p. 12706). Briarcliff Manor, NY 10510: Academy of Management.
Chaveesuk, S., Khalid, B., Bsoul-Kopowska, M., Rostań ska, E., & Chaiyasoonthorn, W. (2022). Comparative analysis of variables that influence behavioral intention to use MOOCs. Plos one, 17(4), e0262037.
Chayomchai, A. (2020). The online technology acceptance model of generation-Z people in Thailand during COVID-19 crisis. Management & Marketing. Challenges for the Knowledge Society, 15(s1), 496-512.
Doan, T. V., van Rijswijk-Deij, R., Hohlfeld, O., & Bajpai, V. (2022). An empirical view on consolidation of the web. ACM Transactions on Internet Technology (TOIT), 22(3), 1-30.
De Choudhury, M., & De, S. (2014). Mental health discourse on reddit: Self-disclosure, social support, and anonymity. In Proceedings of the international AAAI conference on web and social media (Vol. 8, No. 1, pp. 71-80).
De Bruyn, A., & Lilien, G. L. (2008). A multi-stage model of word-of-mouth influence through viral marketing. International journal of research in marketing, 25(3), 151-163.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.
Garrigos-Simon, F. J., Alcamı́, R. L., & Ribera, T. B. (2012). Social networks and Web 3.0: their impact on the management and marketing of organizations. Management Decision, 50(10), 1880-1890.
Gogolin, I. (2016). European educational research quality indicators (EERQI): An experiment. Research assessment in the humanities: Towards criteria and procedures, 103-111.
Grover, A., Zweig, A., & Ermon, S. (2019, May). Graphite: Iterative generative modeling of graphs. In International conference on machine learning (pp. 2434-2444). PMLR.
Hennig-Thurau, T., Gwinner, K. P., Walsh, G., & Gremler, D. D. (2004). Electronic word-of-mouth via consumer-opinion platforms: what motivates consumers to articulate themselves on the internet?. Journal of interactive marketing, 18(1), 38-52.
He, S. X., & Bond, S. D. (2015). Why is the crowd divided? Attribution for dispersion in online word of mouth. Journal of Consumer Research, 41(6), 1509-1527.
Hassani, H., Huang, X., & Silva, E. (2018). Banking with blockchain-ed big data. Journal of Management Analytics, 5(4), 256-275.
Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the academy of marketing science, 40, 414-433.
Henseler, J., Ringle, C. M., & Sarstedt, M. (2016). Testing measurement invariance of composites using partial least squares. International marketing review, 33(3), 405-431.
Ismagilova, E., Hughes, L., Dwivedi, Y. K., & Raman, K. R. (2019). Smart cities: Advances in research—An information systems perspective. International journal of information management, 47, 88-100.
Jeong, Y., Joo, H., Hong, G., Shin, D., & Lee, S. (2015). AVIoT: Web-based interactive authoring and visualization of indoor internet of things. IEEE Transactions on Consumer Electronics, 61(3), 295-301.
Kasireddy, Preethi 2021. The Architecture of Web 3.0 Application. Search date 2.11.2022. https://www.preethikasireddy.com/post/the-architecture-of-a-web-3-0-application
Knublauch, H., Fergerson, R. W., Noy, N. F., & Musen, M. A. (2004). The Protégé OWL plugin: An open development environment for semantic web applications. In The Semantic Web–ISWC 2004: Third International Semantic Web Conference, Hiroshima, Japan, November 7-11, 2004. Proceedings 3 (pp. 229-243). Springer Berlin Heidelberg.
Lo, C. K., Hew, K. F., & Chen, G. (2017). Toward a set of design principles for mathematics flipped classrooms: A synthesis of research in mathematics education. Educational Research Review, 22, 50-73.
Limbu, Y.B., Wolf, M. and Lunsford, D.L. (2011). Consumers’ perceptions of online ethics and its effects on satisfaction and loyalty. Journal of Research in Interactive Marketing, 5(1), 71–89.
