This document summarizes a study that applied the Technology Acceptance Model to examine factors influencing student usage of Wi-Fi at the Economics and Business Faculty of Brawijaya University in Indonesia. The study analyzed how perceived ease of use, perceived usefulness, and perceived playfulness affected student attitudes toward using Wi-Fi, their behavioral intention to use Wi-Fi, and actual Wi-Fi usage. A survey was administered to 100 students to collect data on these variables. The results showed that perceived ease of use, perceived usefulness, and perceived playfulness all significantly influenced student attitudes, intentions, and actual usage of the university's Wi-Fi network.
Requirement analysis, architectural design and formal verification of a multi...ijcsit
This paper presents an approach based on the analysis, design, and formal verification of a multi-agent
based university Information Management System (IMS). University IMS accesses information, creates
reports and facilitates teachers as well as students. An orchestrator agent manages the coordination
between all agents. It also manages the database connectivity for the whole system. The proposed IMS is
based on BDI agent architecture, which models the system based on belief, desire, and intentions. The
correctness properties of safety and liveness are specified by First-order predicate logic.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
Requirement analysis, architectural design and formal verification of a multi...ijcsit
This paper presents an approach based on the analysis, design, and formal verification of a multi-agent
based university Information Management System (IMS). University IMS accesses information, creates
reports and facilitates teachers as well as students. An orchestrator agent manages the coordination
between all agents. It also manages the database connectivity for the whole system. The proposed IMS is
based on BDI agent architecture, which models the system based on belief, desire, and intentions. The
correctness properties of safety and liveness are specified by First-order predicate logic.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
Information System Success Framework based on Interpersonal Conflict Factors IJECEIAES
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS. In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...ijcsit
The requirements of software are key elements that contribute to the quality and users satisfaction of the
final system. In this work, Requirements Engineering (RE) of web sites is presented using an organizational
semiotics perspective. They are shown as being part of an organization, with particular practices, rules
and views considering stakeholders several differences and opinions. The main contribution of this paper is
to relate an experience, from elicitation to validation, showing how organizational semiotics artifacts were
exploited in a collaborative and participatory way to RE of a web portal. A case study is described in order
to demonstrate the feasibility of using such artifacts to RE when we think about the system as being part of
a social organization.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
CITE PhD Student research Seminar Presentation at the University of East London
Speaker: Amin Hosseinian Far
Title: Artificial Intelligence Techniques for Modelling Systems’ Sustainability : A Review
How institutions make decisions to accept or reject technology innovation has been explored by academics with the assistance of the Technology Acceptance Model (TAM). Scenarios involving successful delivery of online learning from degree granting universities guide this literature review. It examines decision processes influenced by TAM methods combined with dominant research perspectives such as Self-efficacy Theory and Universal Technology Adoption and Use Theory. This paper analyzes which variables determine perceptions of usefulness, attitude and preferences and become frequent factors to influence typical TAM results. It identifies patterns about reliable predictors of outcomes (behaviors, aligning IT and preferences) for educational investments in learning environments, content delivery and teacher preferences. Adoption of technology is a complex, inherently social process guided by perceptions or misperception of value and ease of use. Thus, facilitating a decision to adopt devices, software or processes must address emotional, cognitive, and contextual concerns of all stakeholders.
Prepared for TCC conference, 2011
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
An Investigation of Critical Failure Factors In Information Technology ProjectsIOSR Journals
Rate of failed projects in information technology system project remains high in comparison with other infrastructure or high technology projects. The objective of this paper is to determine and represent a broad range of potential failure factors during the implementation phase and cause of IS/IT Project defeat/failure. Challenges exist in order to achieve the projects goal successfully and to avoid the failure. In this research study, 12 articles were studied as significant contributions to analyze developing a list of critical failure factors of IT projects
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
Improving Technological Services and Its Effect on the Police’s PerformanceEditor IJCATR
The role of police department in any country is critical. It is obvious that improving the technology in police department can
be done with safety and contributes to improve its economy. This paper, first tries to recognize the existed weaknesses in used
technologies. Then, it will suggest the best approach. The proposed framework of this study points out to two different moderating
roles that can be considered as technical contributions. Moreover, the combination of this proposed framework is new for current
study. This framework is concentrated on technology improvement, knowledge management system, technology acceptance, police
performance, and ministry performance
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
Information System Success Framework based on Interpersonal Conflict Factors IJECEIAES
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS. In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...ijcsit
The requirements of software are key elements that contribute to the quality and users satisfaction of the
final system. In this work, Requirements Engineering (RE) of web sites is presented using an organizational
semiotics perspective. They are shown as being part of an organization, with particular practices, rules
and views considering stakeholders several differences and opinions. The main contribution of this paper is
to relate an experience, from elicitation to validation, showing how organizational semiotics artifacts were
exploited in a collaborative and participatory way to RE of a web portal. A case study is described in order
to demonstrate the feasibility of using such artifacts to RE when we think about the system as being part of
a social organization.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
CITE PhD Student research Seminar Presentation at the University of East London
Speaker: Amin Hosseinian Far
Title: Artificial Intelligence Techniques for Modelling Systems’ Sustainability : A Review
How institutions make decisions to accept or reject technology innovation has been explored by academics with the assistance of the Technology Acceptance Model (TAM). Scenarios involving successful delivery of online learning from degree granting universities guide this literature review. It examines decision processes influenced by TAM methods combined with dominant research perspectives such as Self-efficacy Theory and Universal Technology Adoption and Use Theory. This paper analyzes which variables determine perceptions of usefulness, attitude and preferences and become frequent factors to influence typical TAM results. It identifies patterns about reliable predictors of outcomes (behaviors, aligning IT and preferences) for educational investments in learning environments, content delivery and teacher preferences. Adoption of technology is a complex, inherently social process guided by perceptions or misperception of value and ease of use. Thus, facilitating a decision to adopt devices, software or processes must address emotional, cognitive, and contextual concerns of all stakeholders.
