An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
The UTAUT model aims to explain user intentions to use information systems and subsequent usage behavior. It was developed by reviewing and consolidating eight previous models of technology acceptance. The UTAUT model proposes four key constructs that influence usage intention and behavior: performance expectancy, effort expectancy, social influence, and facilitating conditions. Gender, age, experience, and voluntariness of use are hypothesized to moderate the impact of the four constructs. Several studies have applied the UTAUT model to domains such as mobile service adoption, social media adoption, and computer use frequency. Some researchers have also extended the UTAUT model by adding additional constructs. However, others have critiqued the UTAUT model for having many independent variables and
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
This presentation is about UTAUT and UTAUT 2. In this slide also discuss briefly about UTAUT and changes made in UTAUT 2. It also discuss about how it can be applied in the classroom and the strength and weakness of using it.
The document discusses the Technology Acceptance Model (TAM) and its viability for determining acceptance of e-learning technologies in higher education institutions. TAM identifies perceived usefulness and perceived ease of use as key factors influencing attitudes toward and use of new technologies. The document reviews literature on TAM and its constructs. It also presents two case studies that applied TAM to evaluate student acceptance of online technologies for communication and public relations courses. Both case studies found TAM to be an effective model for predicting technology use.
The case for ubuntu linux operating system performance and usabilMaurice Dawson
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency in the system and regarded it as well integrated.
1. The document discusses the Technology Acceptance Model (TAM), which aims to explain and predict user acceptance of technology. TAM focuses on how perceived ease of use and perceived usefulness influence attitudes, behavioral intention, and actual technology use.
2. The document reviews several studies that have applied TAM across different contexts like education. It finds that TAM is useful for understanding factors that influence teacher and student acceptance of educational technologies.
3. However, the document also notes some weaknesses of TAM, such as its reliance on self-reported data and the broad nature of perceived ease of use and usefulness constructs. It suggests TAM needs more research in primary/secondary school settings.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
The UTAUT model aims to explain user intentions to use information systems and subsequent usage behavior. It was developed by reviewing and consolidating eight previous models of technology acceptance. The UTAUT model proposes four key constructs that influence usage intention and behavior: performance expectancy, effort expectancy, social influence, and facilitating conditions. Gender, age, experience, and voluntariness of use are hypothesized to moderate the impact of the four constructs. Several studies have applied the UTAUT model to domains such as mobile service adoption, social media adoption, and computer use frequency. Some researchers have also extended the UTAUT model by adding additional constructs. However, others have critiqued the UTAUT model for having many independent variables and
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
This presentation is about UTAUT and UTAUT 2. In this slide also discuss briefly about UTAUT and changes made in UTAUT 2. It also discuss about how it can be applied in the classroom and the strength and weakness of using it.
The document discusses the Technology Acceptance Model (TAM) and its viability for determining acceptance of e-learning technologies in higher education institutions. TAM identifies perceived usefulness and perceived ease of use as key factors influencing attitudes toward and use of new technologies. The document reviews literature on TAM and its constructs. It also presents two case studies that applied TAM to evaluate student acceptance of online technologies for communication and public relations courses. Both case studies found TAM to be an effective model for predicting technology use.
The case for ubuntu linux operating system performance and usabilMaurice Dawson
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency in the system and regarded it as well integrated.
1. The document discusses the Technology Acceptance Model (TAM), which aims to explain and predict user acceptance of technology. TAM focuses on how perceived ease of use and perceived usefulness influence attitudes, behavioral intention, and actual technology use.
2. The document reviews several studies that have applied TAM across different contexts like education. It finds that TAM is useful for understanding factors that influence teacher and student acceptance of educational technologies.
3. However, the document also notes some weaknesses of TAM, such as its reliance on self-reported data and the broad nature of perceived ease of use and usefulness constructs. It suggests TAM needs more research in primary/secondary school settings.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
Jurnal 2014 student attitudes towards and use of ict in course study, workEPY135
This document summarizes a study that examined student attitudes towards and use of information and communication technology (ICT) in the contexts of course study, work, and social/leisure activities. The study used the technology acceptance model (TAM) as a framework to understand how perceptions of usefulness and ease of use influence technology adoption. Surveys were administered to students in six different courses. Factor analysis revealed that usefulness and ease of use were key dimensions for ICT attitudes across all three contexts, but that ICT was perceived most positively in the work context, and technology use at work was an important driver for technology use in other areas.
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experiences of Faculty
Dr. Joseph K. Adjei
School of Technology (SOT)
Ghana Institute of Management and Public Administration (GIMPA)
2nd International Conference of the African Virtual University
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
This document summarizes Stefan Taubenberger's PhD research on using business process security requirements for IT security risk assessment. The research aims to determine if IT security risks can be reliably evaluated solely based on assessing adherence to security requirements, without using probabilities and events. The approach involves modeling business processes, identifying critical assets and security requirements, and evaluating how well security controls and processes meet the requirements. Preliminary validation using a reinsurance company's processes supports the idea that risks can be determined this way. The research seeks to address limitations of traditional risk assessment approaches.
A web-based survey and theoretical research focuses mainly on the hazards that children are exposed to while surfing the digital world. It addresses the problem from parents/caregivers perspective and tries to shed light over the best ways of understanding and precautionary means. It is important for families to take all preventive measures to protect their kids from such hazards.
The quasimoderating effect of perceived affective quality on an extending Tec...alabrictyn
This document discusses an empirical study that tests an extended Technology Acceptance Model (TAM) to understand factors influencing learner acceptance of the WebCT e-learning system. The study incorporates additional constructs of perceived affective quality (PAQ), flow, perceived usefulness (PU), and perceived ease of use (PEOU) to predict behavioral intention to use WebCT. Structural equation modeling is used to analyze relationships between constructs and test hypotheses. Results support that PU, PEOU, and flow positively impact intention to use WebCT, and that PAQ has a moderating effect on the relationships in the extended TAM.
It ethics undergraduates’ perception based on their awarenessAlexander Decker
This document discusses a study that explored undergraduate students' perceptions of ethical information technology use based on their awareness. The study surveyed 542 students from 4 universities in Pakistan about various computer and internet activities, asking them to label each as right, wrong, or neither. The results found that many students lacked prior training in computer ethics and had little knowledge about the topic. Female students, those from public universities, computing/IT departments, and science disciplines generally had more positive views of ethical IT use. Minimal differences were seen based on prior IT training or ethics knowledge. This suggests computer ethics training is needed for all university students.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
Assesssment of internet service quality and customers’ satisfaction in univer...Alexander Decker
This study examined internet service quality and customer satisfaction at the University of Ilorin in Nigeria. A survey was conducted of 60 academic staff, 40 non-academic staff, and 100 students to understand their awareness of internet services, technical difficulties experienced, and perceptions of quality. The results found that over 90% of staff and 75.5% of students were aware of internet services on campus. However, over 50% of staff and 85.7% of students reported issues like insufficient bandwidth and poor electricity that hindered effective use. Based on these problems, over 50% of staff and 65% of students expressed dissatisfaction with the quality of internet services. Most respondents felt quality and satisfaction could be improved by addressing bandwidth, training
This document provides an overview of best practices for conducting mobile user experience research. It discusses the challenges of mobile research like varied devices, locations, networks and user experiences. It recommends testing across many devices and simulators, addressing network coverage issues, screening for data plans and experience. Field studies are suggested to understand true context of use. Tips include creating a "hot zone" for devices, addressing reflections, simplifying language and having prototype strategies. The document emphasizes understanding usage across many scenarios to effectively evaluate mobile products and identify opportunities for improvement.
This document summarizes key lessons from 11 qualitative studies of enterprise mobility conducted between 2001-2007. It explores six aspects of how mobile information technology impacts organizations:
1. Interaction - Mobile IT can mediate remote interactions by removing time/space constraints, or support situated interactions by enabling work to be done in specific locations while maintaining remote access.
2. Management of work - Mobile IT can increase organizational control over employees or give individuals more discretion over how and when they work.
3. Collaboration - Mobile IT can support either individual or collective work arrangements.
4. Technology use - Mobile IT can be ubiquitous and transparent in everyday use, or opaque and requiring conscious engagement.
