This document is a dissertation manuscript submitted to Northcentral University examining employee perceptions of biometric security adoption in the workplace. The manuscript includes an introduction outlining the need for improved security measures to address rising cyber threats. It also reviews prior literature on technology acceptance models and factors influencing user adoption. The study aims to apply the Technology Acceptance Model to understand employee perceptions of biometric authentication systems.
This document summarizes the findings of a Nature poll and interviews with researchers and administrators on the use of quantitative metrics in evaluating scientific performance and career decisions. The poll found that most researchers believe metrics are heavily used in hiring, promotion, and tenure decisions, whereas administrators said metrics are not relied on as much. There appears to be a disconnect between how researchers and administrators view the role of metrics. While metrics provide transparency, overemphasis on metrics alone could compromise scientific values and encourage "gaming" of the system.
The literature review examines whether big data analysis and data mining can substitute traditional data collection and analysis in healthcare. It summarizes 5 papers that discuss both the benefits and limitations of these new techniques. A key theme is that while data mining is useful for detecting patterns, the quality of the data being mined is paramount. Several papers note that data fragmentation, missing information, and incorrect entries still pose challenges. Proper data cleaning and management remain essential parts of the process that cannot be fully automated or replaced. The review concludes that both new technologies and traditional human data quality practices are needed to maximize the insights that can be gained.
This document provides an introduction to a course project analyzing the roles of data analytics in improving student outcomes in higher education. It discusses the rationale for using data analytics, including issues with high dropout rates and student loan debt. The document outlines the research questions, objectives, and scope of the project. It also discusses some of the challenges of implementing data analytics in higher education, such as costs and data availability. The importance of using learning management systems to effectively collect and analyze student data is also covered.
Rationale: Biostatistics continues to play an essential role in cardiovascular investigations, but successful implementation can be complex.
Objective: To present the rationale behind statistical applications and review useful tools for cardiology research.
Methods and Results: Prospective declaration of the research question, clear methodology, and adherence to protocol serve as the critical foundation. Parametric and distribution-free measures are presented along with t-testing, ANOVA, regression analyses, survival analysis, logistic regression, and interim monitoring. Finally, common weaknesses are considered.
Conclusions: Biostatistics can be productively applied to cardiovascular research if investigators (1) develop and rely on a well-written protocol and analysis plan, (2) consult bi
This report summarizes the results of a campus-wide survey initiative, conducted by the Southern California Clinical and Translational Science Institute (SC CTSI), focused on the development of a clinical data warehouse for research (CDWR) and a clinical trials management system (CTMS) as well as general barriers to conducting clinical research at the University of Southern California (USC) and Children's Hospital Los Angeles (CHLA).
Learn more about SC CTSI http://www.sc-ctsi.org/
This review article critiques the United States Preventive Services Task Force's (USPSTF) recommendation against testicular cancer (TCa) screening, which currently holds a 'D' grade. The authors analyze the evidence and methods used by the USPSTF to make this recommendation. They find logical inconsistencies and a lack of evidence to support a conclusive 'D' grade. Considering the flaws in methodology and lack of sufficient evidence, the authors argue the recommendation should be changed to an 'I' statement, indicating the harms and benefits of TCa screening are indeterminate. The purpose is to reassess the value of TCa screening and encourage further research on its efficacy and ability to prevent cancer mortality
European Pharmaceutical Review: Trials and Errors in NeuroscienceKCR
This document discusses several challenges of conducting clinical research in neuroscience. It notes that while interest and publications in neuroscience have increased, the nervous system remains the least understood part of the human body. Conducting global clinical trials in neuroscience poses difficulties due to variations in where patients can be found, standards of care between countries, and restrictions on access to modern therapies. The document also outlines problems with using complex questionnaires in trials and inconsistencies in how patients perceive and report their symptoms.
This document summarizes the findings of a Nature poll and interviews with researchers and administrators on the use of quantitative metrics in evaluating scientific performance and career decisions. The poll found that most researchers believe metrics are heavily used in hiring, promotion, and tenure decisions, whereas administrators said metrics are not relied on as much. There appears to be a disconnect between how researchers and administrators view the role of metrics. While metrics provide transparency, overemphasis on metrics alone could compromise scientific values and encourage "gaming" of the system.
The literature review examines whether big data analysis and data mining can substitute traditional data collection and analysis in healthcare. It summarizes 5 papers that discuss both the benefits and limitations of these new techniques. A key theme is that while data mining is useful for detecting patterns, the quality of the data being mined is paramount. Several papers note that data fragmentation, missing information, and incorrect entries still pose challenges. Proper data cleaning and management remain essential parts of the process that cannot be fully automated or replaced. The review concludes that both new technologies and traditional human data quality practices are needed to maximize the insights that can be gained.
This document provides an introduction to a course project analyzing the roles of data analytics in improving student outcomes in higher education. It discusses the rationale for using data analytics, including issues with high dropout rates and student loan debt. The document outlines the research questions, objectives, and scope of the project. It also discusses some of the challenges of implementing data analytics in higher education, such as costs and data availability. The importance of using learning management systems to effectively collect and analyze student data is also covered.
Rationale: Biostatistics continues to play an essential role in cardiovascular investigations, but successful implementation can be complex.
Objective: To present the rationale behind statistical applications and review useful tools for cardiology research.
Methods and Results: Prospective declaration of the research question, clear methodology, and adherence to protocol serve as the critical foundation. Parametric and distribution-free measures are presented along with t-testing, ANOVA, regression analyses, survival analysis, logistic regression, and interim monitoring. Finally, common weaknesses are considered.
Conclusions: Biostatistics can be productively applied to cardiovascular research if investigators (1) develop and rely on a well-written protocol and analysis plan, (2) consult bi
This report summarizes the results of a campus-wide survey initiative, conducted by the Southern California Clinical and Translational Science Institute (SC CTSI), focused on the development of a clinical data warehouse for research (CDWR) and a clinical trials management system (CTMS) as well as general barriers to conducting clinical research at the University of Southern California (USC) and Children's Hospital Los Angeles (CHLA).
Learn more about SC CTSI http://www.sc-ctsi.org/
This review article critiques the United States Preventive Services Task Force's (USPSTF) recommendation against testicular cancer (TCa) screening, which currently holds a 'D' grade. The authors analyze the evidence and methods used by the USPSTF to make this recommendation. They find logical inconsistencies and a lack of evidence to support a conclusive 'D' grade. Considering the flaws in methodology and lack of sufficient evidence, the authors argue the recommendation should be changed to an 'I' statement, indicating the harms and benefits of TCa screening are indeterminate. The purpose is to reassess the value of TCa screening and encourage further research on its efficacy and ability to prevent cancer mortality
European Pharmaceutical Review: Trials and Errors in NeuroscienceKCR
This document discusses several challenges of conducting clinical research in neuroscience. It notes that while interest and publications in neuroscience have increased, the nervous system remains the least understood part of the human body. Conducting global clinical trials in neuroscience poses difficulties due to variations in where patients can be found, standards of care between countries, and restrictions on access to modern therapies. The document also outlines problems with using complex questionnaires in trials and inconsistencies in how patients perceive and report their symptoms.
The document reports on the fastest growing Amazon sellers in April 2016 based on feedback growth rates. Petphabet had the highest growth of 1350% by selling a range of pet products. Other top growing sellers included OEM Accessories Direct, Dr. JK, and Mower Partsman. Many of the fastest growing sellers offered smartphone accessories and protective phone cases. Overall growth was not as high as in March but feedback growth was used as a metric to identify the top 100 fastest growing Amazon sellers that month.
This document outlines an itinerary for a cruise from May 2009 to December 2009 aboard the sailing vessels Sea Cloud and Sea Cloud II. The itinerary includes ports of call in Europe, North Africa, and transatlantic crossings. Specific dates and details are provided for individual legs of the journey that will involve stops in places like Nice, France; Corsica; Sardinia; Italy; Morocco; and the Caribbean. Pricing information is also included for the different cabin categories.
This document is a resume for Beverly Faulds summarizing her professional experience in accounting roles from 1988 to present. It details her experience as a controller, senior accountant, office manager, bookkeeper, and accountant for various companies in real estate, property management, manufacturing, and accounting. Her responsibilities included financial statement preparation, accounting, payroll, cash management, and working with auditors and resolving financial issues.
El documento describe las herramientas de autor de Quandary y cómo crear y enlazar puntos de decisión en un ejercicio. Explica que se debe colocar el título del ejercicio en el primer punto de decisión, luego describir el contenido de ese punto, y finalmente agregar un nuevo enlace al siguiente punto de decisión. Una vez finalizado el ejercicio, se podrá ver un resumen y exportarlo a XHTML.
Este documento presenta una introducción a los conceptos de metas y objetivos. Explica que una meta es el fin hacia el cual se dirigen las acciones o deseos de una persona u organización, mientras que un objetivo es lo que impulsa al individuo a tomar decisiones o perseguir sus aspiraciones. Luego, proporciona ejemplos de metas y objetivos personales, académicos y sociales de Luis Contreras, como ser cada día mejor, aprender más sobre abogacía y vivir cómodamente apoyando a sus clientes.
El documento presenta un análisis de la situación fiscal y perspectivas del municipio de Bucaramanga para el año 2015. Resalta que el municipio tuvo un déficit de $240 millones en 2015, principalmente debido a mayores gastos de inversión e intereses de deuda. Aunque la deuda pública es sostenible, existen pasivos contingentes por cuantificar. Se recomienda depurar los pasivos, tomar acciones sobre entidades descentralizadas de riesgo y mejorar la provisión pensional.
This document provides a history of horror films from the 19th century to modern day, covering major works, trends, and innovations within the genre. It discusses how early horror literature influenced silent films and German expressionism in the late 19th/early 20th century. The introduction of sound in the 1930s boosted the popularity of Universal monster films starring Bela Lugosi and Boris Karloff. Trends from this era like mad scientists and Gothic settings continued influencing horror through the following decades.
This document discusses several theories of international trade, including mercantilism, absolute advantage, and comparative advantage. It provides details on key aspects of each theory such as balance of payments for mercantilism and production possibility curves for comparative advantage. It also addresses limitations of the theories and additional factors that influence trade patterns between countries such as differences in country size, factor proportions, and product life cycles. Later sections explore strategic trade policy and Porter's diamond model for understanding why companies engage in international trade.
Kelly J. Dupre has over 20 years of experience in clinical data management and research. She has worked for various companies in roles such as clinical data coordinator, clinical data manager, and electronic medical records scanner. Her experience includes tasks like data entry, query generation, adverse event reconciliation, and ensuring accurate and consistent data in clinical trials. She is proficient in MS Office and specialized data management software.
PROBING FOR EVIDENCE OF PLUMES ON EUROPA WITH HST/STISSérgio Sacani
Roth et al. (2014a) reported evidence for plumes of water venting from a southern high latitude
region on Europa – spectroscopic detection of off-limb line emission from the dissociation
products of water. Here, we present Hubble Space Telescope (HST) direct images of Europa in
the far ultraviolet (FUV) as it transited the smooth face of Jupiter, in order to measure absorption
from gas or aerosols beyond the Europa limb. Out of ten observations we found three in which
plume activity could be implicated. Two show statistically significant features at latitudes similar
to Roth et al., and the third, at a more equatorial location. We consider potential systematic
effects that might influence the statistical analysis and create artifacts, and are unable to find any
that can definitively explain the features, although there are reasons to be cautious. If the
apparent absorption features are real, the magnitude of implied outgassing is similar to that of the
Roth et al. feature, however the apparent activity appears more frequently in our data.
This document provides tips and advice for nurturing a child's language skills. It discusses the importance of talking, reading, and interacting with children from an early age. Specific recommendations include talking about daily activities, expanding on a child's remarks with more words, asking open-ended questions, reading interactively by discussing pictures and letting the child make up stories, playing word games, singing songs, and playing interactive games. It also advises taking field trips for new experiences and listening to the child. The document warns against pretending to understand if you can't, allowing too much TV/computer time, over-correcting, and pressuring a child to talk. It provides typical language development milestones and signs of possible speech delays.
1) El departamento de Sucre ha logrado cumplir con su acuerdo de reestructuración de deuda suscrito en 2009, a pesar de algunos riesgos. 2) Registró superávit fiscal en 2015 y mantiene bajos niveles de deuda pública. 3) Sus principales retos son fortalecer la defensa jurídica y mejorar la ejecución presupuestal.
This document discusses how Ubona Automated Agent helped solve an e-commerce company's need for an effective cash-on-delivery verification system. The system allowed 88% of customers to successfully confirm or cancel orders in a single call, improving order dispatch rates from 40% within a day to 80% within two hours. The cloud-based system provides a cost-effective way to automate the verification process while still providing a personalized customer experience.
This article profiles Amy Pfeffer, a 2006 graduate of Hilbert College's criminal justice program, who has emerged as Rochester's first-ever "Top Cop." As a police officer, Pfeffer made more arrests than anyone else on the force in 2009, earning her the Top Cop Award. The article describes Pfeffer's background and journey, including her service in the Army National Guard in Iraq from 2001-2006. It highlights how Pfeffer has been an "adrenaline junkie" from a young age and discusses her success as a police officer in apprehending suspects despite her small stature.
