This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and
adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and
adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
There is growing interest in the rate of eHealth uptake resulting from the increased potential to advance the quality of healthcare services in both the developed and developing countries. Although the implementation of information and communication technology to support healthcare delivery would greatly address the quality and accessibility challenges in healthcare as well as reduction in the cost of healthcare delivery, the adoption of eHealth has not been fully realized. This study aimed at conducting a systematic literature review to establish the factors associated with the adoption of eHealth and propose a context-specific framework for successful adoption of eHealth technologies in developing countries such as Uganda. The systematic literature review process was guided by the Systematic Review Protocol. The review of 29 journals from the period 2009-2021 showed that, although the most widely used frameworks in the developing countries were Technology Adoption Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT) framework and Technology Organization Environment (TOE) framework, there were other salient factors reported by other researchers that contributed to the adoption of eHealth in developing countries. A novel framework for adoption of eHealth in the local context with eight (8) dimensions namely; Sociodemographic, Technology, Information, Socio-cultural, Organization, Governance, Ethical and legal and Financial dimensions is derived and presented as result of the research.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...IJMIT JOURNAL
The purpose of the present paper is to describe the development of a measurement scale, to assess the impact of the national cultural factors on the electronic clinical records acceptance in the Ibn Sina Hospital Center(CHUIS)in Morocco. The methodology assumed is based on the Churchill paradigm
(1979).Thus, our contribution focuses on the exploratory phase, where the items have been analysed using principal components analysis (PCA) and internal consistency with Cronbach’s Alpha (α). The results show a satisfactory factorial structure and excellent reliability of all the items.
Readiness measurement of IT implementation in Higher Education Institutions i...TELKOMNIKA JOURNAL
This article elaborates the result of the Pilot Study which is related to IT implementation factors at the Higher Education Institution (HEI), a pilot study is used to validate quantitative readiness model of IT implementation. The main objective of this study is examining the factors that influence the readiness of IT implementation in HEI. This study attempts to analyze IT Content factors, Institutional Context, People, Process, Technology, Service Quality and IT Implementation Readiness (ITIR). The sample of data was taken from 150 HEIs throughout Indonesia which was then processed in statistical techniques through PLS-SEM method. The research finding shows that 9 of the 14 hypotheses used as ITIR model construct have a very significant influence on IT implementation on HEI, so that this finding can provide a comprehensive contribution to the literature of ITIR model development.
A Study of Technology Acceptance Model (TAM) In Understanding the Efficacy of...inventionjournals
Global usage of automated system in all fields has remarkably increased in the past decades. To understand the extensive usage of the Information system, the study is undertaken where the Technology Acceptance Model (TAM) is used to see the extent to which an Information System (IS) is able to make any HR routine activity in the institution to be automated; whereby, the information obtained is effective and reliable. The study undertook in this article focuses on the reliability test in order to test the reliability of the scale and also the correlation test in order to find the rate of correlation between the various components of the TAM model – Perceived Usefulness (PU), Perceived Ease of Use (PEOU), Attitude towards change (ATU) and Behavioral Intention towards use (BIU). The study indicated that the null hypothesis is accepted where there is significant positive change in the Perceived Ease of Use, Attitude of the User and the Behavioral intention of the user towards using the HRIS tool in any organization. This led to understanding from the study that there is a very high rate of effectiveness in the usage of HRIS tool in any institutions using, which is proved using the TAM model.
Antecedents of Knowledge Management Practices: Case of Malaysian PractitionersjournalBEEI
In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia who work in different sectors and involved in Information Technology (IT) related fields. We proposed a conceptual framework based on the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB) and Unified Theory of Acceptance and Use of Technology (UTAUT) to study their intention and involvement in KM initiatives. The knowledge creation theory (SECI process) was employed to operationalize KM intention and KM behavior. We proposed six independent variables that represent the social-cultural nature of KM as the antecedence of KM intention. These variables are trust, management support, decentralization, IT support, performance expectancy (PE), and effort expectancy (EE). Seventy-four executives from both private and government-linked organizations responded to our online questionnaire. SmartPLS3 was used to run the analysis. The reliability was ensured with the factor loadings, Cronbach’s alpha, Composite Reliability (CR) that met the fit requirement of above 0.6, 0.7 and 0.7 respectively. The convergent validity was confirmed through average variance extracted (AVE) that met the fit requirement of above 0.5. The discriminant validity was assessed by using Fornell and Larcker’s criterion. Finally, the structural model confirmed that only PE of KM, and EE of KM are the significant predictors of KM intention and the KM intention significantly predicts KM behavior. The implications of the findings are discussed in detail at the end of the paper.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...nooriasukmaningtyas
Business intelligence is a collection of methodologies, methods, architectures, and technologies that convert raw data into significant and useful information used by organizations to enable more effective strategic, tactical, and operational insights and decision-making. In spite of several studies have examined the critical success factors and development of business intelligence system, but few relevant studies have investigated perceptions of end-user’s business intelligence systems. Furthermore, none of those studies was performed in a higher education sector in Iraq. Consequently, the study aims to determine the business intelligence system features influencing perceived impact end users’ and of using business intelligence systems in Iraqi educational institutes. A technology acceptance model and technology organization environment framework were syntheses as a basis to develop a research model for business intelligence users' perceived impact and adopt of business intelligence systems named (SMUPIBIS). Later, an online instrument (questionnaire) was designed to gather data from the business intelligence system users in five Iraqi universities. Twentyone hypotheses were proposed and later tested. The main outcomes of this study suggest that decision support, information quality, and real-time reporting are the most significant system characteristics influencing end users' perceived impact and their usage of business intelligence systems.
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
There is growing interest in the rate of eHealth uptake resulting from the increased potential to advance the quality of healthcare services in both the developed and developing countries. Although the implementation of information and communication technology to support healthcare delivery would greatly address the quality and accessibility challenges in healthcare as well as reduction in the cost of healthcare delivery, the adoption of eHealth has not been fully realized. This study aimed at conducting a systematic literature review to establish the factors associated with the adoption of eHealth and propose a context-specific framework for successful adoption of eHealth technologies in developing countries such as Uganda. The systematic literature review process was guided by the Systematic Review Protocol. The review of 29 journals from the period 2009-2021 showed that, although the most widely used frameworks in the developing countries were Technology Adoption Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT) framework and Technology Organization Environment (TOE) framework, there were other salient factors reported by other researchers that contributed to the adoption of eHealth in developing countries. A novel framework for adoption of eHealth in the local context with eight (8) dimensions namely; Sociodemographic, Technology, Information, Socio-cultural, Organization, Governance, Ethical and legal and Financial dimensions is derived and presented as result of the research.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...IJMIT JOURNAL
The purpose of the present paper is to describe the development of a measurement scale, to assess the impact of the national cultural factors on the electronic clinical records acceptance in the Ibn Sina Hospital Center(CHUIS)in Morocco. The methodology assumed is based on the Churchill paradigm
(1979).Thus, our contribution focuses on the exploratory phase, where the items have been analysed using principal components analysis (PCA) and internal consistency with Cronbach’s Alpha (α). The results show a satisfactory factorial structure and excellent reliability of all the items.