5. Impact on practices
The paper investigates factors that influence student performance in online and campus-based courses as measured by final course grade. It focuses on the relationship between e-learning tools (like discussion forums and chats) and performance. The paper studies how perceived usefulness, perceived ease of use, computer self-efficacy, computer anxiety, and ability to work independently correlate with course grade. It finds that perceived usefulness, perceived ease of use, and ability to work independently significantly predict grade. The paper aims to explore how e-learning tools affect performance, rather than compare online to campus-based courses.
Representing and Evaluating Social Context on Mobile DevicesKris Mihalic
The document summarizes research on representing and evaluating social context on mobile devices. It describes related work using context-aware systems and experience sampling methods. It then outlines a study that used ontologies and a mobile prototype to model relationship types, mood, communication channels, and settings based on user-initiated and system-triggered surveys. The results showed that communicated content, relationship types, and mood are impacted by social contexts, and that experience sampling is suitable for studying social contexts, while semantic web ontologies are useful for representing complex contextual models.
AN ENHANCED ELECTRONIC TRANSCRIPT SYSTEM (E-ETS)ijcsit
Transcript is an inventory system holding student academic record. This system has been implemented
conventional, electronically or implemented using web services approaches which have been devoid of
mobile computing approach and system classification rules. The proposed architecture provides an
assiduous pathway for the implementation of the aforementioned issues. This architecture has the
propensity for cutting down operational cost and hardcopy documentation while handling organizational
procedures and processes
1) The study examined how Norwegian tourists described destinations they visited and their motivations.
2) A survey found that when asked where they went, most respondents described specific regions or cities within countries rather than just the country name.
3) The results showed eight distinct motivation factors for Norwegian outbound tourists but no significant association between motivation and country visited. Motivations did not determine country choice.
The study of e commerce service systems in global viral marketing strategyIAEME Publication
This document discusses viral marketing and e-commerce service systems. It defines viral marketing as a strategy that encourages people to voluntarily pass along a marketing message, potentially reaching many people at low cost. The document examines characteristics of effective viral marketing, including being simple, providing value, and utilizing existing social networks. It provides examples of companies like Hotmail that used viral strategies successfully. Benefits include increased brand awareness at low cost by leveraging social sharing.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
Jurnal 2014 student attitudes towards and use of ict in course study, workEPY135
This document summarizes a study that examined student attitudes towards and use of information and communication technology (ICT) in the contexts of course study, work, and social/leisure activities. The study used the technology acceptance model (TAM) as a framework to understand how perceptions of usefulness and ease of use influence technology adoption. Surveys were administered to students in six different courses. Factor analysis revealed that usefulness and ease of use were key dimensions for ICT attitudes across all three contexts, but that ICT was perceived most positively in the work context, and technology use at work was an important driver for technology use in other areas.
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experiences of Faculty
Dr. Joseph K. Adjei
School of Technology (SOT)
Ghana Institute of Management and Public Administration (GIMPA)
2nd International Conference of the African Virtual University
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
This document summarizes Stefan Taubenberger's PhD research on using business process security requirements for IT security risk assessment. The research aims to determine if IT security risks can be reliably evaluated solely based on assessing adherence to security requirements, without using probabilities and events. The approach involves modeling business processes, identifying critical assets and security requirements, and evaluating how well security controls and processes meet the requirements. Preliminary validation using a reinsurance company's processes supports the idea that risks can be determined this way. The research seeks to address limitations of traditional risk assessment approaches.
A web-based survey and theoretical research focuses mainly on the hazards that children are exposed to while surfing the digital world. It addresses the problem from parents/caregivers perspective and tries to shed light over the best ways of understanding and precautionary means. It is important for families to take all preventive measures to protect their kids from such hazards.
The quasimoderating effect of perceived affective quality on an extending Tec...alabrictyn
This document discusses an empirical study that tests an extended Technology Acceptance Model (TAM) to understand factors influencing learner acceptance of the WebCT e-learning system. The study incorporates additional constructs of perceived affective quality (PAQ), flow, perceived usefulness (PU), and perceived ease of use (PEOU) to predict behavioral intention to use WebCT. Structural equation modeling is used to analyze relationships between constructs and test hypotheses. Results support that PU, PEOU, and flow positively impact intention to use WebCT, and that PAQ has a moderating effect on the relationships in the extended TAM.
It ethics undergraduates’ perception based on their awarenessAlexander Decker
This document discusses a study that explored undergraduate students' perceptions of ethical information technology use based on their awareness. The study surveyed 542 students from 4 universities in Pakistan about various computer and internet activities, asking them to label each as right, wrong, or neither. The results found that many students lacked prior training in computer ethics and had little knowledge about the topic. Female students, those from public universities, computing/IT departments, and science disciplines generally had more positive views of ethical IT use. Minimal differences were seen based on prior IT training or ethics knowledge. This suggests computer ethics training is needed for all university students.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
Assesssment of internet service quality and customers’ satisfaction in univer...Alexander Decker
This study examined internet service quality and customer satisfaction at the University of Ilorin in Nigeria. A survey was conducted of 60 academic staff, 40 non-academic staff, and 100 students to understand their awareness of internet services, technical difficulties experienced, and perceptions of quality. The results found that over 90% of staff and 75.5% of students were aware of internet services on campus. However, over 50% of staff and 85.7% of students reported issues like insufficient bandwidth and poor electricity that hindered effective use. Based on these problems, over 50% of staff and 65% of students expressed dissatisfaction with the quality of internet services. Most respondents felt quality and satisfaction could be improved by addressing bandwidth, training
This document provides an overview of best practices for conducting mobile user experience research. It discusses the challenges of mobile research like varied devices, locations, networks and user experiences. It recommends testing across many devices and simulators, addressing network coverage issues, screening for data plans and experience. Field studies are suggested to understand true context of use. Tips include creating a "hot zone" for devices, addressing reflections, simplifying language and having prototype strategies. The document emphasizes understanding usage across many scenarios to effectively evaluate mobile products and identify opportunities for improvement.
This document summarizes key lessons from 11 qualitative studies of enterprise mobility conducted between 2001-2007. It explores six aspects of how mobile information technology impacts organizations:
1. Interaction - Mobile IT can mediate remote interactions by removing time/space constraints, or support situated interactions by enabling work to be done in specific locations while maintaining remote access.
2. Management of work - Mobile IT can increase organizational control over employees or give individuals more discretion over how and when they work.
3. Collaboration - Mobile IT can support either individual or collective work arrangements.
4. Technology use - Mobile IT can be ubiquitous and transparent in everyday use, or opaque and requiring conscious engagement.
5. Impact on practices
The paper investigates factors that influence student performance in online and campus-based courses as measured by final course grade. It focuses on the relationship between e-learning tools (like discussion forums and chats) and performance. The paper studies how perceived usefulness, perceived ease of use, computer self-efficacy, computer anxiety, and ability to work independently correlate with course grade. It finds that perceived usefulness, perceived ease of use, and ability to work independently significantly predict grade. The paper aims to explore how e-learning tools affect performance, rather than compare online to campus-based courses.
Representing and Evaluating Social Context on Mobile DevicesKris Mihalic
The document summarizes research on representing and evaluating social context on mobile devices. It describes related work using context-aware systems and experience sampling methods. It then outlines a study that used ontologies and a mobile prototype to model relationship types, mood, communication channels, and settings based on user-initiated and system-triggered surveys. The results showed that communicated content, relationship types, and mood are impacted by social contexts, and that experience sampling is suitable for studying social contexts, while semantic web ontologies are useful for representing complex contextual models.
AN ENHANCED ELECTRONIC TRANSCRIPT SYSTEM (E-ETS)ijcsit
Transcript is an inventory system holding student academic record. This system has been implemented
conventional, electronically or implemented using web services approaches which have been devoid of
mobile computing approach and system classification rules. The proposed architecture provides an
assiduous pathway for the implementation of the aforementioned issues. This architecture has the
propensity for cutting down operational cost and hardcopy documentation while handling organizational
procedures and processes
1) The study examined how Norwegian tourists described destinations they visited and their motivations.
2) A survey found that when asked where they went, most respondents described specific regions or cities within countries rather than just the country name.
3) The results showed eight distinct motivation factors for Norwegian outbound tourists but no significant association between motivation and country visited. Motivations did not determine country choice.
The study of e commerce service systems in global viral marketing strategyIAEME Publication
This document discusses viral marketing and e-commerce service systems. It defines viral marketing as a strategy that encourages people to voluntarily pass along a marketing message, potentially reaching many people at low cost. The document examines characteristics of effective viral marketing, including being simple, providing value, and utilizing existing social networks. It provides examples of companies like Hotmail that used viral strategies successfully. Benefits include increased brand awareness at low cost by leveraging social sharing.