The document describes the synthesis and evaluation of 6,7-dihydro-4H-isothiazolo[4,5-b]pyridin-5-ones (DIP) as potential antimitotic agents. A series of DIP derivatives were synthesized via a multicomponent reaction. Selected DIP derivatives were found to alter sea urchin egg cleavage at low nanomolar concentrations and showed cytotoxicity against cancer cells, including chemoresistant lines, at submicromolar to low nanomolar levels. Both the sea urchin embryo assay and cancer cell assays confirmed the DIP derivatives act by destabilizing microtubules. Structure-activity relationship studies showed the importance of a p
Nursing Shortageby Monica CastelaoSubmission dat e 01-.docxcherishwinsland
The document summarizes the issue of nursing shortages, particularly in intensive care units (ICUs). It discusses how demand for healthcare has increased, creating staffing shortages. Shortages are also due to lack of nursing school faculty and limited enrollment. ICU nursing is described as stressful and demanding, with long hours and complex technology. Shortages in ICUs can negatively impact patient safety and outcomes. Potential solutions proposed include increasing nurses' wages and improving nursing's public image to attract more people to the profession.
Qualitative Study Summary
Qualitative Research Evaluation Essay
Essay On Qualitative Analysis
Planning A Qualitative Study? Essay
Qualitative Analysis : Qualitative Data
Qualitative Research Papers
Qualitative Research Essay
Essay on Qualitative and Quantitative Research
Qualitative Reflection
Importance Of Qualitative Research
Qualitative vs. Quantitative Research Essay
Qualitative Research Methods Essay
What Is The Generic Qualitative Approach? Essay
Qualitative Research : Phenomenological Research
Qualitative Analysis Essay
Essay On Qualitative Research
Qualitative Exploratory Essay
Applied Research Essay example
Ethics in Research Essay
Research Critique Essay example
Essay on Types Of Research
Methodology of Research Essay examples
Qualitative Research Evaluation Essay
Essay about Sampling
Sample Methodology Essay
Research Methods Essay
Fundamentals of Research Essay
Experimental Research Designs Essay
Sampling Methods Essay
Animal Experimentation Successes And Clinical Research...Laura Arrigo
This essay discusses the politics and economics surrounding the FDA's drug approval process. There is pressure on the FDA from Congress, the public, and pharmaceutical companies to speed up approval of new drugs. While faster approval can help patients, it may compromise safety. The FDA must balance these competing interests. The essay provides historical context on the FDA's evolution and expanded authorities over time to regulate an increasing scope of products that impact public health and safety. It also notes the appointment of Jane Heney as the first female FDA commissioner in 1998.
In nursing, evidence-based practice (EBP) is a blend of research f.docxsleeperharwell
In nursing, evidence-based practice (EBP) is a blend of research findings, clinical skills, and patient choices (Skaggs et al., 2018). In clinical practice, nurses are pushed to adopt this problem-solving strategy to deliver individualized patient care. EBP includes information on evidence-based practices in practically all areas of nursing, such as direct patient care, workflow concerns, infection control, supply management, charting, and central line care, to name a few. EBP enables nurses to utilize the most recent research methods in real-world settings, such as direct patient care. With the nurse's extensive knowledge and data on quality improvement, potential improvements to current processes that may result in better outcomes can be considered. EBP can improve patient care by focusing on known results. In a fast-paced industry like healthcare, it is crucial to remain current with the most recent research methodology.
Journals subject to peer review are one of the most reliable sources of evidence-based research. In reality, peer-reviewed publications are the most reputable source of study findings. They are the settings where researchers evaluate the efficacy of drugs, therapies, and behaviors and publish their findings (Schmidt & Brown, 2017). Peer-reviewed sources are those that have been evaluated for quality by experts and professionals in accordance with industry standards. Unlike many websites, peer-reviewed materials are examined prior to publication. This shows that the library's collections are a more reliable source of information than the Internet. PubMed and CINAHL are two important evidence-based research tools. PubMed is a database of articles and papers covering a broad spectrum of biological and clinical research. Evidence-Based Practice is an advanced search option in CINAHL that restricts search results to articles from evidence-based journals, articles about evidence-based practice, articles about applying evidence-based practice to research, and research articles, including systematic reviews, clinical trials, and meta-analyses.
References
Schmidt, N. A., & Brown, J. M. (2017).
Evidence-Based Practice for Nurses: Appraisal and Application of Research: Appraisal and Application of Research. Jones & Bartlett Learning.
Skaggs, M. K. D., Daniels, J. F., Hodge, A. J., & DeCamp, V. L. (2018). Using the evidence-based practice service nursing bundle to increase patient satisfaction.
Journal of emergency nursing, 44(1), 37-45
Evidence-based practice illustrates the difference between on-the-job experience and research-based assessment and interventions that are done daily. The importance of EBP will stop healthcare professionals from providing care that is ritualistic and traditional. EBP can also determine the efficacy of the care provided and evaluate the care to ensure positive patient outcomes (Tappen,.R.M. 2015). One of the worst mindsets to have is “that is how we have.
The document is a thesis use authorization that allows the library to make the thesis freely available for inspection and download. It also allows permission for the thesis to be printed for scholarly purposes with approval from university officials. However, any copying or publishing of the thesis for financial gain requires the author's written permission. The author signs and dates the document to indicate their approval.
The document reports on the fastest growing Amazon sellers in April 2016 based on feedback growth rates. Petphabet had the highest growth of 1350% by selling a range of pet products. Other top growing sellers included OEM Accessories Direct, Dr. JK, and Mower Partsman. Many of the fastest growing sellers offered smartphone accessories and protective phone cases. Overall growth was not as high as in March but feedback growth was used as a metric to identify the top 100 fastest growing Amazon sellers that month.
This document outlines an itinerary for a cruise from May 2009 to December 2009 aboard the sailing vessels Sea Cloud and Sea Cloud II. The itinerary includes ports of call in Europe, North Africa, and transatlantic crossings. Specific dates and details are provided for individual legs of the journey that will involve stops in places like Nice, France; Corsica; Sardinia; Italy; Morocco; and the Caribbean. Pricing information is also included for the different cabin categories.
This document is a resume for Beverly Faulds summarizing her professional experience in accounting roles from 1988 to present. It details her experience as a controller, senior accountant, office manager, bookkeeper, and accountant for various companies in real estate, property management, manufacturing, and accounting. Her responsibilities included financial statement preparation, accounting, payroll, cash management, and working with auditors and resolving financial issues.
El documento describe las herramientas de autor de Quandary y cómo crear y enlazar puntos de decisión en un ejercicio. Explica que se debe colocar el título del ejercicio en el primer punto de decisión, luego describir el contenido de ese punto, y finalmente agregar un nuevo enlace al siguiente punto de decisión. Una vez finalizado el ejercicio, se podrá ver un resumen y exportarlo a XHTML.
Este documento presenta una introducción a los conceptos de metas y objetivos. Explica que una meta es el fin hacia el cual se dirigen las acciones o deseos de una persona u organización, mientras que un objetivo es lo que impulsa al individuo a tomar decisiones o perseguir sus aspiraciones. Luego, proporciona ejemplos de metas y objetivos personales, académicos y sociales de Luis Contreras, como ser cada día mejor, aprender más sobre abogacía y vivir cómodamente apoyando a sus clientes.
El documento presenta un análisis de la situación fiscal y perspectivas del municipio de Bucaramanga para el año 2015. Resalta que el municipio tuvo un déficit de $240 millones en 2015, principalmente debido a mayores gastos de inversión e intereses de deuda. Aunque la deuda pública es sostenible, existen pasivos contingentes por cuantificar. Se recomienda depurar los pasivos, tomar acciones sobre entidades descentralizadas de riesgo y mejorar la provisión pensional.
This document provides a history of horror films from the 19th century to modern day, covering major works, trends, and innovations within the genre. It discusses how early horror literature influenced silent films and German expressionism in the late 19th/early 20th century. The introduction of sound in the 1930s boosted the popularity of Universal monster films starring Bela Lugosi and Boris Karloff. Trends from this era like mad scientists and Gothic settings continued influencing horror through the following decades.
This document discusses several theories of international trade, including mercantilism, absolute advantage, and comparative advantage. It provides details on key aspects of each theory such as balance of payments for mercantilism and production possibility curves for comparative advantage. It also addresses limitations of the theories and additional factors that influence trade patterns between countries such as differences in country size, factor proportions, and product life cycles. Later sections explore strategic trade policy and Porter's diamond model for understanding why companies engage in international trade.
Kelly J. Dupre has over 20 years of experience in clinical data management and research. She has worked for various companies in roles such as clinical data coordinator, clinical data manager, and electronic medical records scanner. Her experience includes tasks like data entry, query generation, adverse event reconciliation, and ensuring accurate and consistent data in clinical trials. She is proficient in MS Office and specialized data management software.
PROBING FOR EVIDENCE OF PLUMES ON EUROPA WITH HST/STISSérgio Sacani
Roth et al. (2014a) reported evidence for plumes of water venting from a southern high latitude
region on Europa – spectroscopic detection of off-limb line emission from the dissociation
products of water. Here, we present Hubble Space Telescope (HST) direct images of Europa in
the far ultraviolet (FUV) as it transited the smooth face of Jupiter, in order to measure absorption
from gas or aerosols beyond the Europa limb. Out of ten observations we found three in which
plume activity could be implicated. Two show statistically significant features at latitudes similar
to Roth et al., and the third, at a more equatorial location. We consider potential systematic
effects that might influence the statistical analysis and create artifacts, and are unable to find any
that can definitively explain the features, although there are reasons to be cautious. If the
apparent absorption features are real, the magnitude of implied outgassing is similar to that of the
Roth et al. feature, however the apparent activity appears more frequently in our data.
This document provides tips and advice for nurturing a child's language skills. It discusses the importance of talking, reading, and interacting with children from an early age. Specific recommendations include talking about daily activities, expanding on a child's remarks with more words, asking open-ended questions, reading interactively by discussing pictures and letting the child make up stories, playing word games, singing songs, and playing interactive games. It also advises taking field trips for new experiences and listening to the child. The document warns against pretending to understand if you can't, allowing too much TV/computer time, over-correcting, and pressuring a child to talk. It provides typical language development milestones and signs of possible speech delays.
1) El departamento de Sucre ha logrado cumplir con su acuerdo de reestructuración de deuda suscrito en 2009, a pesar de algunos riesgos. 2) Registró superávit fiscal en 2015 y mantiene bajos niveles de deuda pública. 3) Sus principales retos son fortalecer la defensa jurídica y mejorar la ejecución presupuestal.
This document discusses how Ubona Automated Agent helped solve an e-commerce company's need for an effective cash-on-delivery verification system. The system allowed 88% of customers to successfully confirm or cancel orders in a single call, improving order dispatch rates from 40% within a day to 80% within two hours. The cloud-based system provides a cost-effective way to automate the verification process while still providing a personalized customer experience.
This article profiles Amy Pfeffer, a 2006 graduate of Hilbert College's criminal justice program, who has emerged as Rochester's first-ever "Top Cop." As a police officer, Pfeffer made more arrests than anyone else on the force in 2009, earning her the Top Cop Award. The article describes Pfeffer's background and journey, including her service in the Army National Guard in Iraq from 2001-2006. It highlights how Pfeffer has been an "adrenaline junkie" from a young age and discusses her success as a police officer in apprehending suspects despite her small stature.
The document describes the synthesis and evaluation of 6,7-dihydro-4H-isothiazolo[4,5-b]pyridin-5-ones (DIP) as potential antimitotic agents. A series of DIP derivatives were synthesized via a multicomponent reaction. Selected DIP derivatives were found to alter sea urchin egg cleavage at low nanomolar concentrations and showed cytotoxicity against cancer cells, including chemoresistant lines, at submicromolar to low nanomolar levels. Both the sea urchin embryo assay and cancer cell assays confirmed the DIP derivatives act by destabilizing microtubules. Structure-activity relationship studies showed the importance of a p
Nursing Shortageby Monica CastelaoSubmission dat e 01-.docxcherishwinsland
The document summarizes the issue of nursing shortages, particularly in intensive care units (ICUs). It discusses how demand for healthcare has increased, creating staffing shortages. Shortages are also due to lack of nursing school faculty and limited enrollment. ICU nursing is described as stressful and demanding, with long hours and complex technology. Shortages in ICUs can negatively impact patient safety and outcomes. Potential solutions proposed include increasing nurses' wages and improving nursing's public image to attract more people to the profession.
Qualitative Study Summary
Qualitative Research Evaluation Essay
Essay On Qualitative Analysis
Planning A Qualitative Study? Essay
Qualitative Analysis : Qualitative Data
Qualitative Research Papers
Qualitative Research Essay
Essay on Qualitative and Quantitative Research
Qualitative Reflection
Importance Of Qualitative Research
Qualitative vs. Quantitative Research Essay
Qualitative Research Methods Essay
What Is The Generic Qualitative Approach? Essay
Qualitative Research : Phenomenological Research
Qualitative Analysis Essay
Essay On Qualitative Research
Qualitative Exploratory Essay
Applied Research Essay example
Ethics in Research Essay
Research Critique Essay example
Essay on Types Of Research
Methodology of Research Essay examples
Qualitative Research Evaluation Essay
Essay about Sampling
Sample Methodology Essay
Research Methods Essay
Fundamentals of Research Essay
Experimental Research Designs Essay
Sampling Methods Essay
Animal Experimentation Successes And Clinical Research...Laura Arrigo
This essay discusses the politics and economics surrounding the FDA's drug approval process. There is pressure on the FDA from Congress, the public, and pharmaceutical companies to speed up approval of new drugs. While faster approval can help patients, it may compromise safety. The FDA must balance these competing interests. The essay provides historical context on the FDA's evolution and expanded authorities over time to regulate an increasing scope of products that impact public health and safety. It also notes the appointment of Jane Heney as the first female FDA commissioner in 1998.
