Skip to main content
Top
Published in: Information Systems Frontiers 4/2017

03-02-2017

Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework

Authors: Ahmet Bulent Ozturk, Khaldoon Nusair, Fevzi Okumus, Dipendra Singh

Published in: Information Systems Frontiers | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increased popularity of mobile devices, hotels and online travel agencies have started focusing on mobile hotel booking (MHB) in recent years. However, there has been limited research on users” loyalty intentions toward MHB technology. This research attempted to provide an integrated theoretical model that examines the determinants of MHB loyalty. The proposed model, which incorporates personalization, privacy concern, trust, perceived risk, and loyalty, was tested via structural equation modeling (SEM) by using data collected from 396 MHB users. The study results demonstrated that personalization is a strong predictor of MHB users” privacy concerns, trust, and risk perceptions. In addition, privacy concern had a significant impact on trust, and trust significantly influenced perceived risk. Finally, the results revealed that trust and perceived risk were associated with loyalty. This study provides valuable theoretical contributions for researchers and practical implications for online travel agencies, hotel operators and hospitality technology vendors.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Adomavicius, G., & Tuzhilin, A. (2005). Toward the next generation of recommender systems: a survey of the state-of-heart and possible extensions. IEEE Transactions on Knowledge and Data Engineering, 17(6), 734–749.CrossRef Adomavicius, G., & Tuzhilin, A. (2005). Toward the next generation of recommender systems: a survey of the state-of-heart and possible extensions. IEEE Transactions on Knowledge and Data Engineering, 17(6), 734–749.CrossRef
go back to reference Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: a review, recommended two-step approach. Psychological Bulletin, 103, 411–423.CrossRef Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: a review, recommended two-step approach. Psychological Bulletin, 103, 411–423.CrossRef
go back to reference Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14(3), 396–402.CrossRef Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14(3), 396–402.CrossRef
go back to reference Ary, D., Jacobs, L., Razavieh, A. (1996). Introduction to research in education, 5th ed. Rinehart and Winston, Ft Worth. Ary, D., Jacobs, L., Razavieh, A. (1996). Introduction to research in education, 5th ed. Rinehart and Winston, Ft Worth.
go back to reference Bauer, R. A. (1967). Consumer behavior as risk taking. In D. Cox (Ed.), Risk taking and information handling in consumer behavior. Cambridge: Harvard University Press. Bauer, R. A. (1967). Consumer behavior as risk taking. In D. Cox (Ed.), Risk taking and information handling in consumer behavior. Cambridge: Harvard University Press.
go back to reference Bhatnagar, A., & Ghose, S. (2004). Segmenting consumers based on the benefits and risks of internet shopping. Journal of Business Research, 57(12), 1352–1360.CrossRef Bhatnagar, A., & Ghose, S. (2004). Segmenting consumers based on the benefits and risks of internet shopping. Journal of Business Research, 57(12), 1352–1360.CrossRef
go back to reference Chaudhuri, A., & Holbrook, M. B. (2001). The chain of effects from brand trust and brand affect to brand performance: the role of brand loyalty. Journal of Marketing, 65, 81–93.CrossRef Chaudhuri, A., & Holbrook, M. B. (2001). The chain of effects from brand trust and brand affect to brand performance: the role of brand loyalty. Journal of Marketing, 65, 81–93.CrossRef
go back to reference Chen, J. Q., Zhang, R., & Lee, J. (2013). A cross-culture empirical study of M-commerce privacy concerns. Journal of Internet Commerce, 12(4), 348–364.CrossRef Chen, J. Q., Zhang, R., & Lee, J. (2013). A cross-culture empirical study of M-commerce privacy concerns. Journal of Internet Commerce, 12(4), 348–364.CrossRef
go back to reference Chiu, C-M., Wang, E.T.G., Fang, Y-H., Huang H-Y. (2014). Understanding customers’ repeat purchase intentions in B2C e-commerce: the roles of utilitarian value, hedonic value and perceived risk. Information Systems Journal, 24(1), 85–114. Chiu, C-M., Wang, E.T.G., Fang, Y-H., Huang H-Y. (2014). Understanding customers’ repeat purchase intentions in B2C e-commerce: the roles of utilitarian value, hedonic value and perceived risk. Information Systems Journal, 24(1), 85–114.
