<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Investigating the Effects of Implicit and Explicit Personalization on Perceived Credibility</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Felix Nti Koranteng</string-name>
          <email>f.n.k.m.koranteng@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Isaac Wiafe</string-name>
          <email>iwiafe@ug.edu.gh</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jaap Ham</string-name>
          <email>j.r.c.ham@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Uwe Matzat</string-name>
          <email>u.matzat@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eindhoven University of Technology</institution>
          ,
          <addr-line>Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Ghana</institution>
          ,
          <addr-line>Legon, Accra</addr-line>
          ,
          <country country="GH">Ghana</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Personalizing computer systems (such as Academic Social Networking Sites) can improve positive user perceptions, particularly credibility perceptions of that system. Earlier research has identified two broad personalization approaches: Implicit and Explicit personalization. Moreover, applying the wrong personalization approach may negatively affect users' perceptions of the system's credibility. Yet, the evidence that earlier research provides for the relevance and importance of the different personalization approaches on perceived credibility in system design is limited. This study explores which of the two personalization approaches is most important and could be prioritized when designing systems to improve credibility perceptions. Academic Social Networking Sites (ASNSs) users' perceptions of implicit and explicit personalization and system credibility are gathered via survey and analyzed using Partial Least Square Structural Equation Modeling. We find that whereas Implicit personalization has a positive influence, Explicit personalization negatively influences users' credibility perceptions. Furthermore, the Importance Performance Map Analysis (IPMA) reveals implicit personalization as the better-performing and more important approach for promoting credibility perceptions on ASNSs. Based on the results, this study recommends further investigations into how personalizing the personalization approaches for different users may affect their credibility perceptions.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;personalization</kwd>
        <kwd>persuasive systems</kwd>
        <kwd>credibility 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The desire to tailor tools, equipment, and products to meet individual needs is a longstanding
concept. Throughout history, artisans, craftsmen, and businesses have crafted custom-made
items (such as clothing and furniture) specifically designed to enhance personal experiences
and better suit individual preferences. In today’s digital landscape, personalization continues to
play a crucial role in shaping user experiences. Many e-commerce platforms in the United
Kingdom and the United States have increasingly incorporated personalization techniques to
enhance user satisfaction and foster loyalty [1, 2]. Similarly, many online social networks
employ artificial intelligence techniques to tailor content based on various factors, such as
location, time of day, and recent interactions, to ensure that the content remains relevant to
users [3]. Thus, personalization techniques have been pervasively adopted to enhance user
experience in many digital environments. Consequently, research attention on the concept of
personalization has increased.</p>
      <p>The concept of personalization has been viewed differently by different fields. In
management science and marketing, personalization is defined as delivering targeted solutions
to a customer based on the customer’s personal information [4]. In the field of estate
management, personalization is the modification of one’s environment to reflect the occupant’s
identity or imprint [5]. From a computer science perspective, personalization is mainly
concerned with the application of rules to design varying sets of features and interfaces [6]. In
this current study, personalization is defined as changing the functionality and behavior of an
information system to increase its relevance to an individual or a category of individuals. This
definition is based on how earlier studies (e.g., [7, 8]) have defined personalization in the field
of Human-Computer Interaction (HCI). Relevant HCI literature [9, 10] demonstrates two main
personalization approaches (i.e., Implicit, and Explicit). With the Implicit Personalization
approach, the system automatically adjusts itself (i.e., behavior and interaction), in a way that
is intended to support the user’s needs. On the other hand, Explicit Personalization requires
users to utilize configuration mechanisms provided by the system to specify how they want the
system to behave [10]. Implicit and Explicit Personalization is synonymous with adaptive –
adaptable [11], dynamic – static [12], or weak - strong personalization [13] as used in some
studies. Regardless of the terms used, Implicit Personalization is system-controlled, whereas
Explicit Personalization is user-controlled [9].</p>
      <p>Existing literature posits that personalizing computer systems is an effective means of
accommodating the differences between user needs and requirements [14]. When computer
systems are personalized, users perceive them to be tailored fit for them, which positively affects
their attitude towards the system [15]. Papakostas et al., [16] also showed that personalization
can enhance users' perception of the system’s usability and effectiveness. Personalization can
therefore be harnessed as a tool to project positive user perceptions such as credibility.
However, research into how personalization affects different user perceptions is still infant.