1) The document presents a study on conceptualizing global marketing strategy (GMS) and its effect on firm performance.
2) It develops a broad conceptualization of GMS and a model linking GMS to antecedents like international experience and external conditions, and consequences like strategic and financial performance.
3) The empirical analysis found GMS has a positive effect on performance and is influenced by experience, orientation, and external conditions. Firms can benefit from standardized strategies and accumulating international experience.
Penelitian ini menguji pengaruh citra merek terhadap loyalitas pelanggan dan komitmen pelanggan di pasar telepon seluler China. Hasilnya menunjukkan bahwa citra merek berpengaruh positif terhadap loyalitas pelanggan dan komitmen pelanggan. Temuan ini bermanfaat bagi perusahaan untuk mempertahankan merek yang kuat dalam pasar yang kompetitif.
This document summarizes a research study that examined the relationship between relational dynamics (trust, personalization, communication, conflict handling, and empathy) and relationship quality in the banking industry of Malaysia and New Zealand. The study surveyed 150 bank customers in Kuala Lumpur, Malaysia and 208 bank customers in Dunedin, New Zealand. The results of multiple regression analysis showed that the five relational dynamics explained 84% and 76% of the variations in relationship quality in Malaysia and New Zealand, respectively. Communication, trust, and empathy were significantly related to relationship quality in both countries, while personalization had a significant impact in New Zealand but not Malaysia. Conflict handling was significantly associated with relationship quality in New Zealand and marginally associated
Similar to An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning
Assessment 3: Essay
Length: 1500 words
Weighting: 45%
This last assessment builds on the annotated bibliography completed as Assessment 1 and your Assessment 2 essay plan. Use the feedback from your Assessment 2 to write an essay developing an argument for or against your chosen topic. The essay choices are as already presented:
1. Educational institutions should incorporate mobile technology for the benefit of students.
1. Using social media enhances adolescent well-being.
1. Mobile technology will continue to transform health care in positive ways.
You need to:
· Take a position and argue your case with supporting evidence. You may support or argue against the topic. Include a counterargument either in a separate paragraph or within your supporting point(s).
· Remember to include at least six sources of evidence to support your argument.
· Be sure to include a reference list on a separate page, using APA referencing.
· Go through the marking criteria carefully to ensure you have addressed all the marking criteria for your essay.
Marking criteria – see over the page
Davison, C. B. Lazaros, E. J. (2015). Adopting mobile technology in the higher education classroom. Journal of Technology Studies, 41:1, 30-39. Retrieved from https://www.ebsco.com
This 2015 article looks at the discoveries from a study of an Indiana research and teaching university, focusing on the student’s practices with mobile technologies. The findings were based on, and cross examined with a previous similar study of British students that was undertaken 9 years prior. Key ideas demonstrated are the technological influence of mLearning in the tertiary education environment, carried out with intentions of providing infrastructure integration techniques and insight to educators, by identifying characteristics and patterns within the mobile technology utilization of the student body. The study touches on student perceptions of mobile learning, the most popular method of communicating and the benefits. A limitation to this study include lack of personal interviews with students to provide concurrent opinions of findings presented, and an uncertain means of accumulating data by use of an anonymous online poll. A further limitation includes lack of an in-depth explanation to the conclusion that laptops are the most preferred tool amongst the participants. The piece itself has been published in the peer-reviewed Journal of Technology Studies, which is owned by an international honor society of technology professions. In particular this article will be helpful in providing a comparison between the study a decade previously, to monitor what the sequences of mLearning in the classroom has demonstrated, and to collate with new evidence between this article and now.
Henderson, M. Selwyn, N. Aston, R. (2015). What works and why? Student perceptions of ‘useful’ digital technology in university teaching and learning. Studies in Higher Education, 42:8, 1567-1579, DOI: 10.1080/030 ...
This document discusses the use of mobile learning (m-learning) in undergraduate education. It begins by introducing m-learning and how it allows students to access educational materials anywhere through mobile devices. It then states the purpose is to study the effects of m-learning tools on student academic achievement. Finally, it reviews literature that has found m-learning can enhance the learning process and student performance when used as a supplement to traditional classroom learning.
020. students’ attitude and behavioural intention on adoption of internet for...Gambari Isiaka
This document summarizes a study that examined students' attitudes and behavioral intentions regarding adopting the internet for learning. The study surveyed 200 undergraduate students at Al-Hikmah University in Nigeria. The findings showed that perceived usefulness was the strongest determinant for adopting the internet for learning. Students' attitudes were also found to significantly influence their adoption of the internet. However, facilitating conditions did not significantly impact adoption. The study aims to better understand factors influencing internet adoption for education among Nigerian students.
Revisiting the definition of Mobile LearningHelen Farley
Mobile learning is increasingly seen as a boon to universities and educators as a means of enabling learning anywhere, anytime and at the convenience of the learner. Even though the field of mobile learning is in its infancy, there is no common understanding of what mobile learning is. Previous attempts at defining mobile learner have either been overly inclusive or exclusive, and have focused on characteristics of the mediating technology, the learner, or the nature of the learning activity. Inspired by Wittgenstein’s theory of family resemblances, this paper explores the attempt to create a new definition of mobile learning that will be dynamic, drawing from a collection of characteristics that may change over time rather than just supplying a single, unchanging definition. The revised definition will be used to support the development of a Mobile Learning Evaluation Framework by clarifying the attributes and features to be included in a robust and flexible definition of mobile learning. The outcome may be of value to researchers in the mobile learning field and educators considering incorporating mobile learning initiatives into current pedagogical strategies.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
How Do Students Use Their Mobile Devices to Support Learning? A Case Study fr...Helen Farley
Though universities are eager to leverage the potential of mobile learning to provide learning flexibly, most balk at the cost of providing students with mobile hardware. The practice of ‘bring your own device’ (BYOD) is often mooted as a cost-effective alternative. This paper provides a snapshot of student ownership of mobile devices at a regional Australian university. Our research shows that students do have access to and use a wide range of devices. However, the delivery of learning is challenged when students try to access materials and activities using these devices. Course materials are rarely optimised for use on smartphones, navigating websites and learning management systems becomes a scrolling nightmare, and interacting with other students is often impractical using prescribed systems. Most concerning is that none of the students surveyed were participating in educator-led mobile learning initiatives. The paper concludes with the proposal of some practical, low-cost tactics that educators could potentially employ to begin engaging with mobile learning, leveraging what students already do.
DETERMINING FACTORS THAT INFLUENCE STUDENTS’ INTENTION TO ADOPT MOBILE BLACKB...ijma
As a newly developing academic domain, researches on Mobile learning are still in their initial stage.
Meanwhile, M-blackboard comes from Mobile learning. This study attempts to discover the factors
impacting the intention to adopt mobile blackboard. Eleven selected model on the Mobile learning
adoption were comprehensively reviewed. From the reviewed articles, the most factors are identified. Also,
from the frequency analysis, the most frequent factors in the Mobile blackboard or Mobile learning
adoption studies are performance expectancy, effort expectancy, perceived playfulness, facilitating
conditions, self-management, cost and past experiences. The descriptive statistic was performed to gather
the respondents’ demographic information. It also shows that the respondents agreed on nearly every
statement item. Pearson correlation and regression analysis were also conducted.
This document discusses mobile learning and its uses in education. It begins with an introduction to mobile learning and its importance. It then reviews literature on using mobile technology for finding information, providing feedback, learning new concepts, taking notes, reading, calculating, communicating, planning and collaborating. Frameworks for mobile learning are also discussed. The document reviews concerns about and trends in mobile learning and concludes that mobile learning is most effective when integrated into the curriculum.
The Impact of Social Media Technologies on Adult Learning IJECEIAES
Technology and social media have presented significant tools for adult learners to learn and advance continually. Fast technological advancements have enabled development of technologies used for learning. Expansion of various tools has given professors, educaters, trainers, instructers, many alternatives towards the implementation of the technology supported learning. The use of social media can improve adult learning outcomes and academic accomplishment. Social media is increasingly proven to be beneficial in adult learning and has a huge potential for adult education. This paper sheds some lights on benefits of social media for adult learners, this is incorporated through the review of previous work and some barriers that encounters social media for learning purposes. Also some social media models are reviewed to show the growth and effect of social media in adult learning context, and suggestions and recommendations are provided.
