International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
Introduction to ArtificiaI Intelligence in Higher Education
Top 10 Read Articles of Managing Information Technology - June 2021
1. TOP 10 READ ARTICLES OF
IJMIT JUNE 2021
INTERNATIONAL JOURNAL OF MANAGING INFORMATION
TECHNOLOGY (IJMIT)
http://airccse.org/journal/ijmit/ijmit.html
ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
2. THE ADOPTION AND CHALLENGES OF ELECTRONIC VOTING TECHNOLOGIES WITHIN
THE SOUTH AFRICAN CONTEXT
Mourine Achieng and Ephias Ruhode
Cape Peninsula University of Technology, Cape Town, South Africa
ABSTRACT
Literature has shown that countries such as Brazil and India have successfully implemented electronic
voting systems and other countries are at various piloting stages to address many challenges associated
with manual paper based system such ascosts of physical ballot paper and other overheads, electoral
delays, distribution of electoral materials, and general lack of confidence in the electoral process. It is in
this context that this study explores how South African can leverage the opportunities that e-voting
presents. Manual voting is often tedious, non-secure, and time-consuming, which leads us to think about
using electronic facilities to make the process more efficient. This study proposes that the adoption of
electronic voting technologies could perhaps mitigate some of these issues and challengesin the process
improving the electoral process. The study used an on-line questionnaire which was administered to a
broader group of voters and an in-depth semi-structured interview with the Independent Electoral
Commission officials. The analysis is based on thematic analysis and diffusion of innovations theory is
adopted as a theoretical lens of analysis. The findings reveal that relative advantage, compatibility and
complexity would determine the intentions of South African voters and the Electoral Management Bodies
(IEC) to adopt e-voting technologies. Moreover, the findings also reveal several other factorsthat could
influence the adoption process. The study is limited to only voters in Cape Town and these voters were
expected to have some access to the internet. The sample size limits the generalizability of the findings of
this study.
KEYWORDS
Electronic voting technology, Diffusion of Innovation (DoI), E-democracy, &E-governance
For More Details: http://airccse.org/journal/ijmit/papers/5413ijmit01.pdf
http://airccse.org/journal/ijmit/vol5.html
3. REFERENCES
[1] Garson, G. David.(2006) Public Information Technology and E-Governance: Managing the Virtual
State. Sudbury, MA: Jones & Bartlett.
[2] Clift, S. (2003) E-Government and Democracy: Representation and citizen engagement in the
information age. United Nations-DESA.
[3] Lai, R., & Haleem (2002), a.. E-Governance: An Emerging Paradigm. Vision: The Journal of Business
Perspective, Vol. 6 No. 2 pp. 99–109.
[4] Bedi, K., Singh P. J. & Srivastava, S. (2001) Government@net: New Governance opportunities for
India, Sage Publications, New Delhi.
[5] Holmes,D. (2001) eGov: eBusinness Strategies for Government, Nicholas Brealey, London.
[6] Okot-Uma, R.W. (2000)Electronic Governance: Re-Inventing Good Governance, Commonwealth
Secretariat, London.
[7] Islam, M. S. (2008) Towards a sustainable e-Participation implementation model. European Journal of
ePractice, Vol.5, No.10 .
[8] Rosenstone, S. J. (1993), Hansen, J. M. Mobilization, participation and democracy in America.,New
York: Macmillan.
[9] ACE Electoral Knowledge Network 2010. Last accessed June 5, 2013, from
http://aceproject.org/aceen/focus/e-voting/countries
[10] Republic of South Africa 1996. Last accessed June 20, 2013 from
http://www.acts.co.za/constitutionof-the-republic-of-south-africa-act-1996/
[11] Southafrica.info (2006) http://www.southafrica.info/
[12] Worldbank South Africa 2009 http://www.worldbank.org/en/country/southafrica
[13] Kersting, N. (2009). Africa Spectrum, 125–133
.
[14] EISA Interim statement: Eisa observer mission to the 2009 South Africa national &Provincial
elections 2009. Last accessed July 5, 2013. www.eisa.org.za/PDF/eusa2009bk.pdf
[15] Kroukamp, H. (2005) E-governance in South Africa: are we coping? ACTA
ACADEMICAUNIVERSITY OF THE FREE STATE Vol. 37,pp. 52–69, Last accessed May 25,2013
http://www.sabinet.co.za/abstracts/academ/academ_v37_n2_a3.html
[16] Booz Allen Hamilton. (2002)Re-Learning e-Learning last accessed on June 28 from
www.boozallen.com
[17] Smith, E., &Macintosh, A. (2003) E-voting: Powerful symbol of E-democracy. Electronic
Government, 1064.
4. [18] Macintosh, A. (2004) Characterizing e-participation in policy-making. System Sciences, Proceedings
of the 37th …, 00(C), 1–10. 2004 Retrieved from
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1265300
[19] Qadah, G., & Taha, R. Electronic voting systems: Requirements, design, and implementation.
Computer Standards Interfaces, Vol. 29No.3 pp. 376–386, 2007 doi:10.1016/j.csi.2006.06.001
[20] Sæbø, Ø., Rose, J., & Skiftenes Flak, L. (2008)The shape of eParticipation: Characterizing an
emerging research area. Government Information Quarterly, Vol.25, No.3pp. 400–428.
[21] Svensson, J., & Leenes, R.( 2003) E-voting in Europe: Divergent democratic practice. Information
Polity, Vol .8 No.1, pp. 3–15.
[22] Xenakis, A. & Macintosh, A. (2005) “E-electoral Administration: Organizational Lessons Learned
from the Deployment of E-voting in the UK”, ACM International Conference Proceeding Series, Vol. 89,
Atlanta, Georgia.
5. DEFINING ICT IN A BOUNDARYLESS WORLD : THE DEVELOPMENT OF A WORKING
HIERARCHY
Colrain M. Zuppo
Marion Technical College (MTC)
ABSTRACT
Subsequent to rapid information and communication technology development, the scope of the definition
of Information and Communication Technologies (ICT or ICTs) has been utilized within diverse contexts
including economic development, education, IT, business and personal usage. A review of academic
literature, trade publications and general information was undertaken to establish a hierarchy of
applications for the term ICT or ICTs..
KEYWORDS
ICT, ICTs, education, economics, digital communication, hierarchy.
For More Details: http://airccse.org/journal/ijmit/papers/4312ijmit02.pdf
http://airccse.org/journal/ijmit/vol4.html
6. REFERENCES
[1] International Telecommunication Union. (2007). Measuring village ICT in sub-Saharan Africa.
Retrieved from http://www.itu.int/ITU-D/ict/statistics/material/Africa_Village_ICT_2007.pdf.
[2] United Nations University. (2010). Greater Access to Cell Phones than Toilets in India. Retrieved
from http://www.inweh.unu.edu/News/2010-04_UNU-INWEH_News-Release_Sanitation.pdf
.
[3] International Telecommunication Union. (n.d.). Who we are. Retrieved,from
http://www.itu.int/en/about/Pages/default.aspx.