In nursing, evidence-based practice (EBP) is a blend of research f.docxsleeperharwell
In nursing, evidence-based practice (EBP) is a blend of research findings, clinical skills, and patient choices (Skaggs et al., 2018). In clinical practice, nurses are pushed to adopt this problem-solving strategy to deliver individualized patient care. EBP includes information on evidence-based practices in practically all areas of nursing, such as direct patient care, workflow concerns, infection control, supply management, charting, and central line care, to name a few. EBP enables nurses to utilize the most recent research methods in real-world settings, such as direct patient care. With the nurse's extensive knowledge and data on quality improvement, potential improvements to current processes that may result in better outcomes can be considered. EBP can improve patient care by focusing on known results. In a fast-paced industry like healthcare, it is crucial to remain current with the most recent research methodology.
Journals subject to peer review are one of the most reliable sources of evidence-based research. In reality, peer-reviewed publications are the most reputable source of study findings. They are the settings where researchers evaluate the efficacy of drugs, therapies, and behaviors and publish their findings (Schmidt & Brown, 2017). Peer-reviewed sources are those that have been evaluated for quality by experts and professionals in accordance with industry standards. Unlike many websites, peer-reviewed materials are examined prior to publication. This shows that the library's collections are a more reliable source of information than the Internet. PubMed and CINAHL are two important evidence-based research tools. PubMed is a database of articles and papers covering a broad spectrum of biological and clinical research. Evidence-Based Practice is an advanced search option in CINAHL that restricts search results to articles from evidence-based journals, articles about evidence-based practice, articles about applying evidence-based practice to research, and research articles, including systematic reviews, clinical trials, and meta-analyses.
References
Schmidt, N. A., & Brown, J. M. (2017).
Evidence-Based Practice for Nurses: Appraisal and Application of Research: Appraisal and Application of Research. Jones & Bartlett Learning.
Skaggs, M. K. D., Daniels, J. F., Hodge, A. J., & DeCamp, V. L. (2018). Using the evidence-based practice service nursing bundle to increase patient satisfaction.
Journal of emergency nursing, 44(1), 37-45
Evidence-based practice illustrates the difference between on-the-job experience and research-based assessment and interventions that are done daily. The importance of EBP will stop healthcare professionals from providing care that is ritualistic and traditional. EBP can also determine the efficacy of the care provided and evaluate the care to ensure positive patient outcomes (Tappen,.R.M. 2015). One of the worst mindsets to have is “that is how we have.
The document is a thesis use authorization that allows the library to make the thesis freely available for inspection and download. It also allows permission for the thesis to be printed for scholarly purposes with approval from university officials. However, any copying or publishing of the thesis for financial gain requires the author's written permission. The author signs and dates the document to indicate their approval.
The document discusses different approaches to conducting root cause analyses (RCA) when investigating medical errors or adverse outcomes. It compares the 5-Whys approach, fishbone diagram, and logic tree analytical tools. The 5-Whys approach involves asking "why" five times to drill down to the root cause, but it may overlook other contributing factors. A case study of a maternal death is presented to demonstrate how the different tools would analyze the same situation. The document advocates for a comprehensive RCA approach that involves a team, evidence-based analysis of multiple contributing causes.
No harm, no foul: Canadian Journal of Medical Laboratory ScienceJane Langille
Hands-on simulation experience allows healthcare workers to get messy, make mistakes and hone problem-solving skills — with no risk to patients. In this feature story for the Canadian Journal of Medical Laboratory Science, I explore trends in simulation in education at the undergrad level at The Michener Institute for Applied Health Sciences in Toronto, as well as in-field training provided by a unique mobile simulation specialist in remote areas in northern Alberta.
ASIS&T Diane Sonnenwald Information Science as a Career ASIS&T
American Society for Information Science & Technology Board of Directors President Diane H. Sonnenwald presents "Reflections on the Journey" at European Chapter’s Celebration of ASIS&T’s 75th Anniversary. With examples from her own career, she speaks to how a career in the discipline of Information Science can be shaped.
Presentation for the School of Dentistry Bootcamp series on April 23, 2008. Uploaded originally at that time, but Slideshare for some inexplicable reason deleted the file. Hope it sticks this time. The Chain of Trust / Levels of Evidence tool was originally developed for use by college undergraduate students, shown adapted here for use in healthcare. It is appropriate for a wide variety of audiences.
When digital medicine becomes the medicine (1/2)Yoon Sup Choi
This document introduces the journal npj Digital Medicine, which focuses on digital medicine. Digital medicine uses digital tools like biosensors, algorithms, and artificial intelligence to upgrade healthcare by individualizing it and making it data-driven. It has the potential to democratize healthcare by empowering individuals. The journal aims to foster collaboration between the many fields involved in digital medicine like computer science, healthcare, engineering, and more to accelerate progress. It argues digital innovations can help address challenges in current healthcare systems by providing more personalized care at sustainable costs while also improving clinical research.
59 minutes agoLuke Powell Initial post - Luke PowellCOLLAP.docxtroutmanboris
59 minutes ago
Luke Powell
Initial post - Luke Powell
COLLAPSE
Top of Form
Introduction
As nurses, we are guided by evidence-based practice to ensure that the care we deliver is safe and appropriate for our patients. During nursing school, we are encouraged to seek out scientific research to support why we do what we do and are taught to continue to do so even after we leave the classroom. We make decisions based from sources including coursework, our textbooks, and clinical experience (Polit & Beck, 2017). However, I have caught myself asking “what does the research say?” especially when completing cares. In particular, do sequential compression devices (SCD) actually contribute to the prevention of deep venous thrombosis (DVT). Nursing research is conducted to answer questions or solve problems (Polit & Beck, 2017). As I have began to ask my coworkers as to why we use SCDs, the answer is always that this is what we have always done. According to Polit and Beck (2017), this is described as unit culture, and these interventions are based on tradition rather than sound evidence.
PICOT Question
Many of the patients that I see in the intensive care unit (ICU) can expect to be there for at least three days. Most are too sick to be able to get out of bed and move around the room. This inactivity can potentially put them at risk for developing a DVT. To help prevent this from happening, knee high SCDs are utilized. However, the organization that I work for does not have the evidence they found listed anywhere to support the use of SCDs. In fact, when looking at unit council notes from years ago, the same question was brought up and it was noted that there is no evidence to support their use in the ICU. When conducting research for evidence-based practice (EBP), it is important to create a clinical question that can be answered with research evidence (Polit & Beck, 2017). My PICOT question is “In patients admitted to the ICU, does the utilization of SCDs reduce the risk of DVTs as compared to the use of low dose subcutaneous heparin during a three day admission?” My background questions include: what is a DVT, and what is its pathophysiology? Using PICOT, I can turn this research question into search terms that help to prevent my search from being too broad (Walden Student Center for Success, 2012).
Adoption of Evidence-Based Practices
Overall, I do believe that my organization is willing to change processes or procedures, if the evidence is there to support such a change. The only problem that I can identify with making those changes is that they must be presented to a committee who reviews our current policies and procedures every two years. Unless there is a strong need to make changes, it could take some time before the specific policy or procedure is up for review. As for my coworkers, we are constantly reevaluating and questioning why we do what we do. It is not that we are trying to find faults within our organization rather that we are try.
51_Introduction to Artificial Intelligence and its applications.pdfVamsi kumar
This course provides an in-depth understanding of the fundamentals, applications, and future trends of artificial intelligence (AI) in the field of medical lab technology. It covers the role of AI in clinical lab diagnostics, predictive analysis, big data interpretation, precision medicine, and ethical considerations in AI deployment. Through case studies, students will gain practical insights into the use of AI in healthcare.
Created by: Mr. Attuluri Vamsi Kumar, Assistant Professor, Department of MLT, UIAHS, Chandigarh University, Mohali, Punjab. For more details website: https://www.mltmaster.com
Health Care Essay Topics. Personal Health Care Essaydavih0fytav3
Essay on the Importance of Health Social Group Public Health. Impressive Health Care Essay Thatsnotus. Essay on Health Education Health Education Essay for Students and .... Health Essay Sample Telegraph. HEALTH CARE SYSTEM ESSAY EXAMPLE Nexthanpa1963 Blog. Sample On Psychology for Health and Social care By Instant Essay Writ. Argumentative essay about universal healthcare. Universal Health Care Essay - Docsity. Health And Wellness Essay Paper Moreover, There Is Nothing More .... argumentative essay about universal healthcare. Public Health Essay Public Health Preventive Healthcare. Personal Health Care Essay. health essays. Health care essay. Importance of Health Essay In English The Importance of Good Health .... The Health of the Peop
This document discusses the importance of science education. It provides historical context about science education in India dating back 2600 years to Taxila University. During the British rule, science education was limited but started expanding in the late 19th century with institutions like IISc. Post-independence, leaders recognized the importance of science and technology in development, leading to expansion of science education and institutions like IITs and IISERs. The document emphasizes that developing countries need to establish modern science through education to transform traditional economies based on science and technology.
Nicholas Tenhue completed his Master's degree in MSc ICT Innovation at University College London, this document is his thesis on Making Sense of Risk by Visualizing Complex Health Data.
Find out more about Nicholas at http://nicholastenhue.com
1. i
Employee Perceptions of
Biometric Security Adoption in the Workplace
Dissertation Manuscript
Submitted to Northcentral University
Graduate Faculty of the School of Business
in Partial Fulfillment of the
Requirements for the Degree of
DOCTOR OF BUSINESS ADMINISTRATION
by
TIMOTHY CARROLL
Prescott Valley, Arizona
July 2016
2. Approval Page
Employee Perceptions of Biometric Security Adoption in the Workplace
By
Timothy Carroll
Approved by:
8/23/16
Chair: Dr. Melanie Shaw Date
Certified by:
Dean of School: Dr. Peter Bemski Date
3. Abstract
Organizations that fail to understand the reasons that employees accept or reject new
technology may be more susceptible to the misuse of the systems, ultimately resulting in
potential corporate financial losses. The specific problem that was addressed in this study
was the widespread lack of employee participation in the implementation of biometric
security technology in U.S. organizations and the need to understand the factors that
influenced employee participation during the implementation phase. The purpose of this
quantitative study was to use the Technology Acceptance Model (TAM) framework to
examine employee perceptions regarding the use of biometric authentication systems that
will be implemented in information technology. Because there are a variety of biometric
systems that are available in the private and public sector, this study did not focus on a
specific biometric type such as fingerprint, iris scan, or hand geometry. Limiting the
study to one type of biometric could have resulted in bias among the participants. A
quantitative correlational research design was chosen to investigate the research problems
and associated questions. The population for this research study was 600 LinkedIn
connections that are were not currently using biometric security technology in their work
environment, but had prior exposure to biometric technology. Prior exposure indicates
that the participants had experience with using biometrics systems at their former
employers. The target sample for the study was 200 employees who were members of
the LinkedIn network, are were current connections of the researcher, had an anonymous
relationship with the researcher, and worked for information technology organizations
that did not currently utilize biometrics. An Exploratory Factor Analysis (EFA),
Confirmatory Factor Analysis (CFA), and a Structural Equation Modeling (SEM)
4. analysis were performed during the analysis of the data. The findings revealed that
PEOU was a significantly statistical predictor of BI with a path coefficient of 0.441, t =
5.22, R2
= 0.12 and p = 0.001. SN also had significant evidence indicated by a path
coefficient of 0.331, t = 3.55 and p = 0.001. No statistical evidence was found to indicate
that PU had an influence on BI (path coefficient = 0.05, t = 0.698 and p = 0.485). The
predictions of PEOU and PU were statistically significant by SN, SN to PEOU, the path
coefficient was 0.326, t = 4.12, and p = 0.001, SN to PU, the path coefficient was 0.460, t
= 7.30, and p = 0.001. The findings of this study yielded significant practical and
theoretical contributions to the information security field. Future researchers could
explore the demographics of biometric users, to better understand if there is a potential
predictor based on age groups.
5. Acknowledgements
Wow what a journey this has been for me, I honestly never thought this day would even
be imaginable a year ago after my battle with a rare form of cancer. I would like to
dedicate this paper to my entire Sarcoma team at Massachusetts General Hospital for
making this paper possible: Dr Francis Hornicek, an amazing surgeon who I bow down to
with my utmost graciousness, for you are truly a god among physicians; Dr Joseph
Schwab, an amazing intelligent and personable doctor who stands among the greatest of
surgeons; Dr Karen Bernstein, the most upbeat and cheerful doctor I have ever met, she
has a personality that is undefined in her line of work, she brings a smile to my face every
time I meet her; and lastly the greatest Nurse Practitioner (Soon to be Dr), Anne Fiore,
she is someone that you could cry in her lap and she would make you feel good, without
her support I do not believe I could have emotionally survived my ordeal.
I would also like to thank the best Dissertation Chair at any school imaginable, Dr.
Melanie Shaw, she is not only a wonderful academic mentor, but someone who
understands the frustrations that I have faced along my journey. Without Melanie I
seriously doubt I would have ever graduated. Finally, I would like to thank the mighty
lord, for he is the one I pray to each and every day for another day of life.