Evaluation of mobile teaching and learning projects, introductionHelen Farley
In the decade and a half since the beginning of the new millennium, mobile computing technologies have evolved rapidly, enabling increasingly sophisticated methods of communication and interaction. As a result of the incremental improvements in design, tendency towards reduced size, increased functionality, improvements in data storage capability, and the reliability and ubiquity of the networks that support them, mobile technologies are increasingly perceived as essential to the conduct of people’s everyday lives (Evans-Cowley, 2010).
The Effect of Mobile Learning on the Development of the Students' Learning Be...inventionjournals
This research study was conducted on 153 students from the Jordanian University. A researchermade Likert-type questionnaire was adopted. A five-question questionnaire was formulated to measure the effect of mobile learning at the University’s students focusing on different aspects. The reliability of the questionnaire was at 91% through the use of Chronbach’s Alpha. T test was adopted to find out significance of differences among the different used variables that supported the effect of mobile learning on the student’s development in learning behaviors and performances. ANOVA was embraced to examine the student’s learning behaviors on mobile learning. The results showed that mobile learning accrues positive effect on motivating the students towards learning. There was also a positive correlation mobile learning to increased academic performance. Finally, the results indicated that M-learning changed student’s learning habits for the better.
This study used the Unified Theory of Acceptance and Use of Technology (UTAUT) model to evaluate acceptance and use of a virtual learning environment (VLE) in higher education in Turkey and the UK. Questionnaires were completed by over 1,000 students using similar VLEs in both countries. The study found differences between the two countries in behavioral intention to use and actual use of the VLE, as well as differences in the impact of factors like performance expectancy, effort expectancy, and social influence on behavioral intention and use behavior. The study aimed to contribute to understanding acceptance of technology in different cultural contexts.
Knowledge, social media and technologies for a learning societywanzahirah
The document summarizes several papers presented in a special issue of the journal Transactions of the SDPS on the topics of knowledge, social media, and technologies for learning. The papers explore how new technologies and social media are changing learning and discuss approaches like using smartphones and scaffolding tools to enhance the learning process. They also address challenges in recommending learning resources and the role of collective intelligence in driving innovation. The goal of the special issue is to look at the future of education from a transdisciplinary perspective.
Demetrios G. Sampson and Panagiotis Zervas,
Context-Aware Adaptive and Personalized Mobile Learning
Tutorial Slides
@ International Summer School on Educational Technology 2013, Beijing Normal University, Beijing, China, 19-23 July
@ The 4th IEEE International Conference on Technology for Education (T4E 2012), Hyderabad, India, 18-20 July 2012
This document discusses the past, present, and future of mobile learning (mLearning). It defines mLearning as eLearning through mobile devices and learning across contexts. The document outlines four perspectives on mLearning and discusses how mLearning builds upon eLearning by making education available anywhere, anytime through portable devices. Challenges and trends in mLearning are also examined, such as location-based learning and augmented reality. The future of mLearning is predicted to include new forms of assessment, learning implants, and ambient intelligence.
Mobile learning anytime, anywhere: What are our students doing?Helen Farley
Recent developments in mobile technologies have provided unique opportunities for learning and teaching. This paper reports on recent research undertaken at a regional Australian university in order to understand how higher education students are using mobile devices to support their learning. A survey instrument was developed and deployed and the data collected analysed quantitatively. Upon analysis, these data demonstrate that students are predominantly using laptop computers to support their learning, but their use of smart phones and tablets are also used for a number of specific learning activities. Further analysis indicates that in spite of the limitations in the formal university infrastructure, many students would like to use their mobile devices for formal
learning as well as informal learning.
In China, a mobile education app is one of the top-three most popular apps, and its market size is
continually growing. As the age of the largest group of mobile app users in China is between 26 and 30 years
old, college students will become the largest potential group to use mobile education apps in the future.
Therefore, understanding the Chinese potential consumers’ attitude and behavior intention to use mobile
education apps is a good way for marketers to set up competitive strategies during promotions. Based on the
TAM model, this study used perceived usefulness, perceived ease of use, and perceived enjoyment to measure
students’ attitude and behavior intention to use mobile education apps in China. Based on the research of 125
Chinese college students, the result indicated that perceived usefulness and perceived enjoyment were positively
influencing users’ attitude and intention to use mobile education apps. However, the perceived ease of use didn’t
affect participants’ behavior intention to use education apps. It confirms that the perceptions of usefulness and
enjoyment are indicators of attitude and intention to use mobile education apps among Chinese college students.
Moreover, the perceived ease of use has a positive impact on the Chinese college students’ attitude toward
education apps but not the individual intention to use the apps. Therefore, in order to target Chinese college
students, marketers can focus on the usefulness and enjoyment of using education apps.
Similar to An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning (20)
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent.
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This talk will discuss technical, human, societal, and policy issues concerning hyperconnectivity and IoT. Additionally, this talk will offer insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
The document discusses gaining control of a situation through intelligence gathering and search techniques in order to find vulnerabilities that can be exploited to perform unparalleled events. It explores controlling the landscape through applying intelligence operations, information warfare, data science, and cybersecurity to search for and sample applications that allow one to exploit and destroy through techniques like searching for PHP errors that enable SQL injection. The session aims to explore this landscape and applications of control, search, exploit, and destroy.
The document summarizes the activities of the Midwest Association for Information Systems (MWAIS) in 2017, provides information about the 2018 annual conference, and makes a call for future conference organizers. Key points:
- MWAIS was recognized for the third year in a row as an outstanding AIS chapter in 2016. The 2017 annual conference in Springfield, Illinois was well attended with over 100 participants.
- The 2018 conference will be held in St. Louis, Missouri in May and focus on the theme of cybersecurity.
- Future conferences will be hosted by the University of Wisconsin-Oshkosh in 2019 and Drake University in 2020. Hosting a conference is an opportunity to showcase a university and
The document provides insights from a student who traveled to Guinea, Conakry to conduct a 2-week training assignment for the agriculture sector. The student trained Agriculture Trainers and Specialized Technicians in computer skills like Microsoft Office and using the Internet as a research tool. The experience helped the student contribute to the global society and learn about Guinean culture. The student advised that such assignments provide professional and personal growth opportunities. The document also discusses establishing an enterprise security architecture and key elements to consider like information, strategies, security mechanisms, and security services. The architecture should be flexible, adaptable, and promote self-regulation to address evolving security threats.
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
This document provides the schedule for the 2018 Midwest Association for Information Systems (MWAIS) Conference taking place May 17-18 at the University of Missouri-St. Louis. The schedule lists the times, locations, and topics for events including keynote speakers, panels, presentations in concurrent sessions, workshops, and social events. Some of the topics covered are cybersecurity, artificial intelligence, healthcare IT, e-commerce, and pedagogical issues related to information systems education. Transportation between the conference hotel and campus is provided via shuttle.
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
Midwest Association for Information Systems
13th Annual Conference
May 24 – 25, 2018
College of Business Administration
University of Missouri – Saint Louis
Saint Louis, Missouri
We invite submissions of completed manuscripts, research-in-progress papers, panel proposals, and workshop proposals addressing behavioral, organizational, and technical aspects of information systems. Two to three parallel sessions are planned. A computer lab will be available if needed. Submitted papers and proposals will undergo a double blind review process by at least two reviewers. To facilitate the blind review, include the title of the paper, names, affiliations, mailing addresses, e-mail addresses, and phone numbers of all authors on a cover page submitted as a separate document from the body of the manuscript. If one or more of the co-authors are students, please clearly indicate so. Include only the title of the paper at the beginning of the manuscript. In the case of multiple-authorship, designate the corresponding author with a footnote on the cover page. Please do not include any author or affiliation identification on any page (except the separate cover page), in headings/footers, or in the properties of the submitted file. Previously published work or work under review elsewhere is not eligible for submission. All submissions should be posted electronically in either MS Word or PDF.
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
Recently some countries have fell victim to attacks from nation-states, cyber criminals, and bad actors resulting in loss of critical data or damage to critical infrastructure. Thus there is an urgent need to design, implement, and deliver innovative solutions that meet the challenges through advancements in intellection collection, analysis. This submission will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world concerning multiple sources of intelligence. This submission will provide insights into technological advancement for all cyber intelligence. Additionally, technological advancements for subjects such as open source intelligence, human intelligence, geospatial intelligence, social media intelligence, and data science will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
Data and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
This presentation discusses UMSL's cyber security program which is currently the only and first NSA & DHS CAE in cyber security education in the St. Louis Metropolitan Region.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning
2. 2 SAGE Open
its effectiveness. Just because a technology is widely avail-
able, does not mean that it will be used or adopted (Liu, Han,
& Li, 2010). This idea has been the premise of adoption
research in all systems research: A system is only good if it is
used.