go back to reference Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159.CrossRef Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159.CrossRef
go back to reference Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.CrossRef Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.CrossRef
go back to reference Cyr, D., Head, M., & Ivanov, A. (2006). Design aesthetics leading to m-loyalty in mobile commerce. Information & Management, 43(8), 950–963.CrossRef Cyr, D., Head, M., & Ivanov, A. (2006). Design aesthetics leading to m-loyalty in mobile commerce. Information & Management, 43(8), 950–963.CrossRef
go back to reference Dai, H., Wen, K.-W., Singh, R., & Iyer, L. S. (2012). An integrative framework of mobile commerce consumers’ privacy concerns and willingness to use: an empirical study. International Journal of Electronic Business, 10(1), 79–100.CrossRef Dai, H., Wen, K.-W., Singh, R., & Iyer, L. S. (2012). An integrative framework of mobile commerce consumers’ privacy concerns and willingness to use: an empirical study. International Journal of Electronic Business, 10(1), 79–100.CrossRef
go back to reference Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80.CrossRef Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80.CrossRef
go back to reference Duckham, M., & Kulik, L. (2006). Location privacy and location aware computing. In J. Drummond (Ed.), Dynamic & mobile GIS: Investigating change in space and time (pp. 34–51). Boca Raton: CRC Press. Duckham, M., & Kulik, L. (2006). Location privacy and location aware computing. In J. Drummond (Ed.), Dynamic & mobile GIS: Investigating change in space and time (pp. 34–51). Boca Raton: CRC Press.
go back to reference Fan, H., & Poole, M. S. (2006). What is personalization? Perspectives on the design and implementation of personalization in information systems. Journal of Organizational Computing and Electronic Commerce, 16(3&4), 179–202.CrossRef Fan, H., & Poole, M. S. (2006). What is personalization? Perspectives on the design and implementation of personalization in information systems. Journal of Organizational Computing and Electronic Commerce, 16(3&4), 179–202.CrossRef
go back to reference Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3), 219–229.CrossRef Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3), 219–229.CrossRef
go back to reference Flavian, C., Guinaliu, M., & Gurrea, R. (2006). The role played by perceived usability, satisfaction and consumer trust on website loyalty. Information & Management, 43(1), 1–14.CrossRef Flavian, C., Guinaliu, M., & Gurrea, R. (2006). The role played by perceived usability, satisfaction and consumer trust on website loyalty. Information & Management, 43(1), 1–14.CrossRef
go back to reference Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: algebra and statistics. Journal of Marketing Research, 18(3), 382–388.CrossRef Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: algebra and statistics. Journal of Marketing Research, 18(3), 382–388.CrossRef
go back to reference Frank, J., & Harnisch, M. J. (2014). Review on benefits and risks of personalization and solutions for privacy concerns. Computer Communication & Collaboration, 2(1), 35–46. Frank, J., & Harnisch, M. J. (2014). Review on benefits and risks of personalization and solutions for privacy concerns. Computer Communication & Collaboration, 2(1), 35–46.
go back to reference Freudiger J., Shokri R., Hubaux JP. (2012). Evaluating the privacy risk of location-based services. In: Danezis G. (eds) Financial Cryptography and Data Security. FC 2011. Lecture Notes in Computer Science, vol 7035. Springer, Berlin, Heidelberg. Freudiger J., Shokri R., Hubaux JP. (2012). Evaluating the privacy risk of location-based services. In: Danezis G. (eds) Financial Cryptography and Data Security. FC 2011. Lecture Notes in Computer Science, vol 7035. Springer, Berlin, Heidelberg.
go back to reference Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51–90. Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51–90.
go back to reference George, D., Mallery, M. (2010). SPSS for Windows Step by Step: A Simple Guide and Reference, 17.0 update (10a ed.) Boston: Pearson. George, D., Mallery, M. (2010). SPSS for Windows Step by Step: A Simple Guide and Reference, 17.0 update (10a ed.) Boston: Pearson.
go back to reference Georgiadis, C. K., & Manitsaris, A. (2005). Personalized recommendations in mobile commerce. In 7th Hellenic European Conference on Computer Mathematics & its Applications, HERCMA, Athens, Greece, September 2005. Georgiadis, C. K., & Manitsaris, A. (2005). Personalized recommendations in mobile commerce. In 7th Hellenic European Conference on Computer Mathematics & its Applications, HERCMA, Athens, Greece, September 2005.