[4] World Health Organization. (2011). 2011-last update: Information and communication technologies
for public health emergency management. Retrieved from http://www.who.int/csr/ict4phem/en/index.html
[5] World Health Organization. (2006). Health aspects of disaster preparedness and response: Report
from a regional meeting of countries of South East Asia, Bangkok, Thailand, 21-23 November 2005.
Prehospital & Disaster Medicine, 21(5), 62-78.
[6] Yang, C., Yang, J., Luo, X., and Gong, P. (2009). Use of mobile phones in an emergency reporting
system for infectious disease surveillance after the Sichuan earthquake in China. Bulletin of the World
Health Organization, 87(8), 619-623.
[7] Organisation for Co-operation and Development (OECD). (2002). Retrieved from
http://www.oecd.org/dataoecd/63/60/1933354.pdf.
[8] Angeleski, M., Mitrevski, P., and Janeska, M. (2009). “Composite index of e-business strategy
readiness of the enterprises in the Republic of Macedonia” in ICT Innovations 2009, Davcev, D., and
Marx Gomex, J., (Eds.), p. 265-275. Springer-Verlag Berlin Heidelberg, Scientific Publishing
Services Pvt. Ltd.
[9] Cohen, D., Garibaldi, P., and Scarpetta, S., (Eds.). (2004). The ICT Revolution: Productivity,
Differences and the Digital Divide. Oxford University Press, University of Oxford.
[10] Educational Testing Service. (2007). Digital transformation: A framework for ICT literacy. A report
of the International ICT Literacy Panel. Retrieved from
http://www.ets.org/Media/Tests/Information_and_Communication_Technology_Literacy/ictreport.pd
f.
[11] Jarnieson-Proctor, R., Watson, G., Finger, G., Grimbeek, P., & Burnett, P. C. (2007). Measuring the
use of Information and Communication Technologies (ICTs) in the classroom. Computers in the Schools,
24(1/2), 167-184. doi:10.1300/J025v24n01̱11.
[12] Clark, L., Demont-Heinrich, C., & Webber, S. (2005). Parents, ICTs, and children's prospects for
success: Interviews along the digital “Access Rainbow”. Critical Studies in Media Communication, 22(5),
409-426. doi:10.1080/07393180500342985.
[13] Selwin, N., Gorard, S., & Furlong, J. (2006). Adult learning in the digital age: Information
technology and the learning society. Routledge, Taylor & Francis Group.
7. [14] Zhang, P., Aikman, S., & Sun, H. (2008). Two types of attitudes in ICT acceptance and use.
International Journal of Human Interaction, 24(7), 628-648. doi: 10.1080/10447310802335482.
[15] Information Technology Infrastructure Library [ITIL]. (n.d.). ITIL glossaries. Retrieved from
http://www.itil-officialsite.com/InternationalActivities/ITILGlossaries_2.aspx.
[16] TechTerms.com. (n.d.). Definition of ICT. Retrieved from http://www.techterms.com/definition/ict.
[17] Innovation Value Institute at National University of Ireland Maynooth. (n.d.). IVI and CEPIS
develop European Framework for ICT Professionalism. Retrieved from http://ivi.nuim.ie/news-events/ivi-
andcepis-develop-european-framework-ict-professionalism
[18] Institute of IT Professionals, New Zealand. (n.d.). ITCP – IT Certified Professional. Retrieved from
http://www.itcp.org.nz/about
[19] Professional Standards Board, Australian Computer Society. (2012.). The ICT professional body of
knowledge. Retrieved from http://www.acs.org.au/__data/assets/pdf_file/0007/7792/The-ICTProfession-
Body-of-Knowledge-July-2012.pdf
[20] Galperin, H., and Mariscal, J. (2007). Digital Poverty: Latin American and Caribbean Perspectives.
International Development Research Centre, Intermediate Technology Publications Ltd.
[21] National Geographic News. (2005). The deadliest tsumani in history? Retrieved from
http://news.nationalgeographic.com/news/2004/12/1227_041226_tsunami.html.
[22] The Telegraph. (2011). Japan earthquake, tsunami and Fukushima nuclear disaster: 2011 review. Retrieved
from http://www.telegraph.co.uk/news/worldnews/asia/japan/8953574/Japan-earthquaketsunami-and-Fukushima-
nuclear-disaster-2011-review.html.
AUTHOR
Colrain M. Zuppo earned a PhD in Technology Management from Indiana
State University with a specialization in Human Resource Development and
Industrial Training. Cori’s dissertation research was entitled “Organizations
as consumers of human capital via technology: A policy study of information
and communication technologies”. Cori also holds an M.A.Ed. from The
George Washington University and a B.S. in Conflict Resolution from Ohio
University. Cori is a Professor in the Department of Business and Information
Technology at Marion Technical College (MTC) and served as part time
faculty and doctoral fellow at Bowling Green State University, conducting
research and teaching in the areas of technology management, academic
research and instructional design & delivery.
8. CHALLENGES OF E-LEARING IN NIGERIAN UNIVERSITY EDUCATION BASED ON THE
EXPERIENCE OF DEVELOPED COUNTRIES
N.D. Oye1
, Mazleena Salleh2
, N. A. Iahad3
1,2,3
Faculty of Computer Science and Information systems
Universiti Teknologi Malaysia
ABSTRACT
This paper present a review of the challenges of e-learning in Nigerian University education based on the
experience of four developed countries, UK, Australia, Korea and France. The survey shows that these
countries have: (i) vision and action plans for e-learning, (ii) they have good government policies and
financial support, (iii) they earmark action programs and set committees with sufficient funds to pursue it
goals, (iv) they believe in research as a fundamental part of e-learning strategy, and lastly (v) they embark
on awareness, training and motivational programs. The paper pointed out that, for the challenges of
Nigerian university education to be reduced to minimum, the Federal Government should improve on
educational funding as UNESCO recommended 26% of the annual budget. In addition the government
should fulfill her promise on the issue of improving Electricity supply in the country. Furthermore, the
university administrators should embark on awareness and training of staff on the use of ICTs, with
motivations attached. The Internet is a major driver of ICT in education and bandwidth is a major issue in
the deployment of e-learning. Therefore government should make Internet connectivity a priority for
higher education to be able to leverage on the promises and opportunities ICTs present..
KEYWORDS
E-learning; ICT; Developed Countries,;Nigerian University; Challenges; Education; Internet..
For More Details: http://airccse.org/journal/ijmit/papers/3211ijmit04.pdf
http://airccse.org/journal/ijmit/vol3.html
9. REFERENCES
[1] Aduke, A F ( 2008). Usage and Challenges of Information and Technology (ICT) in Teaching and
Learning in Nigerian Universities. Asian Journal of Information Technology, 7(7), 290-295.
[2] Ajadi TO, Salawu, IO and Adeoye, FA (2008). E-learning and Distance Education in Nigeria. The
Turkish Online Journal of Educational Technology, 7(4), Article 7.