Prepared for TCC conference, 2011
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
An Investigation of Critical Failure Factors In Information Technology ProjectsIOSR Journals
Rate of failed projects in information technology system project remains high in comparison with other infrastructure or high technology projects. The objective of this paper is to determine and represent a broad range of potential failure factors during the implementation phase and cause of IS/IT Project defeat/failure. Challenges exist in order to achieve the projects goal successfully and to avoid the failure. In this research study, 12 articles were studied as significant contributions to analyze developing a list of critical failure factors of IT projects
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
Improving Technological Services and Its Effect on the Police’s PerformanceEditor IJCATR
The role of police department in any country is critical. It is obvious that improving the technology in police department can
be done with safety and contributes to improve its economy. This paper, first tries to recognize the existed weaknesses in used
technologies. Then, it will suggest the best approach. The proposed framework of this study points out to two different moderating
roles that can be considered as technical contributions. Moreover, the combination of this proposed framework is new for current
study. This framework is concentrated on technology improvement, knowledge management system, technology acceptance, police
performance, and ministry performance
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...IJSEA
Nowadays, with the rapid growth of cloud computing, many industries are going to move their computing
activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through
mobile platforms. This paper offers a model to accompany the benefits of “Mobile Intelligent Learning”
technology and “Cloud Computing”. The architecture of purposed system is based on multi-layer
architecture of Mobile Cloud Computing. Despite the existing challenges, the system has increased the life
of mobile device battery. It will raise working memory capacity and processing capacity of the educational
system in addition to the greater advantage of the educational system. The proposed system allows the
users to enjoy an intelligent learning every-time and every-where, reduces training costs and hardware
dependency, and increases consistency, efficiency, and data reliability.
Adoption of Digital Learning Technology: An Empirical Analysis of the Determi...IJAEMSJORNAL
Technology has advanced significantly from the analogue period to the digital era. Digital Learning Technology (DLT) is a learning paradigm based on the use of ubiquitous latest technologies, by using smart devices. It can be described as a learning environment that is assisted in daily life by wireless networks, mobile, and embedded computers. It aims to offer content and interaction to students wherever they are, at any time. The learning process has advanced thanks to the technology revolution, which has also fundamentally altered how knowledge is shared and learned. At present, there exist other frameworks too, but they are centered towards different paradigms, and point of view pertaining to DLT with its emphasis on Telecommunication Sector has not been taken into consideration. As, existing frameworks are centered towards different environments hence there exists a need to add dimensions of Empowered Learner, Digital Citizen, Knowledge Curator, Innovative Designer, Computational Thinker and Creator, Communicator & Global Collaborator. These have not been integrated together in existing available research. The study will ascertain level of knowledge of DLT and examined factors which affect the adoption rate, use, and role of DLT in telecoms setups. The results of this research will help create a framework that, if used in any academic or learning setting in a technology-based firm.
Assimilation of TTF and UTAUT for Mobile Banking UsageIJAEMSJORNAL
Introduction of mobile banking has enlightened the new ways of business penetration for traditional banks. Over the last two decades, availability of internet and data services massively increased mobile usage which boosted the demand for mobile banking due to its ubiquity and immediacy features. This paper seeks to explore the user perception against mobile banking adoption with technology perspective. The assimilation of “TTF” task-technology fit and “UTAUT” unified theory of acceptance and usage of technology projected a mobile banking adoption model. It further proposed that task-technology fit and customization of technology influences user adoption. This Study came with diversified results of developing country like Pakistan.
In China, a mobile education app is one of the top-three most popular apps, and its market size is
continually growing. As the age of the largest group of mobile app users in China is between 26 and 30 years
old, college students will become the largest potential group to use mobile education apps in the future.
Therefore, understanding the Chinese potential consumers’ attitude and behavior intention to use mobile
education apps is a good way for marketers to set up competitive strategies during promotions. Based on the
TAM model, this study used perceived usefulness, perceived ease of use, and perceived enjoyment to measure
students’ attitude and behavior intention to use mobile education apps in China. Based on the research of 125
Chinese college students, the result indicated that perceived usefulness and perceived enjoyment were positively
influencing users’ attitude and intention to use mobile education apps. However, the perceived ease of use didn’t
affect participants’ behavior intention to use education apps. It confirms that the perceptions of usefulness and
enjoyment are indicators of attitude and intention to use mobile education apps among Chinese college students.
Moreover, the perceived ease of use has a positive impact on the Chinese college students’ attitude toward
education apps but not the individual intention to use the apps. Therefore, in order to target Chinese college
students, marketers can focus on the usefulness and enjoyment of using education apps.
Mobile Financial Services – Adoption and Challenges in BangladeshAbu Shadath Shaibal
The introduction of prepaid cards and the fallen prices of mobile handsets have led to a rapid spread of mobile phones in the emerging economies. This has opened up diverse opportunities for them to be used over and above voice communication. One of such uses which have emerged lately is the use of mobile phones in financial services. This paper explored the key factors that affect the consumer’s acceptance and use of mobile money transfer by extending using key determinants from TAM and IDT theory.
And go through opportunities, threats, challenges, risks and how to mitigate the risk.
Keywords: TAM, Adoption, Mobile Money, Mobile Money Transfer, Bangladesh, MFS, MFSP.
The Big data concept emerged to meet the growing demands in analysing large
volumes of fast moving, heterogeneous and complex data, which traditional data
analysis systems could not manage further. The application of big data technology
across various sectors of the economy has aided better utilization of multiple data
collated and hence decision making. Organizations no longer base operations on
assumptions or constructed models solely, but can make inferences from generated
data. Educational organizations are more efficient and the pedagogical processes
more effective, when multiple streams of data can be collated from the various
personnel and facilitators involved. This data when analysed, maximizes the
performance of administrators andrecipients alike. This paper looks at the
components and techniques in bigdata technology, and how it can be implemented in
the education system for effective administration and delivery
An Analysis on the Application of Information and Communication Technology (I...AJASTJournal
The paper sought to analyse the application of Information and Communication Technology (ICT) in teaching Health Education students in tertiary institutions in Adamawa State. A survey research design was used for the study. The population for the study comprised of 4 tertiary institutions offering Health Education out of which 2 were sampled. A simple random sampling was used in selecting 150 students from each of the institutions sampled making a total of 300 respondents. Data was collected with the use of questionnaire which was subjected to validity and reliability test. The mean and ANOVA was used in establishing the correlation between the variables in the study. The researcher accepts a result if the average mean is above 2.6 which is on the high side and shows a significant relationship. The researchers also reject a result if the average mean is below 2.5 which is on the low side and shows no significant relationship. Based on the findings of this study, it is recommended that: institutions and their management should have more ICT training centers on campus, the management of the institutions should urgently make sure ICT facilities are available for students’ use, the students should be given assignments, course project, group work, which will involve sourcing for information from the internet, lecturers should encourage students to organize mini seminars for presentation of assignments through the use of power point among others.