Mobile devices are used in high numbers; and the ques-
tion is one of how, why, and what. What makes the students
want to use mobile devices, and how can this best be facili-
tated by organizations such as universities? This study and
other related studies are attempting to address the new reality
of ubiquitous computing devices at the university level.
Yordanova (2007) states that wireless technologies have high
acceptance among the younger generation. M-learning has
the attributes of being both mobile and ubiquitous (Alexander,
2006; Yordanova, 2007). M-learning is an extension of
e-learning and has been tested in the literature as a stand-
alone educational platform, but more importantly, as add-on
platform and channel for existing hybrid, face to face, and
e-learning classes. Seong states that “mobile learning pre-
sumes the use of mobile Internet technology to facilitate the
learning process” (Seong, 2006, p. 1). This presumption is
founded on the rapid growth of wireless and mobile comput-
ing devices (Seong, 2006). Mobile devices are already being
used by a majority of the students for other purposes; the
literature illustrated that there were many studies regarding
learning and mobile devices. Sharples (2007) stated there is
a need to re-conceptualize learning for the mobile age, point-
ing out that there are many existing roles of mobility and
communication in the learning process. Many of these
changes are found within e-learning with its collaborative
advantages and constructivist nature. This was shown in the
review of the literature, as numerous applications of m-learn-
ing were provided. Therefore, a logical next step is to deter-
mine the effective ways to use these devices within the
contemporary classroom, whether brick and mortar, e-
learning, or a hybrid learning environment.There is a lack of
empirical research concerning m-learning adoption factors.
A continuing issue in information systems research is the
identification and determination of the factors that are related
to the cause and then acceptance of a technology (King &
He, 2006). Shengquan, Xianmin, Gang, and Minjuan (2015)
indicate that not much research has been conducted in the
discipline of m-learning as this is fairly new and is just gain-
ing acceptance as a research object within the literature.
M-learning is supplemental and aids the student by provid-
ing ubiquitous access to both the online and hybrid class-
room. Because these types of learning are collaboration
intensive and constructivist in nature, the smartphone has
been adopted by many for the purpose of extending as it is an
ideally suited technology for expanding the classroom.
SEM Model Variables
Self-efficacy (SE) is the individual’s comfort level with
using technology (Tweed, 2013). The facilitating conditions
are the second component, which is the availability of
resources needed to use the technology. Subjective norms
(SN) are social pressures that make an individual perform a
particular behavior (Ajzen, 1991). The individual’s social
groups may have different opinions regarding the adoption
of a technology. Prior use of e-learning (PRIORE) is the indi-
vidual’s prior exposure and use of e-learning technologies. In
this study, we are using a learning management system as the
standard for including the individual in the study.
Perceived usefulness (PU) is the degree to which the indi-
vidual believes that a technology would improve his or her
job performance (Davis, 1989). Perceived ease of use
(PEOU) is the degree to which an innovation is easy to
understand (Rogers, 2003) or the degree to which the tech-
nology is free of effort (Davis, 1989). Innovations that are
perceived to be less complex to use and have a higher possi-
bility of adoption/acceptance by potential users
BIs are correlated with actual behavior. BIs are “the single
best predictor of actual usage” (Venkatesh & Davis, 1996,
p. 20). In addition, “the intention-behavior linkage is proba-
bly the most uncritically accepted assumption in social sci-
ence research” (Bagozzi, 2007, p. 245). Ajzen (1991) found
that an individual’s attitude toward a particular behavior is
equivalent to that person’s overall assessment of performing
the behavior.
Data Analysis
Many of the relevant variables in this study had been prede-
termined by the application of previous research models.
Therefore, selection of relevant variables was predetermined
for examination and possible inclusion or exclusion in the
study based on their respective strength in the related
studies.
The survey data were entered into Warp Partial Least
Squares (PLS) 3.0. PLS is a second generation statistical
technique for conducting Structural Equation Modeling
(SEM)-based analysis. The utility of PLS is detailed else-
where (Falk & Miller, 1992). With respect to technology
acceptance, a number of recent studies utilized PLS
(Al-Gahtani, 2001; Venkatesh, Morris, Davis, & Davis,
2003). PLS allows for the evaluation of psychometric prop-
erties of indicators used to measure a variable, and the esti-
mation of direction and strength of the relationships among
the model variables. PLS includes two sets of equations: the
measurement model, or outer model, composed of equations
representing the relationships between indicators and the
variable they measure, and the structural model composed of
equations representing the paths among the study’s variables.
PLS calculates weights and loading factors for each item in
relation to the construct. The weights, calculated by PLS, are
used to calculate latent variable scores for the constructs,
which reflect the contribution of each variable to its con-
struct. Factor loading, as with other studies of this nature,
were high (Cocosila & Archer, 2010), which are typical for
TAM studies.
by guest on April 25, 2016Downloaded from
3. Abramson et al 3
Model fit indices are provided by the software after run-
ning the PLS analysis. Three model fit indices and associated
p values for the average path coefficient (APC) and average
R-squared (ARS). Model fit indices are a useful set of mea-
sures related to model quality (Kock, 2011). P values for the
APC andARS should be less than .05 (Kock, 2011); this con-
dition is met by both of the measures. Figure 1 below dis-
plays the research model with correlational coefficients and
associated metrics.
The measurement, or structural model, consists of latent
variables and relationships that represent the conceptual fac-
tors of interest. The path coefficients and p values are pre-
sented for the latent variables. Coefficients of determination
indicate the strength and direction of the relationship between
the latent variable pathways. The latent variables are the
results of the loadings, which are the values from the specific
questions in the study’s survey after treatment, including re-
sampling by the Warp PLS 3.0 program. Path coefficient, or
beta, is the equivalent of Spearman’s Rho correlational coef-
ficient, which, in the structural model, is used to describe the
strength of the linear relationships between the latent con-
structs. A corresponding measure that is shown with the beta
is the significance level, which is the t statistic for that coef-
ficient to its standard error. Shown on all but the outside
latent variables or antecedent variables are the coefficients of
determination or R square, which is calculated by squaring
the path coefficients. The result is used to determine the vari-
ance of the independent variable. SN in the research model
are significantly related to BI through PEOU but not through
PU. The identification of this relationship is going to be
dependent on many factors, such as causal relations.
Results
Attitude (ATT) was left in the research model even though
some TAM studies have removed this construct (Heerink,
Krose, Evers, & Wielinga, 2009; Holden & Karsh, 2010).
Attitude is quite significant in the model, as can be seen by
observing the research model with path coefficients. Specific
to the key external factor of interest in the study, we can
observe that the stronger significant relationship is through
PEOU, rather than directly to BI. The effect of ATT is defi-
nitely a strong determinant of BI and one that effectively
mediates many antecedent variables in the TAM model. This
research model is using ATT as an antecedent to BI.
Djamasbi, Siegel, Tullis, and Dai (2010) found that ATT was
an important factor and antecedent. Also, the use of affect as
a variable, which is the user’s global feelings, moods, and
emotions (Djamasbi et al., 2010), was significant and posi-
tively related to attitude. It was also found that affect can also
negatively influence attitude, although this point is beyond
the scope of this research. What is not beyond the scope of
Figure 1. Research model with correlational coefficients and associated metrics.
Note. SE = self-efficacy; PU = perceived usefulness; SN = subjective norms; ATT = attitude; BI = behavioral intention; PEOU = perceived ease of use;
PRIORE = prior use of e-learning.
by guest on April 25, 2016Downloaded from
4. 4 SAGE Open
this research is the strong effect of attitude on BI and the
effectiveness of attitude as a relevant and critical mediator in
this model and others. Other studies have used Exploratory
Factor Analysis (EFA) and Confirmatory Factor Analysis
(CFA) to establish this when just the latent variables were
examined purely on correlation of the latent variables, with
no user intention model. Attitude’s inclusion as an anteced-
ent is based on the strong support in the literature for Attitude
Toward Behavior (ATB), which has been highly correlated
with user intention. ATB is defined as “an individual’s posi-
tive or negative feelings (evaluative affect) about performing
the target behavior” (Fishbein & Ajzen, 1975). M-learning
involves objects, but it is a behavior; therefore, attitude is
going to be a more relevant variable and antecedent to BIs.
