This document describes a study that examines factors influencing businesses' adoption of electronic business (e-business) in eight European countries. The study develops a conceptual model based on the technology-organization-environment framework. Survey data from 3,100 businesses and 7,500 consumers is used to test the model. The study finds that technology competence, firm size and scope, consumer readiness, and competitive pressure positively influence adoption, while lack of trading partner readiness negatively influences adoption. As e-business intensity increases, consumer and trading partner readiness become less important factors. In high e-business intensity countries, e-business is no longer dominated by large firms, and small firms benefit from network effects. Firms in high intensity countries also appear more cautious
This document summarizes a literature review on organizational learning factors that impact the success of implementing e-procurement initiatives in the public sector. It identifies 11 organizational learning factors cited in case studies of e-procurement projects, including the need for change management, phased implementation strategies, clear goals and objectives, and performance measurement. The document proposes a conceptual model relating organizational learning factors to implementation outcomes like organization/management, processes/practices, systems/technology, and initiative success. The literature review methodology involved surveying implementation assessments and reports to identify common lessons learned.
Academia-to-Industry Transition of Search and Learning- Based Software Engine...Dr.Bestoun S. Ahmed
The document discusses challenges and opportunities for collaboration between academia and industry in search-based software engineering, noting different missions and reward systems between the two. It provides an overview of search-based software engineering approaches and applications, including test case generation and minimization. Barriers to collaboration include companies prioritizing fast outputs while academia focuses on publications, as well as bureaucracy and lack of prior relationships between parties.
This document summarizes key lessons from 11 qualitative studies of enterprise mobility conducted between 2001-2007. It explores six aspects of how mobile information technology impacts organizations:
1. Interaction - Mobile IT can mediate remote interactions by removing time/space constraints, or support situated interactions by enabling work to be done in specific locations while maintaining remote access.
2. Management of work - Mobile IT can increase organizational control over employees or give individuals more discretion over how and when they work.
3. Collaboration - Mobile IT can support either individual or collective work arrangements.
4. Technology use - Mobile IT can be ubiquitous and transparent in everyday use, or opaque and requiring conscious engagement.
5. Impact on practices
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
Keerthi Thomas is a PhD student at the Open University, supervised by Prof. Bashar Nuseibeh, Dr. Arosha Bandara, and Mr. Blaine Price. Her research focuses on eliciting and analyzing users' privacy requirements for mobile applications. Previous work has shown privacy requirements vary based on users' changing contexts. However, most existing approaches do not address challenges of understanding privacy needs for mobile apps. Thomas proposes a systematic approach using a user-centric model combining contextual and interaction data to capture how privacy requirements are "distilled" from empirical studies of mobile social networking app users.
The Contribution of Information Technology Infrastructure in the Information ...IJRES Journal
There are some great innovations in e-government during the past decade. And there is intense competition between some governments and leaders in the supply of services on the Internet. Some countries do not want to stay behind in this area, where many governments have developed detailed strategies to realize the e-government programs. Despite differences in goals behind these programs from one country to another, but there are still many points of convergence between them particularly in information technology infrastructure field. However, Problems associated with the process of application and adoption of e-government due to poor systems and infrastructure construction, which negatively affects the adoption of the public services through the e-government portal, in particular in developing countries. This study argued contribution the information technology Infrastructure in Information Systems success in e-government agencies. Where there are weaknesses in the understanding of this contribution and its importance in many developing countries, so the researcher proposed a model to clarify this contribution, and expected a positive relationship between the information technology infrastructure factors and information systems success, and this affects positively or negatively the adoption of e-government.
Neither Information technologies determine organisational structure merely, nor does organisational structure. There is a mutual interaction between there variables. Using information technologies is a must for the organisations in this century. However how information technologies evolved over the time brings a question of what effect can technology bring towards organisations and their structure. This study discusses the conceptual issues that raise the importance of technological tools, views and ways that followed by organisations and changed over the time. It also examines technological, organisational and interactive ties that connect organisational structure and the information technology. It concludes that information technologies have an impact on the organisational structure via centralisation and decentralisation, authority and control, space of control, change in organisational level, departmental structure, decision making process, communication, and organising the work.
This document summarizes a literature review on organizational learning factors that impact the success of implementing e-procurement initiatives in the public sector. It identifies 11 organizational learning factors cited in case studies of e-procurement projects, including the need for change management, phased implementation strategies, clear goals and objectives, and performance measurement. The document proposes a conceptual model relating organizational learning factors to implementation outcomes like organization/management, processes/practices, systems/technology, and initiative success. The literature review methodology involved surveying implementation assessments and reports to identify common lessons learned.
Academia-to-Industry Transition of Search and Learning- Based Software Engine...Dr.Bestoun S. Ahmed
The document discusses challenges and opportunities for collaboration between academia and industry in search-based software engineering, noting different missions and reward systems between the two. It provides an overview of search-based software engineering approaches and applications, including test case generation and minimization. Barriers to collaboration include companies prioritizing fast outputs while academia focuses on publications, as well as bureaucracy and lack of prior relationships between parties.
This document summarizes key lessons from 11 qualitative studies of enterprise mobility conducted between 2001-2007. It explores six aspects of how mobile information technology impacts organizations:
1. Interaction - Mobile IT can mediate remote interactions by removing time/space constraints, or support situated interactions by enabling work to be done in specific locations while maintaining remote access.
2. Management of work - Mobile IT can increase organizational control over employees or give individuals more discretion over how and when they work.
3. Collaboration - Mobile IT can support either individual or collective work arrangements.
4. Technology use - Mobile IT can be ubiquitous and transparent in everyday use, or opaque and requiring conscious engagement.
5. Impact on practices
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
Keerthi Thomas is a PhD student at the Open University, supervised by Prof. Bashar Nuseibeh, Dr. Arosha Bandara, and Mr. Blaine Price. Her research focuses on eliciting and analyzing users' privacy requirements for mobile applications. Previous work has shown privacy requirements vary based on users' changing contexts. However, most existing approaches do not address challenges of understanding privacy needs for mobile apps. Thomas proposes a systematic approach using a user-centric model combining contextual and interaction data to capture how privacy requirements are "distilled" from empirical studies of mobile social networking app users.
The Contribution of Information Technology Infrastructure in the Information ...IJRES Journal
There are some great innovations in e-government during the past decade. And there is intense competition between some governments and leaders in the supply of services on the Internet. Some countries do not want to stay behind in this area, where many governments have developed detailed strategies to realize the e-government programs. Despite differences in goals behind these programs from one country to another, but there are still many points of convergence between them particularly in information technology infrastructure field. However, Problems associated with the process of application and adoption of e-government due to poor systems and infrastructure construction, which negatively affects the adoption of the public services through the e-government portal, in particular in developing countries. This study argued contribution the information technology Infrastructure in Information Systems success in e-government agencies. Where there are weaknesses in the understanding of this contribution and its importance in many developing countries, so the researcher proposed a model to clarify this contribution, and expected a positive relationship between the information technology infrastructure factors and information systems success, and this affects positively or negatively the adoption of e-government.
Neither Information technologies determine organisational structure merely, nor does organisational structure. There is a mutual interaction between there variables. Using information technologies is a must for the organisations in this century. However how information technologies evolved over the time brings a question of what effect can technology bring towards organisations and their structure. This study discusses the conceptual issues that raise the importance of technological tools, views and ways that followed by organisations and changed over the time. It also examines technological, organisational and interactive ties that connect organisational structure and the information technology. It concludes that information technologies have an impact on the organisational structure via centralisation and decentralisation, authority and control, space of control, change in organisational level, departmental structure, decision making process, communication, and organising the work.
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
E business an appraisal in enhancing accountability in service delivery and e...Alexander Decker
1) The document discusses the impacts of e-business on accountability in service delivery, productivity, and economic growth. It reviews previous literature that has examined both the positive and negative environmental effects of e-commerce.
2) The literature review finds that e-business can increase productivity and efficiency within companies by up to 60%, and that it has the potential to reduce waste, inventory needs, and the use of paper. However, e-commerce may also increase transportation and packaging waste from shipping.
3) The document examines how e-business impacts accountability in service delivery through identity management and proposes requirements for identity services to provide accountability, such as properly assessing identity data and maintaining identity information over long periods of time.
This document reviews and compares eight prominent models of user acceptance of information technology: the theory of reasoned action, technology acceptance model, motivational model, theory of planned behavior, combined TAM and TPB model, model of PC utilization, innovation diffusion theory, and social cognitive theory. It aims to empirically compare the models, formulate a unified model integrating elements of the eight models called UTAUT, and validate UTAUT using multiple data sets. The eight models are described and their constructs defined. Prior empirical comparisons of the models are discussed, noting limitations that the current study aims to address.
Organizational and social impact of Artificial IntelligenceAJHSSR Journal
ABSTRACT: Modern information technologies and the advent of machines powered by artificial intelligence
(AI) have already strongly influenced the world of work in the 21st century. Computers, algorithms and
software simplify everyday tasks, and it is impossible to imagine how most of our life could be managed
without them. However, the emergence of artificial intelligence (AI) has its own advantages and disadvantages.