Readiness measurement of IT implementation in Higher Education Institutions i...TELKOMNIKA JOURNAL
This article elaborates the result of the Pilot Study which is related to IT implementation factors at the Higher Education Institution (HEI), a pilot study is used to validate quantitative readiness model of IT implementation. The main objective of this study is examining the factors that influence the readiness of IT implementation in HEI. This study attempts to analyze IT Content factors, Institutional Context, People, Process, Technology, Service Quality and IT Implementation Readiness (ITIR). The sample of data was taken from 150 HEIs throughout Indonesia which was then processed in statistical techniques through PLS-SEM method. The research finding shows that 9 of the 14 hypotheses used as ITIR model construct have a very significant influence on IT implementation on HEI, so that this finding can provide a comprehensive contribution to the literature of ITIR model development.
A Study of Technology Acceptance Model (TAM) In Understanding the Efficacy of...inventionjournals
Global usage of automated system in all fields has remarkably increased in the past decades. To understand the extensive usage of the Information system, the study is undertaken where the Technology Acceptance Model (TAM) is used to see the extent to which an Information System (IS) is able to make any HR routine activity in the institution to be automated; whereby, the information obtained is effective and reliable. The study undertook in this article focuses on the reliability test in order to test the reliability of the scale and also the correlation test in order to find the rate of correlation between the various components of the TAM model – Perceived Usefulness (PU), Perceived Ease of Use (PEOU), Attitude towards change (ATU) and Behavioral Intention towards use (BIU). The study indicated that the null hypothesis is accepted where there is significant positive change in the Perceived Ease of Use, Attitude of the User and the Behavioral intention of the user towards using the HRIS tool in any organization. This led to understanding from the study that there is a very high rate of effectiveness in the usage of HRIS tool in any institutions using, which is proved using the TAM model.
Antecedents of Knowledge Management Practices: Case of Malaysian PractitionersjournalBEEI
In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia who work in different sectors and involved in Information Technology (IT) related fields. We proposed a conceptual framework based on the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB) and Unified Theory of Acceptance and Use of Technology (UTAUT) to study their intention and involvement in KM initiatives. The knowledge creation theory (SECI process) was employed to operationalize KM intention and KM behavior. We proposed six independent variables that represent the social-cultural nature of KM as the antecedence of KM intention. These variables are trust, management support, decentralization, IT support, performance expectancy (PE), and effort expectancy (EE). Seventy-four executives from both private and government-linked organizations responded to our online questionnaire. SmartPLS3 was used to run the analysis. The reliability was ensured with the factor loadings, Cronbach’s alpha, Composite Reliability (CR) that met the fit requirement of above 0.6, 0.7 and 0.7 respectively. The convergent validity was confirmed through average variance extracted (AVE) that met the fit requirement of above 0.5. The discriminant validity was assessed by using Fornell and Larcker’s criterion. Finally, the structural model confirmed that only PE of KM, and EE of KM are the significant predictors of KM intention and the KM intention significantly predicts KM behavior. The implications of the findings are discussed in detail at the end of the paper.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...nooriasukmaningtyas
Business intelligence is a collection of methodologies, methods, architectures, and technologies that convert raw data into significant and useful information used by organizations to enable more effective strategic, tactical, and operational insights and decision-making. In spite of several studies have examined the critical success factors and development of business intelligence system, but few relevant studies have investigated perceptions of end-user’s business intelligence systems. Furthermore, none of those studies was performed in a higher education sector in Iraq. Consequently, the study aims to determine the business intelligence system features influencing perceived impact end users’ and of using business intelligence systems in Iraqi educational institutes. A technology acceptance model and technology organization environment framework were syntheses as a basis to develop a research model for business intelligence users' perceived impact and adopt of business intelligence systems named (SMUPIBIS). Later, an online instrument (questionnaire) was designed to gather data from the business intelligence system users in five Iraqi universities. Twentyone hypotheses were proposed and later tested. The main outcomes of this study suggest that decision support, information quality, and real-time reporting are the most significant system characteristics influencing end users' perceived impact and their usage of business intelligence systems.
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
Employees Adoption of E-Procurement System: An Empirical StudyIJMIT JOURNAL
Today, organizations are investing a lot in their IT infrastructure and reengineering their business processes by digitizing firms. If organizational employees will not optimum utilize its IT infrastructure, the productivity gain reduced enormously. In Uttarakhand e-procurement system implemented by public sector under e-governance integrated mission mode projects. So, there is need to find the determinants which influence employee’s adoption and uses of e-procurement systems. This research study assesses the organizational and individual determinants that influence the use of e-procurement system in Uttarakhand public sector. This study provides managers with the valuable information to take intervention programs to achieve greater acceptance and usage of e-procurement system. Data collected for this study by the means of a survey conducted in Uttarakhand state in 2011. A total 1200 questionnaire forms were distributed personally and online to employees using e-procurement system in Uttarakhand.
Information System Success Framework based on Interpersonal Conflict Factors IJECEIAES
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS. In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
Technology Readiness and Technology Acceptance of Employees of Bekasi Kota Po...AJHSSR Journal
ABSTRACT : This study aims to determine and analyze the readiness and acceptance of technology in
Polres Metro Bekasi City employees in using information system services. This type of research is
quantitative. The sampling technique used is saturated sampling in which the number of questionnaires are
106 respondents. Data collection techniques by distributing questionnaires. The respondents of this study
were all employees of Polres Metro Bekasi Kota. The analytical method used is a statistical analysis method,
namely Path Analysis on the Technology Readiness Acceptance Model (TRAM). The results of testing the
data using the validity and reliability tests show that the data obtained is valid and reliable. Of the 11
hypotheses in the TRAM, five hypotheses are supported by research results while 6 hypotheses are not
supported. Based on the proof of the hypothesis, in this study sample, the TRAM (Technology Readiness
Acceptance Model) model was not fully implemented in the sample studied. Behavior intention that occurs is
due to its relationship with perceived usefulness; where perceived usefulness is related to optimism and
innovativeness. Perception of ease of use is related to Optimism and Insecurity; however, the perceived easy
of use is not positively related to the perceived usefulness and behavioral intention.