go back to reference Ha, H.-Y. (2002). The effects of consumer risk perception on pre-purchase information in online auctions: brand, word-of-mouth, and customized information. Journal of Computer-Mediated Communication, 8(1), 1–23. Ha, H.-Y. (2002). The effects of consumer risk perception on pre-purchase information in online auctions: brand, word-of-mouth, and customized information. Journal of Computer-Mediated Communication, 8(1), 1–23.
go back to reference Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2006). Multivariate Data Analysis. Upper Saddle River: Prentice Hall. Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2006). Multivariate Data Analysis. Upper Saddle River: Prentice Hall.
go back to reference Hanson, W. (2000). Principles of internet marketing. Cincinnati: South-Western. Hanson, W. (2000). Principles of internet marketing. Cincinnati: South-Western.
go back to reference Harridge, S. (2006). Can the building of trust overcome consumer perceived risk online? Marketing Intelligence & Planning, 24(7), 746–761.CrossRef Harridge, S. (2006). Can the building of trust overcome consumer perceived risk online? Marketing Intelligence & Planning, 24(7), 746–761.CrossRef
go back to reference Heskett, J. L., Sasser Jr., W. E., & Schlesinger, L. A. (1997). The service profit chain. How leading companies link profit and growth to loyalty, satisfaction, and value. New York: The Free Press. Heskett, J. L., Sasser Jr., W. E., & Schlesinger, L. A. (1997). The service profit chain. How leading companies link profit and growth to loyalty, satisfaction, and value. New York: The Free Press.
go back to reference Hirsh, H., Basu, C., & Davison, B. (2000). Learning to personalize. Comm. of the ACM, 43(8), 102–106.CrossRef Hirsh, H., Basu, C., & Davison, B. (2000). Learning to personalize. Comm. of the ACM, 43(8), 102–106.CrossRef
go back to reference Hong, I. B., & Cho, H. (2011). The impact of customer trust on attitudinal loyalty and purchase intentions in B2C e-marketplace: intermediary trust vs. seller trust. International Journal of Information Management, 32(5), 469–479.CrossRef Hong, I. B., & Cho, H. (2011). The impact of customer trust on attitudinal loyalty and purchase intentions in B2C e-marketplace: intermediary trust vs. seller trust. International Journal of Information Management, 32(5), 469–479.CrossRef
go back to reference Hong, S. J., Thong, J., & Tam, K. Y. (2006). Understanding continued information technology usage behavior: a comparison of three models in the context of mobile internet. Decision Support Systems, 42, 1819–1834.CrossRef Hong, S. J., Thong, J., & Tam, K. Y. (2006). Understanding continued information technology usage behavior: a comparison of three models in the context of mobile internet. Decision Support Systems, 42, 1819–1834.CrossRef
go back to reference Hsieh, J., Rai, A., & Keil, M. (2008). Understanding digital inequality: comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. MIS Quarterly, 32(1), 97–126. Hsieh, J., Rai, A., & Keil, M. (2008). Understanding digital inequality: comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. MIS Quarterly, 32(1), 97–126.