Existing studies (e.g., [17]) have primarily focused on user preferences between Implicit and
Explicit Personalization. There is limited research on how the personalization approaches affect
specific user perceptions, particularly credibility. Such an understanding is important because
credibility is a key factor that influences users’ trust and engagement with computer systems
[18]. If users perceive a system as credible, they are more likely to trust its recommendations,
rely on its functionality, and remain engaged over time [19]. Moreover, the design principles
implemented in a computer system can trigger unintended negative outcomes [20]. It is
therefore important for designers who prioritize credibility to understand which approach can
achieve the intended objective. This current study thus examines users’ perceptions of Implicit
and Explicit Personalization approaches implemented on Academic Social Networking Sites
(ASNSs), and how these approaches influence users’ credibility perceptions. This study further
examines the importance and performance of Explicit Personalization and Implicit
Personalization on users’ Perceived Credibility of ASNSs using the Importance Performance
Map Analysis (IPMA).</p>
      <p>The findings from this study will offer valuable insights for designers and developers seeking
to optimize user experience and enhance users’ credibility perceptions of their systems. As
personalization techniques become more prevalent, it is essential to understand their effects to
avoid potential pitfalls, such as decreased trust or user dissatisfaction. Furthermore, employing
the Importance Performance Map Analysis (IPMA) to evaluate the significance and
effectiveness of these personalization approaches provides a rigorous methodological
framework for assessing their impact. Thus, the study will contribute to both theoretical
knowledge and practical guidelines, helping developers create more effective computer systems
that better meet users’ needs and preferences. The next section presents related works. This is
followed by the research method, analysis, and discussion of findings.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review</title>
      <sec id="sec-2-1">
        <title>2.1. Related Works</title>
        <p>The design principles and strategies implemented in a computer system (e.g., ASNS) can affect
users’ attitudes and behavior toward the system [21]. In line with this, existing studies indicate
that implementing design strategies that project system credibility can positively influence user
perceptions and intentions [22, 23]. This implies that an understanding of how credibility
principles can be implemented in system design is essential for influencing system use and,
hence, the need to be examined. Credibility is believability [24]. In another definition, credibility
is the extent to which a computer system is worthy of trust and perceived to have expertise
[21]. A user’s credibility perception is informed by his/her evaluation of the characteristics of a
computer system (e.g., ASNSs) [23]. Personalization (which is a system characteristic) can
therefore influence users’ credibility perceptions. It is thus important to understand how
personalization influences users’ credibility perceptions. This is because lower ratings of system
credibility result in negative user attitudes toward the system and discourage system use [25].
On the other hand, when users perceive a system to be credible, the system is perceived to be
more effective [26], and more likely to be used continuously [27].</p>
        <p>Yet, there is a lack of clear understanding as to how personalization can be implemented in
system design to promote credibility perceptions. Evidence as to which of the two
personalization approaches is more effective is lacking. Rather, existing studies have compared
user preferences for personalization approaches. For example, Parra and Brusilovsky [17]
explored how user-controllable personalization influences user perceptions of a recommender
system. The study concluded that when users are allowed to control personalization, it improves
their overall experience, and they are more likely to accept the recommendations provided by
a recommender system. Also, Findlater and McGrenere [11], compared the efficiency and user
preferences for adaptive (i.e., Implicit) and adaptable (i.e., Explicit) user interface menus. The
results from the study indicated that adaptable menus are mostly preferred and more efficient
compared to adaptive menus. In a different study, Orji et al., [9] compared the effectiveness of
and user preference for system-controlled (i.e., Implicit) and user-controlled (i.e., Explicit)
personalization approaches implemented in a persuasive health game. The study concluded that
the implicit personalization approach received high preference as it reduced system complexity.</p>
        <p>The results from earlier studies show inconsistent and varying preferences for the
personalization approaches. Admittedly, the inconsistent result may have been caused, for
instance, by the differences in the domains these studies were conducted. This further implies
that the implementation of personalization approaches may have different effects under
different conditions. Further, these results do not provide adequate direction for what designers
should consider when choosing a suitable personalization technique for their systems. Hence,
these existing studies cannot form the basis for informed decision-making on which
personalization approach should be prioritized to improve credibility. Unlike the
abovementioned existing studies, this current study attempts to address the existing limitations by
providing adequate information on the specific effectiveness of the personalization approaches
on users’ credibility perceptions. Likewise, this current study employs the IPMA to understand
the relative performance and importance of the two personalization approaches on the
Perceived Credibility of ASNSs using the Importance Performance Map Analysis (IPMA). Thus,
with the IPMA this study provides an additional layer of methodological rigor that helps to
establish how each of the personalization approaches perform and where improvements are
needed.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Importance Performance Map Analysis</title>
        <p>The IPMA (see Figure 1) (also referred to as priority map analysis) is an analytical technique
that augments faster, strategic, and quality decision-making [28]. IPMA highlights the main
factors that are critical for desired results. IPMA is represented using a four-quadrant square
matrix with performance represented on the x-axis and importance on the y-axis. Quadrant 1
signifies high performance and importance, Quadrant 2 shows low performance and high
importance, Quadrant 3 indicates low attributes in both performance and importance and
Quadrant 4 represents high performance but low importance. In decision-making, concepts that
are represented in Quadrant 1 are regarded as the most impactful on the observed phenomenon
[29]. That is, the IPMA helps to identify from a variety of concepts, the ones that should be
prioritized to improve a certain target concept. The IPMA is important for practical studies (as
in the case of this study) that identify the different impacts that certain dimensions of a concept
have on an observed phenomenon. IPMA has proven to be useful in fields including information
security [30], tourism [31], banking [32], and hospitality [33]. Therefore, in this study, the IPMA
is applied to compare which of Implicit and Explicit personalization is most influential in terms
of importance and performance on users’ credibility perceptions in ASNSs.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Academic Social Networking Site</title>
        <p>ASNSs are online spaces specially designed for academic and professional collaborations and
networking [34, 35]. Popular ASNSs include ResearchGate, Google Scholar, and Academia.edu.