With the recent boom in big data and the continuous need for innovation, Artificial Intelligence is carving out a
bigger place in our society. Through its computer-based capabilities, it brings new possibilities to tackle many
issues within organizations. It also raises new challenges about its use and limits. Over the past few years,
developments in artificial intelligence (AI) have captured the imagination of tens of millions of people around
the world. Both the sophistication and the societal impact of intelligent technologies are set to increase
substantially in the coming years and decades, as are the associated policy challenges. This includes how
government agencies protect consumers and citizens from unethical, unsafe or unsound use of AI systems
employed in critical contexts such as health, finance, or employment by companies or individuals. Some of the
impacts of AI on organizations include: power shifts; reassignment of decision making responsibility; cost
reduction and enhanced service; and personnel shifts and downsizing as some jobs are done Robots. This paper
aims to provide a better understanding of the organizational and social impact of Artificial Intelligence in the
organizational decision making process. Unemployment is not the same as leisure, and there are deep links
between unemployment and unhappiness, self-doubt, and isolation understanding what policies and norms can
break these links could significantly improve the median quality of life. Empirical and theoretical research on AI
came up with discussions and findings that with time the negative perceptions will be addressed.
KEYWORDS: Artificial Intelligence, Algorithms, Decision making, Robots, Technologies.
This document discusses e-recruitment practices in Malaysia. It begins with an introduction to e-recruitment and how it has been adopted by government agencies in Malaysia. It then discusses traditional recruitment methods and compares them to e-recruitment. The pros of e-recruitment include reaching a large target audience, being cost effective, and saving time. However, the cons include possible discrimination of groups without computer access and difficulties recruiting executive-level positions. The document provides examples of e-recruitment systems used by the Malaysian government.
CONNECTING O*NET® DATABASE TO CYBERSECURITY WORKFORCE PROFESSIONAL CERTIFICAT...IJITE
The Occupational Information Network O*NET is considered the primary source of occupational
information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce
readiness certification programs. The O*NET database is used to map out education requirements and how
they relate to professional certifications as required by employers and job designers in accordance with the
National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information
Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Statistics (BLS),
and finally tied back to NICCS source work role to identify certifications requirements. I found that no site
has listed any certification as required, desirable or mandatory. NICCS offered general guidance to potential
topics and areas of certification. Careeronestop site provided the ultimate guidance for this role certification.
Professional certifications are still not integrated in the Cybersecurity Workforce Framework official
guidance.
The Use of Social Media to Gather Qualitative Data: A Case of Government E-P...IAIN Datokarama Palu
The emergence of social media is enabling researchers to consider new data collection and triangulation strategies. Quantitative researchers have taken advantage of the emergence of the Internet as a medium to gather data. Meanwhile, interpretive researchers are only now being able to harness the potential that social media provide in generating more insight into collected data. Using a case of government e-procurement implementation and use in an Indonesian regency, we illustrate how social media exchange, postings, and conversations can be used as a source of rich qualitative data to enhance understanding of a topic being studied. Our findings show that monitoring social media exchange, postings, and conversation can strengthen our understanding and interpretation of offline data (such as interviews). This study contributes to literature on the use of online media for interpretive data collection.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
Recently, information security incidents such as personal information leakage have been regarded as serious risk factors that directly affect corporate sales reduction and corporate image loss. In order to manage information security systematically, enterprises have been introducing information security systems more than ever before. This study aims to derive major items of the information security system mainly for corporate organizational management, with a focus on the technology-organizationenvironment (TOE) framework, and suggests a direction for system build-up and management. To this end, the Analytic Hierarchy Process (AHP) was conducted on 20 items derived from previous studies. A survey was conducted among 24 individuals, including 12 corporate internal administrators and 12 corporate external consultants. As a result, it turned out that environmental factors affected the information security system more significantly among technical, organizational, and environmental factors. Notably, 'compliance with legal requirements,' 'protection of information subjects' rights,' and 'increase of the information security awareness' affected the operation of the information security system or related decision-making processes. This finding suggests that although technical and organizational management is also essential when it comes to corporate information security system operation, the system needs to respond swiftly to rapid market changes and legal and administrative changes concerning information security.
Impact of Information and Communication Technology on Cargo Industries A Stud...ijtsrd
The modern trend towards E commerce and computerization that they give you an idea about the way cargo industries Trucking and freight services , this paper establishes an “Impact of information and communication technology on cargo industries” In terms of commerce, logistics and fleet management, and proposes invented mechanisms of influence. The authors note that the speedy increase of E commerce and freight fleet management system compose it not easy to arrive next to firm, statistics based conclusion in relation to their impact of cargo industries, however suggest that more complicated government management of transportation demand over and above freight fleet management systems could call off out the pessimistic impact of E commerce on road transportation. Dr. Nandisha H. D "Impact of Information and Communication Technology on Cargo Industries - A Study in Bengaluru" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35731.pdf Paper URL : https://www.ijtsrd.com/management/mis-and-retail-management/35731/impact-of-information-and-communication-technology-on-cargo-industries--a-study-in-bengaluru/dr-nandisha-h-d
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
The last decade of the twentieth century and the turn of twenty-first century witnessed significant progress in technology in general and information technology and communication in particular. Such progress still continues until today, accelerating with wide quick strides more than ever. This age has produced many mechanisms for manufacturing knowledge and more advanced technological means that have made the globe as a small village. Communication technology, which is represented by the internet, has played a huge rule in transferring information and technological revolution from the north to the south passing by the east and the west at the same time. All of that have had an impact on all political, economic, educational, teaching, social, media, and advertisement systems in all communities.
The term technology is derived from Greek. It consists of two parts, techno, which means skills or art, and logy, which means science or study. Thus, the word technology means the science of performance, science of implementation, or the technical methods to achieve a practical purpose, the science of industrial operation.
Insights on critical energy efficiency approaches in internet-ofthings applic...IJECEIAES
This document summarizes approaches to improving energy efficiency in internet-of-things (IoT) applications. It discusses how cross-layer schemes can be used to optimize network performance and energy efficiency in IoT systems. It also examines optimization-based approaches using machine learning techniques. While various studies have identified methods to improve energy efficiency, open issues remain that need to be addressed to further enhance IoT system performance and outcomes.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
ERP usability is such a problem that according to this study by IFS North America, many users would use Microsoft Excel, online tools like Google Docs or even Dropbox instead of their system of record. Some may even consider changing jobs to get away from bad ERP.
This document discusses how technology is changing the nature of jobs and the future of work. Key points:
1) Digital technologies are automating routine tasks and jobs that involve structured processes, while human workers will likely shift toward tasks requiring creativity, social skills and innovative thinking.
2) New online platforms are creating "networked work" where freelancers connect directly with clients, taking on more risks but also gaining more control over their work. However, this transition to more flexible work arrangements is not painless.
3) Demand is growing for STEM jobs across many industries as data analysis and computing become more widespread. While some jobs will be automated, technology also has the potential to create new types of jobs
This document summarizes a research paper on the information technology (IT) infrastructure in Badin, Pakistan. The research was conducted through a literature review of 4 papers and collecting data via 60 closed-ended questionnaires. The results showed that the IT infrastructure in Badin is weak and not developing well due to issues like frequent power outages, poor internet speeds, lack of IT training institutes, and unreliable cellular networks. Disasters were also found to negatively impact the local IT network. The conclusion is that Badin requires improvements to its IT infrastructure.
The document discusses the implementation of information and communication technology (ICT) for a fast food sandwich website. It describes how ICT integrates telecommunications, computers, storage and audiovisual systems to allow users easy access to information. The main points are how ICT was used to develop the website with menu, nutrition and allergy information. Potential problems with ICT implementation include network failures during bad weather and server overloading during high traffic. Solutions involve building a strong server system that can handle multiple user requests simultaneously and designing infrastructure that can withstand natural disasters. The document also discusses advantages like promoting services anywhere at any time, and disadvantages like risk of confidential data exposure if not protected carefully. It analyzes how the company benefited from using reliable
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
This document discusses a study on the adoption of open source enterprise resource planning (ERP) software by deposit-taking savings and credit cooperatives (SACCOs) in Kenya. The study aims to determine the extent of adoption of open source ERP and identify the significant factors influencing its adoption. It reviews literature on previous studies related to technology adoption in organizations. The conceptual framework uses factors from the technology-organization-environment framework and decomposed theory of planned behavior to assess their influence on ERP adoption. The study collected survey data from 378 respondents across 164 SACCOs to analyze adoption levels and significance of adoption drivers.
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
E business an appraisal in enhancing accountability in service delivery and e...Alexander Decker
1) The document discusses the impacts of e-business on accountability in service delivery, productivity, and economic growth. It reviews previous literature that has examined both the positive and negative environmental effects of e-commerce.
2) The literature review finds that e-business can increase productivity and efficiency within companies by up to 60%, and that it has the potential to reduce waste, inventory needs, and the use of paper. However, e-commerce may also increase transportation and packaging waste from shipping.
3) The document examines how e-business impacts accountability in service delivery through identity management and proposes requirements for identity services to provide accountability, such as properly assessing identity data and maintaining identity information over long periods of time.
This document reviews and compares eight prominent models of user acceptance of information technology: the theory of reasoned action, technology acceptance model, motivational model, theory of planned behavior, combined TAM and TPB model, model of PC utilization, innovation diffusion theory, and social cognitive theory. It aims to empirically compare the models, formulate a unified model integrating elements of the eight models called UTAUT, and validate UTAUT using multiple data sets. The eight models are described and their constructs defined. Prior empirical comparisons of the models are discussed, noting limitations that the current study aims to address.
Organizational and social impact of Artificial IntelligenceAJHSSR Journal
ABSTRACT: Modern information technologies and the advent of machines powered by artificial intelligence
(AI) have already strongly influenced the world of work in the 21st century. Computers, algorithms and
software simplify everyday tasks, and it is impossible to imagine how most of our life could be managed
without them. However, the emergence of artificial intelligence (AI) has its own advantages and disadvantages.