go back to reference Im, I., Kim, Y., & Han, H.-J. (2008). The effects of perceived risk and technology type on users’ acceptance of technologies. Information and Management, 45(1), 1–9.CrossRef Im, I., Kim, Y., & Han, H.-J. (2008). The effects of perceived risk and technology type on users’ acceptance of technologies. Information and Management, 45(1), 1–9.CrossRef
go back to reference Ip, C., Leung, R., & Law, R. (2011). Progress and development of information and communication technologies in hospitality. International Journal of Contemporary Hospitality Management, 23(4), 533–551.CrossRef Ip, C., Leung, R., & Law, R. (2011). Progress and development of information and communication technologies in hospitality. International Journal of Contemporary Hospitality Management, 23(4), 533–551.CrossRef
go back to reference Jackson, T. W. (2007). Personalization and CRM. Journal of Database Marketing and Customer Strategy Management, 15(1), 24–36.CrossRef Jackson, T. W. (2007). Personalization and CRM. Journal of Database Marketing and Customer Strategy Management, 15(1), 24–36.CrossRef
go back to reference Kandampully, J., & Suhartanto, D. (2003). The role of customer satisfaction and image in gaining customer loyalty in the hotel industry. Journal of Hospitality and Leisure Marketing, 10(1/2), 3–25.CrossRef Kandampully, J., & Suhartanto, D. (2003). The role of customer satisfaction and image in gaining customer loyalty in the hotel industry. Journal of Hospitality and Leisure Marketing, 10(1/2), 3–25.CrossRef
go back to reference Kandampully, J., Zhang, T., & Bilgihan, A. (2015). Customer loyalty: a review and future directions with a special focus on the hospitality industry. International Journal of Contemporary Hospitality Management, 27(3), 379–414.CrossRef Kandampully, J., Zhang, T., & Bilgihan, A. (2015). Customer loyalty: a review and future directions with a special focus on the hospitality industry. International Journal of Contemporary Hospitality Management, 27(3), 379–414.CrossRef
go back to reference Keller, K. (1993). Conceptualizing, measuring, and managing customer based equity. Journal of Marketing, 57(1), 1–22.CrossRef Keller, K. (1993). Conceptualizing, measuring, and managing customer based equity. Journal of Marketing, 57(1), 1–22.CrossRef
go back to reference Kim, J. (2016). An extended technology acceptance model in behavioral intention toward hotel tablet apps with moderating effects of gender and age. International Journal of Contemporary Hospitality Management, 28(8), 1535–1553.CrossRef Kim, J. (2016). An extended technology acceptance model in behavioral intention toward hotel tablet apps with moderating effects of gender and age. International Journal of Contemporary Hospitality Management, 28(8), 1535–1553.CrossRef
go back to reference Kim, M., & Qu, H. (2014). Travelers' behavioral intention toward hotel self-service kiosks usage. International Journal of Contemporary Hospitality Management, 26(2), 225–245.CrossRef Kim, M., & Qu, H. (2014). Travelers' behavioral intention toward hotel self-service kiosks usage. International Journal of Contemporary Hospitality Management, 26(2), 225–245.CrossRef
go back to reference Kim, D. J., Ferrin, D. L., & Rao, R. H. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.CrossRef Kim, D. J., Ferrin, D. L., & Rao, R. H. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.CrossRef
go back to reference Kim, M.-J., Chung, N., & Lee, C.-K. (2011). The effect of perceived trust on electronic commerce: shopping online for tourism products and services in South Korea. Tourism Management, 32(2), 256–265.CrossRef Kim, M.-J., Chung, N., & Lee, C.-K. (2011). The effect of perceived trust on electronic commerce: shopping online for tourism products and services in South Korea. Tourism Management, 32(2), 256–265.CrossRef
go back to reference Komiak, S. Y. X., & Benbasat, I. (2006). The effect of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941–960. Komiak, S. Y. X., & Benbasat, I. (2006). The effect of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941–960.
go back to reference Kramer, J., Noronha, S., & Vergo, J. (2000). A user-centered design approach to personalization. Communications of the ACM, 43(8), 45–48.CrossRef Kramer, J., Noronha, S., & Vergo, J. (2000). A user-centered design approach to personalization. Communications of the ACM, 43(8), 45–48.CrossRef
go back to reference Krishnamurthy, S. (2001). A comprehensive analysis of permission marketing. Journal of Computer-Mediated Communication, 6(2), 23–32. Krishnamurthy, S. (2001). A comprehensive analysis of permission marketing. Journal of Computer-Mediated Communication, 6(2), 23–32.
go back to reference Law, R., Buhalis, D., & Cobanoglu, C. (2014). Progress on information and communication technologies in hospitality and tourism. International Journal of Contemporary Hospitality Management, 26(5), 727–750.CrossRef Law, R., Buhalis, D., & Cobanoglu, C. (2014). Progress on information and communication technologies in hospitality and tourism. International Journal of Contemporary Hospitality Management, 26(5), 727–750.CrossRef
go back to reference Levi, J. (2013). Why is WiFi so much worse on smartphones than on laptops and computers? Retrieved from: http://pocketnow.com/2013/06/28/smartphone-wifi-performance (04.15.2016). Levi, J. (2013). Why is WiFi so much worse on smartphones than on laptops and computers? Retrieved from: http://​pocketnow.​com/​2013/​06/​28/​smartphone-wifi-performance (04.15.2016).