6. Table of Contents
Chapter 1: Introduction....................................................................................................... 1
Background.................................................................................................................. 3
Statement of the Problem............................................................................................. 8
Purpose of the Study.................................................................................................... 9
Research Questions.................................................................................................... 10
Hypotheses................................................................................................................. 12
Nature of the Study.................................................................................................... 13
Significance of the Study........................................................................................... 15
Definition of Key Terms............................................................................................ 17
Summary.................................................................................................................... 20
Chapter 2: Literature Review............................................................................................ 21
Documentation........................................................................................................... 21
Information Security.................................................................................................. 22
Concept and Theory of Acceptance........................................................................... 28
Theory of Reasoned Action....................................................................................... 33
Theory of Planned Behavior...................................................................................... 36
Technology Acceptance Model ................................................................................. 39
TAM and Information Security ................................................................................. 43
User behavior and Information Technology.............................................................. 45
Effects of Perceived Ease of Use............................................................................... 50
Effects of Perceived Usefulness ................................................................................ 53
Effects of SN.............................................................................................................. 55
IT Investments in Biometric Technology.................................................................. 57
Biometric Technology: An Introduction ................................................................... 58
Social Impact of Biometrics ...................................................................................... 68
Economics and Biometrics ........................................................................................ 71
Summary.................................................................................................................... 72
Chapter 3: Research Method............................................................................................. 75
Hypotheses................................................................................................................. 77
Research Methods and Design................................................................................... 79
Population.................................................................................................................. 80
Sample ....................................................................................................................... 81
Materials/Instruments ................................................................................................ 82
Operational Definition of Variables .......................................................................... 87
Data Collection, Processing, and Analysis................................................................ 90
Limitations................................................................................................................. 94
Delimitations.............................................................................................................. 95
Ethical Assurances..................................................................................................... 95
Summary.................................................................................................................... 96
8. List of Tables
Table 1 Physiological and Behavioral Biometric Areas.................................................. 63
Table 2 Constructs and Measurement Instruments......................................................... 85
Table 3 Cronbach Alpha of Constructs from Prior Studies............................................. 85
Table 4. SEM Paths of influence ..................................................................................... 93
Table 5. Descriptive Statistics for Data Collection ....................................................... 103
Table 6. Exploratory Factor Analysis ............................................................................ 104
Table 7. KMO and Bartlett's Test............................................................................... 105
Table 8. Reliability analysis for each construct............................................................. 105
9. List of Figures
Figure 1. The Theory of Reasoned Action Diagram. Reprinted from User acceptance of
computer technology: ....................................................................................................... 34
Figure 2. The Theory of Planned Behavior Model Ajzen (2006).................................... 37
Figure 3. Technology Acceptance Model Diagram......................................................... 42
Figure 4. TAM2 Diagram ................................................................................................. 42
Figure 5. Perceived Ease of Use Diagram ........................................................................ 51
Figure 6. Hypothesized structural model: A path model of employee’s PU, SN, and
PEOU on their intention to use biometrics. ...................................................................... 76
Figure 7. CFA 4 Factor Measurement model for this research study.............................. 87
Figure 8. Final SEM CFA 4 Factor Measurement model IBM AMOS 23.................... 111
Figure 9. SEM Factor Measurement model IBM AMOS 23......................................... 112
10. 1
Chapter 1: Introduction
Companies have become increasingly vulnerable to internal and external security
threats to their information infrastructure (Nicho & Hendy, 2013). Computer threats and
cyber-terrorism are rapidly increasing and straining the structure of the Internet, due to
their destructive tendencies to disrupt business activities (Brahme, 2012). These
increasing incidents of Internet attacks aimed at online businesses have presented serious
risks to the safety and security of employees and tangible assets. Although many
organizations have physical hardware firewalls and intrusion detection systems in place
to protect internal systems, the use of weak authentication techniques, such as passwords,
are lacking the security necessary for online business transactions (Saleh, Alsmadi, &
Mashhour, 2011). The cost of recovering from a security breach has been up to 20 times
greater than the cost of protecting the data (Ernst & Young, 2012). Thus, there has been
a growing need for technology that can decrease information security breaches (Yayla &
Hu, 2011).
The rate of change in information technology has forced organizational leaders to
update and implement new software solutions and technologies continually (Fang,
Benamati, & Lederer, 2011). The successful implementation of new technology has
allowed organizations to improve productivity and increase their competitive position in
the marketplace (Knani, 2013). One of the most critical technologies that has undergone
continual change has been information security.
A technology that lends itself to the reduction of identity theft is biometrics (Voss
et al., 2013). Biometrics is a technology that enables the identification of individuals by
authentication based on unique physiological or behavioral patterns, such as fingerprints,
11. 2
eye scans, facial recognition, and voice recognition (Hasso, S. A., Hasso, M. A., & Saad,
2012). Technological advances in biometrics has provided tools to enhance security in
the workplace.
Many organizations have already begun to implement biometrics for building
security, personal computer use, and network authentication. For example, RealTime
North America, a Tampa-based company, has been using biometric technology to help
businesses and government agencies improve their internal security (Simmons, 2012).
Apple Inc, has recently added fingerprint biometrics as an added security features to its
new line of iPhones, this new feature has allowed the user to scan their fingerprint and
use that print to unlock the device (Ankeny, 2013). Banco Azteca, is one of Latin
America’s leading specialty retailers, in an effort to help better protect customer
accounts, the bank has introduced a fingerprint biometric system throughout more than
900 of its branch locations with more than 15M customers using the fingerprint
authentication to access their accounts (Pappas, 2012).
However, one of the biggest obstacles organizations face when implementing
technological change has been user acceptance (Pasaoglu, 2011). If users are not willing
to accept and use security measures and systems, organizations will not reap the benefits
of the technology (Barrett, 2013). A few years ago in New York City, the Bloomberg
administration had implemented biometrics in an effort to keep track of its employees.
Many of the employees had expressed concerns that this type of security has violated
their privacy interests. As a result, many of the employees who feared the possible misuse
of their private data, have refused to allow their employers to scan or record any type of
biometric data (Michael, 2012).
12. 3
Prior studies with biometrics and employee acceptance have focused on a variety
of technologies, ranging from the Internet to social media (Morosan, 2012; Todd, 2011).
Factors related to whether employees intend to use biometric security authentication in
their companies have not been investigated (Jones, 2009). Prior studies in the acceptance
of new technology had identified three primary constructs that have been proven useful in
identifying the intention to use a new technology: (a) perceived usefulness (PU); defined
as the likelihood that the use of a new technology will increase a user’s job function, is
one of the factors that has been identified in prior studies to identify the acceptance of
various new technologies (Kim & Lee, 2014); (b) perceived ease of use (PEOU); defined
as the level of effort it will take to use a new technology—the premise being, the easier
the level of effort, the more likely users will want to use and take advantage of the
features of the new system (Kesharwani & Shailendra, 2012); and (c) subjective norm
(SN); defined as the perception that user behavior can be determined by how they believe
their peers and coworkers will accept the technology—if a user’s friends all accept a new
technology without resistance, there is a strong chance that the user will also accept the
technology (Trongmateerut & Sweeney, 2013). By understanding these three factors
related to technology acceptance, leaders will have the ability to adapt business models so
that employees will be more willing to use the new tools (Pasaoglu, 2011).
Background
Organizations have typically lost 5% of their revenue due to security breaches
each year (C. da Silva, J. da Silva, Rodrigues, Nascimento, & Garcia, 2013). Cyber-
terrorist attacks have cost U.S. companies over $100 billion dollars in lost revenue
annually (Rustici, 2011). In January 2012, Zappos reported that 24 million records
13. 4
containing credit card information were hacked and personal information disclosed,
costing the organization over $100 million in legal fees to contain the losses (Sauls &
Gudigantala, 2013). In March 2013, Evernote, a popular Internet-based note-sharing
service, fell victim to a security breach affecting 50 million users, resulting in over $150
million in lost revenue (Kesh & Raghupathi, 2013). In October 2013, Adobe reported
that the credit card information for 3 million customers was stolen as a result of a source
code leak by an employee, resulting in over $150 million in losses (Perlroth, 2013). In
November and December 2013, hackers gained access to over 40 million credit and debit
cards used by Target customers, costing Target at least $100 million to cover legal costs
to repair the damage (Timberg, Yang, & Tsukayama, 2013).
As more organizations operate in the global economy, it has becoming
increasingly apparent to business leaders that safeguarding and protecting informational
assets from computer crimes is a necessary standard business practice (Czosseck, 2013).
To ensure data security, organizations are advised to update and adapt security protocol
changes every 6 to 12 months, according to one estimate (Nassimbeni, Sartor, & Dus,
2012). The results of the 2013 Computer Security Survey indicated that information
security budgets are on the rise in 43% of all U.S. organizations (Ramanauskaite,
Radvile, & Olifer, 2013). Forty-six percent of the organizational leaders surveyed
indicated that expenditures would be directed toward security improvement, innovation,
and expansion (Czosseck, 2013) .
The human factor is generally considered the weakest link in the protection of
information systems (Jaafar & Ajis, 2013). Users can misunderstand and misuse a
security system, no matter how effective the system is believed to be (Malik, Kumra, &
14. 5
Srivastava, 2013). When that misunderstanding and misuse occurs, the system loses its
usefulness.
In a 2013 survey, 90% of technology departments reported that employees abused
Internet usage on a daily basis (Thomopoulas, 2013). The violations ranged from
opening infected email attachments to surfing the Internet for personal use. In a 2013
Computer Crime and Security survey, the majority of the organizations indicated that
insiders accounted for the largest portion of financial losses, with 65% of respondents
reporting that most of the threats were attributable to users who did not accept new
security technology measures.
To help protect organizational security, it is becoming essential for companies to
develop information security strategies and to update and replace older technology
(Stripple, 2012). The objective of system security management is to ensure the
confidentiality of data, the integrity of data, and data availability within the organization.
For security measures to be effective within an organization, employees have been
encouraged to adopt and understand the proper use of these technologies (Chang &
Wang, 2011).
Organizational leaders need to understand that the threats of information security
breaches affect the company as a whole. Appropriate information security policies,
procedures, strategies, and measures are advised to be in place, to understood and be
accepted by employees who use these systems. Security breaches can adversely affect
the market share and reputation of an any organization (Yayla & Hu, 2011). Business
Leaders are encouraged to understand how employees perceive the implementation of
technology related to information security.
15. 6
Biometric authentication techniques have been in existence for decades.
Biometrics of the past were often associated with fingerprinting criminals (Muller, 2011).
Today, biometrics have been used in all types industries, such as hospitals, financial
institutions, border patrol, and personal computers (Chang, Lu, Wu, Yap & Yu, 2011).
As cyber-terrorism attacks become more complex, organizations have been looking for
better security methods for protecting their workplace. Primitive security measures such
as passwords have proven to be unreliable, because many organizations do not enforce a
complex password algorithm (Sangani & Vijayakumar, 2012). Biometric security
authentication techniques have been steadily adapted by many organizations. Fingerprint
authentication has been one of the most efficient and trustworthy methods of biometric
authentication. Many new laptops have built in fingerprint readers, others have slots for
smart cards that have fingerprint information embedded within their internal chips
(Musleh, Nofal, Ba, & Ibrahim, 2012).
As organizations have started to adopt biometrics, many employers have
experienced resistance and frustration by employers who have forced them to implement
and utilize the technologies with little or no training (Bidgoli, 2012). The Bloomberg
administration tried to implement biometric authentication to track employees during the
workday, however, employees refused to allow their personal privacy to be violated and
resisted the technology, resulting in a termination of the biometric authentication policy
(Michael, 2012). Understanding why employees resist biometrics has the potential to
benefit organizations during the planning and implementing phase of biometric security
authentication systems.
The Technology Acceptance Model (TAM) is a theoretical model that has been
16. 7
recognized as one of the most reliable metrics for understanding why employees accept
or reject technology (Kim, 2012). TAM is one of the most widely accepted measures of
the success or failure of new technology acceptance (Jones, 2009). The key constructs
used in the TAM include PEOU, PU, and SN (Davis, 1989; El-Attar, 2006; Huang &
Hsu, 2010).
The knowledge acquired from TAM studies has allowed companies to make
informed decisions regarding the introduction of new technology (Davis, 1989; Huang &
Hsu, 2010). PEOU and PU were the original TAM constructs and are considered the
primary determinants for information technology acceptance behaviors (Davis, 1989).
PU refers to the tendency to use a specific technology in the belief that it will increase the
user’s job performance. PU has been one of the primary constructs used in determining
technology acceptance. Several studies that have used the TAM model have determined
PU to be significant in determining acceptance of new technology, specifically
technologies that involve biometrics (Nwatu, 2011). PEOU is also one of the primary
constructs associated with the significance of technology acceptance. PEOU is defined
as the degree an individual believes that using a particular technology will increase their
job performance (Davis, 1989). PEOU also has been proven to influence PU, since the
easier a system is perceived to be used, the more individuals will utilize it (Davis, 1989).
In 2000, the TAM was modified to include SN as a primary construct (Venkatesh, 2000).
SN refers to how individual decisions are made based on peer pressure. SN was included
in the TAM model because many workplace decisions are based on social pressure from
others within the organization (Jones, 2009). In repeated studies by Venkatesh and
Davis (2000), SN influenced PU when social pressure was incorporated into the decision
17. 8
making process. SN has also been studied in relation to biometric technology acceptance
studies, most recently by Uffen, Kaemmerer, and Breitner (2013); SN was found to be a
significant indicator of acceptance to biometrics in smart phones.
Statement of the Problem
Information Security theft has been increasing at an alarming rate; almost 50%
since the attacks on Sept 11, 2011 (911) (Silic & Back, 2014). Organizations have not
been adopting new security technologies, such as biometrics. Biometrics have the ability
to prevent many of these intrusions (Rashed & Alajarmeh, 2015). The specific problem
to be addressed is that although biometric security systems have many advantages over
traditional security methods, biometrics are not being utilized by companies due to the
acceptance rate of their employees. Determining factors that affect employee satisfaction
with biometric technology would be a benefit to organizations that have decided to utilize
biometrics. Prior research has affirmed that when employees are involved in the selection
and implementation phase of biometrics, satisfaction has increased (Bidgoli, 2012;
bdelbary, 2011; Corazao, 2014; Musleh, Nofal, Ba, & Ibrahim, 2012; Muhammad,
Markkula, & Oivo, 2013;). Since only 2% of businesses as of 2014 have implemented a
security protocol that has addressed Internet security attacks, many businesses are at risk
(Mathias, 2014).
The impact of rapid technological advancement has motivated organizations to
seek innovative security technologies to help defer breaches to internal computer
systems. Researchers and practitioners have identified biometrics as one of the most
innovative technologies that can be implemented in a relatively inexpensive manner.
