The advancement in communication technology coupled with improvement in smartphone App application software enhances user flexibility in communication platform supported by the UTAUT (Unified Theory of Acceptance and Use of Technology) concepts. The growing tendency of data security concerns among the mobile users is of the essence for smooth trade and efficient payment services to be in place. Regardless of age differences among mobile device users, improvement of data security is of high impact for improved performance of the technology. The existence of the Generation X platform anchored on the G-network accelerates the rate of acceptance of internet services based on the efficiency with which the communication signals flow from the source of the user’s points thus increases the rate of mobile phone consumption in the economy. The involvement of unified theory in the mobile communication sector redefined the intention and acceptance of the user to implement the generation X models in the communication devices (Sun, 2012; Venkatesh, 2015).
The design based implication of the theory covers the critical element of device's security relates to cybercrime, data hacking or signal interception. Hence, allows people to gain unauthorized access to critical information thus increases the risk levels of the storage facility through assigning specific codes that allow specific users with the knowledge regarding special key to gain access and use the device to improve the data security in the broad network. The analysis of the performance of the generation X mobile devices in the context of consumer market reveals the prominent success in attaining data security parameters and related adaptability of the generation X mobile device services in the global market sphere ( Liu, & Li, 2013; Nillos, 2016).
The research paper focuses on establishing the significance of generation X mobile phones and the associated contributions in the consumer market concerning data security based on the socio-economic and cultural perceptions defined by the unified theory of acceptance and use displayed by the user. The research strives to reveal essential information regarding the application of mobile technology anchored on the security measures alongside the impact of age difference among the mobile device users and social relation to the progress of mobile technology and user related elements under the unified theory. The study of demographic, social, cultural and technological factors influences the trends in the usage of mobile devices within the age group ranging from 35 to 50 years old (Naik & Jenkins, 2016; Sung, Jeong, Jeong & Shin, 2015). The trends present provide sufficient information that aids the manufacturers in the process of producing and distributing the mobile gadgets in the market segment based on the need submitted by the users.
The element of unified acceptance theory moderates the device characteristics of the cell phone to accommodate users' needs anchored on the empirical validation of the computing ability of increased resolution present in the smartphones. The primary concerns of the unified theory associated with independent variables linked the behavioral intentions into restrained mobile phone use (Gia-Shie, & Pham, 2016; Guo, 2015). The effectiveness of end-user services based on the difference character displayed by users for the accessibility of socialization where the elderly individuals use mobile phones in safe and secure modes compared to the younger generation.
The behavior of consumer influences logical representation and use of the mobile devices in communication platform. The performance expectancy displays the intended fulfillment the user gains from the instrument once in use. For instance, the generation X population prefers to have secure access to the cloud network on the internet for the realization of efficient communication services that provide important data security to the users. Thus, compels the designer of the app supported technology to provide optimal data transmission protocol through secure networks (Javidnia, Nasiri & Kiani far, 2012; Kilic, 2013).
The social influence of the design parameters provides the micro-level impact on the way different individuals view mobile technology concerning communication protocol with friends in the network through the user-friendly mobile platform. The social elements incorporate aesthetic value consideration while designing the communication devices meant to serve the population in the age bracket of 35 to 50 years. The research places more emphasis on the price value, age, and gender components that moderating the impact of device limitation in the communication platforms (Chia, Choo & Fehrenbacher, 2017; Raggo, 2016). The prominent best practices covered throughout the research entails the provision of safe feedback paths and use of designated apps for the device in use.
The focus on dependent variables aligns mobile device security and the unified acceptance theory to the technological adaptation of the cell phones strives to fulfill designated functions. The increased security concerns link the technology acceptance models view the user as financial entities based on the impact of technology on the society. The paradigm of design development relies on the software application that fosters the open evolution of the communication mobiles for the benefit of the consumer through the integration of different components that improves data security during transmission. The UTAUT model develops the hybrid smart mobile device incorporates previous research findings necessary in harmonizing variables in the smart mobile device (Cho & Ngai, 2014; Kasim, 2015; Wiemer, 2015). The pronounced communication ethics in the mobile device application restrain the security parameters to the user where the older users often ensure increased mobile device safety compared to the youth using a similar communication gadget.