go back to reference Li, Y.-M., & Yeh, Y.-S. (2010). Increasing trust in mobile commerce through design aesthetics. Computers in Human Behavior, 26(4), 673–684.CrossRef Li, Y.-M., & Yeh, Y.-S. (2010). Increasing trust in mobile commerce through design aesthetics. Computers in Human Behavior, 26(4), 673–684.CrossRef
go back to reference Lin, H.-H., & Wang, Y.-S. (2006). An examination of the determinants of customer loyalty in mobile commerce contexts. Information and Management, 43(3), 271–282.CrossRef Lin, H.-H., & Wang, Y.-S. (2006). An examination of the determinants of customer loyalty in mobile commerce contexts. Information and Management, 43(3), 271–282.CrossRef
go back to reference Malhotra, N., Kim, S. K., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.CrossRef Malhotra, N., Kim, S. K., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.CrossRef
go back to reference Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Acad Management Rev, 20(3), 709–734. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Acad Management Rev, 20(3), 709–734.
go back to reference McCole, P., Ramsey, E., & Williams, J. (2010). Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. Journal of Business Research, 63(9–10), 1018–1024.CrossRef McCole, P., Ramsey, E., & Williams, J. (2010). Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. Journal of Business Research, 63(9–10), 1018–1024.CrossRef
go back to reference McKnight, D., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Acad Management Rev, 23(3), 473–490. McKnight, D., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Acad Management Rev, 23(3), 473–490.
go back to reference McKnight, H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for E-commerce: an integrative typology. Information Systems Research, 13(3), 334–359.CrossRef McKnight, H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for E-commerce: an integrative typology. Information Systems Research, 13(3), 334–359.CrossRef
go back to reference Miller, L. E., & Smith, K. L. (1983). Handling nonresponse issues. Journal of Extension, 21, 45–50. Miller, L. E., & Smith, K. L. (1983). Handling nonresponse issues. Journal of Extension, 21, 45–50.
go back to reference Nunnally, J. C. (1970). Introduction to psychological measurement. New York: McGraw-Hill. Nunnally, J. C. (1970). Introduction to psychological measurement. New York: McGraw-Hill.
go back to reference Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63–77.CrossRef Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63–77.CrossRef
go back to reference Ozturk, A. B. (2016). Customer acceptance of cashless payment systems in the hospitality industry. International Journal of Contemporary Hospitality Management, 28(4), 801–817.CrossRef Ozturk, A. B. (2016). Customer acceptance of cashless payment systems in the hospitality industry. International Journal of Contemporary Hospitality Management, 28(4), 801–817.CrossRef
go back to reference Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134. Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.
go back to reference Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRef Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRef
go back to reference Preacher, K.J., Hayes, A.F. (2008). Asymptotic and resampling strategies for assessing and comparing indsirect effects in multiple mediator models. Behavior Research Methods, 40, 879–891. Preacher, K.J., Hayes, A.F. (2008). Asymptotic and resampling strategies for assessing and comparing indsirect effects in multiple mediator models. Behavior Research Methods, 40, 879–891.
go back to reference Reichheld, F. F., & Schetter, P. (2000). E-loyalty: your secret weapon on the web. Harvard Business Review, 78(4), 105–113. Reichheld, F. F., & Schetter, P. (2000). E-loyalty: your secret weapon on the web. Harvard Business Review, 78(4), 105–113.
go back to reference Riecken, D. (2000). Personalized views of personalization. Communications of the ACM, 43(8), 26–28.CrossRef Riecken, D. (2000). Personalized views of personalization. Communications of the ACM, 43(8), 26–28.CrossRef
go back to reference Sheng, H., Nah, F., & Siau, K. (2008). An experimental study on U-commerce adoption: the impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9(6), 344–376. Sheng, H., Nah, F., & Siau, K. (2008). An experimental study on U-commerce adoption: the impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9(6), 344–376.
go back to reference Smith, J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–197.CrossRef Smith, J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–197.CrossRef
go back to reference Stoecklin-Serino, C., & Paradice, D. (2009). An examination of the impacts of brand equity, security, and personalization on trust processes in an e commerce environment. Journal of Organizational and End User Computing, 21(1), 1–36.CrossRef Stoecklin-Serino, C., & Paradice, D. (2009). An examination of the impacts of brand equity, security, and personalization on trust processes in an e commerce environment. Journal of Organizational and End User Computing, 21(1), 1–36.CrossRef
go back to reference Thongpapanl, N., & Ashraf, A. R. (2011). Enhancing online performance through website content and personalization. Journal of Computer Information Systems, 52(1), 3–13. Thongpapanl, N., & Ashraf, A. R. (2011). Enhancing online performance through website content and personalization. Journal of Computer Information Systems, 52(1), 3–13.