KEYWORDS : Information System Services, TRAM, technology readiness, technology acceptance.
The development of information and communication technology (ICT) during the era of the fourth industrial revolution, the impact of the COVID-19 pandemic in 2020, and the government’s call for large-scale social restrictions have led to the emergence of online learning systems (OLS) in higher education. This study develops a measurement model for the success of OLS based on the DeLone & McLean model. Surveys were conducted on a sample of 175 students from domestic and international universities. Data processing used the partial least squares structural equation modeling or PLS-SEM method, and root cause analysis. The results show that platform quality has a positive influence on OLS success, whether mediated by user satisfaction or OLS usage. Social influence has a positive effect on OLS success, mediated by OLS usage. User computer anxiety has a negative effect on OLS success, mediated by user satisfaction. Recommendations to improve OLS success include adjusting internet package rates to make them more affordable, improving signal strength to various locations for better coverage, limiting the number of users in one learning session for more effective OLS, and the need for organizational support in using the right applications.
EFFECTIVENESS OF E-RKAP SYSTEM IMPLEMENTATION WITH HUMAN, ORGANIZING, TECHNOL...AJHSSR Journal
ABSTRACT: This study aims to test and prove the influence of human, organizing and technology on the
effectiveness of the E-RKAP system. The hypotheses of this study are System Use affects the Effectiveness of the
E-RKAP System, User Satisfaction affects the Effectiveness of the E-RKAP System, Structural affects the
Effectiveness of the E-RKAP System, Environment affects the Effectiveness of the E-RKAPSystem, System
Quality affects the Effectiveness of the E-RKAP System, Information Quality affects the Effectiveness of the ERKAP System, Service Quality affects the Effectiveness of the E-RKAP System. The population of this study
were company employees. The sampling technique used in this study was purposive sampling which obtained a
sample of 90 people. This study shows that system use, use satisfaction, structure, environment, information
quality and service quality have no influence on the effectiveness of the E-RKAP system. System quality has an
influence on the effectiveness of the E-RKAP system.
KEYWORDS : Effectiveness, E-RKAP system, HOT Fit.
International Journal of Business and Management Invention (IJBMI)inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
In this case study we identify the factors that influence the adoption of a new system in a major company in Saudi Arabia. We develop a theoretical framework to help derive better understanding of system adoption via socio-technical integration.
We formulation of 14 hypotheses that were tested via a survey of 42 system users. Management support and change management were found to be significant factors influencing system adoption. As a result, the 14 null hypotheses were rejected due to their statistical significance (p-value < 0.05). Discussions and recommendations for future research are discussed.
Improving Technological Services and Its Effect on the Police’s PerformanceEditor IJCATR
The role of police department in any country is critical. It is obvious that improving the technology in police department can
be done with safety and contributes to improve its economy. This paper, first tries to recognize the existed weaknesses in used
technologies. Then, it will suggest the best approach. The proposed framework of this study points out to two different moderating
roles that can be considered as technical contributions. Moreover, the combination of this proposed framework is new for current
study. This framework is concentrated on technology improvement, knowledge management system, technology acceptance, police
performance, and ministry performance
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...IJMIT JOURNAL
The propose of the present paper is to describe the development of a measurement scale to assess the impact of the national cultural factors on the electronic clinical records acceptance in the Hospital Center Ibn Sina in Morocco.The methodology assumed is based on the Churchill paradigm (1979).Thus, our contribution focuses on the exploratory phase, which the items have been analyzed by the principal components' method and aninternal consistency method using the Cronbach’s Alpha (α). The results show a satisfactory factorial structure and excellent reliability of all the items, except some which are eliminated.
The Contribution of Information Technology Infrastructure in the Information ...IJRES Journal
There are some great innovations in e-government during the past decade. And there is intense competition between some governments and leaders in the supply of services on the Internet. Some countries do not want to stay behind in this area, where many governments have developed detailed strategies to realize the e-government programs. Despite differences in goals behind these programs from one country to another, but there are still many points of convergence between them particularly in information technology infrastructure field. However, Problems associated with the process of application and adoption of e-government due to poor systems and infrastructure construction, which negatively affects the adoption of the public services through the e-government portal, in particular in developing countries. This study argued contribution the information technology Infrastructure in Information Systems success in e-government agencies. Where there are weaknesses in the understanding of this contribution and its importance in many developing countries, so the researcher proposed a model to clarify this contribution, and expected a positive relationship between the information technology infrastructure factors and information systems success, and this affects positively or negatively the adoption of e-government.
Similar to Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkish Public Organizations (20)
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
Building on this premise, this paper conducts an empirical analysis, utilizing reliable firms data on ESG
risk and brand value, with a focus on 100 global R&D leader firms. It analyzes R&D and actions for ESG
risk mitigation, and assesses the development of new functions that fulfill F + ESG optimization through
R&D. The analysis also highlights the significance of network externality effects, with a specific focus on
Amazon, a leading R&D company, providing insights into the direction for transforming R&D strategies
towards F + ESG optimization.
The dynamics of stakeholder engagement in F + ESG optimization are indicated with the example of
amazon's activities. Through the analysis, it became evident that Amazon's capacity encompassing growth
and scalability, specifically its ability to grow and expand, is accelerating high-level research and
development by gaining the trust of stakeholders in the "synergy through R&D-driven ESG risk
mitigation."
Finally, as examples of these initiatives, the paper discussed the Climate Pledge led by Amazon and the
transformation of Japan's management system.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
These days the security provided by the computer systems is a big issue as it always has the threats of
cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security
provided by the blue team operations tends to be costly if done in large firms as a large number of systems
need to be protected against these attacks. This leads these firms to turn to less costly security
configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services
provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS
attacks which are done on both physical and network layers. These attacks in turn result in loss of
extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it,
and taking appropriate action to not only stop the attack but also locate its source IP address. This whole
process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will
result in not only the detection of the attack but also the source IP address of the machine on which the
attack is initiated and completed. The end product of this research will result in sets of default rules for the
Snort tool which will not only be able to provide better security than its previous versions but also be able
to provide the user with the IP address of the attacker or the person conducting the attack. The system
involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata
which is another intrusion detection system capable of detecting all these types of attacks as mentioned.
Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to
be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for
traffic monitoring and incident response than any other of its alternatives in the market. Since this system
is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as
it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS
automation in its capability to capture and report the malicious packets found during the network scan. All
of this gives the IDS a capability of a low budget automated threat detection system. This paper gives
complete guidelines for authors submitting papers for the AIRCC Journals.
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
IT (Information and Communication Technology) companies are facing the dilemma of decreasing
productivity despite increasing research and development efforts. M&A (Merger and Acquisition) is being
considered as a breakthrough solution. From existing research, it has been pointed out that M&A leads to
the emergence of new innovations. Purpose of this study was to discuss the efficient ways of acquisition and
to resolve the dilemma of productivity decline by clarifying how the technology obtained through M&A
leads to the creation of new innovations. Hypothesis 1 was that the technology acquired through M&A is
utilized for innovation creation, Hypothesis 2 was that the acquired technology is utilized over a long
period of time, and Hypothesis 3 was that a long-term utilization has a positive impact on corporate
performance. The results, using sports prosthetics as a case study and using patents as a proxy variable,
confirmed all the hypotheses set. We have revealed that long-term utilization of technology obtained
through M&A is effective for creating new innovations.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of information technology and management
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
The main objective of this paper is to identify the factors that influence academic staff's digital knowledgesharing behaviors in Ethiopian higher education. A structural equation model was used to validate the
research framework using survey data from 210 respondents. The collected data has been analyzed using
Smart PLS software. The results of the study show that trust, self-motivation, and altruism are positively
related to attitude. Contrary to our expectations, knowledge technology negatively affects attitude.
However, reward systems and empowerment by leaders are significantly associated with knowledgesharing intentions.Knowledge-sharing intention, in turn, was significantly related to digital knowledgesharing behavior. The contributions of this study are twofold. The framework may serve as a roadmap for
future researchers and managers considering their strategy to enhance digital knowledge sharing in HEI.
The findings will benefit academic staff and university administrations.The study will also help academic
staff enhance their knowledge-sharing practices.
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
Cloud computing systems need to be reliable so that they can be accessed and used for computing at any
given point in time. The complex nature of cloud systems is the motivation to conduct research in novel
ways of ensuring that cloud systems are built with reliability in mind. In building cloud systems, it is
expected that the cloud system will be able to deal with high demands and unexpected events that affect the
reliability and performance of the system.
In this paper, chaos engineering is considered a heuristic method that can be used to build reliable cloud
systems. Chaos engineering is aimed at exposing weaknesses in systems that are in production. Chaos
engineering will help identify system weaknesses and strengths when a system is exposed to unexpected
knocks and shocks while it is in production.
Chaos engineering allows system developers and administrators to get insights into how the cloud system
will behave when it is exposed to unexpected occurrences.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
This paper will provide a novel empirical study for the relationship between network media attention and
green technology innovation and examine how network media attention can ease financing constraints. It
collected data from listed companies in China's heavy pollution industry and performed rigorous
regression analysis, in order to innovatively explore the environmental governance functions of the media.
It found that network media attention significantly promotes green technology innovation. By analyzing the
inner mechanism further, it found that network media attention can promote green innovation by easing
financing constraints. Besides, network media attention has a significant positive impact on green invention
patents while not affecting green utility model patents.
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
Information System (IS) research advocates employing collaborative and loose coupling strategies to address contradictory issues to address diversified actors’ interests than the prescriptive and unilateral Information Technology (IT) governance mechanisms’, yet it is rarely depicting how managers employ these strategies in Health Information System (HIS) implementation, particularly in a resource-constrained setting where IS implementation activities have highly relied on multiple international organizations resources. This study explored how managers in resource-constrained settings employ collaborative IT governance mechanisms in the case of District Health Information System 2 (DHIS2) adoption with an interpretative case study approach and the institutional logic concept. The institutional logic concept was used to identify the major actors’ logics underpinning the DHIS2 adoption. The study depicted the importance of high-level officials' distance from the dominant systemic logic to consider new alternative, and to employ inclusive IT governance mechanisms which separated resource from the system that facilitated stakeholders’ collaboration in DHIS2 adoption based on their capacity and interest.
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
With an increasing number of extreme events and complexity, more alarms are being used to monitor
control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable
actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It
is important to have a rigid surveillance that should guarantee protection from any sought of hazard.
Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these
CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired
off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with
a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing
images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and
a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on
providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO
algorithm, it divides an image from the video into grid system and each grid detects an object within itself
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkish Public Organizations
1. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
DOI : 10.5121/ijmit.2011.3101 1
ANALYSIS OF THE USER ACCEPTANCE FOR
IMPLEMENTING ISO/IEC 27001:2005 IN TURKISH
PUBLIC ORGANIZATIONS
Tolga MATARACIOGLU1
and Sevgi OZKAN2
1
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE),
Department of Information Systems Security, 06700, Ankara, TURKEY
2
Middle East Technical University, Informatics Institute,
Department of Information Systems, 06531, Ankara, TURKEY
mataracioglu@uekae.tubitak.gov.tr, sozkan@ii.metu.edu.tr
ABSTRACT
This study aims to develop a model for the user acceptance for implementing the information security
standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey
reveal that the legislation on information security public which organizations have to obey is significantly
related with the user acceptance during ISO 27001 implementation process. The fundamental components
of our user acceptance model are perceived usefulness, attitude towards use, social norms, and
performance expectancy.
KEYWORDS
User acceptance, TAM, UTAUT, ISO 27001, PDCA, ISMS, perceived usefulness, attitude towards use,
social norms, performance expectancy
I.INTRODUCTION
Information Security Management System (ISMS) is a set of processes and the main goal of those
systems is to manage information security issues in an enterprise [36]. ISMS uses Plan-Do-
Check-Act (PDCA) model and the input of this model is information security requirements and
expectations. The expected output is obviously managed information security. In Plan phase,
establishing ISMS policy, objectives, processes and procedures relevant to managing risk and
improving information security to deliver results in accordance with an organization’s overall
policies and objectives are performed. In Do phase, implemention and operation of the ISMS
policy, controls, processes and procedures are performed. In Check phase, assessment and,
measurement of process performance against ISMS policy, objectives and practical experience
and reporting of the results to management for review are performed. In Act phase, taking
corrective and preventive actions, based on the results of the internal ISMS audit and
management review or other relevant information, to achieve continual improvement of the ISMS
is performed.