However, throughout most organizations, it has not been implemented or accepted
18. 9
(Amofa, 2014). It is unclear why companies have not been using biometrics, despite the
simplicity and low implementation costs to organizations. There is a gap in the literature
highlighting the reasons why biometric security technology has not being accepted.
According to the TAM, user behavioral intentions or participation toward the
acceptance of a new technology can be predicted by the technology’s PEOU, PU, and SN
(Bagozzi, 2007; Davis, 1989). These three TAM constructs have been demonstrated in past
studies to be the most significant predictors of user acceptance (Chi, Yeh, & Yang, 2011).
Purpose of the Study
The purpose of this quantitative correlational study was to identify and analyze
the problem of adopting biometric security by investigating the impact that the TAM
constructs: perceived ease of use, perceived usefulness, and subjective norm have among
employees who work in organizations that are examining biometrics as a replacement for
existing security system authentication. The specific problem that was addressed is that
although biometric security systems have many advantages over traditional security
methods, they are not being utilized by companies and readily accepted by their
employees. These behavioral intentions have been due to varies constructs: the exclusion
of employees in the selection process, ethical issues related to biometrics, and poor
training and education in biometric technology. Organizations have been dependent on
employees to perform daily tasks that has often involved financial and sensitive
information that has been relevant to the survival of the organization. By examining
biometric technology acceptance from the employee point of view, organizations should
begin to understand the value of having employees involved during the technology
selection phase. This involvement process, determines the effort involved to make sure
19. 10
the technology is usable, increases employee performance, and possibly reduce security
risks resulting in employee acceptance.
The TAM model constructs of perceived usefulness, perceived ease of use, and
subjective norm are the exogenous variables. Structural equation modeling (SEM)
statistical analysis was used for path analysis to determine whether the exogenous
variables: PU, PEOU, and SN as represented by the TAM theoretical model predicted the
endogenous variable, intention to use biometric authentication systems (Kline, 2010; Teo,
2011, Venkatesh et al., 2003). The SEM approach is selected because of its ability to
analyze all of the regression paths simultaneously (Kline, 2010; Teo, 2011; Venkatesh &
Davis, 2000).
A non-experimental, survey approach was the type of quantitative design that was
used for this study. A quantitative design was better suited for accessing the relationship
among the variables in the study (Feistel, 2014). Probability sampling technique
involving the use of a cross-sectional sample from the population was used for this study.
The target population for this study were members of the LinkedIn community who were
active connections of the researchers, lived within the U.S., worked for technology
organizations who either use biometrics or are in the process of evaluating them. The
appropriate sample size for this study was 200 participants, based on the rule-of-thumb
assumptions for SEM (Kline, 2010).
Research Questions
The TAM has been used to study attitudes to the introduction of many new
information technology systems (Pasaoglu, 2011). The purpose of this quantitative study
is to use the TAM theoretical framework and its constructs of PU, PEOU, and SN to
20. 11
examine TAM’s influence on predicting employee’s intention to use biometric
authentication systems that will be implemented in information technology.
The research structural model consists of three exogenous variables (perceived
usefulness, perceived ease of use, and subjective norm), and one endogenous variable
(intention). Each of the exogenous variables is hypothesized against the direct impact on
intention. PEOU is hypothesized to be a fundamental determinant of intention to use in
hypotheses H1a and H1b. PU is hypothesized to be a fundamental determinant of
intention in hypotheses H2. SN is hypothesized to be a fundamental determinant of
intention to use in hypotheses H3a, H3b, and H3c.
The following is the research question for the study, coupled with its associated
null and alternate hypotheses.
Q1. To what extent, if any, does perceived usefulness have on employee’s
perceptions of the use of biometric authentication?
Q2. To what extent, if any, does perceived ease of use have on employee’s
perceptions of the use of biometric authentication?
Q3. To what extent, if any, does subjective norm have on employee’s perception
of the use of biometric authentication?
Q4. To what extent, if any, does subjective norm have on the perceived
usefulness of employee’s perceptions of the use of biometric authentication?
Q5. To what extent, if any, does subjective norm have on the perceived ease of
use of employee’s perceptions of the use of biometric authentication?
Q6. To what extent, if any, does perceived ease of use have on perceived
usefulness of employee’s perceptions of the use of biometric authentication?
21. 12
Hypotheses
H10. Perceived usefulness (PU) of biometrics will not have a statistically
significant direct positive direct impact on employee’s intention to use a biometric
security technology.
H1a. Perceived usefulness (PU) of biometrics will have a statistically significant
direct positive direct impact on employee’s intention to use a biometric security
technology.
H20. Perceived ease of use (PEOU) of biometrics will not have a statistically
significant direct positive direct impact on employee’s intention to use a biometric
security technology.
H2a. Perceived ease of use (PEOU) of biometrics will have a statistically
significant direct positive direct impact on employee’s intention to use a biometric
security technology.
H30. Subjective norm (SN) of biometrics will not have a statistically significant
direct positive direct impact on employee’s intention to use a biometric security
technology.
H3a. Subjective norm (SN) of biometrics will have a statistically significant
direct positive direct impact on employee’s intention to use a biometric security
technology.
H40. Subjective norm (SN) will not have a statistically significant direct positive
direct impact on perceived usefulness (PU) of employee’s intention to use a biometric
security technology.
22. 13
H4a. Subjective norm (SN) will have a statistically significant direct positive
direct impact on perceived usefulness (PU) of employee’s intention to use a biometric
security technology.
H50. Subjective norm (SN) will not have a statistically significant direct positive
direct impact of perceived ease of use (PEOU) of employee’s intention to use a biometric
security technology.
H5a. Subjective norm (SN) will have a statistically significant direct positive
direct impact of perceived ease of use (PEOU) of employee’s intention to use a biometric
security technology.
H60. Perceived ease of use (PEOU) will not have a statistically significant direct
positive direct impact of perceived usefulness (PU) of employee’s intention to use a
biometric security technology.
H6a Perceived ease of use (PEOU) will have a statistically significant direct
positive direct impact of perceived usefulness (PU) of employee’s intention to use a
biometric security technology.
Nature of the Study
The primary intent of this quantitative correlational study was to determine
employee perceptions regarding the use of biometric authentication systems. The
variables perceived ease of use, perceived usefulness, and subjective norm, are constructs
that have been identified from an exhaustive review of the literature of previous studies
involving technology acceptance and security (e.g. Bidgoli, 2012; Ghazizadeh, Lee, &
Boyle, 2012; Huang, & Hsu, 2010; Jones, 2009). All of the variables were measured
with multiple questions using a Likert ordinal scale adapted from published pre-validated
23. 14
instruments measuring perceived ease of use (Venkatesh & Davis, 2000), perceived
usefulness (Venkatest & Davis, 2000), and subjective norm (Davis et al., 1989).
This study was conducted without any variable modification or manipulation.
The design of this study was a quantitative correlational research design, since correlation
research begins with hypotheses that are generated from an existing theory and ends with
an assessment of the relationship among the variables without introducing causality
(Spearing, Connelly, Nghiem, & Pobereskin, 2012). To determine the correlation
between the variables that are established in the six hypotheses, a self-administered
Internet survey was distributed to the target population of 600 LinkedIn connections that
were recruited using probability sampling. With probability sampling, each person in the
target population of 600 users had an equal chance of being selected. The use of a cross-
sectional sample allows for the findings to be generalized to the target population
(Woertman, et al, 2013). An Internet survey was used because of its ability to reach
participants using InMail in LinkedIn. Since respondents can complete the questionnaire
at their leisure, respondents were not feel pressured to answer in a hurried manner.
As survey data had been collected, the information was entered into Microsoft
Excel. Each of the exogenous variables had six questions associated with them. These
six questions were derived by Davis (1989) study of technology acceptance. Likert type
5-point scales ranging from strongly disagree to strongly agree was used as a basis of
questions. The 5-point Likert scale had been used in previous TAM related research
(Jones, 2009). After the data had been collected, a descriptive analysis was performed on
the constructs followed by the development of a structural model. Goodness of fit tests
were performed on the structural model using the IBM SPSS AMOS 23 software package
24. 15
(Teo et al., 2011). The IBM SPPS AMOS 23 software consists of two primary modules:
the first is IBM SPSS Statistics 23, which is used to enter the data that has been collected
and calculate the descriptive statistics. The second is IBM SPSS AMOS 23, a graphical
software that will use the data from the statistics spreadsheet to create the confirmatory
factor model (CFA). The CFA is referred to as measurement model. Once the
measurement model is revised and confirmed, it will be changed to a structural equation
model (SEM)Structural equation model that will test the hypothesized relationships. In
the technology industry, SEM is often used for conducting TAM based research (Noor,
Sreenivasan, & Ismail, 2013; Teo et al., 2011; Venkatesh & Davis, 2000). Confirmatory
factor analysis was used to test the model as to how the variables are interrelated. Each
of the six hypotheses was tested simultaneously using the SEM SPSS Statistics 23and
SPSS AMOS 23 software package. Statistics were generated to analyze the model at
three different levels: (a) the individual item and construct level, (b) the overall fit at the
model level, and (c) the individual path analysis level. SEM model are comprised of both
a measurement model and a structural model. The measurement model relates observed
indicators to latent variables, and the structural model specifies the relationships among
the latent variables on observed variables (Khine, 2013). Confirmatory factor analysis
(CFA) is often used to test the measurement model.
Significance of the Study
The successful implementation of new technology related to security is vital to the
success of any business (Dezdar, & Ainin, 2011). New technologies and systems
improve performance and allow organizations to compete in the global economy. Since
employees are the actual users of security technologies, their acceptance and usage of the
25. 16
systems in a favorable manner is critical to the survival of the business (Çakmak, Benk,
& Budak, 2011). The results of this research may help organizations understand the
factors that enhance employee adoption, use and compliance with information security
measures and to foster a positive attitude toward these systems. The adoption of
information security measures may also help organizations realize the potential benefits
of the technology. Corporate wide adoption of security measures can have a significant
financial benefit, since the acceptance and usage of the technology will decrease security
breaches. In this research study, the TAM variables: perceived ease of use, perceived
usefulness, and subjective norm are assessed to determine the extent to which each of
these variables influence security technology adoption in organizations that currently use
biometrics, or are in the process of evaluating them.
From a research perspective, there have been many studies that have examined
technology acceptance of various types of software systems (Bidgoli, 2012; Ghazizadeh,
Lee, & Boyle, 2012; Huang, & Hsu, 2010; Jones, 2009). Very few studies have
examined information security acceptance and its impact on an organization (Jones,
2009). This study attempted to bridge the gap by examining factors that affect employee
acceptance and adoption of biometric information security measures. This study
contributed to the literature on technology adoption of information security, particularly
in the area of biometrics. Potential users are encouraged to use a technology if they
believe it is easy to use, useful, and that others have accepted the benefits of the
technology. The results of this study helped increase the knowledge about the factors
that affect employee perceptions and their decision to adopt biometric security
26. 17
technologies, which are important for businesses that are looking to implement tighter
security protocols consisting of biometrics.
Definition of Key Terms
The following section represents definitions of significant terms and concepts that
are used through the study.
Attitude. Attitude is a learned tendency to evaluate objects using a certain
method. Attitudes have three components: affective, behavioral, and cognitive.
Affective refers to an individual’s feelings toward an object. Cognitive represents a
person’s awareness and knowledge of an object. Behavioral refers to the intention to act
in a certain way towards something. In the TAM model, attitude is a person’s general
feeling of acceptance or rejection toward the stimuli (Ajzen & Fishbein, 1980).
Behavioral intention. Behavioral Intention is defined as a person’s perceived
likelihood that they will engage in a particular behavior. Behavioral intention is one of
the most accurate predictors of behavior (Ajzen, 1991).
Biometric technology. Biometrics is used to uniquely identify individuals using
a characteristic such as a fingerprint. There are two categories of biometrics:
physiological and behavioral. Physiological characteristics are related to the shape of the
body, for example fingerprints, palm prints, facial recognition, and retina scans.
Behavioral characteristics refer to a pattern of behavior; such as someone’s voice, gait, or
typing rhythm (Harper, 2011).
Endogenous variables. Endogenous variables are defined as a factor in a causal
model whose value is to be determined by the states of the other associated variables in
the system. A variable is said to be endogenous if its value is influenced by one or more
27. 18
independent variables (Antwi, Boadi, & Koranteng, 2014).
Exogenous variables. Exogenous variables are defined as a factor in a causal
model whose value is independent from the other states of variables in the system. A
variable can be made exogenous by incorporating causal relations and additional other
factors in the model (Antwi et al., 2014).
External variables. External variables are additional factors that are outside the
scope of the original TAM, such as situational constraints, individual behavior, and peer
interventions that could affect behavior. These variables would be determinants of
perceived usefulness, perceived ease of use, and subjective norm (Jaber & Al-khawaldeh,
2014).
Perceived ease of use. The term Perceived Ease of Use is one of the original
components of the TAM model (Davis, 1989). Perceived ease of use refers to an
individual’s acceptance and belief that using a technology will be free from cognitive
effort (McDaniel, 2011).
Perceived usefulness. The term Perceived Usefulness is one of the original
components of the TAM model (Davis, 1989). Perceived usefulness is defined as the
degree to which a person believes that using a technology will improve their performance
(Riley, Buckner, Johnson, & Benyon, 2009.
Perceptions. Perceptions are sensory experiences of the environment around us
and involve recognition of stimuli and actions in response to the stimuli (Seijts &
Roberts, 2011). In the TAM model, employee perceptions are attitudes and opinions on
the use of new technology. These opinions and attitudes stem from prior experience,
religious implications, social experiences, peers, and upper management.