Technopreneurship Mobile Application (TMA): A Support Mechanism for Flexible ...IJITE
Mobile phones are essential in our daily lives because of their benefits in communication, entertainment, and education. Students use their mobile phones in teaching-learning engagement, both synchronous and asynchronous. The study focused on developing and validating Technopreneurship Mobile Application (TMA) in its functionality, reliability, usability, efficiency, and User interface/user experience. The study engaged with developmental research using the mobile app development cycle, including requirement specification, development modeling, design and development, testing, and deployment. Online data gathering and analysis were used for mobile application validation, evaluation performance, and mobile deployment. A total of 95 information technology students evaluated the application. The results showed that the application is functional, reliable, usable, efficient, and the user interface is helpful. The overall results obtained a 4.20 with an excellent evaluation that shows that developing a mobile application can be a great tool in the flexible learning delivery for students due to its accessibility and usefulness.
Similar to Application of technology acceptance model to wi fi user at economics and business faculty of brawijaya university (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Application of technology acceptance model to wi fi user at economics and business faculty of brawijaya university
1. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
57
Application of Technology Acceptance Model to Wi-Fi User at
Economics and Business Faculty of Brawijaya University
(Study on Stratum-1 Students)
Mochamad Isa Anshori1*
, Ubud Salim2*
, Armanu3*
1.
Management Magistrate Student, Economics and Business Faculty of Universitas Brawijaya, Jalan MT.
Haryono 165 Malang, East Java, Indonesia 65145
2,3.
Lecturer, Professor at, Economics and Business Faculty of Universitas Brawijaya, Jalan MT. Haryono
165 Malang, East Java, Indonesia 65145
* E-mail for correspondence isanshorisa@yahoo.com
Abstract
This study aims to analyze and explaining effect of user extrinsic factors (perceived ease of use and perceived
usefulness) and user intrinsic factor (perceived palyfulness) on attitude toward using, behavioral intention in
using and Wi-Fi usage at Economics and Business Faculty of Universitas Brawijaya. This study applies
technology acceptance model and using quantitative methods. Respondents were 100 students that active to use
Wi-Fi. Primary data was collected by questionnaire and secondary data derived from Information System
Management Agency. Statistical analysis used was path analysis. Results show that perceived ease of use,
perceived usefulness and perceived playfulness significantly affect attitude toward using, behavioral intention
and Wi-Fi usage. This study has shown that intrinsic factors affect on user technology acceptance behavior.
Implications of study were Economic and Business Faculty of Brawijaya University should consider in adding
facilities, network quality improvement for easy access.
Keywords: Technology Acceptance Model (TAM), Wi-Fi, Perceived Ease of Use.
1. Introduction
Rapid technology development and globalization allows each individual to interact with family, business
associates and other individuals without limited by time and distance. These developments include all
technology types, as information and communication technology. Until now, electronic technology development
still very fast. With internet technology, information distribution spread quickly (Daniel, 2003:11). In their
development, information technology was applied widely in various sectors, such as corporate and educational
world. Information technology development also offers various facilities in business activities and educational
aspects. This development emerges a wide range of information technologies such as the telephone network and
Internet. Internet gives data communication benefits to society, as application email, web, and e-Commerce.
Internet applications and computerized systems in companies and libraries may increase IT applications usage
and ultimately contribute to organization development (Nahkoda, 2005 in Sheikhshoaei and Oloumi, 2010),
Internet was also beneficial for company in order to maintain a profitable customer base, reduce transaction costs,
supportive relationships with customers, expand markets, reduce dependence on branch companies and save time
and money (Selic, 2008). Internet applications in everyday create trends in society that always connected to
internet and trend toward wireless data services. Next development phase was wireless internet network (Lehr
and McKnight, 2003). Although initially a wireless network support voice services, but along with wireless
network development, technology was used to transfer high-speed data and Internet applications for customers.
Wi-Fi was more practical compared with wire internet to access internet. Many positive benefits were received
from internet and Wi-Fi in various fields. One them was internet becomes useful tool for interactive
communication, assist research and development of science, data exchange and collaboration between users
(Nasution, 2006:4). Application of information technology (IT) to improve education performance becomes a
prerequisite competencies that required by a number of scholars such as teachers, professors, students,
researchers, and management of educational institutions. (Indrajit, 2006).
Wi-Fi as further development of Internet provides many advantages compared to wired internet. Wi-Fi and
Internet usage prospects were still very large. This phenomenon has supported by government internet program
that launched by internet come to village which will be completed in 2015. Currently Indonesia has many
categories of lagging regions, where many people were still live in a traditional pattern. Therefore, government
promotes Internet program to village. It meant that all people in underdeveloped region still can get new
information about government, agriculture, mining and various other jobs. Further benefits of Internet or Wi-Fi
for village were to make rural people aware of technology. It was expected to be able to further increase human
resources quality in rural and future generations through education.
Specifically, application of information technology (Wi-Fi) in Economics and Business Faculty of University of
2. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
58
Brawijaya was to facilitate and support learning students. In addition, it was expected Wi-Fi applications makes
students more independent, and growing awareness that IT was a knowledge source and to raise talent and skills
competency to use information technology. For faculty, Wi-Fi technology can be used to help them explain
existing teaching materials in various forms, as visual or multi-media illustrations that interesting.
Wi-Fi Usage in Economics and Business Faculty of Brawijaya University was a situation that requires
experience and skills to use information technology to support educational performance and was expected to
increase education quality (Indrajit, 2006). To achieve it, academic organizations need to motivate students to
interact and taking benefit from free Wi-Fi. Therefore, it needs to develop commitment, perceptions of
educational institutions. However, in practice, free Wi-Fi access provided often slow, it was because server was
down or limited quotas can also make Wi-Fi speed was not proportional to number of users. It makes data flow
very slow. Many students complain and do not use Wi-Fi because difficult connection that caused by over-
bandwidth. Consequently this affects student wishes to use Wi-Fi. Easier technology creates more benefits and
more user visit. The more useful a technology, it was likely to be used much more. One reason to support above
opinion was said by Davis (1989), namely: “People tend to use or not use an application to the extent they
believe it will help them perform their job better.” It means a person tends to use or not use technology as far as
they believe the application will help them do their jobs better. Furthermore, Davis (1989) said as follows: “An
application perceived to be easier to use than another is more likely to be accepted by users.” It means was
applications were considered easier to use than others more likely to be accepted by users.