ASNSs allow users to create and share content, ideas, and with other users. They assist
academics to find jobs, access publications, and support each other through knowledge sharing
and social interactions.</p>
        <p>With the increasing relevance of ASNSs in the research community, some institutions have
started to include ASNSs' contributions as a measurement metric for research impact, and in
some cases for promotions and tenure review processes [36]. Therefore, using ASNSs to boost
one’s research impact has become necessary. Some ASNSs implement personalization to
optimize and increase system effectiveness. For example, Academia.edu is designed to
automatically adapt the content shown on a user’s newsfeed to reflect their previous searches
and reading patterns. ResearchGate also allows users to specify categories of content they prefer
on their newsfeed. It is important that designers of ASNSs understand the implications of their
design approach. Most of all, it is essential that they prioritize the right personalization
approach in their design to project positive user perceptions of the system. This study makes
two main contributions: (i) we show which personalization approach should be prioritized
when targeting improved user credibility perceptions (ii) we are the first to extend the
application of IPMA into the ASNSs domain. This next section discusses the research methods.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Method</title>
      <sec id="sec-3-1">
        <title>3.1. Materials</title>
        <p>A survey research design approach was used in this study. Participants’ views and opinions on
concepts: (i) implicit personalization, (ii) explicit personalization, and (iii) perceived credibility
of ASNSs were gathered using a questionnaire. Each concept had at least three (3) questions
ranked on a seven-point Likert scale ranging “Strongly Disagree (1) to “Strongly Agree (7)”. The
questions were adapted from prior studies [10, 37, 38] to suit the context of this study.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Procedure</title>
        <p>The participants for the study were selected using convenience and snowball sampling. An
invitation was sent to potential participants through an email list from the University of Ghana
and other professional bodies (e.g., BCS-HCI). The invitation explained that the study was
purely academic, and participants’ responses would be anonymous. Interested participants were
asked to click on a link that directed them to the questionnaire. In the questionnaire,
participants were asked to provide their demographic information such as age range, gender,
educational background, whether they use ASNSs, which ASNSs they use, and how frequently
they use them. Next, they were tasked to provide their views and opinions on the extent to
which they disagreed or agreed with certain question items. After these questions were
answered, they were asked to submit their responses and were thanked. No rewards were given
for participation.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Participants</title>
        <p>Participation in this study was purely voluntary. Although a total of 140 responses were
received, 133 responses were used for the analysis. Responses from 7 participants were removed
because they indicated they had not used ASNSs in the past year. The majority (51%) of the
responses used ASNSs (including ResearchGate, Academia.edu, LinkedIn, etc.) at least once a
week. More than half (121 of 133) of the participants use ASNSs for Research purposes. The age
distribution showed that majority (67%) of the respondents were below 35 years, 31% were
between 35 to 55 years, and the remainder were above 55 years.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Analysis</title>
      <p>The Partial Least Square Structural Equation Modelling (PLS-SEM) technique was used to
evaluate the hypothesized model. PLS-SEM is appropriate for this study because of its
robustness to multivariate errors and efficacy in evaluating predictive models [32]. This
approach will enable the study to estimate the relationship between the understudied concepts
and offer design implications. The next section discusses the measurement and structural model
evaluations.</p>
      <sec id="sec-4-1">
        <title>4.1. Measurement Model</title>
        <p>The measurement model in PLS-SEM analysis is used to assess the validity and reliability of the
items used to measure the model. The techniques used to assess the measurement model were
item reliability, internal consistency, convergent validity, discriminant validity, and
collinearity. A minimum threshold of 0.7 was used to assess item reliability, and internal