With the recent boom in big data and the continuous need for innovation, Artificial Intelligence is carving out a
bigger place in our society. Through its computer-based capabilities, it brings new possibilities to tackle many
issues within organizations. It also raises new challenges about its use and limits. Over the past few years,
developments in artificial intelligence (AI) have captured the imagination of tens of millions of people around
the world. Both the sophistication and the societal impact of intelligent technologies are set to increase
substantially in the coming years and decades, as are the associated policy challenges. This includes how
government agencies protect consumers and citizens from unethical, unsafe or unsound use of AI systems
employed in critical contexts such as health, finance, or employment by companies or individuals. Some of the
impacts of AI on organizations include: power shifts; reassignment of decision making responsibility; cost
reduction and enhanced service; and personnel shifts and downsizing as some jobs are done Robots. This paper
aims to provide a better understanding of the organizational and social impact of Artificial Intelligence in the
organizational decision making process. Unemployment is not the same as leisure, and there are deep links
between unemployment and unhappiness, self-doubt, and isolation understanding what policies and norms can
break these links could significantly improve the median quality of life. Empirical and theoretical research on AI
came up with discussions and findings that with time the negative perceptions will be addressed.
KEYWORDS: Artificial Intelligence, Algorithms, Decision making, Robots, Technologies.
This document discusses e-recruitment practices in Malaysia. It begins with an introduction to e-recruitment and how it has been adopted by government agencies in Malaysia. It then discusses traditional recruitment methods and compares them to e-recruitment. The pros of e-recruitment include reaching a large target audience, being cost effective, and saving time. However, the cons include possible discrimination of groups without computer access and difficulties recruiting executive-level positions. The document provides examples of e-recruitment systems used by the Malaysian government.
CONNECTING O*NET® DATABASE TO CYBERSECURITY WORKFORCE PROFESSIONAL CERTIFICAT...IJITE
The Occupational Information Network O*NET is considered the primary source of occupational
information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce
readiness certification programs. The O*NET database is used to map out education requirements and how
they relate to professional certifications as required by employers and job designers in accordance with the
National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information
Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Statistics (BLS),
and finally tied back to NICCS source work role to identify certifications requirements. I found that no site
has listed any certification as required, desirable or mandatory. NICCS offered general guidance to potential
topics and areas of certification. Careeronestop site provided the ultimate guidance for this role certification.
Professional certifications are still not integrated in the Cybersecurity Workforce Framework official
guidance.
The Use of Social Media to Gather Qualitative Data: A Case of Government E-P...IAIN Datokarama Palu
The emergence of social media is enabling researchers to consider new data collection and triangulation strategies. Quantitative researchers have taken advantage of the emergence of the Internet as a medium to gather data. Meanwhile, interpretive researchers are only now being able to harness the potential that social media provide in generating more insight into collected data. Using a case of government e-procurement implementation and use in an Indonesian regency, we illustrate how social media exchange, postings, and conversations can be used as a source of rich qualitative data to enhance understanding of a topic being studied. Our findings show that monitoring social media exchange, postings, and conversation can strengthen our understanding and interpretation of offline data (such as interviews). This study contributes to literature on the use of online media for interpretive data collection.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
Recently, information security incidents such as personal information leakage have been regarded as serious risk factors that directly affect corporate sales reduction and corporate image loss. In order to manage information security systematically, enterprises have been introducing information security systems more than ever before. This study aims to derive major items of the information security system mainly for corporate organizational management, with a focus on the technology-organizationenvironment (TOE) framework, and suggests a direction for system build-up and management. To this end, the Analytic Hierarchy Process (AHP) was conducted on 20 items derived from previous studies. A survey was conducted among 24 individuals, including 12 corporate internal administrators and 12 corporate external consultants. As a result, it turned out that environmental factors affected the information security system more significantly among technical, organizational, and environmental factors. Notably, 'compliance with legal requirements,' 'protection of information subjects' rights,' and 'increase of the information security awareness' affected the operation of the information security system or related decision-making processes. This finding suggests that although technical and organizational management is also essential when it comes to corporate information security system operation, the system needs to respond swiftly to rapid market changes and legal and administrative changes concerning information security.
Impact of Information and Communication Technology on Cargo Industries A Stud...ijtsrd
The modern trend towards E commerce and computerization that they give you an idea about the way cargo industries Trucking and freight services , this paper establishes an “Impact of information and communication technology on cargo industries” In terms of commerce, logistics and fleet management, and proposes invented mechanisms of influence. The authors note that the speedy increase of E commerce and freight fleet management system compose it not easy to arrive next to firm, statistics based conclusion in relation to their impact of cargo industries, however suggest that more complicated government management of transportation demand over and above freight fleet management systems could call off out the pessimistic impact of E commerce on road transportation. Dr. Nandisha H. D "Impact of Information and Communication Technology on Cargo Industries - A Study in Bengaluru" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35731.pdf Paper URL : https://www.ijtsrd.com/management/mis-and-retail-management/35731/impact-of-information-and-communication-technology-on-cargo-industries--a-study-in-bengaluru/dr-nandisha-h-d
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
The last decade of the twentieth century and the turn of twenty-first century witnessed significant progress in technology in general and information technology and communication in particular. Such progress still continues until today, accelerating with wide quick strides more than ever. This age has produced many mechanisms for manufacturing knowledge and more advanced technological means that have made the globe as a small village. Communication technology, which is represented by the internet, has played a huge rule in transferring information and technological revolution from the north to the south passing by the east and the west at the same time. All of that have had an impact on all political, economic, educational, teaching, social, media, and advertisement systems in all communities.
The term technology is derived from Greek. It consists of two parts, techno, which means skills or art, and logy, which means science or study. Thus, the word technology means the science of performance, science of implementation, or the technical methods to achieve a practical purpose, the science of industrial operation.
Insights on critical energy efficiency approaches in internet-ofthings applic...IJECEIAES
This document summarizes approaches to improving energy efficiency in internet-of-things (IoT) applications. It discusses how cross-layer schemes can be used to optimize network performance and energy efficiency in IoT systems. It also examines optimization-based approaches using machine learning techniques. While various studies have identified methods to improve energy efficiency, open issues remain that need to be addressed to further enhance IoT system performance and outcomes.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
ERP usability is such a problem that according to this study by IFS North America, many users would use Microsoft Excel, online tools like Google Docs or even Dropbox instead of their system of record. Some may even consider changing jobs to get away from bad ERP.
This document discusses how technology is changing the nature of jobs and the future of work. Key points:
1) Digital technologies are automating routine tasks and jobs that involve structured processes, while human workers will likely shift toward tasks requiring creativity, social skills and innovative thinking.
2) New online platforms are creating "networked work" where freelancers connect directly with clients, taking on more risks but also gaining more control over their work. However, this transition to more flexible work arrangements is not painless.
3) Demand is growing for STEM jobs across many industries as data analysis and computing become more widespread. While some jobs will be automated, technology also has the potential to create new types of jobs
This document summarizes a research paper on the information technology (IT) infrastructure in Badin, Pakistan. The research was conducted through a literature review of 4 papers and collecting data via 60 closed-ended questionnaires. The results showed that the IT infrastructure in Badin is weak and not developing well due to issues like frequent power outages, poor internet speeds, lack of IT training institutes, and unreliable cellular networks. Disasters were also found to negatively impact the local IT network. The conclusion is that Badin requires improvements to its IT infrastructure.
The document discusses the implementation of information and communication technology (ICT) for a fast food sandwich website. It describes how ICT integrates telecommunications, computers, storage and audiovisual systems to allow users easy access to information. The main points are how ICT was used to develop the website with menu, nutrition and allergy information. Potential problems with ICT implementation include network failures during bad weather and server overloading during high traffic. Solutions involve building a strong server system that can handle multiple user requests simultaneously and designing infrastructure that can withstand natural disasters. The document also discusses advantages like promoting services anywhere at any time, and disadvantages like risk of confidential data exposure if not protected carefully. It analyzes how the company benefited from using reliable
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
This document discusses a study on the adoption of open source enterprise resource planning (ERP) software by deposit-taking savings and credit cooperatives (SACCOs) in Kenya. The study aims to determine the extent of adoption of open source ERP and identify the significant factors influencing its adoption. It reviews literature on previous studies related to technology adoption in organizations. The conceptual framework uses factors from the technology-organization-environment framework and decomposed theory of planned behavior to assess their influence on ERP adoption. The study collected survey data from 378 respondents across 164 SACCOs to analyze adoption levels and significance of adoption drivers.
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...nooriasukmaningtyas
Business intelligence is a collection of methodologies, methods, architectures, and technologies that convert raw data into significant and useful information used by organizations to enable more effective strategic, tactical, and operational insights and decision-making. In spite of several studies have examined the critical success factors and development of business intelligence system, but few relevant studies have investigated perceptions of end-user’s business intelligence systems. Furthermore, none of those studies was performed in a higher education sector in Iraq. Consequently, the study aims to determine the business intelligence system features influencing perceived impact end users’ and of using business intelligence systems in Iraqi educational institutes. A technology acceptance model and technology organization environment framework were syntheses as a basis to develop a research model for business intelligence users' perceived impact and adopt of business intelligence systems named (SMUPIBIS). Later, an online instrument (questionnaire) was designed to gather data from the business intelligence system users in five Iraqi universities. Twentyone hypotheses were proposed and later tested. The main outcomes of this study suggest that decision support, information quality, and real-time reporting are the most significant system characteristics influencing end users' perceived impact and their usage of business intelligence systems.
