A study of Relationship Smartphone use behavior and User empowerment in Tour experience : Focusing on Chinese people

관광경험에서의 스마트폰 활용 행태와 사용자 임파워먼트와의 관계에 관한 연구: 중국인을 대상으로

  • 구철모 (경희대학교 컨벤션경영학과) ;
  • 유문정 (경희대학교 대학원 컨벤션전시경영학과) ;
  • 전유희 (경희대학교 대학원 컨벤션전시경영학과) ;
  • 이지민 (경희대학교 대학원 컨벤션전시경영학과) ;
  • 정남호 (경희대학교 호텔경영학과)
  • Received : 2015.06.03
  • Accepted : 2016.01.11
  • Published : 2016.03.31


Recent years, a smartphone has been playing a role of searching, booking, and decision-makings in the tourism industry through tourists' user experiences and engagements. This study investigated the tourists' behavior toward smartphone usage regarding Chinese visitors who were ranked in Korea inbound tourism. This research model formulated two types of usage which identified explorlative use and exploitive use and the antecedent relationships of user empowerment including user competence, user impact, usage meaning, user trust. We analyzed SmartPLS2.0 for the hypotheses and found that first, user competence has a positive influence both of exploitative use and explorative use, second, user impact has a positive influence on exploitative use, but has not influenced on explorative use, third, usage meaning has not influence on exploitive use, but has a postitive influence on explorative use, and finally user trust has influence on both of exploitive and explorative use. Based on the results we found, we suggested Chinese tourists' smartphone usages' behaviors and theoretical and practical implications.