consistency (measured with Cronbach’s Alpha, Rho_A, and composite reliability). The
convergent validity was assessed with Average Variance Extracted (AVE) using a minimum
threshold of 0.5. The possibility of collinearity was evaluated using a Variance Inflation Factor
(VIF) maximum threshold of 3. Table 1 shows the summary item reliability, internal consistency,
convergent validity, discriminant validity, and collinearity of model constructs. Finally,
discriminant validity was assessed with Heterotrait-Monotrait Ratio (HTMT) using a maximum
threshold of 3. All thresholds were in line with Hair and Sarstedt’s [39] recommendations.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Structural Model</title>
        <p>The significance of the proposed relationships is evaluated in this section. The Bootstrap (5000
re-samples) technique was used to examine the relationships. Using a one-tailed t-test, a p-value
less than 0.05 was considered a significant relationship. The results of the structural model
analysis are shown in Figure 2. Along with the p-value, Cohen’s [40] effect size (f) criteria were
used to determine whether the effects of the independent variables were strong (≥ .35), medium
(≥ .15), weak (≥ .02), or irrelevant (&lt;.02). The summary of the relationships is illustrated in Table
3.</p>
        <p>The results show that Explicit and Implicit Personalization collectively explained 41.6%
(R2=0.416) of the variance of Perceived Credibility. This means that Explicit and Implicit
Personalization contributes close to half of users’ credibility perceptions. Moreover, we found
that both Implicit and Explicit Personalization are significant determinants of Perceived
Credibility. However, whereas Implicit Personalization had a significant and strong positive
effect on Perceived Credibility (β = 0.689; p &lt; 0.00; f2 = 0.683), the effect of Explicit
Personalization on Perceived Credibility was reversed. Specifically, Implicit Personalization had
a significant but weak negative effect on Perceived Credibility (β = -0.146; p &lt; 0.019; f2 = 0.031).
This means that whereas implementing Implicit Personalization in a system promotes positive
credibility perceptions, Explicit Personalization will reduce users’ credibility perceptions (see
Table 3).</p>
        <p>The Important Performance Map Analysis (IPMA) from SmartPLS 3.0 was also implemented
to analyze which of the two approaches respondents perceived to be most important in
influencing credibility perceptions. The results from Table 4 and Figure 3 illustrate that Implicit
Personalization has both the highest importance (0.689) and performance (66.319) scores. This
means that when Implicit Personalization on ASNSs is increased by 1 unit point, users’
credibility perceptions would also increase by 0.689. This further suggests that implicit
personalization as implemented on ASNSs (such as ResearchGate) is acceptable to users. On the
other hand, although Explicit Personalization is relatively important, its performance in
influencing credibility perceptions is low. That is, an increase in Explicit Personalization by a
unit point decreases credibility perceptions by 0.146. From these results, there is a need for
system designers to improve on the explicit personalization techniques of ASNSs and how they
are presented to users.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>Personalization as a system design concept has attracted increasing attention from both
academia and industry due to the growing realization of its importance in increasing overall
system acceptance and user experience [41]. This argument holds from extant studies that show
that personalized systems improve system usability and usefulness [16], [17] and promote
positive user attitudes and perceptions [26, 27, 37]. Nevertheless, evidence of which
personalization approach is most important and effective for promoting specific user
perceptions (i.e., credibility) is missing in the existing literature. This study evaluated which of
Implicit and Explicit personalization approaches is most important for promoting users’
credibility perceptions using the Importance Performance Map Analysis (IPMA) technique in
Partial Least Square Structural Equation Modelling (PLS-SEM). This study is perhaps the first
to compare the two personalization approaches in the ASNSs and using the IPMA.</p>
      <p>The study found that whereas Implicit Personalization positively influenced Perceived
Credibility, Explicit Personalization had a negative effect on Perceived Credibility. Specifically,
users perceived ASNSs which automatically adapt its features to fit their needs to be credible.