ISO 27001 is the standard of implementing ISMS to an enterprise. To implement each of the
phase of the PDCA model, items numbered 4.2.1, 4.2.2, 4.2.3 and 4.2.4 are given in the standard.
The standard has ten domains including security policy, organizational security, asset
2. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
2
classification and control, access control, compliance, personnel security, physical and
enviromental security, system development and maintenance, communications and operations
management and business continuity management.
Based on the theory of reasoned Action, Davis [37] developed the Technology Acceptance Model
(TAM) which deals more specifically with the prediction of the acceptability of an information
system. This is an information system, the probability that he will use it is high if he perceives
that the system will improve his performance at work. Besides, the Technology Acceptance
Model hypothesizes a direct link between perceived usefulness and perceived ease of use. With
two systems offering the same features, a user will find more useful the one that he finds easier to
use.
The UTAUT (Unified Theory of Acceptance and Use of Technology) aims to explain user
intentions to use an IS and subsequent usage behavior. The theory holds that four key constructs
(performance expectancy, effort expectancy, social influence, and facilitating conditions) are
direct determinants of usage intention and behaviour. Gender, age, experience, and voluntariness
of use are posited to mediate the impact of the four key constructs on usage intention and
behavior. The theory was developed through a review and consolidation of the constructs of eight
models that earlier research had employed to explain IS usage behaviour (theory of reasoned
action, technology acceptance model, motivational model, theory of planned behavior, a
combined theory of planned behavior/technology acceptance model, model of PC utilization,
innovation diffusion theory, and social cognitive theory). Subsequent validation of UTAUT in a
longitudinal study found it to account for 70% of the variance in usage intention.
II.LITERATURE REVIEW
We will perform a literature review about user acceptance in this section concerning the last 10
years’ journals.
[1] says that important organizational barriers hinder the implementation of personalized e-
government services and important user obstacles, such as access, trust, control, and privacy,
have to be overcome to make fruitful use of those personalized e-government services.
[2] considers the following questions: What are the limitations of the existing TAM for studying
virtual community? What is effect of social networks on user acceptance of technology for virtual
community? and How can the influence of different types of social ties serve as a basis for
exploring the user acceptance of technology in a virtual community? They explore the possibility
for extending TAM to incorporate the influence of the different types of social ties as a new
theoretical construct.
[3] attempts to provide a systematic analysis of the explanatory and situational limitations of
existing technology acceptance studies. Ten moderating factors are identified and categorized into
three groups: organizational factors, technological factors and individual factors.
[4] proposed a revised technology acceptance model for measuring end user computing (EUC)
acceptance. An empirical study was conducted to collect data. This data was empirically used to
test the proposed research model. The structural equation modeling technique was used to
evaluate the causal model and confirmatory factor analysis was performed to examine the
reliability and validity of the measurement model.
3. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
3
A new policy approach is proposed to increase ICT acceptance in [5]. The approach is based on
strategies of segmentation and differentiation. This entails that policy initiatives are specifically
targeted towards different groups in the population.
[6] investigated four potential moderating variables – perceived risk, technology type, user
experience, and gender – in users’ technology adoption. Their moderating effects were tested in
an empirical study of 161 subjects. Results showed that perceived risk, technology type, and
gender were significant moderating variables.
Using the theory of planned behavior (TPB) as a theoretical framework, [7] investigates the effect
of a set of antecedent factors on the intention to accept EDMS. Collected from a sample of 186
users of real e-Government's electronic document management systems (EDMS) in Taiwan, the
results strongly support the utilization of TPB in predicting users' intention to accept EDMS. In
addition, the findings indicate that perceived usefulness, perceived ease of use, training,
compatibility, external influence, interpersonal influence, self-efficacy, and facilitating conditions
are significant predictors of users' intention to utilize EDMS.
Analysis of the data in [8] showed that users and analysts did not agree on the user's involvement
nor did they agree on their perceptions of the acceptability of the system to the user.
Relationships of self-ratings of user involvement (UI) with system usage and system acceptance
by the user demonstrated high correlations, which were attributed to the narrow focus of the UI
and system acceptance measures rather than the original more global measure.
[9] tested one of TAM’s assumptions that the ‘perceived ease-of-use’ and ‘perceived usefulness’
constructs fully mediate the influence of external variables on usage behaviors. Using a survey of
125 employees of a U.S. Government agency they found, contrary to the normally accepted
assumption, that external variables could have direct effects on usage behavior over and above
their indirect effects.
[10]examines the levels of security acceptance that can exist amongst employees within an
organization, and how these levels relate to three recognised levels of corporate culture. It then
proceeds to identify several factors that could be relevant to the development of culture, from
traditional awareness-raising techniques through to context-aware promotion of security.
[11] proposed an extended model for analyzing initial IT acceptance behavior of Chinese users.
To empirically test the model, they conducted a survey regarding the recognition and adoption of
an English e-learning system in the freshmen of a business school.
Using a survey sample collected from 722 knowledge workers using desktop computer
applications on a voluntary basis in Saudi Arabia, [12] examined the relative power of a modified
version of UTAUT in determining ‘intention to use’ and ‘usage behavior’. They found that the
model explained 39.1% of intention to use variance, and 42.1% of usage variance.
A statistical meta-analysis of the technology acceptance model (TAM) as applied in various fields
was conducted using 88 published studies that provided sufficient data to be credible in [13]. The
results show TAM to be a valid and robust model that has been widely used, but which
potentially has wider applicability.
Relying on social exchange theory and technology acceptance literature, [14] argues that users’
acceptance of a newly introduced technology is related to the beliefs that individuals have about
their social relationships with the supervisor, the team members, and the organization as a whole.
Besides confirming previous findings in the acceptance domain, their results demonstrate that
perceived usefulness and ease of use about technology are influenced by team–member exchange,
leader–member exchange, and organizational support, while affective commitment toward the
organization shows a positive influence only on perceived usefulness.
4. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
4
In [15], an attempt is made to explain the descriptive data of a large-scale representative survey of
the use of government Internet services by the Dutch population in 2006 by means of a
multidisciplinary model of technology acceptance and use that is applied to these services.
[16] concludes that TAM is a useful model, but has to be integrated into a broader one which
would include variables related to both human and social change processes, and to the adoption of
the innovation model.