Running Head ANNOTATED BIBLIOGRAPHY – APPLICATION 31ANNOTATED .docxSUBHI7
Running Head: ANNOTATED BIBLIOGRAPHY – APPLICATION 3 1
ANNOTATED BIBLIOGRAPHY – APPLICATION 3 18
Introduction
The use of Information Technologies in the business process is a wide and ever changing filed that is conferring various benefits and challenges in the field of business process managements. Various organizational structure challenges, and employee have exerted various resistances and challenges but the provision of the solutions have been studied and presented. This paper presents the summaries of various studies, objects, methodologies used, the study limitations and assumptions and a concise comment on the resource in relation to the source of the resource and recommendations on further studies in each study to better understanding in the entire field.
Albadvi, A., Keramati, A., & Razmi, J. (2007). Assessing the impact of information technology on firm performance considering the role of intervening variables: organizational infrastructures and business processes reengineering. International Journal of Production Research, 45(12), 2697-2734. Retrieved from Business Source Complete database.
The scope of this paper is on the relationship between information technology (IT) use and the firm general performance in the consideration of the variables like infrastructure and process reengineering intervening in organizations. The purpose of the research was to establish the roles of the intervening variables on the relationship between IT and firms performance. The instruments to be used in research of the relationship between IT and the firms performance and the role of the two intervening important variable focused on which were reengineering of the processes (BPRM) and organizational infrastructure (OIS) in the IT and firm performance relationship were presented. The study based on the empirical filed survey design where 200 car part producers were administered with questionnaires. The questionnaires addressed the OIS, BPRM, Performance measurement (PER) and IT usage (ITU). The findings of this study demonstrated that there was a moderating effects of the organizational infrastructure and the mediating roles of the business process reengineering on the association between IT use and the performance of a firm. The IT usage was significantly high in pecuniary affairs of most companies. Organizational infrastructures was significantly considered in most companies and that IT usage significantly influenced the products production reengineering process. This information was very resourceful in the entire coursework and also raised the confidence of the body of resources used in finding this information. The underlying assumptions of the study was that the measures used in this study had a high internal consistency thus giving highly correlated answers hence high stability of the used measures. The limitations of the study was a small sample population that was corrected by the stability of the study measures (H ...
The document summarizes the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE) framework for understanding technology adoption. TAM models how users come to accept new technologies based on perceived usefulness and ease of use. It is built on expectancy-value theory and the theory of reasoned action. TOE framework examines how three contexts - technological, organizational, and environmental - influence organizations' decisions to adopt innovations. The document provides details on the key constructs of each model and examples of how they have been applied to study different technologies and industries.
Employees Adoption of E-Procurement System: An Empirical StudyIJMIT JOURNAL
Today, organizations are investing a lot in their IT infrastructure and reengineering their business processes by digitizing firms. If organizational employees will not optimum utilize its IT infrastructure, the productivity gain reduced enormously. In Uttarakhand e-procurement system implemented by public sector under e-governance integrated mission mode projects. So, there is need to find the determinants which influence employee’s adoption and uses of e-procurement systems. This research study assesses the organizational and individual determinants that influence the use of e-procurement system in Uttarakhand public sector. This study provides managers with the valuable information to take intervention programs to achieve greater acceptance and usage of e-procurement system. Data collected for this study by the means of a survey conducted in Uttarakhand state in 2011. A total 1200 questionnaire forms were distributed personally and online to employees using e-procurement system in Uttarakhand.
The social dynamics of software developmentaliaalistartup
This document summarizes a study examining the software procurement processes between a university and several software vendors over a decade. It presents three case studies of information systems development histories and analyzes them using a social process model to depict how relationships evolved over time. Major events that changed the relationship between parties were identified as "encounters", with stable periods in between labeled "episodes". While traditional models view procurement statically, this longitudinal study revealed the dynamic nature of procurement strategies over time in the case studies.
Social navigation can be considered as an effective approach for supporting information management issues particularly privacy and security concern that prevail in the management of information systems. Any of these management information system security issues are a matter of critical acknowledgement for knowledge management systems as well. This paper outlines multiple privacy and security risks that can be applied to information systems in general. Including examples from different sectors such as health care, public information, and e-commerce, these management information issues provide an outline of the present situation. It also observes the key concerns of information system executive in these areas, highlighting the identification and explanation of regional differences and similarities. Selecting on a current issue in management information system the paper provides a detailed amount of knowledge on the possible reasons for the issues such as factors of economic development, technological status, and political/legal environment. The paper concludes by providing a revised framework for the management information issues formulated with effective literature searches. This is going to be effective enough for the studies that will more likely support such reasoning in the future.
This paper examines the optimization of purchasing through the use of Internet based systems (electronic Procurement). The focus of this paper is the impact of these systems on the supply chain structure and how they are able to change the procurement function to a strategic operating resource for the organization. The empirical research information is based upon a study carried out that analyzed the supply chain strategies being adopted by public organizations. Respondents ranged from 100 to state corporations, experienced users of e-procurement systems to those just starting out on their pilot investigations of the contribution of such systems to purchasing efficiency. A significant result from the study was that whilst a large number of organizations were e-procurement adopters, less than half of them believed that procurement had a strategic function. The case of state corporations is used, as an example, illustrating the ability of state organizations with a strategic capability in procurement, achieved through e-procurement systems, gaining significant organizational benefits via cost and process reductions.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
This document discusses how analytics can help organizations derive business value from big data. It describes how statistical analysis, machine learning, optimization and text mining can extract meaningful insights from social media, online commerce, telecommunications, smart utility meters, and improve security. While tools exist to analyze big data, challenges remain around data security, privacy, and developing skilled talent. The paper aims to illustrate how existing algorithms can generate value from different industry use cases.
Mining Social Media Data for Understanding Drugs UsageIRJET Journal
This document discusses mining social media data to understand drug usage. It proposes using big data techniques like Hadoop and MapReduce to extract and analyze data from social networks about drug abuse. The methodology involves collecting data from platforms using crawlers, storing it in Hadoop, filtering it, then applying complex analysis using cloud computing. Prior work on extracting health information from social media and multi-scale community detection in networks is reviewed. The challenges of privacy preservation and scalability when anonymizing big healthcare datasets are also discussed.
In this case study we identify the factors that influence the adoption of a new system in a major company in Saudi Arabia. We develop a theoretical framework to help derive better understanding of system adoption via socio-technical integration.
We formulation of 14 hypotheses that were tested via a survey of 42 system users. Management support and change management were found to be significant factors influencing system adoption. As a result, the 14 null hypotheses were rejected due to their statistical significance (p-value < 0.05). Discussions and recommendations for future research are discussed.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of
time is consumed in collecting requirements from the organization to build an archiving system. Sometimes
the system does not meet the organization needs. This paper proposes a domain-based requirement
engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and
SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed
during analyzing and designing the archiving systems decreased significantly. The proposed methodology
also reduces the system errors that may happen at the early stages of the development of the system.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of time is consumed in collecting requirements from the organization to build an archiving system. Sometimes the system does not meet the organization needs. This paper proposes a domain-based requirement engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed during analyzing and designing the archiving systems decreased significantly. The proposed methodology also reduces the system errors that may happen at the early stages of the development of the system.
Adomavicius et al.Technology Trends in the IT LandscapeSP.docxdaniahendric
This document proposes a new conceptual approach and methodology for analyzing technology trends in the IT landscape. It aims to address the problems firms face in making IT investment decisions due to the complexity and dynamic nature of the IT environment. The approach develops new analytical constructs including an "IT ecosystem model" and uses visualization and quantification strategies to identify patterns of technology evolution over time. The goal is to complement existing techniques and provide a more formal analysis of specific IT ecosystems to aid managers in decision making. The constructs and methodology are demonstrated through two case examples and evaluated through expert interviews.
Cloud Computing Role in Information technologyKHakash
Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
Information technology (IT) is part of the value chain and corporate strategy of companies (PORTER, 1998). This area has been highlighted by its rapid development being responsible for several technological innovations, which affect the strategic positioning of companies. In the 1970s the computing model based on both proprietary technology and high cost large computers, known as mainframes, contributed to the formation of oligopolies in companies providing IT services which provided data processing to consumer companies.
The Importance of E-Commerce in Terms of Local Development: A Study in Turkey1inventionjournals
Internet is a great technology as well as a vast information storage, communication tool, trading platform, education field, business and entertainment environment. Internet is also the front door of the change and development and especially of the information community that is the bearer and courier of the development existing in the scientific and technologic fields. For this reason, E-commerce, which leaves its mark on the world market and gains more importance against the classic type of trade, also occupies a quite important position in national economy. The objective of our study is; to examine this commerce platform that is established as of today in city of Gümüşhane (Turkey) and to research the potential of E-commerce with regards to national economies and the factors that effect this potential.
Present study aims to investigate the influence of ICTs dimensions (Information Technology (IT),
Management Information System (MIS), Office automation (OA), Intranet and Internet) on workforce
productivity for a group of industrial organizations in Alexandria - Egypt. The population of the study was
managers and staff members working in different areas related to ICTs in the selected industrial
organizations at various managerial levels. Descriptive-statistical combined research study was conducted.
The selection of the participating industrial organization done using simple random sampling technique.
Data collection done using questionnaires. In order to check the validity of the study instrument expert
comments were used and the reliability of the questions calculated as 79% using Cronbach’s Alpha
coefficient. The analysis of instrument data done using single variable t-test, Friedman and variance
analysis. The study findings revealed that the specified dimensions of ICTs positively affect workforce
productivity of industrial organizations in Alexandria - Egypt.