On the other hand, when users are offered the chance to change ASNS features such that they
fit them, they perceive ASNSs as less credible. This could be due to users’ expectations of the
system. Indeed, with the recent proliferation of technological innovation such as Artificial
Intelligence (AI), users’ engagement with some technologies has been seamless and requires
less effort. Perhaps, ASNS users expect these systems to automatically know their needs and
what is good for them. Rather, when users are required to make specifications themselves, they
may perceive the system to be less proficient or knowledgeable. This may cause them to rate
the system as less credible. System designers who perceive explicit personalization as essential
for their designs may cure such mentality by offering educational platforms that educate users
as to why they expect them to specify the system’s behavior themselves.</p>
      <p>Also, the IPMA results reveal that implicit personalization is the most valuable approach for
promoting credibility perceptions in ASNSs. Precisely, implicit personalization had higher
ratings in terms of performance and importance compared to explicit personalization. This
means that implicit personalization should be prioritized in ASNS design to increase perceptions
credibility. This result reflects the operations of many ASNSs. Currently, ASNSs (e.g.,
ResearchGate) employ implicit personalization by streamlining content for users based on their
activities on the sites, people they follow, their co-authors, or even authors they have cited in
their publications. Therefore, users perceive that such ASNSs provide content that is relevant
to their needs. Research also shows that users will perceive a system to be credible when it
supports their primary tasks [21, 37, 42]. Conceptually, this distinction underscores the
psychological mechanisms underlying user engagement with personalization. Explicit
personalization provides users with agency and control, which can enhance perceived
usefulness and trust. On the other hand, implicit personalization operates in the background,
requiring minimal user intervention, and may not be consciously acknowledged as influential.
Our findings suggest that organizations should prioritize optimizing explicit personalization
features while ensuring that implicit personalization remains unobtrusive yet effective.</p>
      <p>Given these results, system designers are encouraged to further optimize their algorithms
such that relevant information is continuously supplied to users. A key issue we observe on
ASNSs is that frequent users may encounter the same information for the times they visit a site.
This might reduce their motivation to continuously use the site. Perhaps, the integration of
other persuasive principles that direct frequent users’ attention to other activities they could
perform can increase engagement with the site. For example, frequent users who mostly access
publications on a site may be engaged to share their views on topics under discussion for a
reward.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Study Limitation</title>
      <p>Though this study provides insightful revelations on how personalization approaches influence
credibility perceptions, it has some limitations. To begin, the study is exploratory. Unlike an
experimental research design, exploratory research may not provide adequate details of the
causality of the relationship between the observed variables (in this case Implicit, Explicit
personalization, and perceived credibility). Moreover, the respondents of this study are users of
different ASNSs. This study admits that different ASNSs may have different features and
interaction mechanisms which may have affected the results. Future studies could focus more
on a particular ASNS, to verify the outcome of this study.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion and Future Work</title>
      <p>The findings of this study provide relevant directions for building credible ASNSs. The results
enhance our knowledge of the different personalization approaches and their importance in the
design of ASNSs that are perceived to be credible. It directs system designers to prioritize
Implicit personalization for increased credibility perceptions on ASNSs. Further, we extend the
frontiers of IPMA and its relevance for comparing different phenomena. The findings and
recommendations offered in this study do not only augment existing ASNS literature but extend
to the broad arena of HCI research that focuses on system credibility.</p>
      <p>The results from this study open a multitude of research opportunities for future studies.
For instance, this study found Explicit personalization to be negatively correlated to perceived
credibility. Several other reasons might have accounted for this. Therefore, further inquiry into
why this result was recorded may be informative. For example, studies may investigate how the
number of items on an explicit personalization list affects users’ preferences and perceptions of
the system. Moreover, further understanding of how user characteristics (such as age, gender,
cultural background, or personality) affect preferences for personalization approaches will be
needed. As indicated, future studies may investigate how personalizing the personalization
approach, for example, based on certain user characteristics influences their attitude toward the
system. Finally, we hope for both more cross-domain and experimental studies analysis on
personalization to deepen our understanding of the concept.</p>
      <p>M. Kaptein, P. Markopoulos, B. De Ruyter, and E. Aarts, “Personalizing persuasive
technologies: Explicit and implicit personalization using persuasion profiles,” Int J Hum
Comput Stud, vol. 77, pp. 38–51, May 2015, doi: 10.1016/J.IJHCS.2015.01.004.</p>
      <p>L. Findlater and J. McGrenere, “A comparison of static, adaptive, and adaptable menus,”
in Conference on Human Factors in Computing Systems - Proceedings, Association for
Computing Machinery (ACM), 2004, pp. 89–96. doi: 10.1145/985692.985704.</p>
      <p>D. Rubini, “Overcoming the paradox of personalization: Building adoption, loyalty, and
trust in digital markets,” Design Management Journal (Former Series), vol. 12, no. 2, pp.