Liang, G., Weller, S.R., Luo, F., Zhao, J. and Dong, Z.Y. (2019). Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks. IEEE Transactions on Smart Grid, 10(3), 3162–3173.
Labadie, C., Legner, C., Eurich, M., & Fadler, M. (2020, June). Fair enough? enhancing the usage of enterprise data with data catalogs. In 2020 IEEE 22nd Conference on Business Informatics (CBI) (Vol. 1, pp. 201-210). IEEE.
Lawler, J. P., & Molluzzo, J. C. (2010). A study of the perceptions of students on privacy and security on Social Networking Sites (SNS) on the internet. Journal of Information Systems Applied Research, 3(12), 3-18.
Lallmahamood, M. (2007). An examination of individual's perceived security and privacy of the internet in malaysia and the influence of this on their intention to use e-commerce: Using an extension of the technology acceptance model. Journal of internet banking and commerce, 12(3), 1.
Lien, C. H., & Cao, Y. (2014). Examining WeChat users’ motivations, trust, attitudes, and positive word-of-mouth: Evidence from China. Computers in human behavior, 41, 104-111.
Naujoks, A., & Benkenstein, M. (2020). Who is behind the message? The power of expert reviews on eWOM platforms. Electronic Commerce Research and Applications, 44, 101-115.
PixelPlex. (2021). Blockchain education applications & use cases. PixelPlex. Retrieved September 28, 2021, https://pixelplex.io/blog/blockchain-education-use-cases-and-applications/.
Raza, U., Kulkarni, P., & Sooriyabandara, M. (2017). Low power wide area networks: An overview.IEEE Communications Surveys & Tutorials, 19(2), 855-873.
Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary educational psychology, 25(1), 54-67.
Rudman, R., & Bruwer, R. (2016). Defining Web 3.0: opportunities and challenges. The Electronic Library, 34(1), 132-154.
Shivalingaiah, D., & Naik, U. (2008). Comparative study of web 1.0, web 2.0 and web 3.0.doi=10.13140/2.1.2287.2961
Sarstedt, M., Hair Jr, J. F., & Ringle, C. M. (2023). “PLS-SEM: indeed a silver bullet”–retrospective observations and recent advances. Journal of Marketing theory and Practice, 31(3), 261-275.
Twum, F. A., Long, X., Salman, M., Mensah, C. N., Kankam, W. A., & Tachie, A. K. (2021). The influence of technological innovation and human capital on environmental efficiency among different regions in Asia-Pacific. Environmental Science and Pollution Research, 28, 17119-17131.
Tien, N. H., Anh, D. B. H., & Thuc, T. D. (2019). Global supply chain and logistics management.Academic Publications, Dehli Teo, T. (2011). Factors influencing teachers’ intention to use technology: Model development and test. Computers & Education, 57(4), 2432-2440.
Udo, G. J. (2001). Privacy and security concerns as major barriers for e-commerce: a survey study. Information management & computer security, 9(4), 165-174.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
Voshmgir, S. (2020). Token Economy: How the Web3 reinvents the internet (Vol. 2). Token Kitchen.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science, 46(2), 186-204.
Wamba, S. F., Dubey, R., Gunasekaran, A., & Akter, S. (2020). The performance effects of big data analytics and supply chain ambidexterity: The moderating effect of environmental dynamism. International Journal of Production Economics, 222, 107-118.
Yadegaridehkordi, E., Hourmand, M., Nilashi, M., Shuib, L., Ahani, A., & Ibrahim, O. (2018). Influence of big data adoption on manufacturing companies' performance: An integrated DEMATEL-ANFIS approach. Technological Forecasting and Social Change, 137, 199-210.
Yuan, X., He, P., Zhu, Q., & Li, X. (2019). Adversarial examples: Attacks and defenses for deep learning. IEEE transactions on Neural Networks and Learning Systems, 30(9), 2805-2824.
Zhang, C., Bengio, S., Hardt, M., Recht, B., & Vinyals, O. (2021). Understanding deep learning (still) requires rethinking generalization. Communications of the ACM, 64(3), 107-115.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.