Zhang, Aikman, and Sun (2008) tested attitude’s predictive
capability on intentions and usage of information communi-
cations technology (ICT) and devices and found that Attitude
Toward Objects (ATO) and ATB had significant predictive
capabilities for initial use and continued use. Zhang et al.
(2008) noted that we should not make assumptions on atti-
tude regarding related technologies, as attitudes change as a
user’s ICT use increases. Therefore, attitude is regarded as a
highly relevant antecedent to BIs and a critical part of
answering the research questions in this study.
Convergent and Discriminant Validities
According to Geffen and Straub, convergent validity is demon-
strated when a measurement item loads with a significant t
value, with a corresponding p value at less than .05 (Geffen &
Straub, 2005). Reliability tests for the reflective nature of the
model are exhibited by the high Cronbach alpha scores.
Composite reliability is an indicator of how well constructs in
the measurement model are described by indicators. W. H.
Chin (1998) states that the recommended threshold is .7; there-
fore, values above this number imply that constructs are well
described by indicators. Convergent validity is demonstrated in
this study’s data by examination of the models’loads and cross
loadings, which should all be in the −1 to 1 range. Kock (2012)
states that the two criteria recommended as the basis for con-
cluding that a measurement model demonstrates convergent
validity are that p values associated with the loadings be lower
than .05, and the loadings be equal to or greater than .5. The
study’s analysis results demonstrated convergent validity.
Reliability Tests
A Cronbach’s alpha value of at least .7 is commonly seen as
acceptable (Churchill & Brown, 2006). Individual construct
reliability tests need reported values above .7 to suggest that
all constructs could be considered reliable (see Table 1 to
review these values). Testing using Cronbach’s alpha values
shows that the data exhibit high levels of reliability (Adams,
Nelson, & Todd, 1992).
TheAverage Variances Extracted (AVE) are used to assess
discriminant validity and convergent validity. Average vari-
ances that demonstrate acceptable validity should be 0.5 or
greater (Fornell & Larcker, 1981), and all of the latent vari-
ables were at, or exceeded, this value (see Table 2).
Full collinearity Variance Inflation Factors (VIFs) aid in
determining collinearity. There are multiple accepted tests
for multicollinearity in the literature. Hair, Anderson,
Tatham, and Black (1998) stated that VIFs should be lower
than 10. VIFs in the study ranged from 1.496 to 5.722 for all
of the latent variables. The Warp PLS 3.0 program calculates
VIFs on a full collinearity test enabling vertical and lateral
collinearity (Kock, 2012). In Table 3, the full collinearity
VIFs are displayed, while in Table 4, the research model met-
rics are displayed.
Geffen and Straub (2005) defined what measurements are
needed for factorial validity in PLS analysis studies. Many of
these measurements have been adopted in the research that
uses PLS in technology adoption and user intention studies.
This study has used some of the indicators identified in this
research document, and has demonstrated that PLS can be
proven to possess factorial validity. Factorial validity is the
Table 1. Model Cronbach’s Alpha Values.
Cronbach’s alpha
PU .934
PEOU .973
BI .916
ATT .966
SN .931
SE .86
PRIORE .842
Note. PU = perceived usefulness; PEOU = perceived ease of use; BI =
behavioral intention; ATT = attitude; SN = subjective norms; SE = self-
efficacy; PRIORE = prior use of e-learning.
Table 2. Average Variances Extracted.
PU PEOU BI ATT SN SE PRIORE
0.791 0.902 0.923 0.937 0.830 0.787 0.86
Note. PU = perceived usefulness; PEOU = perceived ease of use; BI =
behavioral intention; ATT = attitude; SN = subjective norms; SE = self-
efficacy; PRIORE = prior use of e-learning.
Table 3. Full Collinearity VIFs.
PU PEOU BI ATT SN SE PRIORE
5.722 5.973 5.030 4.757 1.885 1.545 1.496
Note. VIF = variance inflation factor; PU = perceived usefulness; PEOU =
perceived ease of use; BI = behavioral intention; ATT = attitude;
SN = subjective norms; SE = self-efficacy; PRIORE = prior use of e-learning.
by guest on April 25, 2016Downloaded from
5. Abramson et al 5
establishment of validity for latent constructs or latent vari-
ables (Geffen & Straub, 2005) and are “research abstractions
that cannot be measured directly; variables such as beliefs
and perceptions” (Geffen & Straub, 2005, p. 91). The pri-
mary variables of interest are beliefs and perceptions and are
not a directly measured variable, such as age and gender.
Reliability and Internal Consistency
Loadings for all of the latent variables, which are the correla-
tional coefficients between the indicator variables or ques-
tions from the survey and the latent variables, were within
acceptable ranges. W. W. Chin and Gopal (1995) suggest that
the suggested threshold value for loadings (coefficients) is .8.
The AVE is a measure of internal consistency in the model.
All measures were above the .5 value, which is commonly
used as a threshold (W. H. Chin, 1998). As shown, all scores
were well above the accepted threshold. As shown in Table 1,
PLS Factorial Validity Measurements, all of the AVE esti-
mates are well above the .5 value and will therefore be
accepted (Dillon & Goldstein, 1984). Composite reliability is
an indicator of how well each of the constructs is described by
the indicators in the measurement model. All indicators for
the model of the latent variables of PU, PEOU, ATT, and BI
demonstrate high scores and will therefore be used in the
analysis. Indicators were judged according to the .7 threshold
(W. W. Chin & Gopal, 1995). Communality is a measurement
of the squared correlation between an indicator and its latent
construct (W. H. Chin, 1998). It is a measurement of capacity
for describing the related latent constructs that meet the estab-
lished threshold for communality of .5 (W. H. Chin, 1998).
Table 5 displays the effect sizes for path coefficients.
Warp PLS 3.0 provides path coefficients and effect sizes
after the analysis. The effect sizes are Cohen’s (1988)
f-squared coefficients (Kock, 2012). Standard errors and
effect sizes are presented in the same manner that the path
coefficients are. This makes visualization easier as they are
in the same order. Effect sizes are the most relevant to this
analysis and discussion as they offer insight into the indi-
vidual contributions of the predictor latent variables to the
R-square coefficients of the criterion latent variable of each
latent variable (Kock, 2012). Effect sizes aid in determining
whether the effects indicated by path coefficients are small,
medium, or large (Kock, 2012). Recommended values are
0.02, 0.15, and 0.35, respectively (Cohen, 1988). Therefore,
all significant relationships identified by the correlation
coefficients were determined to have adequate effects for
consideration and inclusion in the analysis. Non-significant
values were seen as lacking effect values that would indicate
a smaller or greater effect.
Discussion
Research hypotheses represent if/then logic statements
(Creswell, 2008). This study used demographic or exoge-
nous variables, independent or endogenous variables, and
dependent variables. The TAM was introduced early in the
discussion, as it is a “rationale for the connections among the
Table 4. Research Model Quality Metrics.
R2
Composite
reliability
Cronbach’s
alpha
Average variance
extracted
Full collinearity
extracted—VIF
Q squared
coefficients
PU .781 .95 .934 .791 5.722 .778
PEOU .503 .979 .973 .902 5.973 .503
BI .785 .96 .916 .923 5.03 .786
ATT .767 .978 .966 .937 4.757 .765
SN .931 .83 1.885
SE .86 .787 1.545
PRIORE .842 .864 1.496
Note. VIF = variance inflation factor; PU = perceived usefulness; PEOU = perceived ease of use; BI = behavioral intention; ATT = attitude; SN = subjective
norms; SE = self-efficacy; PRIORE = prior use of e-learning.
Table 5. Effect Sizes for Path Coefficients.
Effect sizes for path coefficients
PU PEOU BI ATT SN SE PRIORE
PU 0.738 0.054 0.002 0.009
PEOU 0.106 0.248 0.149
BI 0.393 0.296 0.097
ATT 0.3 0.467
Note. PU = perceived usefulness; PEOU = perceived ease of use; BI = behavioral intention; ATT = attitude; SN = subjective norms; SE = self-efficacy;
PRIORE = prior use of e-learning.
by guest on April 25, 2016Downloaded from
6. 6 SAGE Open
variables” (Creswell, 2008). There should be a positive rela-
tionship between the PRIORE and the BIs to use m-learning.
