Abstract

Despite the many advantages of smartphone in daily life, there are significant concerns regarding their problematic use. Therefore, several smartphone usage management applications have been developed to prevent problematic smartphone use. The purpose of this study is to investigate the factors of users' behavioral intention to use smartphone usage management applications. Participants were divided into a smartphone use control group and a problematic use group to find significant intergroup path differences. The research model of this study is fundamentally based on the Technology Acceptance Model and Expectation-Confirmation Theory. Based on this theorem, models were modified to best suit the case of problematic smartphone use intervention by smartphone application. We conducted online surveys on 511 randomly selected smartphone users aged 20–60 in South Korea, in 2018. The Smartphone Addiction Proneness Scale was used to measure participants' smartphone dependency. Descriptive statistics were used for the demographic analysis and collected data were analyzed using IBM SPSS Statistics 24.0 and Amos 24.0. We found that in both non-problematic smartphone use group and problematic smartphone use group, facilitating factors and perceived security positively affect the intentions of users to use the application. One distinct difference between the groups was that the latter attributed a lower importance to perceived security than the former. Some of our highlighted unique points are envisioned to provide intensive insights for broadening knowledge about technology acceptance in the field of e-Addictology.

Highlights

  • Smartphones have become crucial in everyday life worldwide, affecting all business, research, and social sectors [1, 2]

  • We proposed the use of the Smartphone Overdependence Management System (SOMS), the Abbreviations: IoT, Internet of Things; IoMT, Internet of Medical Things; App, Application; SOMS, Smartphone Overdependence Management System; TAM, Technology Acceptance Model; ExpectationConfirmation Theory (ECT), Expectation-Confirmation Theory; Facilitating conditions (FC), Facilitating Conditions; EE, Effort Expectancy; Performance expectancy (PE), Performance Expectancy; Behavioral intention-to-use (BIU), Behavioral Intention To Use; Perceived security (PS), Perceived Security; SR, Self Regulation; perceived usefulness (PU), Perceived Usefulness; non-problematic smartphone use (NPSU), Non-Problematic Smartphone Use; problematic smartphone use (PSU), Problematic Smartphone Use; goodness-of-fit index (GFI), Goodness-of-Fit Index; Tucker–Lewis index (TLI), Tucker–Lewis Index; comparative fit index (CFI), Comparative Fit Index; root mean square error of approximation (RMSEA), Root Mean Square Error of Approximation; critical ratio (CR), Critical Ratio

  • An important point to note is that the finding of EE→ PE directly contradicts the findings of our 2018 research [49], in which we found that perceived ease of use had a statistically significant negative effect on BIU

Read more

Summary

Introduction

Smartphones have become crucial in everyday life worldwide, affecting all business, research, and social sectors [1, 2]. The problem is that excessive smartphone use may lead to problematic smartphone use behavior. The term “problematic smartphone use” was used in a recent study of smartphone use types of psychiatric symptoms. According to a recent study by Chen et al, problematic smartphone use can be divided into two categories in the field of Internet addiction: general problematic smartphone use and specific problematic smartphone use [8,9,10]. General problematic smartphone use indicates general behavioral patterns of excessive smartphone use, which may have negative consequences to the individuals [11]. Specific problematic smartphone use indicates the use of smartphones that are problematic for certain types of smartphone activities (e.g., games, social networking service, etc.) [8,9,10,11]. Prior research suggests that problematic smartphone use is associated with depression, anxiety, obsessive-compulsive behavior, and impulsiveness [12,13,14]

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call