28. 19
Subjective norm. The term Subjective norm refers to a person’s own estimation
of the social pressure involved to perform or not perform a particular behavior (Zhang,
Fang, Wei, & Wang, 2012).
Technology. The term technology is defined as the use of methods or
instruments in an organization to enhance existing business processes or solve a problem.
Examples of technology are automated timesheet applications, content management
systems, learning management systems, email applications, records management systems,
and security systems (Spence, 2011).
Technology Acceptance Model. The (TAM) is an extension of Ajzen and
Fishbein’s Theory of Reasoned Action (TRA; Ajzen & Fishbein, 1980). TAM was
originally developed by Fred Davis (Davis, 1989). The original TAM model consisted of
two technology acceptance measures: Perceived Ease of Use and Perceived Usefulness.
The model was later extended in 2000 by Venkatesh to include Subjective Norm
(Venkatesh, 2000).
Theory of Reasoned Action (TRA). The TRA states that attitudes are
influenced by a person’s beliefs resulting in behaviors about the level of intentions
(Ajzen, 2011).
Training. Training is the face-to-face or online support provided to employees to
learn new technology. This support can be demonstrated via simulations or hands-on but
is offered at an expense to the organization (Sundman & Johansson, 2012)
Validity. Validity in data collection means that the findings in the study are a
true representation of the phenomenon that is being measured (Giaretta & Spolaore,
2012).
29. 20
Summary
Biometrics has been shown to be a proven technique for authenticating users
(Arutyunov & Natkin, 2010). Biometrics current use in government and law enforcement
agencies demonstrate that it is a reliable technology that works (Bright, 2011). As
organizations battle with the ongoing challenge of security breaches, biometrics offers
enhanced technology that can help prevent internal and external security threats. The use
of new technology, however, often imposes issues with users who are not willing to
accept and adapt to change (Ajzen & Fishbein, 1980). Upper management has a need to
understand the factors that promote user acceptance of new technology (Ajzen, 2011).
The impact of non-acceptance by the user community has shown the adoption process
often fails. TAM is a proven model. The research applied the TAM model to the
implementation of biometric authentication (Riley et al., 2009).
30. 21
Chapter 2: Literature Review
The purpose of this quantitative correlational study was to examine employee
perceptions regarding the use of biometric authentication systems that will be
implemented in information technology, using TAM as the theoretical framework. The
objective of the literature review was to gain a better understanding of the factors that
affect employee perceptions during the adoption of biometric authentication. This study
was valuable because of the increase in security breaches that have occurred within
organizations that perform business on the Internet. The implementation of biometric
security systems is important for preventing and controlling identity theft.
The literature review begins with an overview of the technology acceptance
models, followed by technology acceptance theory related to biometrics and new
technologies within the workplace. The influence on employee perceptions and
organizational success was also summarized. The existing literature of biometrics was
examined, with an emphasis on biometrics in the work environment.
Documentation
In an effort to maximize the literature review, many different popular scholarly
search databases were used; these include ProQuest, EBSCOHOST, ERIC, SAGE
Journals, and Wiley Online Library. The keyword searches were based on terminology
associated with biometrics and technology acceptance. The method used to search for
relevant literature included the use of phrases, key word, and titles. In addition, other
selected literature was obtained from various doctoral dissertations on the subject and
concepts relevant to the topic of study.
31. 22
Information Security
Information security is defined as the extent to which an organization is free from
the disclosure and destruction of data due to unauthorized access (Hedström, Karlsson, &
Kolkowska, 2013). The review of the literature explains that information security is
broken down into three dimensions: availability, integrity, and confidentiality (Chen, Lo,
& Yeh, 2012). Confidentiality refers to the extent to which organizational information is
prevented from being exposed, disclosed or appropriated. The premise behind
information confidentiality is that the data remains safe from any type of unauthorized
access, including internal and external boundaries (Berezina, Cobanoglu, Miller, &
Kwansa, 2012). Information integrity is the extent to which information remains
compatible and consistent with its original state once it is stored (Ponnuramu, &
Tamilselvan, 2012). The greater the integrity of information, the lower the chances are of
the data being forged. Information availability is referred to as the extent to which
information is available whenever access is required.
Companies have become more dependent on information systems to increase
business effectiveness and efficiency. However, this increased reliance on information
system technology has breaded opportunities for hackers to breach corporate systems
(Chang, & Wang, 2011). Recent studies reported that the number of information security
incidents has had a significant impact on the U.S. economy (Bojanc & Jerman-Blazic,
2013). Because of the drastic increase in the number of information security breaches
and significant financial losses, organizations have made security a top issue in the
management of corporate information systems. In an effort to enhance information
security, several studies have examined critical factors that influence an organization’s
32. 23
security policy enforcement (Chang, & Wang, 2011; Knapp & Ferrante, 2012). In 2011,
a study by Chang and Wang focused on the theoretical perspective that can help
understand the enhancement of information security, namely the resource based view
(RBV). The perspective behind their theory has been that organizations need to invest
and develop technology resources in order to fend off system breaches (Jang, 2013).
Understanding what influences information security has important practical and
theoretical purposes.
To properly protect information within an organization, it has been determined
that companies develop information security strategies and implement accurate security
measures. An information assurance strategy determines how accurate, reliable, secure
and available organizational assets are aligned with corporate strategies (Cheshire, 2011).
Cheshire (2011) found that various common deficiencies exist within information
assurance in many organizations. Cheshire contended that the process of implementing
an information security strategy should be considered at the same time as system is being
designed. Cheshire’s model integrated concepts from security policy theory, risk
management theory, systems and development theory. There were four phases of the
Cheshire model: elaboration, inception, construction, and transition. During each of the
transition stages, the four steps were analyzed. During inception, an overall analysis of
the existing information security infrastructure was examined. During the elaboration
phase, the system was completely analyzed and defined. The key actions in the
elaboration phase included setting up the security and assurance plans. During the
construction phase, the new system was implemented and modified to fit within the
organization. The construction phase involved a continuous testing process. Finally, the
33. 24
transition phase was where the new security system is brought online and made
functional.
Information security risk management is the process that identifies risks to which
a company is exposed, helps to provide an assessment on the impact of the risk to the
business, and enables organizations to make decisions to eliminate or reduce risk to an
acceptable level (Bojanc & Jerman-Blazic, 2013). Risk management requires a
comprehensive evaluation and identification of a company’s digital assets, the
consequences of cyber-attacks, as well as a cost-benefit analysis of the investments in
security. Upper management has a need to be able to manage security risks in order to
properly develop products that meet consumer demands. Information-security
economics, which is a relatively new field of study, utilizes economic models and theory
to analyze the incentives of organizational stakeholders. An analysis of the investments
in security requires a comparative analysis of the costs and benefits. The cost of an
investment includes the price of the hardware, software, and labor; however, it is very
difficult to quantify the benefits (Jalal-Karim, 2013). Enterprise risk management is the
process of managing security breaches with emphasis on controlling, identifying, and
eliminating uncertainties that could prevent a business from being successful.
The primary goal of information security is to prevent unauthorized usage of a
corporate computing system (Nhlanhla & Birch, 2011). The key activities within
information security management are: development of a security policy; assignment of
roles and responsibilities; and the training of personnel on how to use the security
policies (Järveläinen, 2012). The main objective of a security policy is to ensure the
integrity, availability, and confidentiality within information technology. Organization
34. 25
must be able to monitor employee actions, in an effort to protect and guard against
security violations and unauthorized access. Employees must be properly trained on how
to use the security technologies to comply with information security policies (Renaud &
Goucher, 2012).
As the use of information technology continues to grow, controls are needed to
protect an organization from possible computer crime. Chaudhry and Reese (2012),
developed a conceptual model for enterprise information security that stems from four
main pillars: security policy, access control, security awareness, and upper management
support. Their study focused on the problem of organizations storing their information in
one location. This practice increases the chance of intrusions which frequently results in
poor reliability, continuity disruption, and lowered efficiency of processes. Research on
this topic is important because of the current paradigm shift that businesses have been
currently facing. Up until recently, the majority of research performed within the
enterprise information security arena has focused on the technical aspect, such as
firewalls, and anti-virus software (Serova, 2012; Sehgal et al., 2011).
Many companies are in agreement that information security has changed from a
technology centered problem to a management issue that requires the involvement of
upper management (Tsohou, Karyda, Kokolakis, & Kiountouzis, 2012). Recent studies
have concluded that information security should contain five elements that include: (a)
implementing a corporate policy that provides an information security mission statement
that is understood and read by all employees; (b) identifying key personnel that are
responsible for the oversight of the security program; (c) inventory assets to identify
sensitive information and critical components; (d) organizational business reasons
35. 26
highlighting the separation of duty policies, need to know, and privilege hierarchy; and
(e) upper management support for the goals and objectives of the information security
implementation (Njenga & Brown, 2012; Olusegun & Ithnin, 2013).
To strengthen information security technology organizations, there is a need to
define security blueprints, define standard processes that deal with security compliance,
and to plan for identity and access management to monitor and audit employee activity
(Kruger, & Mavis, 2012). Tavakol, and Dennick (2011) performed a study on the
relationship between information security awareness and behavior by analyzing data that
they collected from a Web based Internet survey in Japan. The research participants of
the survey were people who had been working for more than two years for the same
company. Fifty questions were administered with topics such as attitude toward risks and
information security awareness. Two hypotheses were tested: (a) individuals who
understand problematic behavior do not take such problematic behaviors; and (b)
individuals who understand the necessity to collect information security take such
behaviors. An analysis of Spearman’s rank correlation coefficient was performed. In
addition, a Mann-Whitney rank sum test was also performed. Both studies were aimed at
the security awareness of organizations that implement security policies to help prevent
information leaks (Fan, & Datta, 2013). The results of the analysis concluded that many
employees break rules even if the organization implements security policies.
To help organizations comply with nation-wide security standards, the Internal
Standards Organization (ISO) and the International Electrotechnical Commission (IEC)
developed a series of security standards (Disterer, 2013). One of these standards is the
ISO 27000 family of security protocols. The ISO 27000 is a specification that indicates
36. 27
specific requirements that can audited and certified which must be followed by
organizations if they are to maintain their certification standards. One of the key features
of the standards is that they are generic enough to be applied to any organization. The
key concepts of the standards are: (a) organizations are encouraged to perform
assessments of their own security risks; (b) organizations should implement proper
security controls based on their needs; (c) the standards should be used for guidance; (d)
use the Plan, Do, Check, and Act Model, and implement continuous feedback; and (e)
continually assess threats and risks to information security issues (Gillies, 2011).
Security policies are a critical safeguard that provide employees with valuable
information on how they should behave in an effort to protect organizational assets.
Knapp and Ferrante (2012) found that to minimize the probability of information security
incidents, organizations need to be motivated to enforce, communicate, and maintain
security policies. The study investigated a model that explored the impact of policy
awareness, maintenance and enforcement on information security policies. In the
research model, effectiveness to capture information security objectives is measured.
Security effectiveness can often be difficult to measure, because it is challenging to
discover if the hard data is accurate and precise. Organization often face financial losses
and reputational damage if they disclose security incidents, thus many incidents go
unreported (Kaplan, Pope, & Samuels, 2011). In the study by Knapp, rather than
collecting hard numerical data, effectiveness was measured using the judgment of
information security specialists. The variables of the study were: policy awareness,
policy enforcement, and policy maintenance. The participants were all individuals that
possessed the Certified Information System Security Professional (CISSP) certification.
37. 28
SEM was used to analyze the hypotheses, the results indicated that all of the predictor
variables were significant in the cause of the outcome variable: effectiveness.
Concept and Theory of Acceptance
User acceptance is defined as the willingness of an individual to utilize
information technology for the tasks for which it was designed (Show-Hui & Hsu, 2010).
User acceptance is a critical component to the success of new information systems.
Users are often unwilling to use a new technology even if the system promises to yield
significant performance gains in productivity (Pasaoglu, 2011). Both practitioners and
researchers have an interest in understanding why users accept new technology so that
standards for evaluating, designing, and predicting how users will respond to new
technology can be interpreted. Previously, designers of new technology relied on upper
management to encourage workers to accept technology by means of financial rewards.
As technology use increases across our society and organizations become more
dependent on new technology, concerns regarding how information systems will be
designed has increased exponentially (Bienstock & Royne, 2010).
Researchers have studied a wide range of issues surrounding technology
acceptance, from individual user behavior such as cognitive style to internal beliefs and
impacts of usage (Kim, 2012). Acceptance has previously been viewed as a function of
user’s participation in system development or as a measure of the political state of affairs
in an organization. The various types of development processes used and the processes
by which technology are implemented have also been studied (Ghazizadeh et al., 2012).
None of these variables have been able to account for an acceptable level of variance in
acceptance to enable the researcher to predict acceptance reliably. There are, however,
38. 29
distinct patterns in the literature that suggest the issue is not hard to control, and several
variables have been proposed.
Teo, Ursavas, and Bahçekapili (2011) examined the efficiency of the TAM to
explain teachers’ intentions to use technology in Turkey. With the increase of
information and communication technologies used at the institutional level, change has
taken place in education. It is believed that training teachers to use an integrated
technology within the education system could be effectively designed at an early stage.
The predictor variables in this study were: (a) perceived usefulness, and (b) perceived
ease of use. The dependent variables were attitudes toward computer use and intention to
use. Structural equation modeling was utilized, since it lends itself to testing and
validating models that include latent and observed variables. The participants in the study
were 197 pre-service teachers at Rize University in Turkey. The mean age of the sample
was 19.40 years, and 55% were females.