Modeling and Application of a Modified Attributional Psychometric Instrument...IOSR Journals
This document summarizes a study that examined the attributional styles of 300 IT managers and professionals using a Modified Attributional Style Questionnaire (MASQ). The MASQ assessed causal attributions for hypothetical positive and negative work-related events. It was found to have good internal reliability. Attributions for positive events were significantly correlated with demographic variables like occupational status and salary, as well as job satisfaction and motivation. This supports previous research finding an optimistic internal attribution style is associated with greater satisfaction and motivation. Factor analysis revealed the MASQ items loaded onto three factors that accounted for over 75% of the variance in responses. Correlation analysis found attributional styles like personal control and externality correlated with higher salaries, while internality
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
1. UC Irvine
Globalization of I.T.
Title
A Cross-Country Study of Electronic Business Adoption Using the Technology-Organization-
Environment Framework
Permalink
https://escholarship.org/uc/item/6gw3d0rs
Authors
Zhu, Kevin
Kraemer, Kenneth L.
Xu, Sean
Publication Date
2002-12-01
eScholarship.org Powered by the California Digital Library
University of California
2. A Cross-Country Study of Electronic Business Adoption
Using the Technology-Organization-Environment
Framework
December 2002
Kevin Zhu, Kenneth L. Kraemer and Sean Xu
Center for Research on Information Technology and Organizations
University of California, Irvine
ICIS 2002 Best Paper: Conference Theme (93 accepted of 526 submitted papers)
This research is part of the Globalization of E-Commerce Project of the Center for Research on
Information Technology and Organizations (CRITO) at the University of California, Irvine. The material
is based upon work supported by the National Science Foundation under Grant No. 0085852. Any
opinions, findings, and conclusions or recommendations expressed in this maternial are those of the
author(s) and do not necessarily reflect the views of the National Science Foundation.
______________________________________________________________________________
Center for Research on Information Technology and Organizations
University of California, Irvine | www.crito.uci.edu
3. 2002 — Twenty-Third International Conference on Information Systems 337
A CROSS-COUNTRY STUDY OF ELECTRONIC
BUSINESS ADOPTION USING THE TECHNOLOGY-
ORGANIZATION-ENVIRONMENT FRAMEWORK
Kevin Zhu
Center for Research on Information
Technology and Organizations
University of California, Irvine
Irvine, CA USA
kzhu@uci.edu
Kenneth L. Kraemer
Center for Research on Information
Technology and Organizations
University of California, Irvine
Irvine, CA USA
kkraemer@uci.edu
Sean Xu
Graduate School of Management
University of California, Irvine
Irvine, CA USA
xxu00@gsm.uci.edu
Abstract
In this study, we developed a conceptual model for electronic business (e-business or EB) adoption
incorporating six adoption facilitators and inhibitors, based on the technology-organization-environment
framework. Survey data from 3,100 businesses and 7,500 consumers in eight European countries were used
to test the model. We conducted confirmatory factor analysis to assess the reliability and validity of constructs.
To examine whether adoption behaviors differ across different e-business environments, we divided the full
sample into high EB-intensity and low EB-intensity countries. The fitted logit models demonstrated four
findings: (1) Technology competence, firm scope and size, consumer readiness, and competitive pressure are
significant adoption drivers, while lack of trading partner readiness is a significant adoption inhibitor. (2) As
EB-intensity increases, two environmental factors—consumer readiness and lack of trading partner
readiness—become less important. (3) In high EB-intensity countries, e-business is no longer a phenomenon
dominated by large firms; as more and more firms engage in e-business, network effect works to the advantage
of small firms. (4) Firms are more cautious into adopting e-business in high EB-intensity countries, which
seems to suggest that the more informed firms are less aggressive into adopting e-business.
Keywords: Electronic business, adoption, Europe, empirical study, cross-country analysis, technology
competence, readiness, firm scope, technology-organization-environment framework
1 INTRODUCTION
Internet-based electronic business (e-business or EB) has been predicted to experience significant growth across Europe. Yet, in
adoptinge-business,companiesfaceabroad rangeofobstacles, particularlytheirmissingabilityto transcend significanttechnical,
managerial, and cultural issues (Anderson Consulting 1999; Forrester Research 1999). Hence, understanding adoption drivers
and barriers becomes increasingly important. However, such issues have not been well studied in the literature. In particular, what
is missing from the existing literature is (1) a theoretical framework specific to e-business adoption, (2) measurement of factors
4. Zhu et al./Electronc Business Adoption
338 2002 — Twenty-Third International Conference on Information Systems
affecting e-business adoption, and (3) empirical assessment based on large sample datasets. Our study seeks to reduce these gaps.
Key research questions that motivate our work are: (1) What framework can be used as a theoretical basis for studying e-business
adoption? (2) What facilitators and inhibitors can be identified within the theoretical framework? (3) What different adoption
behaviors can be found across different e-business environments?
To betterunderstandtheseissues,wedevelopedaconceptualmodelfore-businessadoptionbasedonthetechnology-organization-
environment framework from the technology innovation and information systems (IS) literature. Then we tested this framework
using survey data from 3,100 businesses and 7,500 consumers in eight European countries. Data analysis identified significant
adoption facilitators and inhibitors in general, but demonstrated differing adoption behaviors across different e-business
environments.
The following section reviews the relevant literature, on which the technology-organization-environment framework was
developed. Within this framework, a conceptual model and research hypotheses are then presented, followed by research method,
analysis, and results. The paper concludes with a discussion ofresearch findings, limitations, and contributions fromboth research
and managerial perspectives.
2 THEORETICAL BACKGROUND: THE TECHNOLOGY-
ORGANIZATION-ENVIRONMENT FRAMEWORK
To study adoption of general technological innovation, Tornatzky and Fleischer (1990) developed the technology-organization-
environment framework, which identified three aspects of a firm’s context that influence the process by which it adopts and
implements technological innovation: organizational context, technological context, and environmental context. Organizational
context is typically defined in terms of several descriptive measures: firm size; the centralization, formalization, and complexity
ofits managerial structure; the qualityofitshuman resource; and the amount ofslack resources available internally.Technological
context describes both the internal and external technologies relevant to the firm. This includes existing technologies inside the
firm, as well as the pool of available technologies in the market. Environment context is the arena in which a firm conducts its
business––its industry, competitors, access to resources supplied by others, and dealings with government (Tornatzky and
Fleischer 1990, pp. 152-154).
This framework has been examined by a number of studies on various IS domains. In particular, the adoption of electronic data
interchange (EDI), an antecedent of e-business, has been studied extensively in the last decade (Mukhopadhyay et al. 1995). An
examination of this literature by Iacovou et al. (1995) reveals many factors that were demonstrated as significant adoption drivers
and barriers in previous studies. Following Tornatzky and Fleischer, Iacovou et al. developed a model formulating three aspects
of EDI adoption influences—technological factor (perceived benefits), organizational factor (organizational readiness), and
environmental factor (external pressure)—as the main reasons for EDI adoption, and examined the model by seven case studies.
Their model was further tested by other researchers using large samples. For example, Kuan and Chau (2001) developed a
perception-based technology-organization-environment framework incorporating six factors as EDI adoption predictors, and
confirmed the usefulness of the technology-organization-environment framework for studying adoption of technological
innovations.
Although specific factors identified within the three contexts may vary across different studies, the technology-organization-
environment framework has a solid theoretical basis, consistent empirical support, and promise of applying to other IS innovation
domains. Thus, we adopted this theoretical framework and extended it to the e-business domain, which has not been done in the
literature. The next two sections discuss its conceptualization and operationalization in the e-business context.
3 CONCEPTUAL MODEL AND HYPOTHESES
Based on the technology-organization-environment framework, we proposed a conceptual model for e-business adoption, shown
in Figure 1. This conceptual model posited six predictors for e-business adoption within the three-context framework, and
controlled for country and industry effects.
5. Zhu et al./Electronc Business Adoption
2002 — Twenty-Third International Conference on Information Systems 339
Intent to
Adopt E-Business
Technology
Competence
IT Infrastructure
IT Expertise
E-Business
Know-how
Technological Context
Firm Scope
Firm Size
Organizational Context
Consumer Readiness
Competitive Pressure
Lack of trading
partner readiness
Consumer
Willingness
Internet Penetration
Environmental Context
Industry Effect
Country Effect
Controls
H1(+)
H2(+)
H3(+)
H4(+)
H5(+)
H6(–)
2nd
-order
construct
Interactive
construct
Intent to
Adopt E-Business
Technology
Competence
IT InfrastructureIT Infrastructure
IT ExpertiseIT Expertise
E-Business
Know-how
E-Business
Know-how
Technological Context
Firm Scope
Firm Size
Organizational Context
Consumer ReadinessConsumer Readiness
Competitive PressureCompetitive Pressure
Lack of trading
partner readiness
Lack of trading
partner readiness
Consumer
Willingness
Consumer
Willingness
Internet PenetrationInternet Penetration
Environmental Context
Industry Effect
Country Effect
Industry EffectIndustry Effect
Country EffectCountry Effect
Controls
H1(+)
H2(+)
H3(+)
H4(+)
H5(+)
H6(–)
2nd
-order
construct
Interactive
construct
Figure 1. Conceptual Model for E-Business Adoption
3.1Dependent Variable
The dependent variable in the conceptual model is intent to adopt e-business. E-business was defined as “the electronic
preprocessing, negotiation, performance and postprocessing of business transactions between commercial subjects over the
Internet” (ECaTT 2000). According to this definition, e-business facilitates major business processes along the value chain. A
business’ intent of adoption refers to its “concrete plan” to implement Web-marketing, online selling, or online procurement
(ECaTT 2000).