Supported by : 한국연구재단


  1. 김병수 (2012), 모바일 소셜네트워크서비스 환경에서 지속 사용 의도의 선행 요인에 관한 연구: 신뢰와 프라이버시 우려의 역할, 지식경영연구, 13(4), 83-100.
  2. 김조영, 이충기, 김정만 (2013), 스마트폰 기반 관광정보 수용과 관광상품 구매의도에 관한 연구, 관광연구, 27(6), 15-38.
  3. 구철모, 김희웅, 전유희 (2011), 스마트폰의 탐색적 사용과 충분한 활용에 대한 연구, 한국전자거래학회지, 16(3), 67-91. https://doi.org/10.7838/jsebs.2011.16.3.067
  4. 산업연구원 (2014), 중국인 관광객 소비패턴 분석 및 산업연계 활용방안.
  5. 이건창, 이근영, 채성욱 (2008), 3 차원 아바타가 소비자 신뢰 및 구매의도에 미치는 영향에 관한 실증연구: 세컨드라이프를 중심으로, 지식경영연구, 9(4), 91-112.
  6. 이금실, 이형룡 (2011), 스마트폰 서비스에 대한 여행자의 지각이 태도와 사용 의도에 미치는 영향에 관한 연구, 관광학연구, 35(2), 271-292.
  7. 조휘형 (2012), 스마트폰의 지각된 품질요인이 만족 및 지속적 사용의도에 미치는 영향에 관한 연구-수정된 DeLone & McLean 의 정보시스템 성공모델 관점으로, Entrue Journal of Informatio Technology, 11(2), 167-180.
  8. 최재원, 전엘, 김경규 (2014), 연구논문: 소셜커머스 환경에서 정보중개상에 대한 구전 의도의 결정요인, 지식경영연구, 15(3), 209-228.
  9. 한국문화산업교류재단 (2015), 2014 한류백서.
  10. 한국정보화진흥원 (2015), 2014년 중국 스마트폰시장 결산 및 2015년 전망.
  11. Ahuja, M. K. and Thatcher, J. B. (2005), Moving Beyond Intentions and toward the Theory of Trying : Effects of Work Environment and Gender on Post-Adoption Information Technology Use, MIS Quarterly, 29(3), 427-459,
  12. Agarwal, R., and Karahanna, E. (2000), Time Flies When You're Having Fun: Cognitive Absorption and Beliefs about Information Technology Usage, MIS Quarterly, 24(4), 665-694. https://doi.org/10.2307/3250951
  13. Bagozzi, R. P., and Yi, Y. (1988), On the evaluation of structural equation models, Journal of the academy of marketing science, 16(1), 74-94. https://doi.org/10.1007/BF02723327
  14. Bandura, A. (1986), Social foundations of thought and action: A social cognitive theory, NJ: Prentice-Hall, Inc.
  15. Bandura, A. (1997), Self-efficacy: The exercise of control, New York: Freeman.
  16. Baroudi, J.J., Olson, M. H., and Ives, B. (1986), An Empirical Study of the Impact of User Involvement on System Usage and Information Satisfaction, Communications of the ACM , (29)3, 232-238.
  17. Brown, H. G., Poole, M. S., and Rodgers, T.L. (2004), Interpersonal traits, complementarity, and trust in virtual collaboration, Journal of Management Information Systems, 20(4), 115-138. https://doi.org/10.1080/07421222.2004.11045785
  18. Chin, W. W. (1998), The partial least squares approach to structural equation modeling, In G.A. Marcoulides(ed.), Modern methods for Business Research, Lawrence Erlbaum Associates, Mahwah, Nj, pp.295-336.
  19. Cooper, R. B., and Zmud, R. W. (1990), Information technology implementation research: a technological diffusion approach, Management science, 36(2), 123-139. https://doi.org/10.1287/mnsc.36.2.123
  20. Doll, W., and Deng, X. (2010), A technology empowerment model for engineering work, ACM SIGMIS Database, 41(4), 52-74. https://doi.org/10.1145/1899639.1899643
  21. Ericsson, N. (2015), Ericsson Mobility Report.
  22. Fornell, C. and Larcker. D. (1981), Evaluating structural equation models and unobservable variables and measurement error, Journal of Marketing Research, (18), 39-50.
  23. Gefen, D., E. Karahanna. D.W. Straub., (2003), Trust and TAM in Online Shopping: An integrated model, MIS Quarterly, 27(1), 51-90. https://doi.org/10.2307/30036519
  24. Gagne, M., and Deci, E. L. (2005), Self-Determination Theory and Work Motivation, Journal of Organizational Behavior, (26), 331-362.
  25. Goo, J., Huang, C. D., and Koo, C. (2015), Learning for healthy outcomes: Exploration and exploitation with electronic medical records, Information & Management, 52, 550-562. https://doi.org/10.1016/j.im.2015.04.002
  26. Gorsline, K. (1996), A competency profile for human resources: No more shoemaker's children, Human Resource Management, 35(1),
  27. Hair, J. F., R ingle, C. M., and Sarstedt, M. (2011), PLS-SEM: Indeed a silver bullet, Journal of Marketing Theory and Practice, 19(2), 139-152. https://doi.org/10.2753/MTP1069-6679190202
  28. Hannan, M. T., and Freeman, J. (1984), Structural inertia and organizational change, American sociological review, 149-164.
  29. He, Z. L., and Wong, P. K. (2004), Exploration vs. exploitation: An empirical test of the ambidexterity hypothesis, Organization science, 15(4), 481-494. https://doi.org/10.1287/orsc.1040.0078
  30. Hong, I. B., and Cho, H. (2011), The impact of consumer trust on attitudinal loyalty and purchase intentions in B2C e-marketplaces: Intermediary trust vs. seller trust, International Journal of Information Management, 31(5), 469-479. https://doi.org/10.1016/j.ijinfomgt.2011.02.001
  31. Hong, W., Thong, J. Y., and Wai-Man Wong, K. Y. T. (2002), Determinants of user acceptance of digital libraries: an empirical examination of individual differences and system characteristics, Journal of Management Information Systems, 18(3), 97-124. https://doi.org/10.1080/07421222.2002.11045692
  32. Hsieh, J. P. A . a nd Wa ng, W. (2007), Explaining employees' extended use of complex information systems, European Journal of Information Systems, (16), 216-227.
  33. Hunton, J. E., and Price, K. H. (1997), Effects of the user participation process and task meaningfulness on key information system outcomes, Management Science, 43(6), 797-812. https://doi.org/10.1287/mnsc.43.6.797
  34. Jackson, C. M., Chow, S., and Leitch, R. A. (1997), Toward an Understanding of the Behavioral Intention to Use an Information System, Decision Sciences, 28(2), 357-389. https://doi.org/10.1111/j.1540-5915.1997.tb01315.x
  35. Jones, E., Sundaram, S., and Chin, W. (2002), Factors Leading to Sales Force Automation Use: A Longitudinal Analysis, Journal of Personal Selling & Sales Management, (3), 145-156.
  36. Kim, D. Y., Park, O. J., and Morrison, A. M. (2008), A model of traveler acceptance of mobile technology, International Journal of Tourism Research, 10(5), 393-407. https://doi.org/10.1002/jtr.669
  37. Kim, H. W., Chan, H. C., and Lee, S. H. (2012), A User Commitment Approach to Information Systems Infusion, In PACIS, 101.