[17]describes the development of a comprehensive model for measuring user satisfaction in the
context of E-Government. It rethinks the e-strategies of government and subsequently presents a
conceptual model derived from ICT acceptance theory. Both quantitative as well as qualitative
research have been carried out in order to elaborate the model and to formulate adequate
indicators for measuring user satisfaction.
[18]Attitude theory from psychology provides the rationale for hypothesized model relationships,
and validated measures were used to operationalize model variables in [18]. A field study of 112
users regarding two end-user systems was conducted to test the hypothesized model. TAM fully
mediated the effects of system characteristics on usage behavior, accounting for 36% of the
variance in usage.
[19] develops hypotheses about the effects of the dimensions (innova-tiveness, optimism,
discomfort, and insecurity) of technology readiness on two key stages of Internet acceptance,
adoption, and usage of different Internet-based activities, and test them through a two-stage
model using U.S. consumer survey data.
[20] reported the results of an investigation that compared two versions of technology acceptance
model (TAM) in understanding the determinants of user intention to use wireless technology in
the workplace. The first model is derived from original TAM that includes perceived usefulness,
perceived ease of use, attitude and behavioral intention. The alternative model is a parsimonious
version in which the attitude was taken out as was done by many prior studies.
[21] explores the extent of user acceptance of the national identity card (NIC) and driving license
(DL) applications embedded in the Malaysian government multipurpose smartcard (called
MyKad).
[22] assessed the use of “Personal Computer Technology” in public organizations of developing
countries in South Asia, particularly in Pakistan.
[23] considers whether people likely to pursue careers within the not-for-profit (NFP) sector have
different attitudes to technology and whether such differences affect the measures used within
technology acceptance models.
The model is tested using data gathered from 374 end users of the Internet in Korean firms and
data analysis is conducted using a structural equation modeling with LISREL in [24]. Significant
relationships are found between experience and usefulness, between experience and ease of use,
and between ease of use and usefulness.
[25] says that, some drawbacks must be considered. Important organizational barriers hinder the
implementation of personalized e-government services and important user obstacles, such as
access, trust, control, and privacy, have to be overcome to make fruitful use of those personalized
e-government services.
Survey of nonprofit public relations practitioners (N = 409) applied the Unified Theory of
Acceptance and Use of Technology (UTAUT) in [26]. Findings indicate that women consider
social media to be beneficial, whereas men exhibit more confidence in actively utilizing social
media.
[27] examined the influence of information technology (IT) acceptance on organizational agility.
The study was based on a well-established theoretical model, the Technology Acceptance Model
(TAM). They attempted to identify the relationships between IT acceptance and organizational
5. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
5
agility in order to see how the acceptance of technology contributes to a firm's ability to be an
agile competitor. Structural equation modeling techniques were used to analyze the data.
[28] argues that the frequent organizational incoherence and thus the unviability of modern
technology arises from ‘social alienation’ between the innovation-commitment phase and the
implementation of the technology in society. The roles of technical elites and of particular
concepts of technology in this alienation are emphasized.
The findings show in [29] that the majority of Jordanian public organizations have access to
computers, and most of the agencies have in-house systems. Microcomputers were found to be
the most common computer platform, and agency use of IT was consistently intense in the area of
financial management. Most public organizations with in-house computers employ on-staff
programmers, whose numbers range from one to four or fewer.
[30] examined the efficacy of this psychologically based TAM within two samples of government
workers experienced in the use of computers (N=108). All participants completed a self-report
questionnaire consisting of both previously developed and purpose derived scales. The study
achieved its purpose of replicating and validating a development of the TAM, although only
moderate support for the model was found.
[31] develops hypotheses about the effects of the dimensions (innovativeness, optimism,
discomfort, and insecurity) of technology readiness on two key stages of Internet acceptance,
adoption, and usage of different Internet-based activities, and test them through a two-stage
model using U.S. consumer survey data.
[32] examines the diffusion process and those factors which determine whether or not an
innovation is accepted with special note towards the determinants of customer acceptance of an
innovation.
Based on the revised unified theory of acceptance and use of technology (UTAUT) model, [33]
described a theoretical framework that incorporates the unique characteristics of m-commerce to
enhance our understanding of m-commerce acceptance and usage in China.
Thirty-four articles selected from international journals were analyzed in [34] to show that most
of the relationships in the classical TAM are significant, but the stabilities of these relationships
differ. The significant positive relationships between perceived ease of use and its independent
variables are more stable than the others. Various factors can strengthen or weaken these
relationships.
[35] examines the evidence that the TAM predicts actual usage using both subjective and
objective measures of actual usage. They performed a systematic literature review based on a
search of six digital libraries, along with vote-counting meta-analysis to analyze the overall
results. The search identified 79 relevant empirical studies in 73 articles. The results show that BI
is likely to be correlated with actual usage. However, the TAM variables perceived ease of use
(PEU) and perceived usefulness (PU) are less likely to be correlated with actual usage.
III.MODELAND METHODOLOGY
We have used surveying as our methodology and asked people questions about general, perceived
usefulness, attitude towards use, performance expectancy and social norms.
Our new model for user acceptance for implementing ISO/IEC 27001:2005 in Turkish public
organizations is given in Fig 1.
Our questions included in the survey are given below with a classification by general, perceived
usefulness, attitude towards use, social norms, and performance expectancy.
6. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
6
Fig 1. The new model for the user acceptance of ISO 27001
General:
GN1) Gender?
a) Female
b) Male
GN2) Age?
a) Under 20
b) Between 20 and 30
c) Between 31 and 45
d) Above 45
GN3) Academic level?
a) High school
b) Bachelor
c) Master
d) PhD
e) Other
GN4) Description of organization?
a) Public organization
b) Private sector
c) Armed Forces
d) I do not work
GN5) Why do you use information systems?
a) For business
b) To read my e-mails
c) For internet surfing
d) I do not use information systems
GN6) How much time do you spend with information systems?
a) Approximately 1 hour
b) Less than 1 hour
c) Between 1 and 3 hours
d) More than 3 hours
7. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
7
GN7) What is your privilege in your computer?
a) Administrator
b) User
c) I do not use computer
GN8) Does your organization have the ISO 27001 certificate?
a) Yes
b) No
Perceived Usefulness:
PU1) ISO 27001 will improve my quality of work
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PU2) ISO 27001 will make it easier to do my job.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PU3) ISO 27001 will make it faster to do my job.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PU4) ISO 27001 will give me better control over my job.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PU5) ISO 27001 will enhance my effectiveness.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PU6) ISO 27001 will make it more secure to do my job.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
Attitude Towards Use:
AU1) I think that ISO 27001 certification is good for my organization.
8. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
8
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
AU2) I think that ISO 27001 certification is beneficial for my organization.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
AU3) I think that ISO 27001 certification is garbage for my organization.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
AU4) I think that ISO 27001 certification is efficient for my organization.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
AU5) I think that ISO 27001 certification is unnecessary for my organization.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
Social Norms:
SN1) Which one should be implemented first so as to establish information security management
system in your organization?
a) COBIT
b) ISO 27001
c) Legal infrastructure
d) All of above
e) None
SN2) Do you want that ISO 27001 certification is a must in our country?
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
SN3) Who do you think is responsible from obtaining ISO 27001 certificate and establishing
information security management system?
a) Senior management
9. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
9
b) IT
c) Consultants
d) All organization employees
e) I do not know
SN4) Suppose that ISO 27001 certification is a must in our country. Which one is true for you?
a) I meet all of the requirements of ISO 27001 on paper since it is a must, however my
method in doing my job remains same as before.
b) I do my job concerning that both ISO 27001 is a must and it brings effectiveness to my
job.
c) ISO 27001 is not applied in my organization even on paper assuming that it is a must
in our country.
SN5) There should firstly be made laws so as to establish information security management
system in my organization. Otherwise, my organization will not take notice this certification.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
Performance Expectancy:
PE1) I think that there will be a decrease in my performance when ISO 27001 certification comes
to my organization.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PE2) I think that there will be an increase in plodding jobs when ISO 27001 certification comes
to my organization.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PE3) I think both job doing performance and ISO 27001 can be driven together.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PE4) I think both job doing rate and ISO 27001 can be driven together.
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
PE5) I think both job doing efficiency and ISO 27001 can be driven together.
10. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
10
a) Strongly agree
b) Agree
c) I’m not sure
d) Disagree
e) Strongly disagree
IV.DISCUSSION
We determined our model for user acceptance of ISO 27001 consisting of four components as
perceived usefulness, attitude towards use, social norms, and performance expectancy. Also we
expect that performance expectancy and perceived usefulness affect attitude towards use. Further,
all of those three components affect social norms. We conclude that the legislation should be
enacted after adopting ISO 27001 in organizations. Otherwise, organizations will behave ISO
27001 as a plodding workload.
As a result, user adoption in ISO 27001certification in Turkish public organizations is
significantly related with legislation and the precedence should be given to user acceptance when
comparing legislation enacting with user acceptance.
V.CONCLUSIONS
In this paper, we tried to analyze of the user acceptance for implementing ISO/IEC 27001:2005 in
Turkish public organizations. First, we introduced the concepts ISMS, PDCA, ISO 27001, user
acceptance, TAM, and UTAUT in Part I. Then in Part II, we presented our new model and the
questions of our survey which determined our model components. In Part IV, we analyzed the
survey results and discussed the results in Part V.
The results of the surveys performed in Turkey reveal that the legislation on information security
public which organizations have to obey is significantly related with the user acceptance during
ISO 27001 implementation process. The fundamental components of our user acceptance model
are perceived usefulness, attitude towards use, social norms, and performance expectancy.
11. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
11
VI.REFERENCE
[1] Personalization in the public sector: An inventory of organizational and user obstacles
towards personalization of electronic services in the public sector, Government Information
Quarterly, Volume 24, Issue 1, January 2007, Pages 148-164, Willem Pieterson, Wolfgang
Ebbers, Jan van Dijk.
[2] Exploring user acceptance of technology using social networks
The Journal of High Technology Management Research, Volume 20, Issue 1, 2009, Pages 1-
18, Liaquat Hossain, Anjali de Silva
[3] The role of moderating factors in user technology acceptance
International Journal of Human-Computer Studies, Volume 64, Issue 2, February 2006, Pages
53-78 Heshan Sun, Ping Zhang
[4] Empirical evaluation of the revised end user computing acceptance model, Computers in
Human Behavior, Volume 23, Issue 1, January 2007, Pages 162-174, Jen-Her Wu, Yung-
Cheng Chen, Li-Min Lin
[5] Profiling the non-user: Rethinking policy initiatives stimulating ICT acceptance,
Telecommunications Policy, Volume 33, Issues 10-11, November-December 2009, Pages
642-652 Pieter Verdegem, Pascal Verhoest
[6] The effects of perceived risk and technology type on users’ acceptance of technologies,
Information & Management, Volume 45, Issue 1, January 2008, Pages 1-9, Il Im, Yongbeom
Kim, Hyo-Joo Han
[7] User acceptance of intergovernmental services: An example of electronic document
management system Government Information Quarterly, Volume 26, Issue 2, April 2009,
Pages 387-397 Shin-Yuan Hung, King-Zoo Tang, Chia-Ming Chang, Ching-De Ke
[8] User involvement during information systems development: a comparison of analyst and user
perceptions of system acceptance Journal of Engineering and Technology Management,
Volume 16, Issues 3-4, September-December 1999, Pages 329-348
S. Thomas Foster Jr., Charles R. Franz
[9] The mediation of external variables in the technology acceptance model, Information &
Management, Volume 43, Issue 6, September 2006, Pages 706-717, Andrew Burton-Jones,
Geoffrey S. Hubona
[10] From culture to disobedience: Recognising the varying user acceptance of IT security,
Computer Fraud & Security, Volume 2009, Issue 2, February 2009, Pages 5-10, Steven
Furnell, Kerry-Lynn Thomson
[11] Extended Information Technology Initial Acceptance Model and Its Empirical Test, Systems
Engineering - Theory & Practice, Volume 27, Issue 9, September 2007, Pages 123-130 Nan
ZHANG, Xun-hua GUO, Guo-qing CHEN
[12] Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT,
Information & Management, Volume 44, Issue 8, December 2007, Pages 681-691, Said S.