3.2Technological Context
In the existing literature, technologyresource has been consistentlydemonstrated as an important factor for successful IS adoption
(e.g., Crook and Kumar 1998; Grover 1993; Kuan and Chau 2001). Hence, our study posited technology competence as an
adoption driver, which, as conceptualized to be a second-order construct, encapsulates three sub-constructs: (1) IT
infrastructure—technologies that enable Internet-related businesses; (2) IT expertise—employees’ knowledge of using these
technologies; and (3) e-business know-how—executives’ knowledge of managing online selling and procurement. By these
definitions, technology competence constitutes not only physical assets, but also intangible resources since expertise and know-
how are complementary to physical assets (Helfat 1997). The above viewpoints lead to the following hypothesis:
H1: Firms with higher levels of technology competence are more likely to adopt e-business.
3.3Organizational Context
3.3.1 Firm Scope
The existing literature has proposed that the larger the scope, the greater the demand for IT investment (Dewan et al. 1998; Hitt
1999; Teece 1980), which suggested us to posit scope as a facilitator for e-business adoption. The role of scope as an adoption
predictor can be explained from two perspectives. First, greater scopes lead to higher internal coordination costs (Gurbaxani and
6. Zhu et al./Electronc Business Adoption
340 2002 — Twenty-Third International Conference on Information Systems
Whang 1991), and higher search costs and inventory holding costs (Chopra and Meindl 2001). Since business digitalization can
reduce internal coordination costs (Hitt 1999), and since e-business can lower search costs for both sellers and buyers (Bakos
1998), achieve demand aggregation and improve inventory management (Zhu and Kraemer 2002), firms with greater scopes are
more motivated to adopt e-business. Second, firms with greater scopes have more potential to benefit from synergy between e-
business and traditional business processes. Typical examples are using Web-based search to help consumers locate physical
stores, establishing more diversified customer community, using Web-based, graphical interfaces to improve the user-friendliness
of ERP systems, and linking various legacy databases by common Internet protocols and open standards. These perspectives lead
to the following hypothesis:
H2: Firms with greater scope are more likely to adopt e-business.
3.3.2 Firm Size
Firm size has been consistently recognized as an adoption facilitator (for a meta-analysis, see Damanpour 1992). With regard
to e-business adoption, larger firms have several advantages over small firms. Larger firms (1) tend to have more slack resources
to facilitate adoption; (2) are more likely to achieve economies of scale, an important concern due to the substantial investment
required for e-business projects; (3) are more capable of bearing the high risk associated with early stage investment in e-
business; and (4) possess more power to urge trading partners to adopt technology with network externalities. Therefore, it is
reasonable to hypothesize:
H3: Larger firms are more likely to adopt e-business.
3.4Environmental Context
3.4.1 Consumer Readiness
Consumer readiness is an important factor for decision makers because it reflects the potential market volume, and thereby
determines the extent to which innovations can be translated into profitability. This study defined consumer readiness as a
combination of consumer willingness and Internet penetration. Consumer willingness reflects the extent to which consumers
accept online shopping; Internet penetration measures the diffusion of PCs and the Internet in the population. Therefore, the
combination of the two factors represents consumers’ readiness for online purchasing. This readiness may encourage firms to
adopt e-business.
H4: Firms facing higher levels of consumer readiness are more likely to adopt e-business.
3.4.2 Competitive Pressure
Many empirical studies recognized competitive pressure as an adoption driver (e.g., Crook and Kumar 1998; Grover 1993;
Iacovou et al. 1995; Premkumar et al. 1997). Competitive pressure refers to the degree of pressure from competitors, which is
an external power pressing a firm to adopt new technology in order to avoid competitive decline. Based on this, the following
hypothesis is posited:
H5: Firms facing higher levels of competitive pressure are more likely to adopt e-business.
3.4.3 Lack of Trading Partner Readiness
A firm’s e-business adoption decision may be influenced by the adoption status of its trading partners along the value chain, since
for an electronic trade to take place, it is necessary that all trading partners adopt compatible electronic trading systems and
provide Internet-enabled services for each other. Furthermore, the Internet is fundamentally about connectivity. E-business may
necessitate more tight integration with customers and business partners, which goes beyond the walls ofan individual organization
(Zhu and Kraemer 2002). Accordingly, a lack of trading partner readiness may hinder e-business adoption.
H6: Firms facing a lack of trading partner readiness are less likely to adopt e-business.
7. Zhu et al./Electronc Business Adoption
1
For examples of using second-order constructs, see Segars and Grover (1998) and Sethi and King (1994).
2002 — Twenty-Third International Conference on Information Systems 341
3.5Controls
To control data variation that would not have been captured by the explanatory variables discussed above, we included country
dummies and industry dummies as independent variables.
4 RESEARCH METHOD
4.1Data
Our data source is ECaTT, a database developed by Empirica, Society for Communication and Technology Research Ltd., based
in Bonn, Germany. ECaTT includes two major surveys: General Population Survey (GPS) and Decision Maker Survey (DMS).
GPS is a survey of about 7,500 European consumers, covering attitudes toward electronic commerce. DMS is a survey of about
4,000 European businesses at the establishment/division level, covering current practices and plans to introduce the various forms
of electronic business. To check for data consistency and reliability, we compared the ECaTT data with OECD statistics. They
matched well for most countries, with only one exception—Sweden—which therefore was excluded fromthe analysis. Data from
the Netherlands were removed due to considerations of missing data. The final sample includes eight European countries
(Germany, the United Kingdom, Denmark, Ireland, France, Spain, Italy, and Finland) and 13 industries covering manufacturing,
distribution and service sectors.
4.2Operationalization of Constructs
Several constructs are operationalized as observed variables. First, intent to adopt e-business was measured as a dichotomy. A
firm was classified as an adopter if it had made concrete plans to implement e-business by 2001. Second, we used the number
of establishments as a proxy for scope. Third, we used the number of employees (in logarithm transformation) to measure firm
size. Fourth, competitive pressure was the percentage of firms in each industry that had already adopted e-business at the time
of the survey in 1999. Other variables were operationalized as multi-item constructs. First, technology competence was modeled
as a second-order construct.1
The theoretical interpretation of this second-order construct is an overall trait of technological
advantage, manifesting in three related dimensions. Taken together, they measure an overarching, second-order construct of
technology competence. Second, the interactive effect, consumer readiness, is of the Kenny and Judd (1984) type. We modeled
this as an interactive construct since each of its two sub-constructs—consumer willingness and Internet penetration—serves as
a necessary condition for the other to evolve into actual online-purchasing readiness.
4.3Instrument Validation
We conducted a confirmatory factor analysis in AMOS 4.0 to assess the constructs theorized above. We checked construct
reliability, convergent validity, discriminant validity, and validity of the second-order construct. The measurement properties are
reported in Table 1.
4.3.1 Validity of the Second-Order Construct
Figure 2 shows the estimates of the measurement model, where exogenous constructs are set to be correlated with one another.
Satisfactory R2
s of three first-order (endogenous) constructs and significant paths (p # 0.001) provided empirical support to our
conceptualization that technology competence was the overarching trait of IT infrastructure, IT expertise, and e-business know-
how. We also checked Marsh and Hocevar’s (1985) target coefficient (T ratio) to examine the efficacy of the higher-order
structure. It had a satisfactory T = 0.88, implying that the relationship among first-order constructs was sufficiently captured
by the second-order construct (Segars and Grover 1998).
9. Zhu et al./Electronc Business Adoption
2002 — Twenty-Third International Conference on Information Systems 343
4.3.2 Construct Reliability
Construct reliability measures the degree to which indicators are free from random error and, therefore, yield consistent results.
The values of Cronbach’s alpha in Table 2 ranged from 0.764 to 0.947, indicating adequate reliability. We also calculated
composite reliability, which ranged from 0.783 to 0.985, all above the cutoff value of 0.70 (Straub 1989).
4.3.3 Convergent Validity and Discriminant Validity
Convergent validity assesses the consistency across multiple operationalizations. All estimated standard loading were significant
at p # 0.001 level (Table 1), suggesting good convergent validity. To assess the discriminant validity—the extent to which
different constructs diverge from one another—we used Fornell and Larcker’s (1981) criteria: average variance extracted (AVE)
for each construct should be greater than the squared correlation between constructs. The correlation matrix on the right-hand side
of Table 2 shows that our measurement model met this condition.
In summary, our measurement model satisfied various reliability and validity criteria. Moreover, for the purpose of testing the
robustness of our measurement model, we also ran exploratoryfactor analysis on all indicators. Principal component analysis with
equamax rotation yielded a consistent grouping with CFA. Thus, factor scores based on this measurement model can be used in
subsequent analyses.
Table 2. Measurement Model: Construct Reliability and Discriminant Validity
Construct
Cronbach’s
alpha
Composite
reliability CR CP TC
Exogenous constructs Correlation matrix
Consumer readiness (CR) 0.922 0.985 0.879
Competitive pressure (CP) 0.764 0.783 0.398 0.703
Technology competence (TC) NA †
0.878 0.177 0.268 0.843
Endogenous constructs
IT infrastructure 0.828 0.815
IT expertise 0.870 0.875
E-business know-how 0.947 0.947
†
Since technology competence does not have observed items, we did not calculate alpha for it.