[3] Arikpo I I, Osofisan, A and Usoro, A ( 2009). Bridging the digital divide: the Nigerian journey so far.
International Journal of Global Business, 2 (1), 181-204.
[4] Asogwa, U D ( 2006). E-learning: A panacea for access, equity and quality higher education in
Nigeria. Paper presented at the 30th annual conference of Nigerian Association for Educational
Administration and Planning (NAEAP) held at the Faculty of Education Hall, Enugu State University of
Science and Technology.
[5] Cook J, Holley D, Smith C, Bradley C and Haynes, R (2006). A Blended M-Learning Design for
Supporting Teamwork in Formal and Informal Settings. Mobile Learning 2006, 14-16 July, Dublin.
[6] Erah, PO (2006). Introduction to e-learning protocols. Paper presented at ETF capacity building
workshop for lecturers of Universities in Nigeria at the University of Uyo.
[7] Folorunso O, Ogunseye OS and Sharma SK( 2006). An exploratory study of the critical factors
affecting the acceptability of e-learning in Nigerian universities. Information Management and Computer
Security Journals, 14 (5), 496-505.
[8] HEFCE (2005). HEFCE strategy for e-learning, March 2005, available at
http://www.hefce.ac.uk/pubs/hefce/2005/05_12/
[9] JAMB (2009). JAMB Statistics: Application and Admission (UME and PCE) Retrieved April 30,
2009, from http://www.jambng.com
[10] NUC (2009). List of Nigerian Universities and Years Founded Retrieved April 30, 2009, from
http://www.nuc.edu.ng/pages/universities.asp
[11] Omofaye, JO( 2007). Challenges facing ICT Infrastructure and successful online education in Africa,
Available online at Http//: www.google.com Downloaded 15th June 2007.
[ 12] Oye ND, Salleh M and Ai.ahad N (2010). Holistic E-learning in Nigerian Higher Education
Institutions. Journal ofComputing, vol 2(11), p20-26.
[13] QAA (2004). Code of practice for the assurance of academic quality and standards in higher
education - Section 2: Collaborative provision and flexible and distributed learning (including e-learning),
September 2004, available at
http://www.qaa.ac.uk/academicinfrastructure/codeOfPractice/section2/collab2004.pdf
[14] Resnick, M (2002). Rethinking Learning in the Digital Age. Online. URL: http:
//web.media.mit.edu/~mres/papers/wef.pdf (last accessed: 2007-01-08).
10. [15] Sharma R, Ekundayo M S and Ng E (2009). Beyond the digital divide: policy analysis for knowledge
societies. Journal of Knowledge Management, 13(5), 373-386.
[16] Schmidt, A (2005). Knowledge maturing and the continuity of context as a unifying concept for
knowledge management and e-learning. In: Proceedings of I-Know ‘05, Special Track on Integrating
Working and Learning, Graz, Austria, pp. 424-431.
[17] Schulmeister, R (2006). ELearning: Einsichten und Aussichten. München; Wien: Oldenbourg
Verlag.
[18] UNESCO (2009). UNESCO portal on Higher Education Institutions: Nigeria Retrieved April 30,
2009, from
http://portal.unesco.org/education/en/ev.phpURL_ID=51421&URL_DO=DO_TOPIC&URL_SECTION=
201.htm
[ 19] Yang, G (2010) “The effect of e-learning for the teachers in Information Society” Proc. Second
International Workshop on Education Technology and Computer Science, pp621-624.
[20] Zook, M (2004). Internet Users Worldwide - statistic 2004. Online. URL: http://www.
zooknic.com/Users/global_2004_09.html (last accessed: 2007-01- 08).
11. SOCIAL BUSINESS TRANSFORMATION THROUGH GAMIFICATION
Jitendra Maan
Tata Consultancy Services Ltd.,
ABSTRACT
Being an emerging business practice, gamification is going to the mainstream to enable and transform
social business initiatives across enterprises. With the consistent focus on customer behavior and
experience, there is a paradigm shift in thinking about how Gamification and Social initiatives together
help to increase the engagement level of knowledge worker, yielding better business results. Business
scenarios for gamification are wide spread ranging from customer service and support to communities and
collaboration.
The Paper discusses the characteristics & mechanism to learn from games that are important for
businesses to understand and apply. It also gives insights on gamification trends, real-world business
challenges and also describes on how game thinking can revolutionize the business and create an
engaging experience.
KEYWORDS
Gaming Techniques, Gamification, Game elements, Game Dynamics, Game mechanics, Enterprise
Gamification, Gamification Platforms, Social gaming elements, Social Collaboration, Social technologies
For More Details: http://airccse.org/journal/ijmit/papers/5313ijmit02.pdf
http://airccse.org/journal/ijmit/vol5.html
12. REFERENCES
[1] C. Stafford, M.A. Mearns: What happens when organisations embrace social networking? Knowledge
sharing at a multinational business solutions corporation, South African Journal of Information
Management, Vol 11, No.4, 2009
[2] Darryl Charles, Therese Charles, Michael McNeill, David Bustard, Michaela Black: Game-based
feedback for edu-cational multi-user virtual environments, British Journal of Educational Technology,
Volume 42, Issue 4, pages 638-654, July 2011
[3] Blacksmith, N; Harter, J: (2011, October). Majority Of American Workers Not Engaged In Their Jobs
[Electronic version]. Gallup Wellbeing, Retrieved January 17, 2012
[4] A. J. Bradley and M. P. McDonald, "The Social Organization," Harvard Business Review Press,
October 2011
[5] Cheshire, T: (2011, March). In Depth: How Rovio Made Angry Birds A Winner (And
What'sNext)[Electronic ver-sion].Wired,Retrieved January 17, 2012, from www.wired.
co.uk/magazine/archive/2011/04/features/how-rovio-made-angry-birds-a-winner?page=all.
[6] King, R: (2011, April). The Games Companies Play [Electronic version]. Bloomberg Businessweek,
Retrieved May 14, 2012, from www.businessweek.com/technology/content
/apr2011/tc2011044_943586.htm.
[7] Van der Walt, C., 2003, ‘Knowledge sharing via enterprise intranets’, unpublished Masters
dissertation, University of Johannesburg.
[8] Doug Palmer, Steve Lunceford and Aaron J. Patton: The Engagement Economy - How gamification is
reshaping businesses, Deloitte Review Report, http://www.deloitte.com/ view/en_US/us/Insights/Browse-
by-Content-Type/deloitte-review/c7cee86d96498310 VgnVCM1000001956f00aRCRD.htm
[9] Maslow, A: (1943). A Theory Of Human Motivation [Electronic version]. Classics in the History of
Psychology, Retrieved January 20, 2012, from http://psychclassics.yorku. ca/Maslow/motivation.htm
[10] McGonigal, J: (2011, January). Be A Gamer, Save The World [Electronic version]. Wall Street
Journal, Retrieved January 17, 2012, from http://online.wsj.com/ article/SB100014240527487
04590704576092460302990884.html.