A questionnaire was designed that consisted of two sections; the first required
participants to provide demographic information and the second contained 18 statements
on the seven constructs. Perceived usefulness had three items, perceived ease of use had
three items, attitudes toward computer use had three items, and intention to use had two
items. Each item was measured on a 5-point Likert type scale with values ranging from 1
(strongly disagree) to 5 (strongly agree). The Cronbach alphas were .940 for perceived
usefulness; .951 for perceived ease of use; .899 for attitude toward computer use, and
.832 for intention to use. The model was tested using AMOS 17.0. There were five
hypotheses tested; of these, four were supported. Attitude towards computer use did not
have a significant impact on intention to use. In examining the relationship among the
39. 30
constructs, the results were significant and consistent with Davis (1989); the role of
attitude was only modest in predicting technology acceptance. The limitations of the
study include the variance in intention to use, which was only explained by 51% of the
variance using three variables. Future studies may include other variables, such as those
that impact the exogenous variables. The data in the study were also self-reported and
possibly susceptible to inflation.
In a study by Çakmak, Benk, and Budak (2011), the researchers utilize the TAM
model as a theoretical framework to extend and complement the acceptance of
technology components of a tax automation system (VEDOP), in Turkey. Since tax
officials had to use the VEDOP system to perform their job functions; unaccepted change
in an organization may negatively affect employee job satisfaction, attitudes towards
upper management, and loyalty within the organization. Sabotage and unfaithful
allocations of technology and the resulting costs to organizations is a potential risk that
needs to be prevented. TRA (Azjen & Fishbein, 1980) assumes that beliefs toward a
behavior are based on the individual’s prior experience. TRA contains two core
constructs of intention: attitudes toward behavior and SN. The attitude toward behavior
is based on the user’s previous attitude toward performing the behavior. An individual,
who strongly believes that the outcome will be positive for performing a particular
behavior, will have positive attitudes toward the behavior and vice-versa, if the user has
negative attitudes toward the behavior, then there will be negative attitudes. Subjective
Norm is the social pressure to perform a particular behavior. The idea of SN posits that
what other individuals or peer groups think about a particular behavior will influence the
decision of the individual (Ghazizadeh et al., 2012).
40. 31
In this study, five hypotheses were examined. Each of the hypotheses dealt with
perceptions to use and ease of use cross-referenced with behavior intention. The
participants in the study were 185 tax officers who were employed by the tax offices in
Turkey. The survey questionnaire was administered that consisted of 17 statements on
perceived usefulness, perceived ease of use, attitude toward use, and behavioral intention.
Participants answered the questions using a 7-point Likert type scale, ranging from 1
(strongly disagree) to 7 (strongly agree). The statistical analysis involved examining the
descriptive statistics and accessing the reliability and validity of the measures. In the
research model, both convergent and discriminant validity were examined. The internal
consistency was measured using Cronbach’s alpha coefficient for each construct.
Discriminant validity was evaluated by comparing the square root of the average variance
extracted for each construct. SEM was used to test the data. This technique was chosen
for its ability to examine a series of dependent relationships.
All five of the hypotheses were supported by the data. The findings indicated that
perceived usefulness significantly influenced perceived ease of use (β = 0.44, p < 0.001),
Perceived ease of use significantly influenced attitude toward use, perceived usefulness
significantly influenced attitude toward use and behavioral intention. The limitations of
the study included sample size; the 185 sample size was quite small and not significantly
representative of the population, since the sample covered only one city in Turkey.
Second, although theoretical background was discussed in the literature review, the
analysis only involved discussing the TAM constructs perceived usefulness and
perceived ease of use.
41. 32
Jones, McCarthy, Halawi, and Mujtaba (2010) studied factors that affect
employee acceptance of information security measures by extending the TAM.
Managers must understand that threats of information security breaches are real, and they
must ensure that appropriate security policies, procedures, and measures are in place and
that these measures are communicated to employees and reinforced throughout the
organization. Destruction or loss of information security systems can affect a company’s
financial bottom line as well as affect their reputation and market share. Given the huge
negative impact on organizations finance and goals, companies are advised to develop
procedures to better measure the impact of information security breaches.
In the study, three research questions were addressed: (a) do employee
perceptions regarding information security affect the intention to use those measures? (b)
do the beliefs of others about the use of information security measures affect employee
perceptions and the intention to use those systems? (c) does management support affect
user perception and the intention to use information security systems? The TAM model
was extended to examine the adoption of security measures. The predictor variables in
the model were perceived usefulness, perceived ease of use, and subjective norm. The
dependent variable was the intention to use the information security measures.
A questionnaire was developed to test the hypotheses. The theoretical constraints
were operationalized and measured using items derived from prior research studies. The
questionnaire was designed and presented using Survey Monkey™. The target
population was employees who work for companies that implement information security
measures. A sample size of one hundred and seventy four participants was obtained for
analysis. Partial least squares were used to analyze the data and test the hypotheses. The
42. 33
measurement model consisted of relationships between the conceptual factors and
measures underlying the constructs. Structural Equation Modeling was used to analyze
how well the theoretical model predicted relationships. Perceived usefulness and
perceived ease of use had a positive and statistically significant effect on intention to use.
Perceived ease of use had a significant effect on perceived usefulness.
Limitations of the study included the participant sample, which consisted of
employees who worked for companies in the U.S. and Canada. Self-reported data had
been also used in the study, which often creates a concern since many users have
difficulties rating themselves (Barge & Gehlbach, 2012). To remedy the issues with self-
reported data collection some researchers have started to utilize techniques such as the
Harman one-factor test (Miller, 2009). In the Harman one-factor test all of the variables
are entered into a factor analysis, then the results are examined to determine the number
of factors that are necessary to remedy the variance. Recommendations for further
research include using the TAM model to take into account employee attitudes. Another
recommendation was to conduct an empirical study using the Theory of Planned
Behavior as the theoretical framework, since subjective norm and attitude are key
constructs in this theory.
Theory of Reasoned Action
The TRA was developed by Fishbein and Ajzen (1975) using the behavioral
theory as its base model. According to the theory, the primary predictor of information
technology behavior is the intention to use the technology. TRA takes into consideration
the cognitive qualities of behavior and assumes that individuals are rational, and the
behaviors they exhibit are under volitional control (Madden, Ellen, & Ajzen, 1992;
43. 34
Ajzen, 2002). The Theory of Reasoned Action, accepts as an antecedent the intention
towards performing a certain behavior (Ajzen & Fishbein, 2005). Intention involves the
willingness of individuals to realize certain behavior (Chen, Chen and Kinshuk, 2009).
Because of its success and proven validity, TRA has been used in a broad array of
disciplines. TRA has been used to study ethics, information technology usage,
information sharing, marketing, health management, and renewable energy (Bang,
Ellinger, Hadimarcou, & Traichal, 2000). As shown in Figure 1, the TRA is a social
psychology model that examines determinants of intended behaviors.
Figure 1. The Theory of Reasoned Action Diagram. Reprinted from User acceptance of
computer technology: A comparison of two theoretical models by Davis, F. D., Bagozzi,
R. P., & Warshaw, P. R. (1989).
44. 35
Behavioral intention is defined as a measure of the strength of an individual’s
intention to perform in a certain behavior (Davis et al., 1989). Attitude is defined as an
individual’s positive or negative feelings about performing a certain behavior (Davis et
al., 1989). Subjective norm refers to the social pressure to perform or not perform a
specific behavior (Ajzen, 1991). Behavioral Intention (BI) is a linear function of the
sums of attitude (A) and SN. The TRA states that an individual’s behavior toward a
behavior is determined by their beliefs that performing the behavior will result in a
certain consequence. Evaluation term refers to the implicit evaluation to an outcome
(Fishbein & Ajzen, 1975). An individual who believes that performing a specific
behavior will lead to a positive outcome will have positive attitudes toward that behavior,
and conversely, if that same individual believes a negative outcome will result from
performing a behavior, the person will have a negative attitude towards the behavior
(Fishbein & Ajzen, 1975).
According to the TRA, a person’s subjective norm is determined by the sum of
the person’s normative beliefs, that is, the person’s peer’s expectations, multiplied by the
motivation to abide by those expectations (Davis et al., 1989). According to Davis, the
TRA is a generic model and does not state the beliefs for any particular behavior.
Because of this model, it is recommended that researchers should identify the belief
constructs for a particular behavior. Fishbein and Ajzen (1975) suggested that between
five and nine beliefs are sufficient to determine an individual’s attitude toward a certain
behavior. The TRA is limited to the assessment of human behavior in situations where
individual actions are mandatory (Ajzen, 1991).
45. 36
Yilmaz, Aktas, Özer, and Özcan (2013) conducted a study that investigated
factors affecting information technology usage behavior of tax office employees in the
Black Sea Region of Turkey. Data from 133 tax office employees was gathered through
a questionnaire that was formed using a 5-point Likert-type scale. The research model
was developed using the TRA. In this study the TRA was used as a starting point in an
effort to understand technology usage behavior of tax office employees. In accordance
with the theory, it is proposed that the intention of employees toward technology usage is
the single determinant factor of technology usage behavior. It is assumed if employees
have a positive intention, they are more likely to use technology in their job. The data
had been analyzed using SPSS. Factor, correlation and regression, and reliability were
conducted to formulate relationships between variables. The Kaiser Meyer-Olkin (KMO)
and Barlett tests verified the factor analysis. Reliability was measured using Cronbach’s
α value of variables. Correlation analysis was performed to examine the direction and
intensity of relations between the variables. Two regression models were developed to
test the hypotheses. The first model was developed to test the relationship between the
intention of employees and technology usage. The results indicated that the relationship
between intention of employees and their technology usage are statistically significant.
The second regression model explores the relationship between attitude and subjective
norm of employees and technology usage behavior. Again the results were statistically
significant (attitude: β =0.372; p=0.00; SN: β = 0.193; p=0.00).
Theory of Planned Behavior
The Theory of Planned Behavior (TPB) is an extension of the TRA (Ajzen, 1991).
One of the primary factors of the theory is a person’s intention to perform a given
46. 37
behavior. Ajzen (1991) suggested that individual behavior is driven by intentions which
are a function of a person’s attitude toward behavior, the subjective norms that surround
the behavioral performance, and an individual’s perception of how easily a certain
behavior can be performed. In the study by Ajzen (1991), the independent variables were
attitude toward behavior, perceived behavior, and subjective norm. The dependent
variables were behavioral behavior and intention. Attitude toward behavior is an
individual’s feelings about a behavior. SN refers to the social pressure to perform or not
perform a particular behavior. The degree of perceived behavioral control refers to the
difficulty of performing the behavior. According to the TPB, the more favorable the
subjective norm and attitude, the higher the perceived behavior and the stronger the
behavioral intention will be (Ajzen, 1991). The model for the Theory of Planned
Behavior is show in Figure 2.
Figure 2. The Theory of Planned Behavior Model (Ajzen, 2006)
According to the TPB, behavioral intentions to perform different kinds of
behaviors can be predicted by subjective norm, attitude toward the behavior, and
47. 38
perceived behavioral control. Ajzen (1991) explained that perceived behavioral control
(PCB) exhibits beliefs toward opportunities needed to perform a behavior. Perceived
behavioral control is derived from the sum of control beliefs (cbk) multiplied by
perceived facilitation (pfk). A central factor in the TPB is an individual’s intention to
perform a certain behavior. Intentions capture the motivational factors that tend to
influence behavior, such as how hard people exert themselves and how much of an effort
they plan to exert to perform a behavior (Ajzen, 1991).
Burns and Roberts (2013) performed a study on cyber-crime that examines the
utility of the Theory of Planned Behavior in predicting online behaviors. The research
advanced knowledge by applying the TPB model to predicting general online behavior
rather than individual behavior. The study used a cross-sectional correlation design using
online behavior as the criterion variable. The predictor variables were SN, attitudes, and
perceived behavior control. A priori power analysis based on data from prior studies, Yao
and Linz’s (2008), produced an estimated sample level of 50 participants needed to detect
significant effects at an alpha level of 0.05. Participants were recruited using
advertisements on academic and social networking sites. Online behavior was measured
using a version of the General Caution Protection Scales (Buchanan, Paine, Joinson, &
Reips, 2007). The Caution scales measure the frequency of general behavior. An online
survey questionnaire using SurveyMonkey was submitted to 150 participants. Bivariate
correlations were computed to test the assumptions of the mediation models. The model
explained 81% of the variance in online safety behaviors. The findings indicate a
significant relationship between subjective norm and intention, which suggested that
48. 39
influence from external individuals had a strong bearing on whether a person engages in
protective behavior.
Lwin and Williams (2003) investigated the reasons behind why online users
disguise their identity. A conceptual model was developed from two existing theoretical
frameworks: (a) Lauder and Wolfe’s Multidimensional Approach to Privacy, and (b)
Ajzen’s TPB. An empirical study was conducted using SEM to test the conceptual
model. The results demonstrated that perceived behavioral control, attitudes, and
perceived moral obligations were significant instigators of fabrication, while subjective
norm was not.
Technology Acceptance Model
The TAM addresses user acceptance of information technology related systems.
TAM is one of the most widely used models of user acceptance that has been applied and
validated across multiple technologies and populations through previous research
(Ghazizadeh et al., 2012). The principles behind the TAM model are that the more users
willing to accept new technology, the more likely they will be to modify their existing
behaviors to adapt to the new environment (Davis, 1989). Davis (1989) proposed that
perceptions of usefulness and ease of use were key factors in user’s intentions to adopt
new technology. The effects of external variables were mediated by perceived usefulness
and perceived ease of use. Perceived usefulness refers to the inclination to use or not use
a new technology based on the user’s belief that it will enhance their productivity (David,
1989). Perceived ease of use refers to the level of effort the user must exert in using the
new technology to perform their job (David, 1989).