5 ANALYSIS
5.1Logit Regression
Since the dependent variable is dichotomous, a binary logit model was developed. Based on the conceptual model for e-business
adoption in Figure 1, the logit regression model is specified as follows:
(1)
1 2 3 4 5 6
Pr( 1) ( ' )
( i i j j
i j
Adoption x
TC S FS CR CP LTPR C I
γ
α β β β β β β δ λ
= = Λ
= Λ + ⋅ + ⋅ + ⋅ + ⋅ + ⋅ + ⋅ + +∑ ∑
where TC stands for technology competence, S for scope, FS for firm size, CR for consumer readiness, CP for competitive
pressure, LTPR for lack of trading partner readiness, Ci's (i = 1,…,8) for country dummies, and Ij's (j = 1,…,13) for industry
dummies. 7(@) denotes the probability density function of the logistic distribution. This model is consistent with our conceptual
framework in Figure 1 and the six hypotheses defined earlier. Testing the six hypotheses is equivalent to testing whether
coefficients $1 to $6 are non-zero: Significant and positive coefficients imply adoption facilitators while significant and negative
coefficients imply inhibitors. However, note that “the parameters of the logit model, like those of any nonlinear regression model,
10. Zhu et al./Electronc Business Adoption
344 2002 — Twenty-Third International Conference on Information Systems
are not necessarily the marginal effects we are accustomed to analyzing” (Greene 2000, p. 815). Actually, the marginal
effect—incremental change of the adoption probability due to unit increase of the regressor—is a function of all coefficients and
regressors:
(2)
Pr( 1)
( ' )[1 ( ' )]
Adoption
x x
x
γ γ γ
∂ =
= Λ − Λ
∂
In interpreting the estimated model, it will be useful to calculate this value at the means of the regressors, which is labeled as
slopes by Greene (2000, p. 816). In short, to test hypotheses, we check the significance of coefficients in (1), while we rely on
slopes defined in (2) for economic interpretation.
5.2Analysis of the Full Sample
The full sample contains N = 3103 observations after the listwise deletion of missing values. Independent variables except
dummies were standardized before estimation. Table 3 shows the estimated logit model, with White’s robust variance-covariance
estimator applied. The significantly positive coefficients of technology competence, scope, size, consumer readiness, and
competitive pressure confirmtheir roles as adoption facilitators; while the significantly negative coefficient ($ = -0.345, p-value =
0.030) of lack of trading partner readiness implies that it is an adoption inhibitor.
Table 3. Logit Model — Full Sample (N = 3103)
Estimates
Variable Coefficient Std. Error†
p-value
Constant 0.366* 0.165 0.027
Technology competence 0.485*** 0.066 0.000
Firm scope 0.606*** 0.093 0.000
Firm size 0.452*** 0.052 0.000
Consumer readiness 0.269*** 0.082 0.001
Competitive pressure 0.375*** 0.078 0.000
Lack of trading partner readiness -0.345* 0.159 0.030
Industry dummies Included
Country dummies Included
Goodness-of-fit
LR statistic: 654.868 Probability: 0.000
Hosmer-Lemeshow †: 43.742 Probability: 0.786
RN
2
: 0.258 RVZ
2
: 0.307
Discriminating power
Predicted % Correct
Non-adopters Adopters
Observed
Non-adopters
Adopters
656
353
537
1557
54.99
81.52
Overall 71.32
†
White’s robust variance-covariance estimator is used.
***p # 0.001; ** p # 0.01; * p # 0.05.
11. Zhu et al./Electronc Business Adoption
2002 — Twenty-Third International Conference on Information Systems 345
Goodness-of-fit of the model was assessed in three ways. First, a likelihood ratio (LR) test was conducted to examine the joint
explanationpowerofindependentvariables.Second,theHosmer-Lemeshow(2000,p.147)testwasusedto compare the proposed
model with a perfect model that can classify respondents into their respective groups correctly (Chau and Tam 1997). An
insignificant Hosmer-Lemeshow index † implies good model fit. Third, we calculated two pseudo-R2
s to measure the proportion
of data variation explained: RN
2
(Nagelkerke 1991) and RVZ
2
(Veall and Zimmermann 1992). The estimated logit model on the full
sample had significant LR test (LR = 654.868, p # 0.001), insignificant Hosmer-Lemeshow test († = 43.742, p = 0.786), and
satisfactory R2
s (25.8% and 30.7%), all suggesting a good model fit.
The logit model was also assessed in terms of the discriminating power (Hosmer and Lemeshow 2000). Based on the observation-
prediction table, the rate of correct predictions by the logit model and that by random guess was computed. The logit model had
an overall prediction accuracy of 71.32 percent. As there are 1,193 adopters and 1,910 non-adopters, the classification accuracy
by random guess would be (1193/3103)2
+ (1910/3102)2
= 52.67%. Thus, we concluded that the logit model had much higher
discriminating power.
5.3Analysis of the Sample Split
Related to the environment context in our theoretical framework, we wanted to understand differences across countries as each
country may have its unique environment for e-business adoption. Hence, we split our full sample into two subsamples on the
basis of e-business intensity. We used three indices to measure e-business intensity in each country: (1) annual e-business
expenditure per capita; (2) e-business adoption rate by firms based on 1999 adoption status; and (3) the ratio of business-to-
consumer market volume over GDP. The three indices (Cronbach’s " = 0.932) measured e-business intensity at three levels—
consumers, firms, and the economy—and were used as clustering variables in a nonhierarchical cluster analysis of eight countries.
It turned out that Finland, Denmark, and the United Kingdom were grouped together (N = 1034), while the other five were
clustered into the other group (N = 2069). Since ANOVA showed that each of the three indices in the first group had significantly
higher value, we labeled the first group as “high EB-intensity countries” and the second group “lowEB-intensity countries.” Logit
model was then fitted on the two subsamples.
In high EB-intensity countries, only four factors—technology competence, scope, size, and competitive pressure—remained
significant at the p # 0.05 level; and the other two factors became insignificant (p = 0.082 for consumer readiness, p = 0.589 for
lack of trading partner readiness). All coefficients were significant at the p # 0.05 level in low EB-intensity countries, similar
to the full sample.
In each subsample, logit model had good model fit as suggested by a significant LR test (p # 0.001), satisfactory R2
(above 25%),
and insignificant Hosmer-Lemeshow † (p > 0.1). However, in low EB-intensity countries the logit model predicted well for both
Table 4. Marginal Effects (Slopes) of the Logit Model
Variables
Slopes
High EB-intensity vs.
low EB-intensity
Full sample
Low EB-intensity
countries
High EB-intensity
countries
2-tail test p-value
Technology competence 0.110 0.109 0.104 0.254 0.799
Firm scope 0.138 0.144 0.120 0.870 0.384
Firm size 0.103 0.111 0.077 2.226 0.026
Consumer readiness 0.061 0.065 --†
--†
--†
Competitive pressure 0.085 0.076 0.070 0.259 0.795
Lack of trading partner
readiness
-0.079 -0.103 --†
--†
--†
†
Slopes and tests are not reported, since the associated coefficients in high intensity countries are insignificant (p > 0.05).
12. Zhu et al./Electronc Business Adoption
346 2002 — Twenty-Third International Conference on Information Systems
adopters (prediction accuracy = 73.8%) and non-adopters (prediction accuracy = 62.7%), but in high EB-intensity countries the
logit model predicted well only for adopters (prediction accuracy = 91.6%), but poorly for non-adopters (prediction accuracy =
36.8%). The implication of this distinction is discussed later.
We calculated slopes by plugging sample means into (2). Values of slopes are shown in Table 4. We conducted a two-tail test
to examine whether the two subsamples had the same slopes; it turned out that the two-tail test was significant only for firm size,
which meant that firm size had different impacts on e-business adoption across two different e-business environments.
6 DISCUSSION
6.1Major Findings and Interpretation
Finding 1: Technology competence, firm scope and size, consumer readiness, and competitive pressure are significant adoption
facilitators; while lack of trading partner readiness is a significant adoption inhibitor.
This result is suggested by the significant coefficients of the logit regression (Table 3). The good model fit and satisfactory
discriminating power demonstrated the comprehensiveness of the technology-organization-environment framework. Significant
regression coefficients provided strong support for the six hypotheses. These results were consistent with our theoretical
arguments based on the technology-organization-environment framework.
Finding 2: As EB-intensity increases, two environmental factors—consumer readiness and lack of trading partner readiness—
become less important.
All six factors were significant in low EB-intensity countries; yet, in high EB-intensity countries, consumer readiness became
marginal (p = 0.082), and lack of trading partner readiness became insignificant (p = 0.589). This is surprising, given that
consumer readiness was higher in high EB-intensity countries (mean = 1352) than in low EB-intensity countries (mean = 298).
A plausible explanation is that, as more customers and competitors adopt e-business and as e-business becomes more prevalent
in the value chain, firms in the high EB-intensity countries tend to regard it as a long-run strategic necessity. The lack of trading
partner readiness became an insignificant factor, possibly because in high EB-intensity countries it is much easier to find online
partners as more firms have adopted e-business, which causes decision makers to downgrade this factor in the decision-making
process.
Finding 3: In high EB-intensity countries, e-business is no longer a phenomenon dominated by large firms; as more and more
firms engage in e-business, network effect works to the advantage of small firms.