[11] Gabe Zichermann, The Six Rules of Gamification, http://www.gamification.co/2011/ 11/29/the
sixrules-of-gamification, November, 2011
[12] Amabile, T; Kramer, S: (2011). The Progress Principle: Using Small Wins To Ignite Joy,
Engagement, and Creativity at Work. USA: Harvard Business Review Press.
13. THE ROLE OF TECHNOLOGY ACCEPTANCE MODEL IN EXPLAINING
EFFECT ON E-COMMERCE APPLICATION SYSTEM
Md Gapar Md Johar1
and Janatul Akmar Ahmad Awalluddin2
1
Information Technology and Innovation Center, Management and Science University,
Selangor, Malaysia
2
Graduate School of Management, Management and Science University, Kuala Lumpur,
Malaysia
ABSTRACT
Today e-commerce has become crucial element to transform some of the world countries into an
information society. Business to consumer (B2C) in the developing countries is not yet a normalcy as
compared to the developed countries. Consumer behaviour research has shown disappointing results
regarding the overall use of the Web for online shopping, despite its considerable promise as a channel for
commerce. As the use of the Internet continues to grow in all aspects of daily life, there is an increasing
need to better understand what trends of internet usage and to study the barriers and problem of
ecommerce adoption. Hence, the purpose of this research is to define how far Technology Acceptance
Model (TAM) contributed in e-commerce adoption. Data for this study was collected by the means of a
survey conducted in Malaysia in 2010. A total of 611 questionnaire forms were delivered to respondents.
The location of respondents was within Penang state. By studying this sample, conclusions would be
drawn to generalize the interests of the population.
KEYWORDS
E-commerce, Technology Acceptances Model (TAM), e-commerce application, online shopping, online
Banking, online payment & buying online.
For More Details: http://airccse.org/journal/ijmit/papers/3311ijmit01.pdf
http://airccse.org/journal/ijmit/vol4.html
14. REFERENCES
[1] Ahmed, M., Hussein, R., Minakhatun, R. and Islam R., (2007) “Building consumers’ confidence in
adopting e-commerce: A Malaysian case”, International Journal Business & Systems Research, Vol. 1,
No. 2, pp236-255.
[2] Alhudaithy, A.I. and Kitchen, P.J., (2009) “Rethinking models of technology adoption for Internet
banking: The role of website features”, Journal of Financial Services Marketing, Vol. 14, No. 1, pp56–69.
[3] Amin, H., (2009) “An analysis of online banking usage intentions: An extension of technology
acceptance model”, International Journal Business and Society, Vol. 10, No. 1, pp27-40.
[4] Habibu, S. and Ho, S. “RM1bil initiative to promote high-speed broadband usage” [Online] Available
at http://thestar.com.my/news/story.asp?file=/2010/3/25/nation/5931577&sec=nation. Accessed on
November 5th 2010.
[5] Internet World Stats. “Internet usage in ASEAN” [Online] Available at
http://www.internetworldstats.com/stats3.htm. Accessed on November 5th 2010
[6] Kaur. K., (2005) “Consumer protection in e-commerce in Malaysia: An overview”, Journal of the
UNE Asia Centre, No., pp1-14.
[7] Lee, H.H., Fiore, A.M. and Kim, J., (2006) “The role of the technology acceptance model in
explaining effects of image interactivity technology on consumer responses” International Journal of
Retail & Distribution Management, Vol. 34, No. 8, pp 621-644.
[8] Legris, P., Ingham, J. and Collerette, P., (2003) “Why do people use information technology? A
critical review of the technology acceptance model” Journal of Information & Management, No. 40,
pp191–204.
[9] “Malaysia : E-commerce Success Story” [Online] Available at
http://www.zerogrey.com/index.php/eshop/info/on/Zerogrey-Malaysia:-Ecommerce
SuccessStory.html/cId/359/. Accessed on November 5th 2010
[10] “Malaysia's E-Commerce Statistics” from http://malaysiacrunch.blogspot.com/2009/09/malaysias
ecommerce-statistics.html. Accessed on November 5th 2010
[11] Mirandah, G. “Internet law – The future of e-commerce in Malaysia” [Online] Available at
http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1917. Accessed on
November 5th 2010
[12] Monsuwe, T.P., Dellaert, B.G.C. and Ruyter, K.D., (2004) “What drives consumers to shop online?
A literature review”, International Journal of Service Industry Management, Vol. 15, No. 1, pp102-121.
[13] Nicoles, C.L., Castillo, F.J.M. and Bouwman, H. , (2008) “An assessment of advanced mobile
services acceptance: Contributions
[14] Rogers, E., (1995) “Diffusion of Innovation”, fourth ed., New York: Free Press.
15. [15] Sekaran, U. and Bougie, R., (2010) “Theoretical framework In theoretical framework and hypothesis
development”. Research Methods for Business: A Skill Building Approach, United Kingdom: Wiley, pp.
80
[16] So, W.C.M., Wong, T.N.D and Sculli, D., (2005) “Factors affecting intentions to purchase via the
internet”, Journal of Industrial Management & Data Systems, Vol. 105, No. 9, pp1225-1244.
[17] “Telecommunications and IT” from http://www.aseansec.org/7808.htm. Accessed on November 5th
2010
16. KNOWLEDGE SHARING IN WORKPLACE: MOTIVATORS AND DEMOTIVATORS
1
Oye, N.D. 2
Mazleena Salleh 3
Noorminshah, A.
Faculty of Computer Science and Information System
Universiti Technologi Malaysia
81310 Skudai, Johor
ABSTRACT
This paper gives an overview of knowledge sharing in workplace. Based on the review of critical
literatures by the authors, they infer that knowledge sharing in workplace can be influenced by motivators
and demotivators. Activities of knowledge sharing in organizations may be on organization level or
individual level. Knowledge sharing of both levels is critical to the success or failure of knowledge
management inside and outside of organizations. Age, culture, and industry were all found to affect
knowledge sharing among workers. A common stereotype is that older workers hoard knowledge because
they are more insecure and feel threatened by younger workers. Since older workers have more valuable
knowledge, younger workers needed to entice their older colleagues to share their valuable knowledge
with them. The paper focus on motivators and demotivators to sharing Knowledge in workplace. Theories
and research pertaining to why workers share knowledge are reviewed. While all industry need
knowledge and innovation, it is also true that the pace of change and the need to innovate differs from
industry to industry. Technology was acknowledged to have a high important role in increasing
productivity of knowledge sharing. It plays a critical role in creating, storing and distributing explicit
knowledge in an accessible and expeditious manner.
KEYWORDS
Knowledge, Sharing knowledge, Intrinsic and Extrinsic Motivators and Demotivators
For More Details: http://airccse.org/journal/ijmit/papers/3411ijmit06.pdf
http://airccse.org/journal/ijmit/vol3.html
17. REFERENCES
[1] Ni C. ,Knowlegde Sharing and Knowledge Broker of Organizations: Second International Conference
on Future Information Technology and Management Engineering. 978-07695-3880-8/09. 2009 IEEE.