The antecedent variables will also have an effect on the stu-
dents’ BIs to use m-learning. This study uses hypotheses set
forth by TAM (Davis, 1989) and those of the antecedent vari-
ables that are used to extend the research model.
Hypothesis 1: The PU of m-learning will have a positive
effect on the users’ BIs to adopt m-learning as mediated
through attitude. PU has a significant positive relationship
with BIs, β = .46 at (p < .01). PU is also positively corre-
lated with attitude (ATT), β = .36 at (p < .01). The hypoth-
esis is accepted.
Hypothesis 2: PEOU of m-learning will have a positive
effect on the users’ BIs to adopt m-learning as mediated
through attitude. PEOU is mediated by attitude and also
PU in the research model and subsequently in the PLS
research analysis model. PEOU is “the degree to which a
person believes that using a particular system would be
free of effort” (Davis, 1989, p. 320). PEOU is signifi-
cantly and positively related to PU, β = .84 at (p < .01) and
also to ATT, β = .54 at (p < .01). With such strong positive
correlations to PU and ATT, which is the direct antecedent
to BI, the hypothesis is accepted.
Hypothesis 3: SN will have a positive effect on the users’
BIs to adopt m-learning as mediated through PU and
PEOU as mediated through attitude. SNs have a positive
relationship with PEOU, β = .22 at (p < .01); its relation-
ship to PU is not supported, β = .10 at (p = .43). Therefore,
the hypothesis is accepted, as there is a significant rela-
tionship with PEOU. Normative behavior is represented
by SNs, and this is expressed as the individuals’ perceived
view of referent others and the individual may approve of
m-learning use if others view this as a positive activity for
the individual. However, they can refuse or reject the inno-
vation based on the opinions of others as well. This is also
contingent on the relationship between normative behav-
ior and attitude. External factors would include reference
groups, demographics, and the individual’s personality.
Hypothesis 4: SE will have a positive effect on the users’
BIs to adopt m-learning though PU and PEOU as medi-
ated by attitude. SE has a significant positive relationship
with PEOU, β = .41 at (p < .01). The second path from SE
to PU is not supported, β = .00 at (p = .47). The hypothesis
is accepted as SE is significantly correlated with BI
through the PEOU→ATT→BI pathway. SE is the per-
son’s judgment on his or her capability to perform the
task. SSE is strongly influenced by a person’s motivation,
perseverance, and effort to perform a task (Wood &
Bandura, 1989). Therefore, if this is true, it would stand to
reason that the prior use of a related technology would be
related to SE. A direct connection was made in Warp PLS
3.0, and the model was re-run for the purposes of answer-
ing this question related to this hypothesis (see Figure 2).
As can be seen, there is a strong relationship between
PRIORE and SE. Therefore, it is possible to further explain SE
and PRIORE. SE was not significantly correlated with PU.
Figure 2. Research model with correlational coefficients and associated metrics, with added PRIORE → SE.
Note. PRIORE = prior use of e-learning; SE = self-efficacy; PU = perceived usefulness; SN = subjective norms; ATT = attitude; BI = behavioral intention;
PEOU = perceived ease of use.
by guest on April 25, 2016Downloaded from
7. Abramson et al 7
Hypothesis 5: PRIORE will have a positive effect on the
users’ BIs to adopt m-learning directly, and as mediated
through PEOU and PU to ATT. PRIORE has a positive
and significant relationship with BI, β = .17 at (p < .01).
PEOU also has a significant positive relationship with
PEOU, β = .29 at (p < .01). The third pathway, which
begins with PU, was not supported, b = −.02 at (p = .40).
Two of the three pathways, including the direct first order
path to BI, had a significant and positive correlation;
therefore, the hypothesis is supported. Prior use of a tech-
nology or related technology has been correlated with
intention to use and actual use in numerous information
system studies.
Findings
The study found that there is a relationship between PRIORE
and BI to use m-learning. Similar questions have been asked
of other types of learning, and of previous uses of m-learn-
ing as a predictor of m-learning (Akour, 2010). Similar
research questions have been examined in the literature
regarding e-learning, but not as it relates to the BI to use
m-learning. There is a pattern in the e-learning research that
follows a similar path. Haverila (2011) found that prior
e-learning experience influenced or affected perceived
learning outcomes in an undergraduate environment.
Therefore, this study and others helped establish new ques-
tions to be answered in future research. This study repre-
sents an addition to the body of knowledge for the BI to use
m-learning.
Implications
Prior experience with e-learning had a significant and posi-
tive effect on PU and BI to use m-learning. This is additive
to the work of Akour (2010), who found that previous use
of e-learning had a significant and positive effect on the
users’ BI to use m-learning. Akour’s final research model
uses attitude as an antecedent and moderator to BI.
Researchers and practitioners should be aware of this strong
connection as it may be critical to designing m-learning
programs at community colleges or universities.
Researchers should see that experience in the m-learning
use intention models plays a key role and may explain vari-
ance in their models.
Future Research
The addition of time and financial resources could have
made a more comprehensive study and one that would have
benefited from a mixed method and a longitudinal approach
that may have included actual usage. Actual usage could be
measured by launching the programs to be used in m-learn-
ing tasks from a special group of programs within a menu
of programs. By categorizing the programs, it would be
possible to track them easier and gather meaningful usage
statistics. In addition, it would be interesting to gather
more demographic information in a more homogeneous
group to gather a more in-depth picture of the users and
additional factors that may have an effect on the BI to use
m-learning.
As has been discussed, there has been massive and expo-
nential growth in the use of mobile wireless computing plat-
forms. This study has documented this growth and some of
the use that is seen in the contemporary university and com-
munity college. Many studies have examined and are exam-
ining the potential uses for these technologies and how and
where they are most effective. M-learning has been driven
from disruptive innovation generated by advances in mobile
computing and wireless communication technology. How
this is used in the university and what are the factors that
influence intentions to use m-learning were some of the key
questions that were examined.
Conclusion
Development of a working definition of m-learning was sim-
plified and refined to the use of a smartphone or other mobile
computing device that is connected to the Internet that can be
used for ad hoc tasks to aid the student, which includes log-
ging on to a learning management system that either has or
has not been optimized for mobile users. The definition of
m-learning was left open, as the focus of the study was to see
the intentions toward m-learning and how the past e-learning
experiences may or may not contribute to the user’s intention
to use m-learning. It was found that there was a significant
correlation between previous e-learning and the intention to
use m-learning. In addition to addressing the research ques-
tions of the study through analysis of the hypotheses, it was
learned that PU and PEOU played a large role in determining
the BI to use m-learning among students. Whether the
research model used attitude or not, the results normally
explain a large part of the variance. It is also possible, as seen
in the literature and demonstrated in this study, to decompose
constructs, by adding latent variables that aid in explaining
the variance in the research model. Previous learning experi-
ences within user intention studies may be highly relevant for
inclusion and study, as this study demonstrated. As experi-
ences change, new experiences and their potential effects on
BI should be examined as they may aid in explaining inten-
tions to use.
Declaration of Conflicting Interests
The author(s) declared no potential conflicts of interest with respect
to the research, authorship, and/or publication of this article.
Funding
The author(s) received no financial support for the research and/or
authorship of this article.
by guest on April 25, 2016Downloaded from
8. 8 SAGE Open
References
Adams, D., Nelson, R., & Todd, P. (1992). Perceived usefulness,
ease of use, and usage of information technology: A replica-
tion. MIS Quarterly, 16, 227-247.
Ajzen, I. (1991). The theory of planned behaviour. Organizational
Behavior and Human Decision Processes, 50, 179-211.
Akour, H. (2010). Determinants of mobile learning acceptance:
An empirical investigation in higher education (Doctoral dis-
sertation). Retrieved from ProQuest Dissertations and Theses.
(Accession Order No. AAT 3408682)
Alexander, B. (2006, January 1). Web 2.0: A new wave of innova-
tion for teaching and learning? Retrieved from http://www.
educause.edu/ero/article/web-20-new-wave-innovation-teach-
ing-and-learning
Al-Gahtani, S. (2001). The applicability of TAM outside North
America: An empirical test in the United Kingdom. Information
Resources Management Journal, 14(3), 37-46.