We resorted to slopes to compare two subsamples (Table 4). The comparison suggested that the impact of firm size on adoption
is significantly lower in high EB-intensity countries than in low EB-intensity countries. This implies that, in high EB-intensity
countries, e-business is no longer a phenomenon dominated by large firms, and consequently there are more opportunities for
small- and medium-sized enterprises (SMEs) to participate in the e-business arena. A possible explanation is that the
disadvantages of SMEs, such as less power in the market and more resource constraints in technological and financial resources,
tend to be leveled out as EB-intensity increases. That is, as more and more firms engage in e-business, network effect works to
the special advantage of small firms. In addition, in high EB-intensity countries, there commonly exist more available technology
providers and service providers, which may help SMEs adopt new technology; executives accumulate more managerial
experience, which helps lower the adoption risk; and as e-business diffuses from low intensity to high intensity, the government
also gradually improves its regulation policies. All of these improved situations might facilitate e-business adoption by SMEs.
Finding 4: Firms are more cautious into adopting e-business in high EB-intensity countries - it seems to suggest that the more
informed firms are less aggressive into adopting e-business.
As discussed above, in low EB-intensity countries, the logit model predicted well for both adopters and non-adopters; however,
in high EB-intensity countries, the logit model predicted well for adopters, but poorly for non-adopters. This implies that our logit
model is overoptimistic when applying to high EB-intensity countries, in the sense that our model optimistically predicted many
firms (182 out of 288 non-adopters in the high EB-intensity subsample) as adopters, which actually were non-adopters. In other
words, firms in high EB-intensity countries behaved more cautiously than predicted by our model. In comparison, firms in low
EB-intensity countries behaved more aggressively. A possible explanation is that in high EB-intensity countries, managers tend
13. Zhu et al./Electronc Business Adoption
2002 — Twenty-Third International Conference on Information Systems 347
to have a more balanced understanding about e-business in terms of its benefits, costs, and risks. Accordingly, they tend to
consider more factors when assessing e-business projects and make more cautious adoption decisions, ratherthanquicklyjumping
onto the e-business bandwagon.
6.2Limitations and Future Research
The research design ofthis studyhas incorporated multiple rounds oftheorybuilding through literature reviewand expert opinion.
The empirical part also instituted a series of validating procedures and controls. Still, our methodologyrequired tradeoffs that may
limit the use of the data and interpretation of the results. First, our study only investigated adoption decisions. To gain a holistic
understanding of e-business, implementation processes and the impacts of e-business on business performance should be
examined. Second, all countries in our dataset are industrialized countries. We do not know whether these results would apply
to developing countries or newly industrialized countries. Accordingly, one future research direction is to design a longitudinal
study examining implementation and impacts on firm performance. Another direction is to compare e-business adoption in
industrialized countries with developing and newly industrialized countries.
6.3Implications and Concluding Remarks
Our research model was tested on a broad empirical base with a large dataset that was not limited to a single country. This helps
to strengthen the generalizability of the findings. Drawing up the data and results, our study offered several contributions. First,
we demonstrated the usefulness of the technology-organization-environment framework for identifying facilitators and inhibitors
of e-business adoption. This framework could be applied by researchers to study other IS adoptions in different settings. Second,
our empirical analysis identified six significant e-business adoption predictors and revealed differing adoption behaviors across
different e-business environments. These results might be useful to serve as a basis for others to derive their research models.
Another technical message is to develop second-order constructs and interactive constructs to operationalize complex concepts.
Finally, instruments used in this study passed various reliability and validity tests, so they could be used in other studies.
This study also has managerial implications as well. First, it is important for firms to build up their technology competence to
adopt e-business, including both physical infrastructure and intangible properties (e.g., e-business know-how). Second, managers
need to re-evaluate the benefits and costs of e-business adoption as the environment changes. Another important message for
managers is to realize that, as e-business intensity increases, SMEs have more opportunities to compete in the e-business domain.
7 ACKNOWLEDGMENTS
The authors wish to thank Empirica, GMBH, Bonn, Germany, for providing the data. The research has benefitted fromcomments
of Sanjeev Dewan, Deborah Dunkle, John Mooney, Paul Gray, and seminar participants at the Center for Research on Information
Technology and Organizations (CRITO), University of California, Irvine.
8 REFERENCES
Anderson Consulting. “eEurope Takes Off,” 1999 (available online at http://www.ac.com/ecommerce/ecom_efuture1.html).
Bakos, Y. “TheEmergingRoleofElectronicMarketplaceson the Internet,”Communications of the ACM (41:8), 1998, pp. 35-42.
Chau, P. Y. K., and Tam, K. Y. “Factors Affecting the Adoption of Open Systems: An Exploratory Study,” MIS Quarterly
(21:1), 1997, pp. 1-21.
Chopra, S., and Meindl, P. Supply Chain Management. Upper Saddle River, NJ: Prentice-Hall, Inc., 2001.
Crook, C. W., and Kumar, R. L. “Electronic Data Interchange: A Multi-Industry Investigation Using Grounded Theory,”
Information & Management (34), 1998, pp. 75–89.
Damanpour, F. “Organizational Size and Innovation,” Organization Studies (13:3), 1992, pp. 375-402.
Dewan, S., Michael, S., and Min, C. “Firm Characteristics and Investments in Information Technology: Scale and Scope
Effects,” Information Systems Research (9:3), 1998, pp. 219- 232.
ECaTT. “Benchmarking Progress on NewWays of Working and NewForms of Business Across Europe,” 2000 (available online
at http://www.ecatt.com/).
14. Zhu et al./Electronc Business Adoption
348 2002 — Twenty-Third International Conference on Information Systems
Fornell, C., and Larcker, D. F. “Structural Equation Models with Unobserved Variables and Measurement Errors,” Journal of
Marketing Research (18:1), 1981, pp. 39-50.
Forrester Research. “Europe: The Sleeping Giant Awakens,” 1999 (available online at http://www.forrester.com/ER/Research/
Report/Summary/0,1338,8706,00.html).
Greene, W. H. Econometric Analysis (4th
ed.). Upper Saddle River, NJ: Prentice-Hall, Inc., 2000.
Grover, V. “An Empirically Derived Model for the Adoption of Customer-Based Interorganizational Systems,” Decision Science
(24:3), 1993, pp. 603–640.
Gurbaxani, V., and Whang, S. “The Impact of Information Systems on Organizations and Markets,”Communications of the ACM
(34:1), 1991, pp. 59-73.
Helfat, C. E. “Know-How and Asset Complementarity and Dynamic Capability Accumulation: The Case of R&D,” Strategic
Management Journal (18:5), 1997, pp. 339-360.
Hitt, L. “InformationTechnologyand FirmBoundaries: EvidencefromPanel Data,” Information Systems Research (10:2), 1999,
pp. 134-149.
Hosmer, D. W., and Lemeshow, S. Applied Logistic Regression (2nd
ed.). New York: John Wiley & Sons, Inc., 2000.
Iacovou, C. L., Benbasat, I., and Dexter, A. S. “Electronic Data Interchange and Small Organizations: Adoption and Impact of
Technology,” MIS Quarterly (19:4), 1995, pp. 465–485.
Kenny, D. A., and Judd, C. M. “Estimating the Nonlinear and Interactive Effects of Latent Variables,” Psychological Bulletin
(96), 1984, pp. 201-210.
Kuan, K. K. Y., and Chau, P. Y. K. “A Perception-Based Model for EDI Adoption in Small Business Using a Technology-
Organization-Environment Framework,” Information and Management (38), 2001, pp. 507-512.
Marsh, H. W., and Hocevar, D. “A New, More Powerful Approach to Multitrait-Multimethod Analyses: Application of Second-
Order Confirmatory Factor Analysis,” Journal of Applied Psychology (73:1), 1985, pp. 107-117.
Mukhopadhyay, T., Kekre, S., and Kalathur, S. “Business Value of Information Technology: A Study of Electronic Data
Interchange,” MIS Quarterly (19:2), 1995, pp. 137-156.
Nagelkerke, N. J. D. “ANote on a General Definition ofthe Coefficient ofDetermination,” Biometrika (78:3), 1991, pp. 691-693.
Premkumar, G., Ramamurthy, K., and Crum, M. R. “Determinants of EDI Adoption in the Transportation Industry,” European
Journal of Information Systems (6:2), 1997, pp. 107-121.
Segars, A. H., and Grover, V. “Strategic Information Systems Planning Success: An Investigation of the Construct and its
Measurement,” MIS Quarterly (22:2), 1998, pp. 139–163.
Sethi, V., and King, W. R. “Development of Measures to Assess the Extent to which an Information Technology Application
Provides Competitive Advantage,” Management Science (40:12), 1994, pp. 1601-1627.
Straub, D. W. “Validating Instruments in MIS Research,” MIS Quarterly (13:2), 1989, pp. 147-169.
Teece, D. J. “Economics ofScope and the Scope ofthe Enterprise,” Journal of Economic Behavior and Organization (1:2), 1980,
pp. 223-247.
Tornatzky, L. G., and Fleischer, M. The Process of Technology Innovation. Lexington, MA: Lexington Books, 1990.
Veall, M. R., and Zimmermann, K. F. “Pseudo-R2
s in the Ordinal Probit Model,” Journal of Mathematical Sociology (16:4),
1992, pp. 333-342.
White,H. “AHeteroscedasticity-ConsistentCovarianceMatrixEstimatorandaDirectTestforHeteroscedasticity,”Econometrica
(48:4), 1980, pp. 817-838.
Zhu, K., and Kraemer, K. L. “E-Commerce Metrics for Net-Enhanced Organizations: Assessing the Value of E-Commerce to
Firm Performance in the Manufacturing Sector,” Information Systems Research (13:3), 2002, pp. 275-295.