[2] Nissen, M.E., ‘‘Knowledge management and global cultures: elucidation through an institutional
knowledge-flow perspective’’, Knowledge and Process Management, 2007. Vol. 14 No. 3, pp. 211-
25.
[3] Pfeffer, J., & Sutton, R. I. Knowing "what “to do is not enough: Turning knowledge into action.
California Management Review, 1999. 42(1), 83-108.
[4] Pfeffer, J., & Sutton, R. I,Knowing "what “to do is not enough: Turning knowledge into action.
California Management Review, 1999. 42(1), 83-108.
[5] Kerr, J., & Slocum, J. W., Managing corporate culture through reward systems. Academy of
Management Executive, 1987. 1(2), 99-108.
[6] Matheson, L. R., & Tarjan, R. E. ,Culturally induced information impactedness: A prescription for
failure in software ventures. Journal of Management InformationSystems, 1998. 15(2), 23-40.
[7] Recardo, R., & Jolly, J., Organizational culture and teams. S.A.M. Advanced Management Journal,
1997. 62(2), 4-8.
[8] Zhang, D.J. and Zhao, L. ,Knowledge management in organizations”, Journal of Database
Management, 2006. Vol. 17 No. 1, pp. 1-9.
[9] Voelpel, S.C., Eckhoff, R.A. and Fo¨rster, J.,“David against Goliath? Group size and bystander effects
in virtual knowledge sharing”, Human Relations, 2005.Vol. 61 No. 2, pp. 271-95.
[10] Nilakanta, S., Miller, L.L. and Zhu, D.,“Organizational memory management: technological and
research issues”, Journal of Database Management, 2006. Vol. 17 No. 1, pp. 85-95.
[11] Nonaka, I.,“The knowledge-creating company”, Harvard Business Review, 1991.Vol. 69 No. 6, pp.
96-104.
[12] Nonaka, I., & Takeuchi, H. ,A dynamic theory of organizational knowledge creation. Organization
Science, 1994. 5(1), 14-37.
[13] Nonaka, I., Von Krogh, G. and Voelpel, S.,“Organizational knowledge creation theory: evolutionary
paths and future advances”, Organization Studies, 2006. Vol. 27 No. 8, pp. 1179-208.
[14] Sa´enz, J., Aramburu, N. and Rivera, O.,“Knowledge sharing and innovation performance; a
comparison between high-tech and low-tech companies”, Journal of Intellectual Capital, 2009.Vol.
10 No. 1, pp. 22-36.
18. A SURVEY ON: CONTENT BASED IMAGE RETRIEVAL SYSTEMS USING CLUSTERING
TECHNIQUES FOR LARGE DATA SETS
Mrs Monika Jain1 , Dr. S.K.Singh
ABSTRACT
Content-based image retrieval (CBIR) is a new but widely adopted method for finding images from vast
and unannotated image databases. As the network and development of multimedia technologies are
becoming more popular, users are not satisfied with the traditional information retrieval techniques. So
nowadays the content based image retrieval (CBIR) are becoming a source of exact and fast retrieval. In
recent years, a variety of techniques have been developed to improve the performance of CBIR. Data
clustering is an unsupervised method for extraction hidden pattern from huge data sets. With large data
sets, there is possibility of high dimensionality. Having both accuracy and efficiency for high dimensional
data sets with enormous number of samples is a challenging arena. In this paper the clustering techniques
are discussed and analysed. Also, we propose a method HDK that uses more than one clustering
technique to improve the performance of CBIR.This method makes use of hierachical and divide and
conquer KMeans clustering technique with equivalency and compatible relation concepts to improve the
performance of the K-Means for using in high dimensional datasets. It also introduced the feature like
color, texture and shape for accurate and effective retrieval system.
KEYWORDS
Content Based Image Retrieval , divide and conquer k-means, hierarchical
For More Details: http://airccse.org/journal/ijmit/papers/3411ijmit03.pdf
http://airccse.org/journal/ijmit/vol3.html
19. REFERENCES
[1] Rui Xu, Donald Wunsch II, “Survey of Clustering Algorithms”, IEEE Transactions On Neural
Networks, Vol. 16, No. 3, May 2005.
[2] Ritendra Datta, Dhiraj Joshi, Jia Li, And James Z. Wang, “Image Retrieval: Ideas, Influences, and
Trends of the New Age”, ACM Computing Surveys, Vol. 40, No. 2, Article 5, Publication date: April
2008.
[3] Tamura et al. “Texture Feautres Corresponding to Visual Perception”- IEEE Trans on system, Man
and cyber 8-460-472-1978.
[4] Sanjoy Kumar Saha et al. “CBIR Using Perception Based Texture And Colour measures ”CSE
Department; CST Department Jadavpur Univ., India; B.E. College, Unit ISI, Kolkata, India - -2003.
[5] Canny, J., “A computational approach to edge detection”, IEEE Trans on Pattern Analysis and
Machine Intelligence, 8:679-698, 1986.
[6] S.Nandagopalan, Dr. B.S. Adiga, and N. Deepak “A Universal Model for Content-Based Image
Retrieval” World Academy of Science, Engineering and Technology 46 2008.
[7] Mohammed Eisa and Ibrahim Elhenawy and A. E. Elalfi and Hans Burkhardt, “Image Retrieval based
on Invariant Features and Histogram Refinement”, ICGST International Journal on Graphics, Vision and
Image Processing, March 2006, pp. 7-11.
[8] V. Castelli and L. D. Bergman (Eds.), “Image Databases: Search and Retrieval of digital Imagery”,
Wiley: New York, 2002.
[9 ] B. Everitt, S. Landau, and M. Leese, “Cluster Analysis”, London:Arnold, 2001.
[10] A. Jain and R. Dubes, “Algorithms for Clustering Data”, Englewood Cliffs, NJ: Prentice-Hall, 1988.
[11] A. Baraldi and E. Alpaydin, “Constructive feedforward ART clustering networks—Part I and II,”
IEEE Trans. Neural Netw., vol. 13, no. 3, pp.645–677, May 2002.
[12] V. Cherkassky and F. Mulier, “Learning From Data: Concepts, Theory, and Methods”, New York:
Wiley, 1998.
[13] I. J. Cox, M. L. Miller, T. P. Minka, T. V. Papathomas and P.Yianilos, “The Bayesian Image
Retrieval System, PicHunter: Theory, Implementation and Psychophysical Experiments”, IEEE Trans.
Image Processing, vol. 9, no. 1, pp. 20-37, 2000.
[14] Y. Rui, T. S. Huang, M. Ortega and S. Mehrotra, “Relevance Feedback: A Power Tool for
Interactive Content-Based Image Retrieval”, IEEE Trans. Circuits and Video Technology, vol. 8, no. 5,
pp. 644- 655, 1998.
[15] S. Thilagamani and N. Shanthi , “A Survey on Image Segmentation Through Clustering”,
International Journal of Research and Reviews in Information Sciences , Vol. 1, No. 1, March 2011 .