49–54, Apr. 2001, doi: 10.1111/J.1948-7169.2001.TB00544.X.</p>
      <p>H. Oinas-Kukkonen, “Personalization myopia: A viewpoint to true personalization of
information systems,” in ACM International Conference Proceeding Series, Association for
Computing Machinery, Oct. 2018, pp. 88–91. doi: 10.1145/3275116.3275121.</p>
      <p>H. Fan and M. S. Poole, “What Is Personalization? Perspectives on the Design and
Implementation of Personalization in Information Systems,” Journal of Organizational
Computing and Electronic Commerce , vol. 16, no. 3–4, pp. 179–202, Jan. 2006, doi:
10.1080/10919392.2006.9681199.</p>
      <p>K. Liu and D. Tao, “The roles of trust, personalization, loss of privacy, and
anthropomorphism in public acceptance of smart healthcare services,” Comput Human
Behav, vol. 127, p. 107026, Feb. 2022, doi: 10.1016/J.CHB.2021.107026.</p>
      <p>C. Papakostas, C. Troussas, A. Krouska, and C. Sgouropoulou, “Measuring User
Experience, Usability and Interactivity of a Personalized Mobile Augmented Reality
Training System,” Sensors 2021, Vol. 21, Page 3888, vol. 21, no. 11, p. 3888, Jun. 2021, doi:
10.3390/S21113888.</p>
      <p>D. Parra and P. Brusilovsky, “User-controllable personalization: A case study with
SetFusion,” Int J Hum Comput Stud, vol. 78, pp. 43–67, Jun. 2015, doi:
10.1016/J.IJHCS.2015.01.007.</p>
      <p>M. J. Metzger and A. J. Flanagin, “Credibility and trust of information in online
environments: The use of cognitive heuristics,” J Pragmat, vol. 59, pp. 210–220, Dec.
2013, doi: 10.1016/J.PRAGMA.2013.07.012.</p>
      <p>L. Sbaffi and J. Rowley, “Trust and Credibility in Web-Based Health Information: A
Review and Agenda for Future Research,” J Med Internet Res, vol. 19, no. 6, 2017, doi:
10.2196/jmir.7579.</p>
      <p>
        A. Stibe and B. Cugelman, “Persuasive backfiring: When behavior change interventions
trigger unintended negative outcomes,” in International conference on persuasive
        <xref ref-type="bibr" rid="ref3">technology, 2016</xref>
        , pp. 65–77.
      </p>
      <p>H. Oinas-Kukkonen and M. Harjumaa, “Persuasive systems design: Key issues, process
model, and system features,” Communications of the Association for Information Systems,
vol. 24, no. 1, p. 28, 2009.</p>
      <p>J. Dabi, I. Wiafe, A. Stibe, and J. D. Abdulai, “Can an enterprise system persuade? The
role of perceived effectiveness and social influence,” in Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), Springer Verlag, 2018, pp. 45–55. doi: 10.1007/978-3-319-78978-1_4.
F. N. Koranteng, U. Matzat, I. Wiafe, and J. Ham, “Credibility in Persuasive Systems: A
Systematic Review,” Lecture Notes in Computer Science (including subseries Lecture Notes
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13832 LNCS, pp. 389–
409, 2023, doi: 10.1007/978-3-031-30933-5_25/TABLES/2.</p>
      <p>S. Tseng and B. J. Fogg, “Credibility and computing technology,” Commun ACM, vol. 42,
no. 5, pp. 39–44, 1999.</p>
      <p>H. C. De Souza Pereira Candello, G. M. Soella, C. S. Sanctos, M. C. Grave, and A. A. De
Brito Filho, “‘this means nothing to me’: Building credibility in conversational systems,”
in Proceedings of the 5th International Conference on Conversational User Interfaces, CUI
2023, 2023. doi: 10.1145/3571884.3603759.</p>
      <p>K. Oyibo and J. Vassileva, “HOMEX: Persuasive Technology Acceptance Model and the
Moderating Effect of Culture,” Front Comput Sci, vol. 2, p. 10, Mar. 2020, doi:
10.3389/fcomp.2020.00010.</p>
      <p>I. Wiafe, F. N. Koranteng, F. A. Kastriku, and G. O. Gyamera, “Assessing the impact of
persuasive features on user’s intention to continuous use: the case of academic social
networking sites,” Behaviour and Information Technology, 2020, doi:
10.1080/0144929X.2020.1832146.</p>
      <p>M. Sarstedt, N. F. Richter, S. Hauff, and C. M. Ringle, “Combined importance–
performance map analysis (cIPMA) in partial least squares structural equation modeling
(PLS–SEM): a SmartPLS 4 tutorial,” Journal of Marketing Analytics, pp. 1–15, Jun. 2024,
doi: 10.1057/S41270-024-00325-Y/FIGURES/21.</p>
      <p>S. Streukens, S. Leroi-Werelds, and K. Willems, “Dealing with nonlinearity in
importance-performance map analysis (IPMA): An integrative framework in a PLS-SEM
context,” Partial Least Squares Path Modeling: Basic Concepts, Methodological Issues and
Applications, pp. 367–403, Jan. 2017, doi: 10.1007/978-3-319-64069-3_17/FIGURES/13.