  38. Kim, H. W., and Gupta, S. (2014), A User Empowerment Approach to Information Systems Infusion, IEEE Transactions on Engineering Management, 61(4), 656-668. https://doi.org/10.1109/TEM.2014.2354693
  39. Kim, M. J., Chung, N., and Lee, C. K. (2011), The effect of perceived trust on electronic commerce: Shopping online for tourism products and ser vices in South Korea, Tourism Management, 32(2), 256-265. https://doi.org/10.1016/j.tourman.2010.01.011
  40. Kirkman, B. L., and Rosen, B. (1999), Beyond Self-Management: Antecedents and Consequences of Team Empowerment, Academy of Management Journal, 42(1), 58-74. https://doi.org/10.2307/256874
  41. Koo, C., Chung, N. and Kim, H. W. (2015), Examining explorative and exploitative uses of smartphones: a user competence perspective, Information Technology & People, 28(1).
  42. Locke, E. A., Frederick, E., Lee, C., and Bobko, P. (1984), Effect of self-efficacy, goals, and task strategies on task performance, Journal of applied psychology, 69(2), 241. https://doi.org/10.1037/0021-9010.69.2.241
  43. Luo, Y., and Ling, H. (2013), Exploration and Exploitation of Information Systems Usage and Individual Performance, Procedia Computer Science, 22, 863-872. https://doi.org/10.1016/j.procs.2013.09.169
  44. Marakas, G. M., Johnson, R. D., and Palmer, J. W. (2000), A theoretical model of differential social attributions toward computing technology: when the metaphor becomes the model, International Journal of Human-Computer Studies, 52(4), 719-750. https://doi.org/10.1006/ijhc.1999.0348
  45. Marcolin, B. L ., Compeau, D. R., Munro, M.C., and Huff, S. L. (2000), Assessing User Comp etence: Conceptualization and Measurement, Information Systems Research, 11(1), 37-60 https://doi.org/10.1287/isre.
  46. Marcolin, B., Huff, S. L., and Munro, M. C. (1992), End user sophistication: Measurement and research model, Administrative Sciences Association of Canada, 108-20.
  47. March, J. G. (1991), Exploration and exploitation in organizational learning, Organization science, 2(1), 71-87. https://doi.org/10.1287/orsc.2.1.71
  48. May, D. R., Gilson, R. L., and Harter, L. M. (2004), The Psychological Conditions of Meaningfulness, Safety and Availability and the Engagement of the Human Spirit at Work, Journal of Occupational and Organizational Psychology, (77), 11-37. https://doi.org/10.1348/096317904322915892
  49. Mayer, R. C., Davis, J. H., and Schoorman, F.D. (1995), An integrative model of organizational trust, Academy of management review, 20(3), 709-734. https://doi.org/10.5465/amr.1995.9508080335
  50. McKnight, D. H., Choudhur y, V., and Kacmar, C. (2002), Developing and validating trust measures for e-commerce: An integrative typology, Information systems research, 13(3),334-359. https://doi.org/10.1287/isre.13.3.334.81
  51. Ng, E. H., and Kim, H. W. (2009), Investigating Information systems infusion and the moderating role of habit: A user empowerment perspective, ICIS 2009 Proceedings, 137.
  52. Ratnasingam, P., and Pavlou, P. A. (2003), Technology trust in internet-based interorganizational electronic commerce, The Social and Cognitive Impacts of E-commerce on Modern Organizations, 311.
  53. Saeed, and Abdinnour-Helm, S. (2008), Examining the effects of information system characteristics and perceived usefulness on post adoption usage of information systems, Information and Management, 376-386.
  54. Seibert, S. E., Wang, G., and Courtright, S. H. (2011), Antecedents and consequences of psychological and team empowerment in organizations: a meta-analytic review, Journal of Applied Psychology, 96(5), 981. https://doi.org/10.1037/a0022676
  55. Soikkeli, T., Karikoski, J., and Hammainen, H. (2011), Diversity and end user context in smartphone usage sessions. In Next generation mobile applications, services and technologies (NGMAST), IEEE 2011 5th international conference on, 7-12.
  56. Song, J. (2007), Trust in health infomediaries, Decision Support Systems, 43(2), 390-407. https://doi.org/10.1016/j.dss.2006.11.011
  57. Spreit zer, G. M. (1995), Psychological Empowerment in the Workplace: Dimensions, Measurement, and Validation, Academy of Management Journal, 38(5), 1442-1465. https://doi.org/10.2307/256865
  58. Thatcher, J. B., McKnight, D. H., Baker, E. W., Arsal, R. E., and Roberts, N. H. (2011), The role of trust in postadoption it exploration: An empirical examination of knowledge management systems, IEEE Transactions on Engineering Management, 58(1), 56-70. https://doi.org/10.1109/TEM.2009.2028320
  59. Thomas, K. W., and Velthouse, B. A. (1990), Cognitive Elements of Empowerment: An "Interpretive" Model of Intrinsic Task Motivation, Academy of Ma nagement Review, 15(4), 666-681.
  60. Vroom, V. H. (1982), Work and motivation. New york: Robert E. Krieger Publishing Company.
  61. Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003), User acceptance of information technology: Toward a unified view, MIS quarterly, 425-478.
  62. Wang, W., and Benbasat, I. (2005), Integrating TAM with trust to explain online recommendation agent adoption, Journal of Association for Information Systems, 6(3), 72-101. https://doi.org/10.17705/1jais.00065
  63. Wang, D., Park, S., and Fesenmaier, D. R. (2012), The role of smartphones in mediating the touristic experience, Journal of Travel Research, 51(4), 371-387. https://doi.org/10.1177/0047287511426341
  64. Wixom., B. and Todd, P. (2005), A theoretical integration of user satisfaction and technology acceptance, Information systems research, 16(1), 85-102. https://doi.org/10.1287/isre.1050.0042
  65. Zhang, X., and Bartol, K. M. (2010), Linking empower ing leadership a nd employee creativity: The inf luence of psychological empowerment, intrinsic motivation, and creative process engagement, Academy of Management Journal, 53(1), 107-128. https://doi.org/10.5465/amj.2010.48037118