20. IMPACT OF THE EVOLUTION OF SMART PHONES IN EDUCATION TECHNOLOGY AND
ITS APPLICATION IN TECHNICAL AND PROFESSIONAL STUDIES: INDIAN PERSPECTIVE
Manoj Kumar
Assistant Professor, Department of Computer Science,
Maharaja Surajmal Institute, Janakpuri, New Delhi, India
ABSTRACT
The greatness of any nation depends largely on the system of education that is used to nurture its talent
from within. With the digital era taking the spotlight, and the world rapidly reforming into a global
village, it is now quintessential that a spirit of healthy competitiveness be inculcated in the budding minds
of this country. While trying to remodel and upgrade the education system, a key issue is that of quality of
education processes in the country. Needs and expectations of the society are changing very fast and the
quality of higher education requires to be sustained at the desired level. The use of internet for educational
purposes has increased many folds among Indian youths. Online video lectures and e-books are the
emerging trends among learners. The birth of high speed internet access and its availability on recently
evolved smart phones has opened several new avenues for learning. The growing popularity of these
smart phones among the youth can potentially revolutionize the way we learn. The introduction of 3G
technology is already being pinned as the next big thing in the mobile internet revolution. This paper
discusses the use of Smart Phones in Education Technology and its application in Technical &
Professional studies in India. We intend to put forward some challenges and advices.
KEYWORDS
Indian education system, high speed internet on smart phone, video lectures, e-books.
For More Details: http://airccse.org/journal/ijmit/papers/3311ijmit04.pdf
http://airccse.org/journal/ijmit/vol3.html
21. REFERENCES
[1] Mahbubur R Syed, Hakikur Rahman, Mohammad S Alam “Technologies and Issues in Distance
Education- Bangladesh Perspective” IEEE 2004, pp 72-76
[2] Chitra G Desai, Sahebrao N.Shinde “Web Based Education in India: A Changing Scenario” IEEE
2009 pp 262-265
[3] Kenneth Hoganson “Distance Learning and Converging Mobile Devices” IEEE 2009, pp 1114-1119
[4] Minghong Chen, Gang Li, Zhenhua Feng “Web Based Education Technology and Application In
Rural Basic Education” IEEE 2009, pp 281-284
[5] http://gigaom.com/2010/06/10/india-3g-subscribers/ Retrieved on January 19, 2011.
[6] http://www.ugc.ac.in
[7] http:// www.aicte.ac.in
[8] http:// www.aiuweb.org
[9] http://www.education.nic.in/uhe/uhe.asp
[10] http://www.ugc.ac.in/more/chairman_nehru_lecture.pdf
[11] http://www.education.nic.in/IHL/INSTITUTESNATIONALIMPORTANCE.pdf
[12] http:// www.vicepresidentofindia.nic.in/content.asp?id=321
[13] http:// www.en.wikipedia.org/wiki/All_India_Council_for_Technical_Education
[14] http:// www.updates.highereducationinindia.com/2010/saarc-university-to-start-functioning-
3361.php
[15] http://www.planningcommission.gov.in/plans/planrel/fiveyr/11th/11_v2/11v2_ch1.pdf
[16] http://www.timesofindia.indiatimes.com/india/Top-central-universities-have-34-teaching-
postsvacant/articleshow/5895118.cms
[17] Report of “The Committee to Advise on Renovation and Rejuvenation of Higher Education” from
http://www.education.nic.in/HigherEdu/YPC-Report.pdf . Retrieved on 20 March, 2011.
[18]
http://www.portal.unesco.org/education/en/ev.phpURL_ID=22329&URL_DO=DO_TOPIC&URL_SEC
TION=201.html
[19] http:// www.en.wikipedia.org/wiki/Indira_Gandhi_National_Open_University
[20] http:// www.unesdoc.unesco.org/images/0012/001284/128463e.pdf
[21] http://www.internetworldstats.com/asia/in.htm
22. [22] http://www.bcg.com/documents/file58645.pdf
[23] http://www.iamai.in/Upload/Research/icube_new_curve_lowres_39.pdf
[24] Draft Report Of Working Group On Higher Education 11th Five Year Plan from
http://www.aicteindia.org/downloads/higher_education_XIplan.pdf. Retrieved on 20 March, 2011.
[25] http://www.en.wikipedia.org/wiki/NPTEL
[26] http://www.nptel.iitm.ac.in/faq.php
[27] http://www.indiaedunews.net/Engineering/IIT_virtual_varsity_project_to_provide_degrees_soon_
13238/ Retrieved on January 19, 2011.
[28] http://www.apple.com/education/itunes-u/whats-on.html
[29] http://www.appleinsider.com/articles/10/08/24/apple_announces_itunes_u_downloads_top_300_
million.html Retrieved on January 19, 2011.
[30] http://www.youtube.com/education?b=400
[31] http://www.bruincast.ucla.edu/
[32] http://www.ocw.mit.edu/index.htm
[33] http://www.oyc.yale.edu/courselist
[34] http://www.uc.princeton.edu/main/index.php
[35] http://www.youtube.com/user/StanfordUniversity
[36] http://www.see.stanford.edu/see/courses.aspx
[37] http://www.emergingedtech.com/2010/02/a-dozen-great-free-online-video-lecture-sites
[38] http://www.teachertube.com/
[39] http://www.learnerstv.com
[40] http://www.lecturefox.com
[41] http://www.academicearth.org/
[42] https://www.testeachersonline.com/
[43] http://www.khanacademy.org/
[44] http://www.academicinfo.net/
[45] http://www.freevideolectures.com/
25. CUSTOMERS PERCEPTION OF M-BANKING ADOPTION IN KINGDOM OF BAHRAIN : AN
EMPIRICAL ASSESSMENT OF AN EXTENDED TAM MODEL
Ali AlSoufi1 and Hayat Ali2
1Department of Information Systems, University of Bahrain, Bahrain
2 Department of Information Systems, University of Bahrain, Bahrain
ABSTRACT
Mobile applications have been rapidly changing the way business organizations deliver their services to
their customers and how customers can interact with their service providers in order to satisfy their needs.
The use of mobile applications increases rapidly, and has been used in many segments including banking
segment. This research aims at extending the Technology Adoption Model (TAM) to incorporate the role
of factors in influencing customer’s perception towards M-banking adoption. Furthermore, the extended
TAM model was evaluated empirically to measure its impact on M-banking adoption in of Bahrain. The
model was evaluated using a sample survey of 372 customers. The results reveal that the intention to
adopt mobile banking is mainly affected by specific factors which are: Perceived Usefulness and Ease of
Use. On the other hand, some factors such as perceived cost and perceived risk did not show any affect on
the users' intention to use mobile banking. The result of this research is beneficial for banking service
managers to consider the factors that can enforce the Mobile Banking services adoption and increase the
take-up of their mobile services..