To examine this phenomenon, writer used TAM (Technology Acceptance Model). Technology acceptance
concept for this study came from Technology Acceptance Model (TAM). It was developed by Davis in 1986.
TAM method describes theoretical relationship between internal user confidence, attitude toward using, usage
interest, and usage behavior, to determine how individuals accept or reject a new technology (Davis, 1989).
TAM has been used widely as a theoretical framework in information technology, education, and business
(Davis, 1989; Davis et al., 1989; Seikhsoei and Oloumi, 2010; Selik, 2008). TAM in information technology was
used to predict acceptance and usage of information technology by user (Davis, 1989).
In another study, TAM concept was modified by incorporating external variables (Davis et al., 1989; Davis,
1991; Seyal and Rahman, 2007; Moon and Kim, 2000; Davis, et al., 1991). Moon and Kim (2000) establish a
TAM construct with a new variable for internet usage context. Moon and Kim introduces perceived playfulness.
Concept of perceived playfulness variable developed from flow concept (Csikszentmihalyi, 1975). Reason to
uses technology acceptance model theory in this study and its relationship with research subjects were because
technology acceptance model theory has ability to explain and predicting technology user’s behavior. It was
consistent with Davis, et al. (1989) which states that: “The goal of TAM is to provide an explanation of the
determinants of computer acceptance that is general, capable of explaining user behavior across a broad range of
end-user computing technologies and user populations.” It means TAM goal was to explain determinants of
computer acceptance generally, capable to explain behavior of end user computer technologies and populations
user at large. Second reason was technology acceptance model was designed to examine information technology.
It is consistent with opinion of Davis, et al. (1989) which says that: “Technology Acceptance Model, is and
adoption of Theory of Reasoned Action (TRA) specifically tailored for modeling user acceptance on information
system.” It means that technology acceptance model, an adaptation of Theory of Reasoned Action (TRA),
specifically designed for the model on user acceptance of information systems.
While the reason for the latter was the technology acceptance model can provide an explanation for the basis for
effect of external factors on internal beliefs, attitude toward using, and behavioral intention. In the study Davis,
et al., (1989) states: “A key purpose of TAM, therefore, is to provide a basis for tracing the impact of external
factors on internal beliefs, attitude toward using, and intentions“. It means a main objective of TAM was to
provide a basis for tracking the impact of external factors on perceived ease of use and perceived usefulness
(internal beliefs), attitude toward using, and interest. Moreover, the attractiveness of this study with other studies
because several studies that discuss mobile technology and internet were not only based on technical research on
problems underlying the technology of mobile internet users. This was in accordance with the opinion-Krulle Ng
et al. (2004), Chow (2006) who argued that: “A large amount of literature so far is still "technical-driven" and
most research conducted on the mobile internet elaborates on technological requirements without discussing
important end-user issues (Ng-Krulle et al. 2004). There is therefore a need for more research efforts into those
underlying "drivers" that motivates users to adopt these services.” It means that most literature so far was still
review technical and value that largely research done only on mobile internet technology requirements without
addressing the problem or issue was important to end user (Ng-Krulle et al., 2004).
There was therefore a need for research to examine the basic things that motivate users to adopt these services.
Opinions Teo et al., 1999; Lin et al., 2005 stated that: “Researchers applied TAM to Internet as a technology
acceptance and found that technology can also be intrinsically motivated.” It means that researchers applied
TAM on Internet as a technology and found that technology acceptance can be motivated intrinsically. Therefore,
3. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
59
this research adds perceived playfulness as an intrinsic motivation factor. Further reasons to select objects from
Economics and Business Faculty of Universitas Brawijaya were Wi-Fi used for learning purposes. Consistent
with Moon and Kim (2000) opinion, internet was used for leisure or play as well as for work or study. It means
internet that used to relax or play was same as for work or study.
Based on various phenomena, theories concepts and previous studies mentioned above, there were difference
results among researchers. This research will demonstrate empirically students behavior regarding to Wi-Fi
facilities usage in Economics Faculty with Wi-Fi perceived usefulness, Wi-Fi perceived ease of use, attitude
toward using in Wi-Fi, and usage Wi-Fi interest (behavioral intention) Wi-Fi. TAM modifications that
performed in this study were adding perceived playfulness variables. It was interesting to conduct research on
implementation of technology acceptance model to Wi-Fi users in Economics and Business Faculty at
Universitas Brawijaya (study on stratum-1 student).
2. Theoretical basis
2.1 Wi-Fi
Wi-Fi was abbreviation for Wireless Fidelity. It means standard used for Wireless Local Area Networks WLAN
(Hossein, 2004). Wi-Fi (Wireless Fidelity) was a wireless connection using technology such as mobile phone
radio. Users can transfer data quickly and safely. Wi-Fi term was created by Wi-Fi Alliance company, a WLAN
tools certification company. Wireless devices were tested for ability to operate with other wireless devices using
same standard. Entire wireless devices that pass will be given "WI-FI certified". It means this device can work
well with other certified wireless devices. It enabled anyone who has a computer with a wireless card or personal
digital assistant to connect to internet using the nearest access point or hotspot.
2.2 Technology Acceptance Model (TAM)
Since end 1980s, many research of technology adoption focuses on exploring user interest determinants to use
new technologies. Many theories have been developed to study problem of information technology (IT) adoption,
including reasoned action theory (Fishbein and Ajzen, 1975, in Davis 1989) and technology acceptance model
(Davis, 1989). Technology acceptance model was an adaptation of theory of reasoned action (Fishbein and
Ajzen, 1975) that was a social psychology model (Davis et al., 1989). Technology acceptance model focuses on
two beliefs, namely perceived usefulness and perceived ease of use and their effect on interest usage (behavioral
intention). According to Davis (1989) theory, perceived usefulness and perceived ease of use were two criteria
that determine user’s acceptance and directly affects their attitude toward using. In turn it determines interest to
using (behavioral intention). Davis et al., (1989) modifies technology acceptance model with a finding that
mediation effect of attitude toward using can be ignored.
Therefore, they remove attitudinal variables from model and propose simple technology acceptance model based
on three main variables: perceived usefulness, perceived ease of use, usage interest. This model has been
empirically validated several times by subsequent studies that focused on perceived usefulness, perceived ease of
use and usage interest (Szajna, 1996, Venkatesh, 2000; Venkatesh and Davis, 2000; Venkatesh et al., 2000) .