Finally, the growth in mobile communication enhances the adaptability of current techniques like Facebook and twits in data transfer. The design of cell phones supported by the cloud network provides safe communication environment for the user and devices due to minimized loads received by the gadget. The unified theory provides the basis through which the user attains data security relevant in ensuring optimal performance in service delivery. The limitation of mobile payment security increases the risk in design and use of such services among the generation X mobile device users. The adoption of the comprehensive model in the process of mobile device users and use-related security concerns thus improves the device safety. Ethical handling of the mobile devices increases their service life and efficiency in service delivery. The condition improves based on the age of the mobile device user whereas experienced members of the society provide optimal device security concerns to the device while in use.
References
Chia, C., Choo, K., & Fehrenbacher, D. (2017). How Cyber-Savvy are Older Mobile Device Users? Mobile Security and Privacy, 67-83. doi:10.1016/b978-0-12-804629-6.00004-3
Cho, V., & Ngai, E. (2014). A Theoretical Framework of the Influence of Mobility in Continued Usage Intention of Smart Mobile Device. Computer Science & Information Technology (CS & IT). doi:10.5121/csit.2014.4703
Gia-Shie Liu, & Pham Tan Tai. (2016). A Study of Factors Affecting the Intention to Use Mobile Payment Services in Vietnam. Economics World, 4(6). doi:10.17265/2328-7144/2016.06.001
Guo, Y. (2015). Moderating Effects of Gender in the Acceptance of Mobile SNS Based on UTAUT Model. International Journal of Smart Home, 9(1), 203-216. doi:10.14257/ijsh.2015.9.1.22
Javidnia, M., Nasiri, S., & Kiani far, J. (2012). Identifying factors affecting acceptance of new technology in the industry using a hybrid model of UTAUT and FUZZY DEMATEL. Management Science Letters, 2(7), 2383-2392. doi:10.5267/j.msl.2012.08.003
Kasim, H. A. (2015). Factors Affecting Knowledge Sharing Using Virtual Platforms – A Validation of Unified Theory of Acceptance and Use of Technology (UTAUT). International Journal of Managing Public Sector Information and Communication Technologies, 6(2), 01-19. doi:10.5121/ijmpict.2015.6201
Kilic, E. (2013). Determining factors of affecting the use of Moodle by using Technology Acceptance Model: A tale of university after an earthquake - Withdrawn. 2013 IEEE 63rd Annual Conference International Council for Education Media (ICEM). doi:10.1109/cicem.2013.6820210
Liu, W., & Li, J. (2013). Mobile Device User Research in Different Usage Situation. The 19th International Conference on Industrial Engineering and Engineering Management, 815-823. doi:10.1007/978-3-642-38391-5_86
Naik, N., & Jenkins, P. (2016). A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards. 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). doi:10.1109/mobilecloud.2016.22
Nillos, B. E. (2016). Performance Expectancy, Effort Expectancy, Social Influence and Facilitating Conditions are Factors that Influence Rural Health Workers in the Use of Wireless Access for Health and Perception of Behavior of their Pregnant Patients. JPAIR Multidisciplinary Research, 24(1). doi:10.7719/jpair.v24i1.376
Raggo, M. T. (2016). Developing Your Mobile Device Security Strategy. Mobile Data Loss, 37-43. doi:10.1016/b978-0-12-802864-3.00005-2
Sung, H., Jeong, D., Jeong, Y., & Shin, J. (2015). The Relationship among Self-Efficacy, Social Influence, Performance Expectancy, Effort Expectancy, and Behavioral Intention in Mobile Learning Service. International Journal of u- and e- Service, Science, and Technology, 8(9), 197-206. doi:10.14257/ijunesst.2015.8.9.21
Sun, X. (2012). Interaction with Mobile Device during Sports Events User Requirements and User Acceptance. Applied Mechanics and Materials, 224, 24-28. doi:10.4028/www.scientific.net/amm.224.24
Venkatesh, V. (2015). Technology Acceptance Model and the Unified Theory of Acceptance and Use of Technology. Wiley Encyclopedia of Management, 1-9. doi:10.1002/9781118785317.weom070047
Wiemer, C. (2015). Mobile Device Security. Mobile Devices, 271-282. doi:10.1201/b18165-21