KEYWORDS
Mobile banking, online banking, Customer perception, Extended TAM
For More Details: http://airccse.org/journal/ijmit/papers/6114ijmit01.pdf
http://airccse.org/journal/ijmit/vol6.html
26. REFERENCES
[1] T. Laukkanen, “Internet vs. mobile banking: comparing customer value perceptions,” Business
Process Management Journal, Vol. 13, No. 6, 2007, pp. 788-797.
[2] A. S.Yang “Exploring adoption difficulties in mobile banking services,” Canadian Journal of
Administrative Sciences, Vol. 26, No. 2, 2009, pp. 136-149
[3] S.Y. Chian " Factors Affecting Individuals to Adopt Mobile Banking: Empirical Evidence from the
UTAUT Model", Journal of Electronic Commerce Research, Vol. 13, No. 2, 2012, pp. 104-121.
[4] J. Sripalawat, M. Thongmak, and A. Ngramyarn, “M-banking in metropolitan Bangkok and a
comparison with other countries,” The Journal of Computer Information Systems, Vol. 51, No. 3, 2011,
pp. 67-76.
[5] E. Scornavacca, and H. Hoehle, “ Mobile banking in Germany: A strategic perspective,” International
Journal of Electronic Finance, Vol. 1, No. 3, 2007, pp. 304-320
[6] H. Riquelme, and R. E. Rios, “The moderating effect of gender in the adoption of mobile banking,”
International Journal of Bank Marketing, Vol. 28, No. 5, 2010, pp. 328-341.
[7] M. Suoranta, and M. Mattila, “Mobile banking and consumer behavior: New insights into the
diffusion pattern,” Journal of Financial Services Marketing, Vol. 8, No. 4, 2004, pp. 354-366 .
[8] T. Laukkanen, and M. Pasanen, “Mobile banking innovators and early adopters: How they differ from
other online users?" Journal of Financial Services Marketing, Vol. 13, No. 2, 2008, pp. 86-94
[9] J. Puschel, J. A. Mazzon, and J. M. C. Hernandez, “Mobile banking: Proposition of an integrated
adoption intention framework,” International Journal of Bank Marketing, Vol. 28, No. 5, 2010, pp. 389-
409
[10] H. Hoehle &, S. Huff, "Electronic banking channels and task-channel fit". Paper presented at the
Thirtieth International Conference on Information Systems, 2009.
[11] M.A. Fishbein I. Ajzen,"Belief, Attitude, Intention and Behavior: An Introduction to Theory and
Research". Reading, MA: Addison-Wesley, 1975.
[12] F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information
technology". MIS Quarterly., vol. 13, no. 3, 1989, pp. 318–339.
[13] P. Legris, J. Ingham, & P. Collerette, "Why do people use information technology? A critical review
of the technology acceptance model". Information & Management., vol. 40, no. 3, 2003, pp. 191– 204.
[14] V. Venkatesh & F.D. Davis, "A theoretical extension of the technology acceptance model: four
longitudinal field studies". Management Science, vol. 46, no. 2, 2000, pp. 186–204.
[15] P. Luarn,, & H.H. Lin, "Toward an understanding of the behavioural intention to use mobile
banking". Computer in Human Behaviour, vol.21, no. 6, 2004, pp. 340-348.
27. [16] T. El-Kiki &.E. Lawrence (2007). Mobile User Satisfaction and Usage Analysis Model of
mGovernment Services [online] Available at:
http://www.m4life.org/proceedings/2006/PDF/11_ElKiki.pdf.
[17] Y, Shi (2009). Factors influencing the use of mobile banking: The case of SMS based mobile
banking [online] available at:
http://aut.researchgateway.ac.nz/bitstream/handle/10292/666/YuS.pdf?sequence=4
[18] D. Hale & R. Thakur, “Self-service technologies and Generation Y: are they beyond the personal
touch”. International Journal of Electronic Marketing and Retailing, vol. 1, no. 2, 2006, pp.
[19] Access Bank Contact Center (2010), what is access mobile [online]. Available at:
http://www.accessbankplc.com/Pages/Page.aspx?Value=51&ln=Gy7UlI4cSJE94Wa2qudbFQ%3D%
3D.
[20] AOEMA.“E-Government from a User’s Perspective” (No. telwg29/BFSG/14). Hong Kong, China:
Asia-Pacific Economic Cooperation (APEC), 2004
[21] B. W. Schay, M. E. Beach, J. A. Caldwell & C. LaPolice, “Using Standardized Outcome Measures in
the Federal Government”. Human Resource Management, vol.41, no.3, 2002, pp.355-368
[22] F. Wefering, S. Rupprecht, G. Wegeler, & A. Grimm, “Community Empowerment Network Through
Universal Regional integration for the 21st Century “, Evaluation Report D3.3, 2002
[23] R. C. Mayer, J. H. Davis, & D. Schoorman, “An Integration Model of Organizational Trust”.
Academy of Management Review, vol.20, no.3, 1995, pp.709-734.
[24] NECCC. “Enterprise Electronic Government: E2Gov. Presented at the National Electronic
Commerce Coordinating Council Symposium, Las Vegas, Nevada, 2001.
[25] P. Luarn, & H.H. Lin, “ Toward an understanding of the behavioural intention to use mobile
banking”. Computer in Human Behaviour, 2004, vol. 21, no.6, pp.340-348.
[26] A. Bandura, Self-Efficacy: The exercise of control. New York: Freeman, 1997
[27] F. Pajares & D. Schunk, (2001). Self-beliefs and school success: Self-efficacy, self-concept, and
school achievement. In R. Riding & S. Rayner (Eds.), Perception (pp. 239-266). London: Ablex
Publishing.[online] Available at: http://www.des.emory.edu/mfp/PajaresSchunk2001.html
[28] W.T. Rupp & A. D. Smith, “Mobile commerce: new revenue machine or black hole?”. Business
Horizons, vol. 45, no. 4,2002, pp. 26-29
[29] S, M. Featherman, “Predicting e-services adoption: a perceived risk facets perspective”. presented at
8th Americas Conference on Information Systems, Dallas, 9-11 August 2002
[30] P.A. Pavlou, (2001) Integrating trust in electronic commerce with the technology acceptance model:
model development and validation, in: Proceedings of the Seventh Americas Conference on
Information Systems, 2001, pp. 816–822.
28. EXTENDING UTAUT TO EXPLAIN SOCIAL MEDIA ADOPTION BY MICROBUSINESSES
Debashish Mandal and Robert J McQueen
Department of Management Systems, University of Waikato, New Zealand.,
ABSTRACT
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to
explain social media adoption by microbusinesses. A canonical action research method is used to study
social media adoption in microbusiness, and a post positivist approach is used to report the results based
on a predetermined premise. It is found that the major constructs of performance and effort expectancy
played an insignificant role, and social influence and facilitating conditions did not influence the
behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and
codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional
customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a
superior method of predicting adoption behavior within the context of microbusinesses..