Technology acceptance model has been tested to explain or predict usage interest to various technologies such as
word processing applications, email, software or graphics software (Davis, 1989; Davis et al., 1989). Technology
acceptance model has been proven valid to test acceptance of a various technology available commercially that
primarily used in office environment (McKechnie et al., 2006, Constantine and Ioannis 2005) or educational
environment (Davis et al., 1989, Sheikhshoaei and Oloumi 2010).
2.3 Variables in Technology Acceptance Model
Original concept of Technology Acceptance Model (TAM) that has not been modified in this case includes
external variables with 5 variable constructs. Description of Technology Acceptance Model (TAM) variables
were described below.
2.3.1 Perceived Ease of Use (PEOU)
Davis (1989) defines perceived ease of use as follows: “Perceived ease of use defined here as the degree to
which a person believes that using a particular system (technology) will be free of effort”. Opinion above means
one confidence level that a specific sistem usage will free from efforts. McKechnie et al. (2006) shows that the
perceived ease of use was a major determinant that determines perceived usefulness.
2.3.2 Perceived Usefulness (PU)
In 1989 Davis defines perceived usefulness as follows: “Perceived ease of use defined here as the degree to
which a person believes that using a particular system, will enhance his or her job performance“. Opinion above
means one confidence level that person who uses a system will improve performance. In adopting and using new
technologies in workplace, Venkatesh et al., (2000) provide evidence that most important determinant of attitude
toward using for employees to adopt and use new technologies was perceived usefulness. It was also a
determinant of behavioral intention.
2.3.3 Attitude toward Using (PP)
4. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
60
Fishbein and Ajzen (1975) said that attitude toward using was one tendency to respond to an object in favorable
or unfavorable way. They showed that attitude toward using can be determined by perceived ease of use. While
attitude toward using was bridge between belief (perceived usefulness, perceived ease of use) and intention to
use technology (behavioral intention), According to Davis et al. (1989) attitude toward using was “An
individual’s positive or negative feelings about performing the target behavior “. It means user assessment in
form of positive or negative feeling to perform desired behaviors. Attitude toward using in TAM was
conceptualized as attitude toward system usage in form of acceptance or rejection as a result when someone uses
a technology in its work (Davis, 1989). Mathieson (1991) in Gadner and Amoroso (2004) stated that attitude
toward using was an evaluation of user's interest to use system.
2.3.4 Interest in Using Technology or Behavioral Intention (BI)
Davis (1989I defines interest in using technology (behavioral intention) as follows: “Behavioral Intention which
is expressed as an anticipated action or inaction towards a system.” It means interest in using was person's desire
to use system or not. Interest in using technology was someone desires to perform a specific behavior. Someone
will perform a behavior if interested in using technology (behavioral intention). Results showed that technology
usage was an interest to use best predictor technology usage by system users (Gaedner and Amoroso 2004). One
conclusion of Davis et al. (1989) was computer usage can be predicted quite well from their interest to use
technology in actual use that can be predicted by technological usage interest (behavioral intention).
2.3.5 Technology Usage (Actual Usage)
Behavior was a person action. In information technology systems usage context, behavior was actual usage of
technology (Jogiyanto 2007:117). In various studies, because actual use can not be observed by researchers that
using questionnaires, actual usage often replaced with perceived usage. David (1989) uses term of actual
technology use (actual use). Igbaria et al., (1995) measures perceived usage as amount of time spent to interact
with technology and frequency of use.
2.3.6 Perceived Playfulness (PP)
Perceived playfulness was intrinsic factor. This variable was introduced first time by Moon and Kim in 2000.
Definition of perceived playfulness by Moon and Kim (2000) was “The extent to which the individual perceives
that his or her attention is focused on the interaction with the internet, is curious during the interaction and finds
the interaction intrinsically enjoyable or interesting”.
Above opinion means how far individuals feel the attention was focused on interaction with internet, curious
during interaction and found that interaction intrinsically enjoyable or interesting. Definition of pleasure was
perceived level of how much user focused, curious and fun, and feel their interaction while interacting with a
technology. Playfulness concept proposed by Moon and Kim (2000) was based on flow theory (Csikszentmihalyi,
1975). Csikszentmihalyi (1975) defines concept of flow as holistic sensation that was felt when they act with
total involvement. Moon and Kim (2000) note that perceived playfulness has a positive effect on attitude toward
using and interest in using (behavioral intention).
2.4 Flow Concept
Flow concept was introduced by Csikszentmihalyi in 1975. According to Csikszentmihalyi, Flow was the
holistic sensation that people feel when they act with total involvement. It means holistic sensation will be
people felt when they act with total involvement (Csikszentmihalyi, 1975). Csikszentmihalyi (1990) argues that
people very happy when they within flow state. It was a state of concentration or absorption the activity or
situation at hand. It was a situation where people very involved in an activity until seem did not care about the
environment. For example, if someone was listening to most preferred music or related to mood, someone will
listen deeply, so changing person's consciousness. People though would blend with music, people no longer feel
themselves as separate things with music.
Flow condition describes a holistic sensation that happens when we perform actions with full involvement. This
was a situation where actions be done according to internal logic that not need a conscious intervention. Meeting
this situation, someone will feel that there was a little bit difference between one's self and environment, between
stimulus and response (Csikszentmihalyi, 1975 ).
3. Conceptual Framework
3.1 Research Hypotesis
Based on conceptual framework, this study proposes 9 hypotheses follow:
H1= Increased perceived ease of use Wi-Fi will be able to improve perceived playfulness to use Wi-Fi
H2 = Increased perceived playfulness in using Wi-Fi will be able to improve attitude toward using Wi-Fi
H3 = Increased perceived playfulness in using Wi-Fi will be able to increase interest of using (behavioral
intention) Wi-Fi.
H4 = Increased perceived ease of use Wi-Fi will improve perceived usefulness of Wi-Fi
H5 = Increased perceived usefulness of Wi-Fi will be able to improve attitude toward using Wi-Fi
5. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
61
H6 = Increases perceived usefulness of Wi-Fi will be able to increase interest of using using (behavioral
intention) Wi-Fi.
H7 = Increased perceived ease of use Wi-Fi will be able to improve attitude toward using Wi-Fi
H8 = Increased attitude toward using Wi-Fi will be able to increase interest in using using (behavioral
intention) Wi-Fi.
H9 = Increased interest in using using (behavioral intention) Wi-Fi technology will be able to increase real
technology usage (actual usage).