Davis (1989) conducted two different studies using the TAM. The first study
49. 40
consisted of a group of 120 users from IBM, who responded to a survey to rate the ease
of use and usefulness of their email system. The second study involved 40 students from
a Boston University MBA program, whose task it was to evaluate two new graphical
systems and respond to a survey. The results of the studies concluded that perceived ease
of use and perceived usefulness have a significant impact on the usage of the system. In
both studies perceived usefulness rated higher than perceived ease of use, as more users
were motivated to use a system if it provides more functionality, regardless of the
difficulty.
In the past decade, there have been over 100 studies that have implemented the
TAM as a theoretical framework for the acceptance of new technology. Of these studies,
the majority have been performed in the United States. Based on a review of the
literature, the results are somewhat conflicting in terms of the key components of
technology acceptance. Only a few studies fully implemented all five constructs that
were from the original TAM model (Davis, 1989). The majority of the studies found that
perceived ease of use and perceived usefulness were the most important variables in
predicting intentions to use new technology (Jiang, Chen, & Lai, 2010).
Mutlu and Efeoglu (2013) investigated email usage by using the Extended
Technology Acceptance Model (TAM2) (Mutlu & Efeoglu, 2013) and tested the effects
of cultural values between subjective norm and behavioral intention/perceived usefulness.
The improvements in communication technologies have become widespread in many
companies. The research questions of this study were: How is the usage of email
evaluated by TAM2 and what are the moderating effects of cultural values between
subjective norm and behavioral intention/perceived usefulness?
50. 41
Field research was used in the study as a research strategy. The survey was
conducted with 321 participants that had access to email during business hours and
worked in a Turkish bank. The scales used in this research measured TAM2 and
Espoused Natural Cultural Values. These scales were originally developed by Davis
(1989) and extended by Venkatesh and Davis (2000). The scale developed by Dorfmann
and Howell (1988) was used to measure espoused national cultural values. SEM was
used for the analysis of the data. Perceived usefulness was both a dependent and
independent variable in the research. The results of the study indicated that perceived
usefulness and perceived ease of use had positive effects on email usage behavioral
intentions. Perceived ease of use and subjective norm had positive effects on perceived
usefulness. Subjective norm affected perceived usefulness stronger than perceived ease
of use. The limitations of the study included that the sample originated from only a
single organization. The fact that only email was examined reduced the ability to apply
the findings to other communication products. Due to the fact that easy usage of
communication technologies affected perceived usefulness and behavioral intention, it
was considered that user friendly technologies should be prioritized. The original TAM
included attitude toward using a system as shown in Figure 3.
51. 42
Figure 3. Technology Acceptance Model Diagram (Venkatesh & Davis, 1996)
During the first 10 years of the TAM, perceived usefulness has been a strong
determinant of usage intention, with regression coefficients typically around β =.06.
Since perceived ease of use has less of an effect on behavioral intention, Davis and
Venkatesh (2000) looked to find the antecendents of percieved usefulness and how it
varied with time and experience using technology. While some researchers have studied
the determinants of perceived ease of use, more often than not the determinants of
perceived usefulness have been overlooked. Because of this oversight, Venkatesh and
Davis extended the TAM to what is referred to as TAM2 as shown in Figure 4.
Figure 4. TAM2 Diagram (Venkatesh & Davis, 2000)
52. 43
Using the TAM as a model, for TAM2, additional theoretical constructs
consisting of social influence and cognitive instrumental processes were incorporated.
Additionally, Venkatesh and Davis discovered that extending TAM2 showed that
subjective norm exerted a direct effect on behavioral intentions.
TAM and Information Security
New challenges continue to emerge in the process of protecting data in networked
information systems as more users and organizations reap the benefits from the adoption
of information technologies (Sun, Ahluwalia, & Koong, 2011). Many of these challenges
arise because of the ease of which data can be duplicated and deployed by distributed
data sources, resulting in an increase of unauthorized access by cyber-terrorism. Existing
literature suggests that individuals are concerned about their privacy and want to have
complete control over their own data (Norberg, Horne, & Horne, 2007)). Organizations
face challenges as more individuals have access to data that is stored on interconnected
data networks. A study in 2003 found that over 29 percent of those interviewed had
experienced a breach of unauthorized data (Schwartz & Treanor, 2003). Organizations
employ various security measures to protect their data, the most widely used method is
through the use of a username and password. In recent years more advanced techniques
such as biometrics have been proposed, such systems require the authentication of users
through fingerprint matching, facial recognition, or voice recognition techniques.
Aurigemma (2013) performed a study that provided a theoretical framework that
discovered key factors that impact employee behavioral intention to comply with security
policies. The theoretical framework was tested in a real-world environment using a well-
defined set of security policies. The study also evaluated how behavior intent to obey
53. 44
security policies is a varying target for employees for both specific guidelines and general
compliance policies. The study found that the primary factors that affect behavioral
intent (SN, attitude, perceived behavioral control, self-efficacy, and organizational
commitment) had strong relationships with the intent to comply with information security
policies. However, when the various factors that affect behavior intent and attitude were
evaluated for a specific security threat, individual factor significance and importance
varied significantly. The results of the study indicated that threat is an essential factor in
the identification of roles for specific behavior antecedents.
Hernandez, Jimenez, and Martin (2008) performed a study to analyze current
and future organizational use of new technologies, such as management software, using
the TAM optimized with experience from other Internet based technologies. The study
examined the relationship among companies to see if there exists a moderating effect
within the industry. The study had two objectives: (a) to extend the TAM model to the
business environment, and (b) to analyze if the model displays differences among
economic sectors. Two hundred and fifty seven participants were selected from a sample
of companies in the Spanish technology sector. A questionnaire was distributed via
email, the items were selected using a 7-point Likert scale. To measure reliability and
validity, a confirmatory factor analysis (CFA) that contains all of the constructs was
estimated using EQS (Bentler, 1995). Eight hypotheses were defined that emphasized the
constructs: perceived ease of use, perceived usefulness, intensity of use, and future use.
The results from the study verified that the moderating effect of industry can be observed
in two relationships: (a) the influence of ease of use on intensity of use, and (b) the
influence of intensity on future use. The results have important implications for
54. 45
managers. The significance of information technological compatibility means that
organizations should be aware the relationships between interrelated technologies.
User behavior and Information Technology
The TRA (Ajzen & Fishbein, 1980) and the TAM (Davis, 1989) are two of the
most popular models for the study of information technology and user behavior. Since
TAM derives from TRA, TAM is generally applied to the principles of user behavior
where the user has control. Individualism is an important variable that affects new
technology acceptance by users (Jiang et al., 2010). Computer knowledge and self-
efficacy have often been used to explain differences among individuals. In a study by
Davis and Venkatesh (1996), the researchers concluded that perceived ease of use of
users to use the information technology system was significantly affected by their self-
efficacy. TAM suggests that the SN is a critical factor that affects user attitude and
intention. SN is generally defined as the acceptance based on the support by supervisors,
colleagues, and top management (Jones et al., 2010).
The TRA theory posits that individuals give higher evaluation scores, not because
of the technological characteristics of the system, but because of how the system fulfills
the needs of the user in performing their job. TRA is a theory that relates individual
behavior and attitude while performing an activity. TRA is the basis for TAM, the
psychological theory that explains individual attitude of information systems that are
based on attitudes, beliefs, and user relationships. Goodhue and Thomson ((1995)
proposed a model of technology compatibility between task and technology in an effort
to identify user needs, time lines to complete work, data access times, ease of use of the
operating system, and reliability of the technology. Jogiyanto (2007) explained that
55. 46
information technology needs to be continually developed to increase effectiveness for
users, since the user needs change over time.
In a study by Hariyanto and Suyono (2012), the relationship between perceptions
of usefulness, the perception of ease of use, user attitudes, and behavior among user
intentions to using a new accounting information system, was examined. The successful
development of accounting information systems is dependent on user satisfaction
(Hariyanto & Suyono, 2012). Many government agencies have purchased new
accounting systems, but have not implemented them because of time constraints and user
willingness to accept a new technology. Successful system development not only
depends on the technical ability of an organization, but also depends on user behavior
(Bodnar & Hopwood, 2010). Behavioral aspects of individuals consist of motivation
factors, perceptions of use, perceptions of ease of use, and behaviors surrounding the
relationship between user attitudes and intentions. The successful implementation of new
technology depends on how well the system runs, the ease of use of the system, and the
benefits to the user (Ajzen, 2011).
The population of the study was users of accounting systems at a regional water
company in Indonesia. The research design used an exploratory study using a survey
method. The sampling technique used was purposive sampling, with the criteria that the
individuals were employees of the regional water company in a district that uses
accounting software to generate financial reports. Data had been collected by observing
workers during office hours, and distributing questionnaires to respondents. The
hypotheses testing utilized SEM with partial least squares. The results of the study
yielded that user’s intentions were affected by perceptions of usefulness, attitudes, and
56. 47
user relationships, while user attitudes were affected by perceptions of usefulness and
ease of use.
Limitations of the study included the participant sample, since there was only a
subset of participants from one region of Indonesia it was difficult to assume research
conclusions about other parts of Indonesia. Another limitation of the study was that the
survey method was self-reported during observation periods. Self-reported data suffers
from social pressure ethics which often results in biased data that may conform to the
norm.
Organizational information assets are now exposed to a growing number of
vulnerabilities and threats. The threats come from both external and internal sources.
Normally, external threats are easier to detect compared to internal threats. According to
Hall, Sarkani, and Mazzuchi (2011), internal threats have the capability of causing
considerably more damage to an organization than that of an outside hacker. Insider
threats have more opportunities to access valuable information within an organization.
They also have the knowledge on how to gather information, while at the same time
covering their tracks. Unfortunately, most companies put an emphasis on external
threats, and often ignore the possibility of internal breaches. According to Nicho and
Hendy (2013), many organizations emphasize less protection and control from insider
security threats rather than external ones. Ninety percent of security controls is focused
on external threats. In the Nicho and Hendy (2013) research, it was found that 70% of
fraud was caused by internal threats.
Jaafar and Ajis (2013) found that four factors affect Information Security
Compliance Behavior (ISCB). These four factors include: (a) co-worker socialization;
57. 48
(b) information security perception; (c) computer self-efficacy; and (d) personal
innovativeness. The study determined that information security perception was the
strongest determinant of information security compliance behavior. One of the other
primary findings of the study are that detailed information security plans should be
implemented by top management. Despite the roles and responsibilities within an
organization, all users use the information systems they produce. This study provided
evidence on how the theory of social behavior is combined with individual and
organizational factors.
Organizations and individuals utilize authentication procedures to help protect
their data. Some of the most widely used authentication methods identify a user using a
unique username and password combination. In recent years, more sophisticated
techniques such as biometrics have been proposed and implemented to protect systems
from unauthorized users. The existing literature in user acceptance points to the tension
between users non-compliance with more sophisticated password techniques. Previous
studies have demonstrated that is an organization has no password constraints, users will
select easy to remember user names and passwords (Shafi, Sattar, & Reddy, 2011).
Employee trust in the integrity of information is related to its perceived privacy and
security (Marcelo, Laroche, Marie-Odile, & Eggert, 2012). Because of this relationship,
organizations seek to increase the complexity of their security infrastructure. Sun,
Ahluwalia, and Koong (2011) studied the factors that influence user attitudes toward
various level of security measures that are used to protect data of varying importance. To
capture user attitude, a construct called “information security readiness” (ISR) was
developed. Observations were collected from a laboratory experiment that was based on
58. 49
a 2 by 3 factorial design, utilizing data criticality and security levels as the treatment
variables. The results revealed a nonlinear relationship between security level and ISR.
For high security data, increasing the security level had a positive impact on the ISR, but
only to a level that was perceived appropriate by the participants. For non-sensitive data,
the increase in security protection was perceived as unnecessary.
McDaniel (2011) performed a study on the comparison of the impact of
acceptance on motivation to use information systems. Prior research has investigated
technology acceptance and intrinsic motivation; however, there exists little or no research
on how user’s acceptance will affect their motivation to use information systems. The
theoretical background of the study includes three different types of well-established
research theories. These theories include: (a) motivation dimension; (b) technology
acceptance model; and (c) end user technology support. Motivation was used to control
human action and behavior (Vallerand, 2012). An unmotivated employee has no reason
to use an information security system, however if they are engaged through the use of
training and reinforcement methods they are considered motivated. Prior research in
motivation suggests that individuals may have varying amounts of motivation, as well as
different tendencies toward motivation (Rahman, Mondol, & Ali, 2013). In the
McDaniel’s study, the constructs are: (a) user’s acceptance of system utility; (b) support
for information system use; and (c) personal motivation to use a system. The participants
in the study included employees from a state university. A survey of 288 respondents
was collected and a path analysis was used to test the proposed research model.
Acceptance and support were found to be significant indicators of user’s motivation to
use information security systems.
59. 50
Effects of Perceived Ease of Use
The original TAM developed by Davis (1989), and derived from the TRA, which
formulated that an individual’s decision-making, willingness, attitude, and SN affects
their Behavioral Intentions (BI). According to the TRA, attitude and SN independently
affect intentions, where in the TAM, PU and PEOU are believed to affect an individual’s
attitude. Davis (1989) wrote a foundation paper on TAM that determined there are
various external factors such as situational constraints, managerial interventions, and
individual differences that affect behavior. The impact of external variables on behavior
intention is measured by two beliefs of technology: perceived ease of use and perceived
usefulness. Even though the perceived ease of use construct has been used extensively in
user acceptance research, Davis and Venkatesh (1996) believed that in an effort to
enhance programs that are designed for technology acceptance, it is important that the
antecedents be understood for perceived ease of use. Perceived ease of use has a direct
impact on intention, and an indirect effect on perceived usefulness. Perceived ease of use
is an obstacle that users need to overcome for adoption, acceptance, and usage of
technology systems. The model for perceived ease of use is displayed in Figure 5.