KEYWORDS
UTAUT, social media, action research, microbusiness
For More Details: http://airccse.org/journal/ijmit/papers/4412ijmit01.pdf
http://airccse.org/journal/ijmit/vol4.html
29. REFERENCES
[1] I. Lee, “Overview of Emerging Web 2.0-Based Business Models and Web 2.0 Applications in
Businesses,” International Journal of E-Business Research, vol. 7, no. 4, pp. 1–16, Jan. 2011.
[2] W. G. Mangold and D. J. Faulds, “Social media: The new hybrid element of the promotion mix,”
Business Horizons, vol. 52, no. 4, pp. 357–365, Jul. 2009.
[3] M. Sepp, V. Liljander, and J. Gummerus, “Private bloggers’ motivations to produce content – a
gratifications theory perspective,” Journal of Marketing Management, vol. 27, no. 13–14, pp. 1479–
1503, Dec. 2011.
[4] P. R. Berthon, L. F. Pitt, K. Plangger, and D. Shapiro, “Marketing meets Web 2.0, social media, and
creative consumers: Implications for international marketing strategy,” Business Horizons, vol. 55, no. 3,
pp. 261–271, May 2012.
[5] B. D. Weinberg and E. Pehlivan, “Social spending: Managing the social media mix,” Business
Horizons, vol. 54, no. 3, pp. 275–282, May 2011.
[6] Y. K. Dwivedi, N. Mustafee, L. D. Carter, and M. D. Williams, “A Bibliometric Comparision of the
Usage of Two Theories of IS/IT Acceptance (TAM and UTAUT),” in AMCIS 2010 Proceedings. Paper
183, 2010.
[7] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User acceptance of information
technology: toward a unified view,” MIS Quarterly, vol. 27, no. 3, pp. 425–478, 2003.
[8] A. S. Lee, “Electronic mail as a medium for rich communication: An empirical investigation using
hermeneutic interpretation,” MIS quarterly, vol. 18, no. 2, pp. 143–157, 1994.
[9] M. D. Williams, Y. K. Dwivedi, B. Lal, and A. Schwarz, “Contemporary trends and issues in IT
adoption and diffusion research,” Journal of Information Technology, vol. 24, no. 1, pp. 1–10, Jan. 2009.
[10] O. Günther, H. Krasnova, D. Riehle, and V. Schondienst, “Modeling Microblogging Adoption in the
Enterprise,” in Americas Conference on Information Systems, 2009, pp. 1–10.
[11] P. Meyer and J. Dibbern, “An exploratory study about microblogging acceptance at work an
exploratory study about microblogging acceptance at work,” in AMCIS 2010 Proceedings of the sixteenth
Americas conference on information systems, Lima, Peru, August 12-15, 2010 Paper 449,
2010.
[12] V. Schoendienst, H. Krasnova, O. Guenther, and D. Riehle, “Micro-Blogging Adoption in the
Enterprise: An Empirical Analysis,” in 10th International Conference on Wirtschaftsinformatik, 2011,
no. February.
[13] Y. K. Dwivedi, N. Rana, H. Chen, and M. Williams, “A Meta-analysis of the Unified Theory of
Acceptance and Use of Technology (UTAUT),” vol. 366, M. Nüttgens, A. Gadatsch, K. Kautz, I.
Schirmer, and N. Blinn, Eds. Springer Boston, 2011, pp. 155–170.
30. [14] N. D. Oye, N. A.Iahad, and N. Ab.Rahim, “The history of UTAUT model and its impact on ICT
acceptance and usage by academicians,” Education and Information Technologies, Feb. 2012.
[15] V. Venkatesh, J. Thong, and X. Xu, “Consumer Acceptance and Use of Information Technology:
Extending the Unified Theory of Acceptance and Use of Technology,” MIS Quarterly, vol. 36, no. 1, pp.
157–178, 2012.
[16] S. Devaraj, R. F. Easley, and J. M. Crant, “Research Note--How Does Personality Matter? Relating
the Five-Factor Model to Technology Acceptance and Use,” Information Systems Research, vol. 19, no.
1, pp. 93–105, Mar. 2008.
[17] V. Venkatesh, S. A. Brown, L. M. Maruping, and H. Bala, “Predicting different conceptualizations
of system use: the competing roles of behavioral intention, facilitating conditions, and behavioural
expectation,” MIS Quarterly, vol. 32, no. 3, pp. 483–502, 2008.
[18] B. H. Sheppard, J. Hartwick, and P. R. Warshaw, “The Theory of Reasoned Past Action :
MetaAnalysis of with Modifications for Recommendations and,” Journal of Consumer Research, vol. 15,
no. 3, pp. 325–343, 1988.
[19] R. P. Bagozzi, “The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm
Shift .,” Journal of the Association for Information Systems, vol. 8, no. 4, pp. 244–254 Article 12,
2007.
[20] J. DiMicco, D. R. Millen, W. Geyer, C. Dugan, B. Brownholtz, and M. Muller, “Motivations for
social networking at work,” in Proceedings of the ACM 2008 conference on Computer supported
cooperative work - CSCW ’08, 2008, p. 711.
[21] S. Barnes and M. Böhringer, “Modeling use continuance behavior in microblogging services : the
case of twitter,” Journal of Computer Information Systems, vol. 51, no. 4, pp. 1–10, 2011.
[22] E. Turban, N. Bolloju, and T.-P. Liang, “Enterprise Social Networking: Opportunities, Adoption, and
Risk Mitigation,” Journal of Organizational Computing and Electronic Commerce, vol. 21, no. 3, pp.
202–220, Jul. 2011.
[23] X. Li, M. D. Troutt, A. Brandyberry, and T. Wang, “Decision Factors for the Adoption and
Continued Use of Online Direct Sales Channels among SMEs,” Journal of the Association for
Information Systems, vol. 12, no. 1, pp. 1–31, 2011.
[24] C. T. Street and D. B. Meister, “Small business growth and internal transparency: The role of
information systems,” MIS Quarterly, vol. 28, no. 3, pp. 473–506, 2004.
[25] R. D Macredie and K. Mijinyawa, “A theory-grounded framework of Open Source Software
adoption in SMEs,” European Journal of Information Systems, vol. 20, no. 2, pp. 237–250, Feb. 2011.
[26] S. Qureshil, M. Kamal, and P. Wolcott, “Information Technology Interventions for Growth and
Competitiveness in Micro-Enterprises,” International Journal of E-Business Research, vol. 5, no. 1,
pp. 117–140, Jan. 2009.
[27] D. DeLuca, M. J. Gallivan, and N. Kock, “Furthering information systems action research: a
postpositivist synthesis of four dialectics,” Journal of the Association for Information Systems, vol. 9, no.
2, pp. 48–72, 2008.
31. [28] I. Benbasat, D. K. Goldstein, and M. Mead, “The Case Research Strategy in Studies of Information
Systems,” MIS Quarterly, vol. 11, no. 3, pp. 369–386, 1987.
[29] R. Baskerville, “Grounded action research: a method for understanding IT in practice,” Accounting,
Management and Information Technologies, vol. 9, no. 1, pp. 1–23, Jan. 1999.