4. Methods
This was confirmatory research type. Sample of this study was active Wi-Fi users, based on data BPSI from
Brawijaya University, there were 2026 users where 1500 users were not active and remaining 526 were active
users. Samples decided by accidental sampling method. Data was collected by questionnaire, measured by 5-
point Likert scale. Data were analyzed by path analysis. Qualitative information in this research aims to make the
issue become clearer.
5. Results And Discussion
5.1 Respondents Characteristics
Descriptive analysis showed that majority the Wi-Fi users of Economics and Business Faculty was from class of
2012 with amount of 45%, while the lowest was class of 2009 with amount 13%. Wi-Fi usage frequency of 3
times a week was equal to 56%, while users with more than 3 times Wi-Fi usage a week were 44%.
5.2 Hypothesis Testing
Data analysis show that entire hypothesis in this study were significant. It shown in table below, at column
significance (sig) where all significance level were lower than 0.05 (sig. <0,05). Furthermore, if seen in column t,
all t-count values were lower than 1.984 (t-table). All hypothesized variables relationships were significant and
meaningful. It mean H1, H2, H3, H4, H5, H6, H7, H8 and H9 was accepted.
First hypothesis testing show that a path coefficient (β) of partial effect was 0.59. It means that there was strong
relationship between the two variables. Second hypothesis testing show that a path coefficient (β) of partial
effect was 0.25. It means that there was strong enough relationship between the two variables. Third hypothesis
testing show that a path coefficient (β) of partial effect was 0.20. It means that there was strong enough
relationship between the two variables.
Fourth hypothesis testing show that a path coefficient (β) of partial effect was 0.59. It means that there was
strong relationship between the two variables. Fifth hypothesis testing show that a path coefficient (β) of partial
effect was 0.29. It means that there was strong enough relationship between the two variables. Sixth hypothesis
testing show that a path coefficient (β) of partial effect was 0.35. It means that there was strong enough
relationship between the two variables. Seventh hypothesis testing show that a path coefficient (β) of partial
effect was 0.21. It means that there was strong enough relationship between the two variables. Seventh
hypothesis testing show that a path coefficient (β) of partial effect was 0.21. It means that there was strong
enough relationship between the two variables.
Seventh hypothesis testing show that a path coefficient (β) of partial effect was 0.21. It means that there was
strong enough relationship between the two variables. Eighth hypothesis testing show that a path coefficient (β)
of partial effect was 0.22. It means that there was strong enough relationship between the two variables. Last
hypothesis testing shows that a path coefficient (β) of partial effect was 0.59. It means that there was strong
relationship between the two variables.
6. Discussion
6.1 Effect of Perceived Ease of Use on Perceived Playfulness
Wi-Fi system easiness was used to strengthen perceived playfulness. Someone happy felling in using system was
determined by how easy technology can be used. This was because when a person faces a simple system, that
user feels enjoyment, focus and great curiosity with these technologies. These results were consistent with
research of Moon and Kim (2000).
6.2 Effect of Perceived playfulness on Attitude Toward Using
Someone’s perception strength to pleasure will reinforces the formation of attitude toward using technology. It
can mean that when a person feels happy in using Wi-Fi, this perception affects person's cognitive and affective
in shaping attitude toward using. These results were consistent with research of Davis (1989), Moon and Kim
(2000), Seyal and Rahman (2007), Sheikhshoaei and Oloumi (2010), Davis et al. (1989), Davis et al. (1992),
McKechnie, et al. (2006).
6.3 Effect of perceived playfulness on Behavioral intention of Wi-Fi
Strong perceived playfulness will attract someone in using Wi-Fi. When someone feels deeply technologies
6. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
62
usage , it will foster one's intention to use a technology. These results were consistent with research of Moon and
Kim (2000).
6.4 Effect of Perceived Ease of Use on Perceived Usefulness of Wi-Fi
Perceived easy of use Wi-Fi systems were used to increase perceived usefulness of Wi-Fi users. When users
meet technology that easy to operate, then user was easy to understand the purpose of technology. Research
result of perceived usefulness also consistent with Davis (1989), Moon and Kim (2000), Seyal and Rahman
(2007), Sheikhshoaei and Oloumi (2010), Davis et al. (1989), Davis et al. (1992), McKechnie, et al. (2006).
6.5 Effect of perceived usefulness on attitude toward using
The amount of usefulness that felt by Wi-Fi user will affect user attitudes to use Wi-Fi. Users who already feel
the benefits of a technology will able to affect their cognitive and affective to create positive attitudes to use
technology. These results were consistent with research of Davis, et al. (1989), Venkatesh, et al. (2000),
McKechnie, et al. (2006).
6.6 Effect of Perceived Usefulness on Behavioral Intention of Wi-Fi
The amount of usefulness that felt by Wi-Fi user will increase user’s interest to use Wi-Fi. Users
perceived usefulness in using technology will motivate users to use technology. It grows user interest in using
Wi-Fi continuously. These results were consistent with research of Moon and Kim, (2000), Venkatesh, et.al.
(2000).
6.7 Effect of Perceived Ease of Use Wi-Fi on Attitude toward Using
Ease of use level of a system will affect someone attitude in using Wi-Fi. If user interacts with technology
systems that easy to use, then it affects cognitive and affective user to create positive attitude toward using of
these technologies. These results were consistent with research of Davis, et al. (1989), Davis (1989), and
McKechnie et al. (2006)
6.8 Effect of attitude toward using on Behavioral Intention of Wi-Fi
Strength of a person's attitude toward using Wi-Fi will affect a person's interest in using Wi-Fi. This was because
if positive cognitive and affective in using technology already formed, it create a positive attitude that motivates
to use technology, so it grow user interest in using Wi-Fi continuously. These results were consistent with
research of Moon and Kim (2000), Mathieson (1991), Davis, et al. (1989).
6.9 Effect of Behavioral Intention of Wi-Fi on Wi-Fi Actual Usage
Higher interest or intention in using Wi-Fi will increase duration and frequency of Wi-Fi actual usage. If
someone was motivated to use then it grow interest in using, it encourages a person to use or apply a technology.
Therefore, frequency and duration of using a technology depends on how much a person interested in technology.
These results were consistent with research of Moon and Kim (2000).