go back to reference Vesanen, J., & Raulas, M. (2006). Building bridges for personalization – a process model for marketing. Journal of Interactive Marketing, 20(1), 1–16.CrossRef Vesanen, J., & Raulas, M. (2006). Building bridges for personalization – a process model for marketing. Journal of Interactive Marketing, 20(1), 1–16.CrossRef
go back to reference Wang, H. Y., & Wang, S. H. (2010). Predicting mobile hotel reservation adoption: insight from a perceived value standpoint. International Journal of Hospitality Management, 29(4), 598–608.CrossRef Wang, H. Y., & Wang, S. H. (2010). Predicting mobile hotel reservation adoption: insight from a perceived value standpoint. International Journal of Hospitality Management, 29(4), 598–608.CrossRef
go back to reference Wu, J.-H., & Wang, S.-C. (2005). What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information and Management, 42(5), 719–729.CrossRef Wu, J.-H., & Wang, S.-C. (2005). What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information and Management, 42(5), 719–729.CrossRef
go back to reference Wu, K. W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889–897.CrossRef Wu, K. W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889–897.CrossRef
go back to reference Xu, H., & Gupta, S. (2009). The effects of privacy concern and personal innovativeness on potential and experienced customers' adoption of location-based services. Electronic Markets--The International Journal on Networked Business, 19(2), 137–140.CrossRef Xu, H., & Gupta, S. (2009). The effects of privacy concern and personal innovativeness on potential and experienced customers' adoption of location-based services. Electronic Markets--The International Journal on Networked Business, 19(2), 137–140.CrossRef
go back to reference Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42–52.CrossRef Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42–52.CrossRef
go back to reference Yang, F. X., & Lau, M. C. V. (2015). “LuXurY” hotel loyalty – a comparison of Chinese gen X and Y tourists to Macau. International Journal of Contemporary Hospitality Management, 27(7), 1685–1706.CrossRef Yang, F. X., & Lau, M. C. V. (2015). “LuXurY” hotel loyalty – a comparison of Chinese gen X and Y tourists to Macau. International Journal of Contemporary Hospitality Management, 27(7), 1685–1706.CrossRef
go back to reference Yun, H., Han, D. F., & Lee, C. C. (2013). Understanding the use of location-based service applications: do privacy concerns matter? Journal of Electronic Commerce, 14(3), 215–230. Yun, H., Han, D. F., & Lee, C. C. (2013). Understanding the use of location-based service applications: do privacy concerns matter? Journal of Electronic Commerce, 14(3), 215–230.
go back to reference Zhang, R., Chen, J., & Lee, C. J. (2013). Mobile commerce and consumer privacy concerns. Journal of Computer Information Systems, 53(4), 31–38.CrossRef Zhang, R., Chen, J., & Lee, C. J. (2013). Mobile commerce and consumer privacy concerns. Journal of Computer Information Systems, 53(4), 31–38.CrossRef
go back to reference Zhou, T. (2011). The impact of privacy concern on user adoption on location based services. Industrial Management and Data Systems, 111(2), 212–226.CrossRef Zhou, T. (2011). The impact of privacy concern on user adoption on location based services. Industrial Management and Data Systems, 111(2), 212–226.CrossRef
go back to reference Zhou, T. (2012). Examining mobile banking user adoption from the perspectives of trust and flow experience. Information Technology and Management, 13(1), 27–37.CrossRef Zhou, T. (2012). Examining mobile banking user adoption from the perspectives of trust and flow experience. Information Technology and Management, 13(1), 27–37.CrossRef
Metadata
Title
Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework
Authors
Ahmet Bulent Ozturk
Khaldoon Nusair
Fevzi Okumus
Dipendra Singh
Publication date
03-02-2017
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 4/2017
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-017-9736-4

Other articles of this Issue 4/2017

Information Systems Frontiers 4/2017 Go to the issue

Premium Partner