Bagozzi, R. P. (2007). The Legacy of the Technology Acceptance
Model and a Proposal for a Paradigm Shift. Journal of the
association for information systems, 8(4), 3.
Brownlow, M. (2012, October). Smartphone statistics and market
share. Retrieved from http://www.email-marketing-reports.
com/wireless-mobile/smartphone-statistics.htm
Chin, W. H. (1998). Partial least squares approaches to struc-
tural equation modeling. In G. A. Marcoulides (Ed.), Modern
methods for business research (pp. 295-336). Mahwah, NJ:
Lawrence Erlbaum.
Chin, W. W., & Gopal, A. (1995). Adoption intention in GSS:
Relative importance of beliefs. ACM SigMIS Database, 26(2-
3), 42-64.
Churchill, G. A., & Brown, T. J. (2006). Basic marketing research.
London, England: The Dryden Press International.
Cocosila, M., & Archer, N. (2010). Adoption of mobile ICT for
health promotion: An empirical investigation. International
Journal on Networked Business, 20, 241-250.
Cohen, J. (1988). Statistical power analysis for the behavioral sci-
ences (2nd ed.). Hillsdale, NJ: Lawrence Erlbaum.
Creswell, J. W. (2008). Narrative research designs. Educational
research: Planning, conducting and evaluating quantitative
and qualitative research, 3.
Curtis, S. (2014, December 11). Quarter of the world will be using
smartphones in 2016. Retrieved from http://www.telegraph.
co.uk/technology/mobile-phones/11287659/Quarter-of-the-
world-will-be-using-smartphones-in-2016.html
Davis, F. (1989). Perceived usefulness, perceived ease of use, and
user acceptance of information technology. MIS Quarterly, 13,
318-340.
Dillon, W. R., & Goldstein, M. (1984). Multivariate analysis, meth-
ods and applications. New York, NY: John Wiley.
Djamasbi, S., Siegel, M., Tullis, T., & Dai, R. (2010, January).
Efficiency, trust, and visual appeal: Usability testing through
eye tracking. In 2010 43rd Hawaii International Conference
on System Sciences (HICSS) (pp. 1-10). Chicago, IL: IEEE.
Entner, R. (2010). Smartphones to overtake feature phones in U.S.
by 2011. Nielsen Wire. Retrieved from http://blog.nielsen.
com/nielsenwire/consumer/smartphones-to-overtake-feature-
phones-in-u-s-by-2011/
Falk, R., & Miller, N. (1992). A primer for soft modeling (1st ed.).
Akron, OH: University of Akron Press.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and
behavior: An introduction to theory and research. Reading,
MA: Addison-Wesley.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation
models with unobservable variables and measurement error.
American Marketing Association, 18, 39-50.
Geffen, D., & Straub, D. W. (2005). A practical guide to facto-
rial validity using PLS Graph: Tutorial and annotated example.
Communications of the Association for Information Systems,
16(5), 91-109.
Hair, J., Anderson, J., Tatham, R., & Black, W. (1998). Multivariate
data analysis (5th ed.). Upper Saddle River, NJ: Prentice Hall.
Haverila, M. (2011). Prior E-learning experience and perceived
learning outcomes in an undergraduate E-learning course.
MERLOT Journal of Online Learning and Teaching, 7,
206-218.
Heerink, M., Krose, B., Evers, V., & Wielinga, B. (2009, September).
Measuring acceptance of an assistive social robot: A suggested
toolkit. The 18th IEEE International Symposium on Robot and
Human Interactive Communication, 2009 (RO-MAN 2009),
IEEE, Toyama, Japan.
Holden, R. J., & Karsh, B. T. (2010). The technology accep-
tance model: Its past and its future in health care. Journal of
Biomedical Informatics, 43, 159-172.
Hoppe, H., Joiner, R., Milrad, M., & Sharples, M. (2003). Wireless
and mobile technologies in education. Journal of Computer
Assisted Learning, 19, 255-259.
King, W. R., & He, J. (2006). A meta-analysis of the technology
acceptance model. Information & Management, 43, 740-755.
doi:10.1016/j.im.2006.05.003
Kock, N. (2011). Using warppls in e-collaboration studies: Mediating
effects, control and second order variables, and algorithm
choices. International Journal of e-Collaboration, 7(3), 1-13.
Kock, N. (2012). WarpPLS 5.0 user manual. Laredo, TX:
ScriptWarp Systems.
Liu, Y., Han, S., & Li, H. (2010). Understanding the factors driv-
ing m-learning adoption: A literature review. Campus-Wide
Information Systems, 27, 210-226.
Lu, X., & Viehland, D. (2008). Factors influencing the adoption
of mobile learning (ACIS spell out Proceedings Paper 56).
Retrieved from http://aisel.aisnet.org/acis2008/56
Massey, A., Ramesh, V., & Khatri, V. (2006). Design, development,
and assessment of mobile applications: The case for problem-
based learning. IEEE Transactions on Education, 49, 183-192.
Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New
York, NY: Simon & Schuster.
Seong, D. S. K. (2006). Usability guidelines for designing mobile
learning portals. In Proceedings of the 3rd international confer-
ence on Mobile technology, applications & systems (Mobility
’06, Article 25). New York, NY: ACM.
Sharples, M. (2007). Introduction to special issue of JCAL on
mobile learning. Journal of Computer Assisted Learning, 23,
283-284.
Shengquan, Y., Xianmin, Y., Gang, C., & Minjuan, W. (2015).
From learning object to learning cell: A resource organiza-
tion model for ubiquitous learning. Journal of Educational
Technology & Society, 18, 206-224.
Tweed, S. R. (2013). Technology implementation: Teacher age,
experience, self-efficacy, and professional development as
by guest on April 25, 2016Downloaded from
9. Abramson et al 9
related to classroom technology integration (Paper 1109).
Retrieved from http://dc.etsu.edu/etd/1109
Venkatesh, V., & Davis, F. D. (1996). A model of the anteced-
ents of perceived ease of use: Development and test. Decision
Sciences, 27, 451-481.
Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User
acceptance of information technology: Toward a unified view.
MIS Quarterly, 27, 425-478.
Walker, J., & Jorn, L. (2009). 21st century instructors: Faculty tech-
nology survey. Minneapolis: Office of Information Technology
(OIT), University of Minnesota Twin Cities.
Weintraub, S. (2010). 2011 will be the year Android explodes
(Google 24/7). Retrieved from http://tech.fortune.cnn.
com/2010/12/22/2011-will-be-the-year-android-explodes
Wood, R., & Bandura, A. (1989). Effect of perceived controllability
and performance standards on self-regulation of complex deci-
sion making. Journal of Personality and Social Psychology, 56,
805-814.
Yordanova, K. (2007). Mobile learning and integration of
advanced technologies in education. In The proceedings
of the International Conference on Computer Systems and
Technologies (pp. IV.23-1 to IV.23-6). New York, NY: ACM.
Zhang, P., Aikman, S., & Sun, H. (2008). Two types of attitudes
in ICT acceptance and use. International Journal of Human-
Computer Interaction, 24, 628-664.
Author Biographies
Jonathan Abramson holds a master’s degree in organizational man-
agement and a doctoral degree in computer science. He has worked in
a variety of technology and management positions in the public and
private sector. In addition, he started and ran a systems integration
and database analysis and programming business for 8 years. He is
currently the academic program manager at Post University in
Computer Information Systems, in Waterbury, Connecticut.
Maurice Dawson serves as an assistant professor of information
systems at the University of Missouri–St. Louis, former assistant
professor (honorary) of industrial and systems engineering at the
University of Tennessee Space Institute, and Fulbright Scholar
Specialist. Dawson is recognized as an information assurance sys-
tem architect and engineer by the U.S. Department of Defense.
Research focus area is cyber security, systems security engineer-
ing, open source software, mobile security, and engineering
management.
Jeffery Stevens holds two master’s degrees, one in human
resources (HR) and the other in general management. He has
more than 16 years in the areas of HR, management, and process
engineering within the private sector. Currently, he is the presi-
dent and CEO of an international consulting company that aids
small and mid-size companies in growth and process refinement.
Within the academic realm, he has conducted research and pub-
lished several articles within the areas of HR, statistics, educa-
tion, research methodology, and homeland security as well as
ground breaking research within the area of virtual education. He
has taught a wide array of courses in both the campus and online
settings and is now working with the American Council on
Education and the Higher Learning Commission in accrediting
academic programs.
by guest on April 25, 2016Downloaded from