6.10 Results of qualitative information
Qualitative analysis results can be used to explore research problem more clearly. Qualitative analysis was
conducted on 10 respondents when collecting questionnaires. the qualitative questions were perceived ease of
use, i.e. total six questions. From analysis result, it showed that respondents know how to operate and understand
Wi-Fi features by reading instructions supplied in IT books or tutorials that available on internet, it learned
through a friend. Indonesian language software and standard systems that issued by internet agency in the world
also helps respondents to understand features and operation of Wi-Fi. Majority of respondents familiar with
internet so it was easier for respondent to become proficient in using Wi-Fi.
Student of active users that did not want to use Wi-Fi to access internet or prefer to use internet outside campus
due the bandwidth provided by campus often can not accommodate all users or overload. This was due to
bandwidth quota reserved was disproportional with users who use. Consequently, Wi-Fi access speed often
slows and Wi-Fi connection was lost. In addition, most active users have own modem or internet connection. It
was used as reserve if Wi-Fi access in campus was overload.
7. Conclusion
Easiness level of a system affects perceived playfulness and perceived usefulness. System operation easiness
affects user’s perceived usefulness. Easy system also affects level of appreciation or user involvement totality in
usage. Attitude toward using affected by system easiness, perceived usefulness and level of appreciation or user
involvement totality in usage. Furthermore, users interest in using Wi-Fi were affected by perceived usefulness,
level of appreciation or user involvement totality in usage, and user attitudes towards Wi-Fi. Perceived
usefulness in this research was dominant factor that influencing user attitudes and interest in using Wi-Fi. User
interest will determine Wi-Fi usage. Users with great interest will result in longer usage duration and more often
to use Wi-Fi.
8. Suggestions
Respondents have some level of proficiency and usage of Wi-Fi. Therefore, future research needs to study more
7. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
63
specific the user experience or proficiency in using technology. TAM theory that applied in this study comes
from social sphere. Therefore it needs special research in order can to generalize Wi-Fi or internet usage within
medicine or engineering.
The purpose of this study was examining Wi-Fi usage in learning context. It hoped future research will address
Wi-Fi usage in job and entertainment facilities context. From statistics development, future research of
technology acceptance model should reveal mediation relationship existence between TAM variables, both for
complete mediation and partial mediation.
References
Arikunto, S. 2006. Prosedur Penelitian: Suatu Pendekatan Praktik, Edisi Revisi 4. Aneka Cipta, Jakarta.
Chow, Jacky Po Ching. 2006. Understanding Users Perceived Playfulness Toward Mobile Information and
Entertainment Service in New Zealand. Thesis Master of Philosophy in Computer and Information Sciences.
Constantine, L. dan Ioannis E.C. 2005. Factors Affecting Accpetance of The Intenet as a marketing-intellegent
Tool Among Employees Of greek Bank Branches. International Journal of Bank Marketing, Vol. 26, No. 6, pp
484-505
Csikszentmihalyi.1975. Beyond Boredom and anxiety. Jossey-Bass, San Francisco, USA
Csikszentmihalyi.1990. Flow: The Psychology of Optimal Experience. Harper and Row. New York.
Davis, F. D, Bagozzi R. P. and Warsaw P.R. 1989. User Acceptance of Computer Tecnology: A Comparison of
Two Theoretical Models. Management Science, Vol. 35, No. 8
Davis, F. D, Bagozzi R. P. and Warsaw P.R. 1992. Extrinsic and Intrinsic Motivation to Use Computers in the
Workplace, Journal of Applied Social Psychology. vol. 22, No. 14, pp 1111-1132
Davis, F. D, 1989. Perceived Usefulness, Perceived Ease of Use and Use Acceptance of Information Technology,
MIS Quartetly.
Davis, F. D, 1991. User Acceptance of Computer Tecnology: User Characteristics, User Perceptions and
Behavioral Impact. International Jornal Man-machine Studies, Vol 38, pp. 475-487
Daniel, m. 2003. Hotspot Networks Wi-Fi for Public Access Locations. McGraw-Hill Companies, USA.
Fishbein, M. and Ajzen, I. (1975). Beliefs, attitude, intention and behavior: An introduction to theory and
research. Reading MA Addison-Wesley.
Gardner, C. Amoroso, Donald D. 2004. Development of an Instrument to Measure the Acceptance of Internet
Technology by Consumers. Proceedings of the 37th Hawaii International Conference on System Sciences. 1-10
Hernandez, B., Jimenez, J., and Martin, M.J. Adoption Versus Acceptance Of E-commerce: Two Different
Decisions. European Journal of Marketing, Vol. 43, No, 9/10, pp. 1232-1245.
Hossein, B. 2004. Internet Encyclopedia, John Wiley and Son, Inc. New Jersey, USA.
Igbaria, M., Guimaraes, T. and Davis B. D. 1995. Testing The Of Microcomputer Usage Via Structural Equation
Model. Journal of Management Information Systems, 11 (4), 87-114.
Indrajit, Ricardus E. 2006. Mengukur Tingkat Kematangan Pemanfaatan Teknologi Informasi Untuk Institusi
Pendidikan. Suatu Pendekatan Kesiapan Pemegang Kepentingan (Stakeholder). Prosiding Konferensi Nasional
Teknologi Informasi & Komunikasi untuk Indonesia Bandung. 116-120
Jogiyanto. 2007. Sistem Informasi Keperilakuan.Yogyakarta. Andi
Lehr, William and McKnight, Lee W. 2003. Wireless Internet access: 3G vs. WiFi?. Telecommunications Policy,
No. 27, pp. 351–370
Lin, C. Wu, S. and Tsai, R. (2005). Integrating Perceived Playfulness into expectation-confirmation model for
web portal context. Information & Management, 42(5), 683-693.
McKechnie, S., Winklhofer, H. Ennew, C. 2006. Appliying The Technology Acceptance Model to The Online
Retailing of Financial Services. International Journal of Retail and Distribution Management, Vol. 34, No. 4/5,
pp.388-410
Moon J.W, Kim Y.G, 2001, Extending the TAM for a World-Wide-Web, Journal Information and Mangement,
Vol. 38, pp. 217-230
Nasution, Laila H. 2006. Pemanfaatan Internet Guna Mendukung Kegiatan Perkuliahan Mahasiswa Program
Pascasarjana UNIMED. Karya Ilmiah, Universitas Sumatra Utara Medan.
Ng-Krulle, G., Swatman, P., Hampe, J. F., & Rebne, D. (2004). End-user Perspectives on the Adoption of
Wireless Applications: Price of Convenience and a Model for Contextual Analysis. In The J 5th Australasian
Conference on Information Systems 2004 (A CIS04), Hobart: Tasmania.