P. Kumah, W. Yaokumah, and C. Buabeng-Andoh, “Identifying HRM Practices for
Improving Information Security Performance: An Importance-Performance Map
Analysis,” Research Anthology on Business Aspects of Cybersecurity, pp. 326–348, Jan.
2022, doi: 10.4018/978-1-6684-3698-1.CH015.</p>
      <p>P. Fakfare and N. Manosuthi, “Examining the influential components of tourists’
intention to use travel apps: the importance–performance map analysis,” Journal of
Hospitality and Tourism Insights, vol. 6, no. 3, pp. 1144–1168, 2022, doi:
10.1108/JHTI-022022-0079/FULL/XML.</p>
      <p>M. M. K. Tailab, “Using Importance-Performance Matrix Analysis to Evaluate the
Financial Performance of American Banks During the Financial Crisis,” Sage Open, vol.
10, no. 1, 2020, doi: 10.1177/2158244020902079.</p>
      <p>
        M. S. Farooq, M. Salam, A. Fayolle, N. Jaafar, and K. Ayupp, “Impact of service quality
on customer satisfaction in Malaysia airlines: A PLS-SEM approach,” J Air Transp
Manag, vol. 67, 2018, doi: 10.1016/j.jai
        <xref ref-type="bibr" rid="ref12">rtraman.2017</xref>
        .12.008.
      </p>
      <p>K. Jordan, “Academics and their online networks: Exploring the role of academic social
networking sites,” First Monday, vol. 19, no. 11, 2014.</p>
      <p>F. N. Koranteng and I. Wiafe, “Factors that Promote Knowledge Sharing on Academic
Social Networking Sites: An Empirical Study,” Educ Inf Technol (Dordr), vol. 24, no. 2, pp.
1211–1236, Mar. 2019, doi: 10.1007/s10639-018-9825-0.</p>
      <p>
        F. K. Espinoza Vasquez and C. E. Caicedo Bastidas, “Academic social networking sites: a
comparative analysis of their services and tools,” iCon
        <xref ref-type="bibr" rid="ref5">ference 2015</xref>
        Proceedings, 2015.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Arora</surname>
          </string-name>
          et al., “
          <article-title>Putting one-to-one marketing to work: Personalization, customization</article-title>
          , and choice,”
          <source>Mark Lett</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>3-4</issue>
          , pp.
          <fpage>305</fpage>
          -
          <lpage>321</lpage>
          , Dec.
          <year>2008</year>
          , doi: 10.1007/S11002-008- 9056-Z.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Desai</surname>
          </string-name>
          , “
          <article-title>An Empirical Study of Website Personalization Effect on Users Intention to Revisit E-commerce Website Through Cognitive</article-title>
          and
          <string-name>
            <given-names>Hedonic</given-names>
            <surname>Experience</surname>
          </string-name>
          ,
          <source>” Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>839</volume>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>19</lpage>
          ,
          <year>2019</year>
          , doi: 10.1007/
          <fpage>978</fpage>
          -981-13-1274-
          <issue>8</issue>
          _1/COVER.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>T. S.</given-names>
            <surname>Chung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wedel</surname>
          </string-name>
          , and R. T. Rust, “
          <article-title>Adaptive personalization using social networks,”</article-title>
          <source>J Acad Mark Sci</source>
          , vol.
          <volume>44</volume>
          , no.
          <issue>1</issue>
          ,
          <year>2016</year>
          , doi: 10.1007/s11747-015-0441-x.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Kassanoff</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rogers</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Peppers</surname>
          </string-name>
          , Making It Personal: How To Profit From Personalization Without Invading Privacy.
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Yavari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Vale</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Khajehzadeh</surname>
          </string-name>
          , “
          <article-title>Guidelines for personalization opportunities in apartment housing</article-title>
          ,” in International Conference of the Architectural Science Association, Melbourne, Australia,
          <year>2015</year>
          , pp.
          <fpage>143</fpage>
          -
          <lpage>152</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Kramer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Noronha</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Vergo</surname>
          </string-name>
          , “
          <article-title>A user-centered design approach to personalization,” Commun</article-title>
          . ACM, vol.
          <volume>43</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>48</lpage>
          , Aug.
          <year>2000</year>
          , doi: 10.1145/345124.345139.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaptein</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Parvinen</surname>
          </string-name>
          , “
          <string-name>
            <surname>Advancing E-Commerce</surname>
            <given-names>Personalization</given-names>
          </string-name>
          :
          <article-title>Process Framework</article-title>
          and Case Study,”
          <source>International Journal of Electronic Commerce</source>
          , vol.
          <volume>19</volume>
          , no.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          3, pp.
          <fpage>7</fpage>
          -
          <lpage>33</lpage>
          , Jan.
          <year>2015</year>
          , doi: 10.1080/10864415.
          <year>2015</year>
          .
          <volume>1000216</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Orji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Reisinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Busch</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Dijkstra</surname>
          </string-name>
          , “Adaptivity and Personalization in Persuasive Technologies,” in International Conference on Persuasive Technology,
          <year>2016</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          5-
          <fpage>9</fpage>
          . Accessed: Jul.
          <volume>02</volume>
          ,
          <year>2023</year>
          . [Online]. Available: http://ceur-ws.org
          <string-name>
            <given-names>R.</given-names>
            <surname>Orji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Oyibo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. F.</given-names>
            <surname>Tondello</surname>
          </string-name>
          , “
          <article-title>A Comparison of System-Controlled and UserControlled Personalization Approaches</article-title>
          ,” in UMAP 2017 -
          <article-title>Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, Association for Computing Machinery</article-title>
          , Inc, Jul.
          <year>2017</year>
          , pp.
          <fpage>413</fpage>
          -
          <lpage>418</lpage>
          . doi:
          <volume>10</volume>
          .1145/3099023.3099116.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [20] [21] [22] [23]
          <string-name>
            <given-names>F.</given-names>
            <surname>Koranteng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ham</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Wiafe</surname>
          </string-name>
          , and U. Matzat, “
          <article-title>The Role of Usability, Aesthetics, Usefulness and Primary Task Support in Predicting the Perceived Credibility of Academic Social Networking Sites</article-title>
          .,” Behaviour &amp; Information
          <string-name>
            <surname>Technology</surname>
          </string-name>
          ,
          <year>2021</year>
          , doi: 10.1080/0144929X.
          <year>2021</year>
          .
          <volume>2009570</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Orji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Oyibo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. F.</given-names>
            <surname>Tondello</surname>
          </string-name>
          , “
          <article-title>A Comparison of System-Controlled and UserControlled Personalization Approaches</article-title>
          ,” in UMAP 2017 -
          <article-title>Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, Association for Computing Machinery</article-title>
          , Inc, Jul.
          <year>2017</year>
          , pp.
          <fpage>413</fpage>
          -
          <lpage>418</lpage>
          . doi:
          <volume>10</volume>
          .1145/3099023.3099116.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Hair</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Sarstedt</surname>
          </string-name>
          , “
          <article-title>Factors versus Composites: Guidelines for Choosing the Right Structural Equation Modeling Method,” Project Management Journal</article-title>
          , vol.
          <volume>50</volume>
          , no.
          <issue>6</issue>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          619-
          <fpage>624</fpage>
          , Dec.
          <year>2019</year>
          , doi: 10.1177/8756972819882132.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <source>Statistical Power Analysis</source>
          , vol.
          <volume>1</volume>
          , no. 3. SAGE PublicationsSage CA: Los Angeles, CA,
          <year>1992</year>
          . doi:
          <volume>10</volume>
          .1111/
          <fpage>1467</fpage>
          -
          <lpage>8721</lpage>
          .EP10768783/ASSET/1467-
          <fpage>8721</fpage>
          .EP10768783.FP.PNG_
          <fpage>V03</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Krishnaraju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Mathew</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Sugumaran</surname>
          </string-name>
          , “
          <article-title>Web personalization for user acceptance of technology: An empirical investigation of E-government services</article-title>
          ,
          <source>” Information Systems Frontiers</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>579</fpage>
          -
          <lpage>595</lpage>
          , Jun.
          <year>2016</year>
          , doi: 10.1007/S10796- 015-9550-9/TABLES/5.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>F. N.</given-names>
            <surname>Koranteng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ham</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Wiafe</surname>
          </string-name>
          , “
          <article-title>Investigating User Perceptions of Persuasive Design Elements that Influence Perceived Credibility</article-title>
          ,
          <source>” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          , vol.
          <volume>12684</volume>
          LNCS, pp.
          <fpage>164</fpage>
          -
          <lpage>177</lpage>
          , Apr.
          <year>2021</year>
          , doi: 10.1007/978-3-
          <fpage>030</fpage>
          -79460- 6_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>