Al-Gahtani, Geoffrey S. Hubona, Jijie Wang
[13] A meta-analysis of the technology acceptance model Information & Management, Volume
43, Issue 6, September 2006, Pages 740-755 William R. King, Jun He
12. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
12
[14] Intra-organizational relationships and technology acceptance
International Journal of Information Management, Volume 28, Issue 6, December 2008,
Pages 517-523 Massimo Magni, Ferdinando Pennarola
[15] Explaining the acceptance and use of government Internet services: A multivariate analysis of
2006 survey data in the Netherlands Government Information Quarterly, Volume 25, Issue 3,
July 2008, Pages 379-399 Jan A.G.M van Dijk, Oscar Peters, Wolfgang Ebbers
[16] Why do people use information technology? A critical review of the technology acceptance
model Information & Management, Volume 40, Issue 3, January 2003, Pages 191-204, Paul
Legris, John Ingham, Pierre Collerette
[17] User-centered E-Government in practice: A comprehensive model for measuring user
satisfaction Government Information Quarterly, Volume 26, Issue 3, July 2009, Pages 487-
497 Pieter Verdegem, Gino Verleye
[18] User acceptance of information technology: system characteristics, user perceptions and
behavioral impacts International Journal of Man-Machine Studies, Volume 38, Issue 3,
March 1993, Pages 475-487 Fred D. Davis
[19] The effects of the dimensions of technology readiness on technology acceptance: An
empirical analysis Journal of Interactive Marketing, Volume 22, Issue 4, 2008, Pages 19-39,
Shun Yin Lam, Jeongwen Chiang, A. Parasuraman
[20] User acceptance of wireless technology in organizations: A comparison of alternative models,
Computer Standards & Interfaces, In Press, Accepted Manuscript, Available online 17 March
2010 Chin-Shan Wu, Fei-Fei Cheng, David C. Yen, Yu-Wen Huang
[21] User acceptance of Malaysian government multipurpose smartcard applications, Government
Information Quarterly, Volume 26, Issue 2, April 2009, Pages 358-367, W.H. Loo, Paul H.P.
Yeow, S.C. Chong
[22] Expanding the Technology Acceptance Model to examine Personal Computing Technology
utilization in government agencies in developing countries, Government Information
Quarterly, Volume 26, Issue 1, January 2009, Pages 128-136, Marvine Hamner, Raza-ur-
Rehman Qazi
[23] Technology acceptance: Not all organisations or workers may be the same, International
Journal of Accounting Information Systems, Volume 10, Issue 4, December 2009, Pages 263-
272 Geoffrey Greenfield, Fiona Rohde
[24] A structural equation modeling of the Internet acceptance in Korea
Electronic Commerce Research and Applications, Volume 6, Issue 4, Winter 2007, Pages
425-432 Byung Gon Kim, Soon Chang Park, Kyoung Jun Lee
[25] Personalization in the public sector: An inventory of organizational and user obstacles
towards personalization of electronic services in the public sector, Government Information
Quarterly, Volume 24, Issue 1, January 2007, Pages 148-164, Willem Pieterson, Wolfgang
Ebbers, Jan van Dijk
[26] Adoption of social media for public relations by nonprofit organizations, Public Relations
Review, Volume 36, Issue 1, March 2010, Pages 90-92, Lindley Curtis, Carrie Edwards,
Kristen L. Fraser, Sheryl Gudelsky, Jenny Holmquist, Kristin Thornton, Kaye D. Sweetser
13. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
13
[27] The relationship between information technology acceptance and organizational agility in
Malaysia Information & Management, Volume 42, Issue 6, September 2005, Pages 829-839
Mohamed Zain, Raduan Che Rose, Iskandar Abdullah, Maslin Masrom
[28] Redefining the issues of risk and public acceptance : The social viability of technology,
Futures, Volume 15, Issue 1, February 1983, Pages 13-32, Brian Wynne
[29] Information technology adoption in jordanian public sector organizations, Journal of
Government Information, Volume 25, Issue 2, 4 March 1998, Pages 117-134, Alaa-Aldin A.
Ahmad, Steven D. Zink
[30] Information technology acceptance in a sample of government employees: a test of the
technology acceptance model Interacting with Computers, Volume 12, Issue 5, April 2000,
Pages 427-443 Peter Roberts, Ron Henderson
[31] The effects of the dimensions of technology readiness on technology acceptance: An
empirical analysis Journal of Interactive Marketing, Volume 22, Issue 4, 2008, Pages 19-39,
Shun Yin Lam, Jeongwen Chiang, A. Parasuraman
[32] Acceptance of innovations: The customer is the key!
The Journal of High Technology Management Research, Volume 6, Issue 2, Autumn 1995,
Pages 193-209 Steve Dunphy, Paul A. Herbig
[33] Mobile Commerce User Acceptance Study in China: A Revised UTAUT Model, Tsinghua
Science & Technology, Volume 13, Issue 3, June 2008, Pages 257-264, Qingfei Min, Shaobo
Ji, Gang Qu
[34] Review of Relationships Among Variables in TAM
Tsinghua Science & Technology, Volume 13, Issue 3, June 2008, Pages 273-278, Yuanquan
Li, Jiayin Qi, Huaying Shu
[35] Does the technology acceptance model predict actual use? A systematic literature review,
Information and Software Technology, Volume 52, Issue 5, May 2010, Pages 463-479, Mark
Turner, Barbara Kitchenham, Pearl Brereton, Stuart Charters, David Budgen
[36] ISO/IEC, “ISO/IEC 17799: Information Technology - Code of Practice for Information
Security Management”, 2000.
[37] Davis, F.D., 1989. Perceived usefulness, perceived ease of use, and user acceptance of
information technology.MIS Quarterly 13 (3), 319–340
14. International Journal of Managing Information Technology (IJMIT) Vol.3, No.1, February 2011
14
Tolga MATARACIOGLU
After receiving his BSc degree in Electronics and Communications
Engineering from Istanbul Technical University in 2002 with high
honors, he received his MSc degree in Telecommunications
Engineering from the same university in 2006. He is now pursuing his
PhD degree in Information Systems from Middle East Technical
University. He is working for TUBITAK National Research Institute
of Electronics and Cryptology (UEKAE) at the Department of
Information Systems Security as senior researcher. He is the author of
many papers about information security published nationally and internationally. He also trains
various organizations about information security. His areas of specialization are system design
and security, operating systems security, and social engineering.
Sevgi OZKAN
Dr Sevgi Ozkan is an Assistant Professor at Department of Information
Systems, Informatics Institute, Middle East Technical University Turkey.
She is currently the Associate Dean of the School. She holds a BA and an
MA in Engineering from Cambridge University and an MSc in Business
Information Systems London University UK. She has a PhD in
Information Systems Evaluation. She is a Fellow of the UK Higher
Education and a Research Fellow of Brunel University UK. Since 2006,
Dr. Ozkan has been involved with a number of EU 7th Framework and National projects in e-
government.