Ridwan dan Kuncoro,A. E. . 2008. Análisis jalur (Path Análisis). Edisi kedua. Penerbit Alfabeta. Bandung
Sarwono, J. 2009. Statistik Itu Mudah: Panduan Lengkap Untuk Belajar Komputasi Statistik Menggunakan SPSS
16. ANDI. Yogyakarta
Selic, Hakan. 2008. What determines Turkish Customers’ Acceptance Of Internet Banking, International
Journal of Bank Marketing. Vol.26, No. 5, Page 353-370
8. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
64
Seyal, A. H. and Rahman N. A. 2007, The Influence of External Variables on The Executives’ Use of The
Internet, Business Process Management Journal, Vol. 13, No. 2, pp. 263-278
Sheikhshoaei, F. and Oloumi, T. 2010. Appliying The Technology Acceptance Model to Iranian Engineering
Faculty Libraries. The Electronic Library, Vol. 39, No. 3, pp. 367-374
Solimun. 2011. Modul Penguatan Confirmatory Research Metode Kuantitatif Untuk Manajemen Dan Bisnis.
University Press
Somantri, A., Mohidin, S.A. 2006. Aplikasi Statistik Dalam Penelitian. Pustaka Setia. Bandung.
Statistik penggunaan internet dunia tahun 2011, http://www.internetworldstats .com. Desember 2012.
Sudjana. 2002. Metode Statistika. Bandung: Tarsito.
Sugiyono. 2008. Metode Penelitian Bisnis. Alfabeta. bandung
Sugiyono. 2010. Statistika untuk penelitian. Alfabeta. Bandung
Szajna, B. (1996). Empirical Evaluation of the Revised Technology Acceptance Model. Management Science,
42(1), 85-92.
Olson, J.C., Peter, P. J. 2010 Consumer Behaviot And Marketing Strategy, 9th Edition. McGraw Hill. New York.
USA
Ruspini, Elisabeta. Longitudinal Research in the Social Sciences. Social Research Update, 28.
http://www.soc.surrey.ac.uk/search/search.htm. diakses tanggal 2 Januari 2013.
Taylor, Nick, et.al. “The Value of Longitudinal Research as a Basis for Subsequent Social Impact Assessment.
Paper for the International Association for Impact Assessment. 20th Annual Meeting. 19-23 June 2000.
Hongkong. 2000.
Teo, T. Lim, V. and Lai, R. (1999). Intrinsic and extrinsic motivation in Internet usage. Omega: International
Journal of Management Science, 27(1), 25-37.
TTIK Universitas Brawijaya. 2005. Survey Teknologi Informasi Dan Komunikasi, Universitas Brawijaya,
Malang.
Uma, Sekaran. 1992. Research Metodh For Business: A Skill Building Approach, Second Edition. John Wiley &
Son Inc. New York. USA
Venkatesh, V. 2000. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and
Emotion into the Technology Acceptance Model. Information Systems Research Vol. 11, No. 4, pp. 342–365
Venkatesh, V. Morris, M. G. and Ackerman, Phillip L. 2000. A Longitudinal Field Investigation of Gender
Differences in Individual Technology Adoption Decision-Making Processes. Organizational Behavior and
Human Decision Processes Vol. 83, No. 1, September, pp. 33–60
Widhiarso, W. 2010. Catatan Pada Uji Linieritas Hubungan, Jurnal Fakultas Psikologi UGM, p.5
Mochamad Isa Anshori, Magistrate Student at Economics and Business Faculty of Universitas Brawijaya Born
at Malang (East Java, Indonesia) on, October 31th
1987. He received his Bachelor Degree in Marketing
Management in 2010 in the Economics and Business Faculty of Universitas Brawijaya, Malang, East Java,
Indonesia and his Master’s Degree in Marketing Management in 2013 in the Faculty of Economics and Business,
Brawijaya University, Malang, East Java, Indonesia.
Ubud Salim, Lecturer dan Professor at Economics and Business Faculty of Universitas Brawijaya. Born in
Malang, Agusts 10th
1948. Stratum-1 graduated from Economics and Business Faculty of Universitas Brawijaya
in Malang East Java Indonesia, Stratum-2 graduated from Ohio State University Ohio USA and Stratum-3
graduated from Economics and Business Faculty of Universitas Brawijaya in Malang East Java Indonesia.
Besides a lecturer, Prof. Ubud Salim is a management consultant, he have authored many books and articles in
many discipline interest eg: Strategy management, management and financial issues
Armanu, Lecturer dan Professor at Economics and Business Faculty of Universitas Brawijaya. Born in Malang,
Agusts 18th
1954. Stratum-1 graduated from Economics and Business Faculty of Universitas Brawijaya in
Malang East Java Indonesia, Stratum-2 graduated from Central Luzon State University in Luzon Philipines and
Stratum-3 graduated from from Central Luzon State University in Luzon Philipines. Prof. Armanu now being
occupied as a leader in doctoral program in Economics and Business Faculty of Universitas Brawijaya in
Malang , East Java, Indonesia.
9. European Journal of Business and Management www.iiste.org
ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online)
Vol.5, No.17, 2013
65
Figure 1 Conceptual Framework and Hypotesis Model
Table 1 Path Analysis Direct Effect Result
Independent
Variable
Dependent
Variable
Standardized
Coefficient beta (β)
t Sig. Statement
PEOU PP (H1) 0,59 7,32 0,00 Significant
PU (H4) 0,59 7,38 0,00 Significant
ATU (H7) 0,21 2,02 0,04 Significant
PP ATU (H2) 0,25 2,64 0,01 Significant
BI (H3) 0,20 2,10 0,03 Significant
PU ATU (H5) 0,29 2,81 0,00 Significant
BI (H6) 0,35 3,49 0,00 Significant
ATU BI (H8) 0,22 2,26 0,02 Significant
BI AU (H9) 0,59 7,30 0,00 Significant
Note:
PEOU : Perceived Ease of Use ATU : Attitude toward Using
PP : Perceived Playfulness BI : Behavioral Intention
PU : Perceived Usefulness AU : Actial Usage
Source : Primary Data Processed
Perceived
Ease of
Use (X1)
Attitude
toward
Using (x4)
Perceived
Usefulness
(X3)
Perceived
Playfulness
(X2)
Behavioral
Intention
(Y1)
Actual
Usage (Y2)
H1
H7
H2
H8
H5H4
H3
H6
H9
10. This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar