Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
There is growing interest in the rate of eHealth uptake resulting from the increased potential to advance the quality of healthcare services in both the developed and developing countries. Although the implementation of information and communication technology to support healthcare delivery would greatly address the quality and accessibility challenges in healthcare as well as reduction in the cost of healthcare delivery, the adoption of eHealth has not been fully realized. This study aimed at conducting a systematic literature review to establish the factors associated with the adoption of eHealth and propose a context-specific framework for successful adoption of eHealth technologies in developing countries such as Uganda. The systematic literature review process was guided by the Systematic Review Protocol. The review of 29 journals from the period 2009-2021 showed that, although the most widely used frameworks in the developing countries were Technology Adoption Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT) framework and Technology Organization Environment (TOE) framework, there were other salient factors reported by other researchers that contributed to the adoption of eHealth in developing countries. A novel framework for adoption of eHealth in the local context with eight (8) dimensions namely; Sociodemographic, Technology, Information, Socio-cultural, Organization, Governance, Ethical and legal and Financial dimensions is derived and presented as result of the research.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Exploring the behavioral intention to use e-government services: Validating t...Mark Anthony Camilleri
This study explores the online users’ behavioral intention to utilize the governments’ websites and their electronic services. The research methodology validates the measuring items from the unified theory of acceptance and use of technology (UTAUT) to better understand the participants’ attitudes toward their performance expectancy, effort expectancy, social norms, facilitating condition and behavioral intention to use the electronic government (e-gov) services. The findings from the structural equations modeling approach reported a satisfactory fit for this study’s research model. The results suggest that there were highly significant, direct effects from the UTAUT constructs, where the utilitarian motives predicted the online users’ behavioral intentions to use e-gov. Moreover, there were significant moderating influences from the demographic variables, including age, gender and experiences that effected the individuals’ usage of the governments’ online services. In conclusion, this contribution identifies its limitations and suggests possible research avenues to academia.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
There is growing interest in the rate of eHealth uptake resulting from the increased potential to advance the quality of healthcare services in both the developed and developing countries. Although the implementation of information and communication technology to support healthcare delivery would greatly address the quality and accessibility challenges in healthcare as well as reduction in the cost of healthcare delivery, the adoption of eHealth has not been fully realized. This study aimed at conducting a systematic literature review to establish the factors associated with the adoption of eHealth and propose a context-specific framework for successful adoption of eHealth technologies in developing countries such as Uganda. The systematic literature review process was guided by the Systematic Review Protocol. The review of 29 journals from the period 2009-2021 showed that, although the most widely used frameworks in the developing countries were Technology Adoption Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT) framework and Technology Organization Environment (TOE) framework, there were other salient factors reported by other researchers that contributed to the adoption of eHealth in developing countries. A novel framework for adoption of eHealth in the local context with eight (8) dimensions namely; Sociodemographic, Technology, Information, Socio-cultural, Organization, Governance, Ethical and legal and Financial dimensions is derived and presented as result of the research.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Exploring the behavioral intention to use e-government services: Validating t...Mark Anthony Camilleri
This study explores the online users’ behavioral intention to utilize the governments’ websites and their electronic services. The research methodology validates the measuring items from the unified theory of acceptance and use of technology (UTAUT) to better understand the participants’ attitudes toward their performance expectancy, effort expectancy, social norms, facilitating condition and behavioral intention to use the electronic government (e-gov) services. The findings from the structural equations modeling approach reported a satisfactory fit for this study’s research model. The results suggest that there were highly significant, direct effects from the UTAUT constructs, where the utilitarian motives predicted the online users’ behavioral intentions to use e-gov. Moreover, there were significant moderating influences from the demographic variables, including age, gender and experiences that effected the individuals’ usage of the governments’ online services. In conclusion, this contribution identifies its limitations and suggests possible research avenues to academia.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and
adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
Antecedents of Knowledge Management Practices: Case of Malaysian PractitionersjournalBEEI
In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia who work in different sectors and involved in Information Technology (IT) related fields. We proposed a conceptual framework based on the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB) and Unified Theory of Acceptance and Use of Technology (UTAUT) to study their intention and involvement in KM initiatives. The knowledge creation theory (SECI process) was employed to operationalize KM intention and KM behavior. We proposed six independent variables that represent the social-cultural nature of KM as the antecedence of KM intention. These variables are trust, management support, decentralization, IT support, performance expectancy (PE), and effort expectancy (EE). Seventy-four executives from both private and government-linked organizations responded to our online questionnaire. SmartPLS3 was used to run the analysis. The reliability was ensured with the factor loadings, Cronbach’s alpha, Composite Reliability (CR) that met the fit requirement of above 0.6, 0.7 and 0.7 respectively. The convergent validity was confirmed through average variance extracted (AVE) that met the fit requirement of above 0.5. The discriminant validity was assessed by using Fornell and Larcker’s criterion. Finally, the structural model confirmed that only PE of KM, and EE of KM are the significant predictors of KM intention and the KM intention significantly predicts KM behavior. The implications of the findings are discussed in detail at the end of the paper.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
Readiness measurement of IT implementation in Higher Education Institutions i...TELKOMNIKA JOURNAL
This article elaborates the result of the Pilot Study which is related to IT implementation factors at the Higher Education Institution (HEI), a pilot study is used to validate quantitative readiness model of IT implementation. The main objective of this study is examining the factors that influence the readiness of IT implementation in HEI. This study attempts to analyze IT Content factors, Institutional Context, People, Process, Technology, Service Quality and IT Implementation Readiness (ITIR). The sample of data was taken from 150 HEIs throughout Indonesia which was then processed in statistical techniques through PLS-SEM method. The research finding shows that 9 of the 14 hypotheses used as ITIR model construct have a very significant influence on IT implementation on HEI, so that this finding can provide a comprehensive contribution to the literature of ITIR model development.
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
A Study of Technology Acceptance Model (TAM) In Understanding the Efficacy of...inventionjournals
Global usage of automated system in all fields has remarkably increased in the past decades. To understand the extensive usage of the Information system, the study is undertaken where the Technology Acceptance Model (TAM) is used to see the extent to which an Information System (IS) is able to make any HR routine activity in the institution to be automated; whereby, the information obtained is effective and reliable. The study undertook in this article focuses on the reliability test in order to test the reliability of the scale and also the correlation test in order to find the rate of correlation between the various components of the TAM model – Perceived Usefulness (PU), Perceived Ease of Use (PEOU), Attitude towards change (ATU) and Behavioral Intention towards use (BIU). The study indicated that the null hypothesis is accepted where there is significant positive change in the Perceived Ease of Use, Attitude of the User and the Behavioral intention of the user towards using the HRIS tool in any organization. This led to understanding from the study that there is a very high rate of effectiveness in the usage of HRIS tool in any institutions using, which is proved using the TAM model.
In this case study we identify the factors that influence the adoption of a new system in a major company in Saudi Arabia. We develop a theoretical framework to help derive better understanding of system adoption via socio-technical integration.
We formulation of 14 hypotheses that were tested via a survey of 42 system users. Management support and change management were found to be significant factors influencing system adoption. As a result, the 14 null hypotheses were rejected due to their statistical significance (p-value < 0.05). Discussions and recommendations for future research are discussed.
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...QUESTJOURNAL
ABSTRACT: This is a review of theoretical models most recently used in Information Technology adoption research. A literature review approach has been adopted. More than 25 literatures were reviewed in the area of information adoption covering the last 30 years. We identified the strengths and weaknesses of each of the theory used. It is found that Technology Acceptance Model is by far the most used to underpin research work in this area follow by Theory of planned behaviour.
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
Innovative work behavior is likely to be an important need for the increasing performance of the hospital to provide the health public services. Theoretically and empirically, the behaviors be related to employee perception on management support, information technology and employee empowerment. The study aims to determine the effect of management supports and information technology on employee empowerment as well as their impact on the innovative work behaviors of the employee of dr. Zainoel Abidin District Hospital Banda Aceh. The study conducted of 302 employees of the hospital. The data collected by questionnaire and then the data is analyzed by statistical means of structural equation model (SEM). The study found that management support and information technology have a positive and significant effect on the employee empowerment and innovative work behavior. The employee empowerment mediates the effect of management supports and information technology on the innovative work behavior.
The development of information and communication technology (ICT) during the era of the fourth industrial revolution, the impact of the COVID-19 pandemic in 2020, and the government’s call for large-scale social restrictions have led to the emergence of online learning systems (OLS) in higher education. This study develops a measurement model for the success of OLS based on the DeLone & McLean model. Surveys were conducted on a sample of 175 students from domestic and international universities. Data processing used the partial least squares structural equation modeling or PLS-SEM method, and root cause analysis. The results show that platform quality has a positive influence on OLS success, whether mediated by user satisfaction or OLS usage. Social influence has a positive effect on OLS success, mediated by OLS usage. User computer anxiety has a negative effect on OLS success, mediated by user satisfaction. Recommendations to improve OLS success include adjusting internet package rates to make them more affordable, improving signal strength to various locations for better coverage, limiting the number of users in one learning session for more effective OLS, and the need for organizational support in using the right applications.
EFFECTIVENESS OF E-RKAP SYSTEM IMPLEMENTATION WITH HUMAN, ORGANIZING, TECHNOL...AJHSSR Journal
ABSTRACT: This study aims to test and prove the influence of human, organizing and technology on the
effectiveness of the E-RKAP system. The hypotheses of this study are System Use affects the Effectiveness of the
E-RKAP System, User Satisfaction affects the Effectiveness of the E-RKAP System, Structural affects the
Effectiveness of the E-RKAP System, Environment affects the Effectiveness of the E-RKAPSystem, System
Quality affects the Effectiveness of the E-RKAP System, Information Quality affects the Effectiveness of the ERKAP System, Service Quality affects the Effectiveness of the E-RKAP System. The population of this study
were company employees. The sampling technique used in this study was purposive sampling which obtained a
sample of 90 people. This study shows that system use, use satisfaction, structure, environment, information
quality and service quality have no influence on the effectiveness of the E-RKAP system. System quality has an
influence on the effectiveness of the E-RKAP system.
KEYWORDS : Effectiveness, E-RKAP system, HOT Fit.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and
adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
Antecedents of Knowledge Management Practices: Case of Malaysian PractitionersjournalBEEI
In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia who work in different sectors and involved in Information Technology (IT) related fields. We proposed a conceptual framework based on the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB) and Unified Theory of Acceptance and Use of Technology (UTAUT) to study their intention and involvement in KM initiatives. The knowledge creation theory (SECI process) was employed to operationalize KM intention and KM behavior. We proposed six independent variables that represent the social-cultural nature of KM as the antecedence of KM intention. These variables are trust, management support, decentralization, IT support, performance expectancy (PE), and effort expectancy (EE). Seventy-four executives from both private and government-linked organizations responded to our online questionnaire. SmartPLS3 was used to run the analysis. The reliability was ensured with the factor loadings, Cronbach’s alpha, Composite Reliability (CR) that met the fit requirement of above 0.6, 0.7 and 0.7 respectively. The convergent validity was confirmed through average variance extracted (AVE) that met the fit requirement of above 0.5. The discriminant validity was assessed by using Fornell and Larcker’s criterion. Finally, the structural model confirmed that only PE of KM, and EE of KM are the significant predictors of KM intention and the KM intention significantly predicts KM behavior. The implications of the findings are discussed in detail at the end of the paper.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
Readiness measurement of IT implementation in Higher Education Institutions i...TELKOMNIKA JOURNAL
This article elaborates the result of the Pilot Study which is related to IT implementation factors at the Higher Education Institution (HEI), a pilot study is used to validate quantitative readiness model of IT implementation. The main objective of this study is examining the factors that influence the readiness of IT implementation in HEI. This study attempts to analyze IT Content factors, Institutional Context, People, Process, Technology, Service Quality and IT Implementation Readiness (ITIR). The sample of data was taken from 150 HEIs throughout Indonesia which was then processed in statistical techniques through PLS-SEM method. The research finding shows that 9 of the 14 hypotheses used as ITIR model construct have a very significant influence on IT implementation on HEI, so that this finding can provide a comprehensive contribution to the literature of ITIR model development.
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
A Study of Technology Acceptance Model (TAM) In Understanding the Efficacy of...inventionjournals
Global usage of automated system in all fields has remarkably increased in the past decades. To understand the extensive usage of the Information system, the study is undertaken where the Technology Acceptance Model (TAM) is used to see the extent to which an Information System (IS) is able to make any HR routine activity in the institution to be automated; whereby, the information obtained is effective and reliable. The study undertook in this article focuses on the reliability test in order to test the reliability of the scale and also the correlation test in order to find the rate of correlation between the various components of the TAM model – Perceived Usefulness (PU), Perceived Ease of Use (PEOU), Attitude towards change (ATU) and Behavioral Intention towards use (BIU). The study indicated that the null hypothesis is accepted where there is significant positive change in the Perceived Ease of Use, Attitude of the User and the Behavioral intention of the user towards using the HRIS tool in any organization. This led to understanding from the study that there is a very high rate of effectiveness in the usage of HRIS tool in any institutions using, which is proved using the TAM model.
In this case study we identify the factors that influence the adoption of a new system in a major company in Saudi Arabia. We develop a theoretical framework to help derive better understanding of system adoption via socio-technical integration.
We formulation of 14 hypotheses that were tested via a survey of 42 system users. Management support and change management were found to be significant factors influencing system adoption. As a result, the 14 null hypotheses were rejected due to their statistical significance (p-value < 0.05). Discussions and recommendations for future research are discussed.
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...QUESTJOURNAL
ABSTRACT: This is a review of theoretical models most recently used in Information Technology adoption research. A literature review approach has been adopted. More than 25 literatures were reviewed in the area of information adoption covering the last 30 years. We identified the strengths and weaknesses of each of the theory used. It is found that Technology Acceptance Model is by far the most used to underpin research work in this area follow by Theory of planned behaviour.
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
Innovative work behavior is likely to be an important need for the increasing performance of the hospital to provide the health public services. Theoretically and empirically, the behaviors be related to employee perception on management support, information technology and employee empowerment. The study aims to determine the effect of management supports and information technology on employee empowerment as well as their impact on the innovative work behaviors of the employee of dr. Zainoel Abidin District Hospital Banda Aceh. The study conducted of 302 employees of the hospital. The data collected by questionnaire and then the data is analyzed by statistical means of structural equation model (SEM). The study found that management support and information technology have a positive and significant effect on the employee empowerment and innovative work behavior. The employee empowerment mediates the effect of management supports and information technology on the innovative work behavior.
The development of information and communication technology (ICT) during the era of the fourth industrial revolution, the impact of the COVID-19 pandemic in 2020, and the government’s call for large-scale social restrictions have led to the emergence of online learning systems (OLS) in higher education. This study develops a measurement model for the success of OLS based on the DeLone & McLean model. Surveys were conducted on a sample of 175 students from domestic and international universities. Data processing used the partial least squares structural equation modeling or PLS-SEM method, and root cause analysis. The results show that platform quality has a positive influence on OLS success, whether mediated by user satisfaction or OLS usage. Social influence has a positive effect on OLS success, mediated by OLS usage. User computer anxiety has a negative effect on OLS success, mediated by user satisfaction. Recommendations to improve OLS success include adjusting internet package rates to make them more affordable, improving signal strength to various locations for better coverage, limiting the number of users in one learning session for more effective OLS, and the need for organizational support in using the right applications.
EFFECTIVENESS OF E-RKAP SYSTEM IMPLEMENTATION WITH HUMAN, ORGANIZING, TECHNOL...AJHSSR Journal
ABSTRACT: This study aims to test and prove the influence of human, organizing and technology on the
effectiveness of the E-RKAP system. The hypotheses of this study are System Use affects the Effectiveness of the
E-RKAP System, User Satisfaction affects the Effectiveness of the E-RKAP System, Structural affects the
Effectiveness of the E-RKAP System, Environment affects the Effectiveness of the E-RKAPSystem, System
Quality affects the Effectiveness of the E-RKAP System, Information Quality affects the Effectiveness of the ERKAP System, Service Quality affects the Effectiveness of the E-RKAP System. The population of this study
were company employees. The sampling technique used in this study was purposive sampling which obtained a
sample of 90 people. This study shows that system use, use satisfaction, structure, environment, information
quality and service quality have no influence on the effectiveness of the E-RKAP system. System quality has an
influence on the effectiveness of the E-RKAP system.
KEYWORDS : Effectiveness, E-RKAP system, HOT Fit.
Assessing Information System Integration Using Combination of the Readiness a...journalBEEI
Information system integration (ISI) is one of the development concerns for organizations to enhance business competitiveness. However, the implementations still present its failures. Despite the ISI may successful technically; but it still seems to be unsuccessful because of the human and management issues. The issues may relate to the readiness constructs of ISI. This study was aimed to know the status of the readiness and success of ISI and to assess the influential factors of the integration in the sampled institution. About 160 samples were purposely involved by considering their key informant characteristics. The data were analyzed using the partial least squares-structural equation modeling (PLS-SEM) method. The findings revealed only the user satisfaction variable that mediated the positive effects of the readiness variables towards variable of the system integration success. Besides, the findings may practically helpful for stakeholders in the sampled institution, but it may also theoretically useful for researchers in regard to the readiness and success issues of ISI.
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...nooriasukmaningtyas
Business intelligence is a collection of methodologies, methods, architectures, and technologies that convert raw data into significant and useful information used by organizations to enable more effective strategic, tactical, and operational insights and decision-making. In spite of several studies have examined the critical success factors and development of business intelligence system, but few relevant studies have investigated perceptions of end-user’s business intelligence systems. Furthermore, none of those studies was performed in a higher education sector in Iraq. Consequently, the study aims to determine the business intelligence system features influencing perceived impact end users’ and of using business intelligence systems in Iraqi educational institutes. A technology acceptance model and technology organization environment framework were syntheses as a basis to develop a research model for business intelligence users' perceived impact and adopt of business intelligence systems named (SMUPIBIS). Later, an online instrument (questionnaire) was designed to gather data from the business intelligence system users in five Iraqi universities. Twentyone hypotheses were proposed and later tested. The main outcomes of this study suggest that decision support, information quality, and real-time reporting are the most significant system characteristics influencing end users' perceived impact and their usage of business intelligence systems.
Acceptance of E-learning among university students in UAE: A practical study IJECEIAES
The objective of the study is to find out the factors which affect the acceptance of E-learning among students and how the students’ purpose of using E-learning is determined by these factors. The research was based on the Technology Acceptance Model (TAM). The researcher developed a questionnaire to gather data from a sample of 366 university students who actively used the E-learning system. According to the results of the study, subjective norms, perceived usefulness, perceived ease of use, enjoyment, and accessibility” are the vital predicators behind the intention of students for using E-learning systems. This indicates that extended TAM is applicable in the UAE. The results show that policymakers and education developers should take E-learning system seriously since it can be opted not just as a technological solution but also as a learning platform for students belonging to a distant area. The results present practical implications for education developers, policymakers and practitioners in devising useful plans to implement E-learning systems.
Empirical evaluation of continuous auditing system use: a systematic reviewIJECEIAES
For more than two decades, the concept of continuous auditing (CA) has been introduced and many large firms had taken the initiatives to apply the CA system in supporting their audit functions. Despite the benefits that the CA system is offers, it is still not widely use and the number of people using the CA system is still considered low. This research focuses on the published papers on the use of CA system within the context of auditing system addressing the quality of system implementation. This paper analyzed primary studies collected using the pre-determined search strings on nine online databases. As a result, a total of 60 articles were carefully selected to undergo further analysis based on empirical evidence of CA system use. The articles were analyzed qualitatively using ATLAS.ti 7 and the elements for the CA system use are extracted from the selected papers. A total of four elements were identified contributing to the use of CA in practice. Those elements are the participant quality, system quality, information quality and products and services quality. This study answers five research objectives to understand the current studies on CA and to determine future research works on CA.
Managers Perceptions towards the Success of E-performance Reporting SystemTELKOMNIKA JOURNAL
Managers are the key informants in the information system (IS) success measurements. In fact, besides the determinant agents are rarely involved in the assessments, most of the measurements are also often performed by the technical stakeholders of the systems. Therefore, the results may questionable. This study was carried to explain the factors that influence the success of an e-performance reporting system in an Indonesian university by involving ± 70% of the managers (n=66) in the sampled institution. The DeLone and McLean model was adopted and adapted here following the suggestions of the previous meta-analysis studies. The collected data was analyzed using the partial least squares-structural equation modelling (PLS-SEM) for examining the four hypotheses. Despite the findings revealed acceptances of the overall hypotheses, the weak explanation of the user satisfaction variable towards the net benefit one had been the highlighted point. Besides the study limitations, the point may also be the practical and theoretical considerations for the next studies, especially for the IS success studies in Indonesia
Generating a Domain Specific Inspection Evaluation Method through an Adaptive...Waqas Tariq
The growth of the Internet and related technologies has enabled the development of a new breed of dynamic websites and applications that are growing rapidly in use and that have had a great impact on many businesses. These websites need to be continuously evaluated and monitored to measure their efficiency and effectiveness, to assess user satisfaction, and ultimately to improve their quality. Nearly all the studies have used Heuristic Evaluation (HE) and User Testing (UT) methodologies, which have become the accepted methods for the usability evaluation of User Interface Design (UID); however, the former is general, and unlikely to encompass all usability attributes for all website domains. The latter is expensive, time consuming and misses consistency problems. To address this need, new evaluation method is developed using traditional evaluations (HE and UT) in novel ways.
The lack of a methodological framework that can be used to generate a domain-specific evaluation method, which can then be used to improve the usability assessment process for a product in any chosen domain, represents a missing area in usability testing. This paper proposes an adapting framework and evaluates it by generating an evaluation method for assessing and improving the usability of a product, called Domain Specific Inspection (DSI), and then analysing it empirically by applying it on the educational domain. Our experiments show that the adaptive framework is able to build a formative and summative evaluation method that provides optimal results with regard to the identification of comprehensive usability problem areas and relevant usability evaluation method (UEM) metrics, with minimum input in terms of the cost and time usually spent on employing UEMs.
USER EXPERIENCE EVALUATION OF A STUDENT INFORMATION SYSTEMijcsit
Today's academic environment, many students use technology as an integral aspect of their studies; as a
result, higher education (HE) institutions have been compelled to design student information systems (SIS)
that can facilitate students' online learning processes. However, SIS must be aligned with user needs and
should provide a pleasant user experience (UX) that enables students to attain their goals. The current
research looked at how students rated an SIS. The study was based on the responses of 307 students at
Kuwait's College of Business Studies (CBS) provided within a questionnaire. The survey's findings
revealed that students had a generally favourable impression of the SIS, with perceptions of the pragmatic
quality of the system being somewhat higher than the perceptions of hedonic quality. The findings of this
research may be valuable to authorities working to design improved SIS, particularly in terms of the
hedonic system components.
Combining Two Models of Successful Information System MeasurementTELKOMNIKA JOURNAL
This paper purposes is to measure successful of Academic Advisory information system by combining two models of information system measurement. DeLone & McLean IS Success Model use to measure the successful of system while COBIT framework is to measure system maturity level. Result of this research showed that the successful of Academic Advisory IS affected by User Satifaction, Quality of Service, Quality of System while Maturity level at 3.7. The result also showed there’s a relation between level of maturity system with the success of system.
The Management of Information Systems and Its Impact on the Quality of Servic...Eswar Publications
This study aimed to identify the impact of management information systems (MIS) techniques on the quality of services provided at the University of Tabuk from the perspective of students. To achieve the goals of the study, one question were developed and distributed on a random sample of 244 students at the University of Tabuk in the Kingdom of Saudi Arabia. The Statistical Package of Social Sciences (SPSS, V.16) was used to analyze the data of the question.
A METHOD FOR WEBSITE USABILITY EVALUATION: A COMPARATIVE ANALYSISIJwest
ABSTRACT
Graphical user interfaces design in software development process focuses on maximizing usability and the user's experience, in order to make the interaction for users easy, flexible and efficient. In this paper, we propose an approach for evaluating the usability satisfaction degree of a web-based system. The proposed method has been accomplished in two phases and implemented on an airlines website as a case study. In the first phase, a website usability test is implemented by a number of users, and then the results obtained are translated into charts for a final web-based system evaluation in the second phase. The results achieved
were satisfactory, since the places where the weaknesses and gaps in the website are identified and recommended solutions to avoid them are drawn. The authenticity of the results have been confirmed by comparing them with user opinions acquired from a questionnaire, which proves the precision in which the website is rated.
UI/UX integrated holistic monitoring of PAUD using the TCSD methodjournalBEEI
User interface (UI)/user experience (UX) is one part of the stages in the development of the system to produce interactive and attractive web-based application layouts so that it is easy to understand and use by users. In this research, a case study was conducted on early childhood in PAUD Kuntum Mekar. The design of the UI/UX model for holistic integrative PAUD monitoring becomes one of the solutions to help parents and teachers. The method used to design UI/UX is the task centered system design (TCSD) approach starting from the stages; 1) identification scope of use, 2) user centered requirement analysis, 3) design and scenario, and 4) walkthrough evaluate, the method used for system testing is user satisfaction, and heuristic usability. The purpose of this study is the UI/UX design with TCSD can provide valid data needs of each actor based on the assignment and design of the story board of the developed system. The results of this research are UI/UX model design for integrative holistic PAUD monitoring application.
Human computer interaction (HCI) is concerned with the practice of usability, which is a measure that
evaluates the simplicity of using a system, software, or interface design for performing particular tasks.
Evaluation is a process by which designers gather information about a systems usability to improve its user
interfaces features. This research presents a study of a usability evaluation of EduGate, an online
academic portal of King Saud University. In this research the heuristic evaluation method was chosen to
evaluate the usability of the EduGate. Our results show that, the EduGate suffers from certain usability
problem and some recommendations were proposed to enhance the usability of the EduGate. A
questionnaire was then used to collect the feedback of real users (i.e. students) on the value of these
recommendations. The participants supported 80% of the proposed recommendations to improve the
usability of the EduGate.
Human computer interaction (HCI) is concerned with the practice of usability, which is a measure that evaluates the simplicity of using a system, software, or interface design for performing particular tasks. Evaluation is a process by which designers gather information about a systems usability to improve its user interfaces features. This research presents a study of a usability evaluation of EduGate, an online academic portal of King Saud University. In this research the heuristic evaluation method was chosen to evaluate the usability of the EduGate. Our results show that, the EduGate suffers from certain usability problem and some recommendations were proposed to enhance the usability of the EduGate. A questionnaire was then used to collect the feedback of real users (i.e. students) on the value of these recommendations. The participants supported 80% of the proposed recommendations to improve the usability of the EduGate.
A HEURISTIC-BASED APPROACH FOR USABILITY EVALUATION OF ACADEMIC PORTALSijcsit
Human computer interaction (HCI) is concerned with the practice of usability, which is a measure that evaluates the simplicity of using a system, software, or interface design for performing particular tasks. Evaluation is a process by which designers gather information about a systems usability to improve its user interfaces features. This research presents a study of a usability evaluation of EduGate, an online academic portal of King Saud University. In this research the heuristic evaluation method was chosen to evaluate the usability of the EduGate. Our results show that, the EduGate suffers from certain usability problem and some recommendations were proposed to enhance the usability of the EduGate. A questionnaire was then used to collect the feedback of real users (i.e. students) on the value of these recommendations. The participants supported 80% of the proposed recommendations to improve the usability of the EduGate.
Information System Success Framework based on Interpersonal Conflict Factors IJECEIAES
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS. In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
Examining relationship between service quality, user satisfaction and perform...IJECEIAES
Governments attempt to use all forms of information technologies including Internet and mobile computing to be able to transform relationships with citizens. However, there is a clear gap between the indicator of the impact of technology innovation output and government’s vision in United Arab Emirates (UAE). In this regard, investigating the relationship between service quality, user satisfaction, and performance impact may help the government to mark its current progress and milestone achievement. This research proposed a model based on Delone & McLean IS success model by considering the research context. The modeling of structural equations via PLS (Partial least squares) regression was applied to evaluate the model within the context of public sector in the UAE. The data was collected from a sample of 147 employees in public organizations using a questionnaire. Results demonstrated that the quality of service has a significant effect on user satisfaction. In addition, quality of service and user satisfaction positively influences the staff performance. The outcome of this research helps to enhance the understanding of the impact of smart government applications.
Similar to FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTAUT AND STRUCTURAL EQUATION MODELING (20)
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS IJCSEIT Journal
Trailers carry large containers to various destinations in the world. These are manually locked on to
trailers as they move through these long distances. Security mainly refers to the safety of a state,
organization, property, and individuals against criminal activity. The study was made to analyze the
existing trailer locks and the insecurity being experienced currently. The study also focused on creating a
background to building an automated lock system for auto-mobiles. Findings showed that there are various
container types like the General Purpose containers, the Hard-Top containers and the Open-Top among
others. Similarly, the twist locks were the ones revised for this study. The study also discussed the
weaknesses of the twist locks, most especially the non-notification on unsecured locks. This causes leads to
accidents and wastage of lives and property. The study finally proposed an automated lock system to
overcome these weaknesses to some good extent.
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone
use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as
well as provides options to access a smartphone through other smartphone or a normal mobile via Short
Message Service. This model provides option to track and secure the mobile by locking it. It also provides
facilities to receive the incoming call and sms information to the remotely connected device and enables the
remote user to control the mobile through SMS. The proposed model is validated by the prototype
implementation in Android platform. Various tests are conducted in the implementation and the results are
discussed.
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
The Job selection process in today’s globally competitive economy can be a daunting task for prospective
employees no matter their experience level. Although many years of research has been devoted to job
search and application resulting in good integration with information technology including the internet and
intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas
include the quality of jobs associated with applicants in the job search by profiling the needs of employers
against the needs of prospective employees and the security and verifications schemes integrated to reduce
the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography
technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and
increased security. With this in mind we propose the intelligent mobile agents instead of human agents to
perform the Job search using fuzzy preferences which is been published elsewhere and application
operations incorporating the use of agents with a trust authority to establish employer trust and validate
applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP
and Android to provide a robust, secure, user friendly solution.
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
A face recognition system using different local features with different distance measures is proposed in this
paper. Proposed method is fast and gives accurate detection. Feature vector is based on Eigen values,
Eigen vectors, and diagonal vectors of sub images. Images are partitioned into sub images to detect local
features. Sub partitions are rearranged into vertically and horizontally matrices. Eigen values, Eigenvector
and diagonal vectors are computed for these matrices. Global feature vector is generated for face
recognition. Experiments are performed on benchmark face YALE database. Results indicate that the
proposed method gives better recognition performance in terms of average recognized rate and retrieval
time compared to the existing methods.
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
Identifying attackers is a major apprehension to both organizations and governments. Recently, the most
used applications for prevention or detection of attacks are intrusion detection systems. Biometrics
technology is simply the measurement and use of the unique characteristics of living humans to distinguish
them from one another and it is more useful as compare to passwords and tokens as they can be lost or
stolen so we have choose the technique biometric authentication. The biometric authentication provides the
ability to require more instances of authentication in such a quick and easy manner that users are not
bothered by the additional requirements. In this paper, we have given a brief introduction about
biometrics. Then we have given the information regarding the intrusion detection system and finally we
have proposed a method which is based on fingerprint recognition which would allow us to detect more
efficiently any abuse of the computer system that is running.
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-filebased
method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on
the performance of wavelet based MC-CDMA wireless communication system with the implementation of
Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of
Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been done in M-ary
modulation schemes (MPSK, MQAM and DPSK) over AWGN and Rayleigh fading channel incorporating
Walsh Hadamard code as orthogonal spreading code to discriminate the message signal for individual
user. It is observed via computer simulation that the performance of the interleaved coded based proposed
system outperforms than that of the uncoded system in all modulation schemes over Rayleigh fading
channel.
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...IJCSEIT Journal
In this paper we extend the problem of classification using Fuzzy Association Rule Mining and propose the
concept of Fuzzy Weighted Associative Classifier (FWAC). Classification based on Association rules is
considered to be effective and advantageous in many cases. Associative classifiers are especially fit to
applications where the model may assist the domain experts in their decisions. Weighted Associative
Classifiers that takes advantage of weighted Association Rule Mining is already being proposed. However,
there is a so-called "sharp boundary" problem in association rules mining with quantitative attribute
domains. This paper proposes a new Fuzzy Weighted Associative Classifier (FWAC) that generates
classification rules using Fuzzy Weighted Support and Confidence framework. The naïve approach can be
used to generating strong rules instead of weak irrelevant rules. where fuzzy logic is used in partitioning
the domains. The problem of Invalidation of Downward Closure property is solved and the concept of
Fuzzy Weighted Support and Fuzzy Weighted Confidence frame work for Boolean and quantitative item
with weighted setting is generalized. We propose a theoretical model to introduce new associative classifier
that takes advantage of Fuzzy Weighted Association rule mining.
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
In this paper, a system, developed for speech encoding, analysis, synthesis and gender identification is
presented. A typical gender recognition system can be divided into front-end system and back-end system.
The task of the front-end system is to extract the gender related information from a speech signal and
represents it by a set of vectors called feature. Features like power spectrum density, frequency at
maximum power carry speaker information. The feature is extracted using First Fourier Transform (FFT)
algorithm. The task of the back-end system (also called classifier) is to create a gender model to recognize
the gender from his/her speech signal in recognition phase. This paper also presents the digital processing
of a speech signals (pronounced “A” and “B”) which are taken from 10 persons, 5 of them are Male and
the rest of them are Female. Power Spectrum Estimation of the signal is examined .The frequency at
maximum power of the English Phonemes is extracted from the estimated power spectrum. The system uses
threshold technique as identification tool. The recognition accuracy of this system is 80% on average.
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
Scanning baggage by x-ray and analysing such images have become important technique for detecting
illicit materials in the baggage at Airports. In order to provide adequate security, a reliable and fast
screening technique is needed for baggage examination.This paper aims at providing an automatic method
for detecting concealed weapons, typically a gun in the baggage by employing image segmentation method
to extract the objects of interest from the image followed by applying feature extraction methods namely
Shape context descriptor and Zernike moments. Finally the objects are classified using fuzzy KNN as illicit
or non-illicit object.
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALIJCSEIT Journal
The proposed approach avoids the semantic gap in image retrieval by combining automatic relevance
feedback and a modified stochastic algorithm. A visual feature database is constructed from the image
database, using combined feature vector. Very few fast-computable features are included in this step. The
user selects the query image, and based on that, the system ranks the whole dataset. The nearest images are
retrieved and the first automatic relevance feedback is generated. The combined similarity of textual and
visual feature space using Latent Semantic Indexing is evaluated and the images are labelled as relevant or
irrelevant. The feedback drives a feature re-weighting process and is routed to the particle swarm
optimizer. Instead of classical swarm update approach, the swarm is split, for each swarm to perform the
search in parallel, thereby increasing the performance of the system. It provides a powerful optimization
tool and an effective space exploration mechanism. The proposed approach aims to achieve the following
goals without any human interaction - to cluster relevant images using meta-heuristics and to dynamically
modify the feature space by feeding automatic relevance feedback.
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...IJCSEIT Journal
In Wireless Ad hoc network, cooperation of nodes can be achieved by more interactions at higher protocol
layers, particularly the MAC (Medium Access Control) and network layers play vital role. MAC facilitates
a routing protocol based on position location of nodes at network layer specially known as Beacon-less
geographic routing (BLGR) using Contention-based selection process. This paper proposes two levels of
cross-layer framework -a MAC network cross-layer design for forwarder selection (or routing) and a
MAC-PHY for relay selection. Wireless networks suffers huge number of communication at the same time
leads to increase in collision and energy consumption; hence focused on new Contention access method
that uses a dynamical change of channel access probability which can reduce the number of contention
times and collisions. Simulation result demonstrates the best Relay selection and the comparative of direct
mode with the cooperative networks. And also demonstrates the Performance evaluation of contention
probability with Collision avoidance.
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMIJCSEIT Journal
Karyotyping is a process in which chromosomes in a dividing cell are properly stained, identified and
displayed in a standard format, which helps geneticist to study and diagnose genetic factors behind various
genetic diseases and for studying cancer. M-FISH (Multiplex Fluorescent In-Situ Hybridization) provides
color karyotyping. In this paper, an automated method for M-FISH chromosome segmentation based on
watershed transform followed by naive Bayes classification of each region using the features, mean and
standard deviation, is presented. Also, a post processing step is added to re-classify the small chromosome
segments to the neighboring larger segment for reducing the chances of misclassification. The approach
provided improved accuracy when compared to the pixel-by-pixel approach. The approach was tested on
40 images from the dataset and achieved an accuracy of 84.21 %.
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction
of that secret message at its destination. Different carrier file formats can be used in steganography.
Among these carrier file formats, digital images are the most popular. For this work, digital images are
used. Here steganography is done on the skin portion of an image. First skin portion of an image is
detected. Random pixels are selected from that detected region using a pseudo-random number generator.
The bits of the secret message will be embedded on the LSB of these random pixels. An analysis is done to
check the efficiency and robustness of the proposed method. The aim of this work is to show that
steganography done using random pixel selection is less prone to outside attacks.
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...IJCSEIT Journal
In many applications like FIR filters, FFT, signal processing and measurements, we are required (~45 dB)
or less side lobes amplitudes. However, the problem is usual window based FIR filter design lies in its side
lobes amplitudes that are higher than the requirement of application. We propose a window function,
which has better performance like narrower main lobe width, minimum side lobe peak compared to the
several commonly used windows. The proposed window has slightly larger main lobe width of the
commonly used Hamming window, while featuring 6.2~22.62 dB smaller side lobe peak. The proposed
window maintains its maximum side lobe peak about -58.4~-52.6 dB compared to -35.8~-38.8 dB of
Hamming window for M=10~14, while offering roughly equal main lobe width. Our simulated results also
show significant performance upgrading of the proposed window compared to the Kaiser, Gaussian, and
Lanczos windows. The proposed window also shows better performance than Dolph-Chebyshev window.
Finally, the example of designed low pass FIR filter confirms the efficiency of the proposed window.
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...IJCSEIT Journal
Association rule mining (ARM) is the process of generating rules based on the correlation between the set
of items that the customers purchase.Of late, data mining researchers have improved upon the quality of
association rule mining for business development by incorporating factors like value (utility), quantity of
items sold (weight) and profit. The rules mined without considering utility values (profit margin) will lead
to a probable loss of profitable rules.
The advantage of wealth of the customers’ needs information and rules aids the retailer in designing his
store layout[9]. An algorithm CSHURI, Customer Segmentation using HURI, is proposed, a modified
version of HURI [6], finds customers who purchase high profitable rare items and accordingly classify the
customers based on some criteria; for example, a retail business may need to identify valuable customers
who are major contributors to a company’s overall profit. For a potential customer arriving in the store,
which customer group one should belong to according to customer needs, what are the preferred functional
features or products that the customer focuses on and what kind of offers will satisfy the customer, etc.,
finds the key in targeting customers to improve sales [9], which forms the base for customer utility mining.
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...IJCSEIT Journal
The exploration of oceans and sea beds is being made increasingly possible through the development of
Autonomous Underwater Vehicles (AUVs). This is an activity that concerns the marine community and it
must confront the existence of notable challenges. However, an automatic detecting and tracking system is
the first and foremost element for an AUV or an aqueous surveillance network. In this paper a method of
Kalman filter was presented to solve the problems of objects track in sonar images. Region of object was
extracted by threshold segment and morphology process, and the features of invariant moment and area
were analysed. Results show that the method presented has the advantages of good robustness, high
accuracy and real-time characteristic, and it is efficient in underwater target track based on sonar images
and also suited for the purpose of Obstacle avoidance for the AUV to operate in the constrained
underwater environment.
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEIJCSEIT Journal
Breast cancer is one of the leading cancers for women in developed countries including India. It is the
second most common cause of cancer death in women. The high incidence of breast cancer in women has
increased significantly in the last years. In this paper we have discussed various data mining approaches
that have been utilized for breast cancer diagnosis and prognosis. Breast Cancer Diagnosis is
distinguishing of benign from malignant breast lumps and Breast Cancer Prognosis predicts when Breast
Cancer is to recur in patients that have had their cancers excised. This study paper summarizes various
review and technical articles on breast cancer diagnosis and prognosis also we focus on current research
being carried out using the data mining techniques to enhance the breast cancer diagnosis and prognosis.
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
The innovative concept of Complex Fuzzy Set is introduced. The objective of the this paper to investigate
the concept of Complex Fuzzy set in constraint to a traditional Fuzzy set , where the membership function
ranges from [0, 1], but in the Complex fuzzy set extended to a unit circle in a complex plane, where the
member ship function in the form of complex number. The Compressive study of mathematical operation of
Complex Fuzzy set is presented. The basic operation like addition, subtraction, multiplication and division
are described here. The Novel idea of this paper to measure the similarity between two fuzzy relations by
evaluating δ -equality. Here also we introduce the probabilistic interpretation of the complex fuzzy set
where we attempted to clarify the distinction between Fuzzy logic and probability.
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...IJCSEIT Journal
This paper presents an optimization of an FPGA circuit implementation of 3D reconstruction algorithm of
medicals images. It is based on an algorithmic specification in the shape of a Factorized and Conditioned
Data Dependences Graph (GFCDD). An automatic and optimized implementation of the algorithm of «
Marching Cubes » has been carried out. The repetitive property of the algorithm has been exploited, as
much as possible, by means of the methodology “Adequacy Algorithm Structures”.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTAUT AND STRUCTURAL EQUATION MODELING
1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
DOI : 10.5121/ijcseit.2012.2205 45
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED
TRAINING SYSTEM: USING EXTENDED UTAUT
AND STRUCTURAL EQUATION MODELING
Thamer A. Alrawashdeh, Mohammad I. Muhairat and Sokyna M. Alqatawnah
Department of software Engineering, Alzaytoonah University of Jordan, Amman, Jordan
Thamer.A@zuj.edu.jo
Drmohoirat@zuj.edu.jo
S.Alqatawnah@zuj.edu.jo
ABSTRACT
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
KEYWORDS
UTAUT, structural equation modeling, system enjoyment, system flexibility and system interactivity
1. INTRODUCTION
Nowadays, with the development of the Word Wide Web, e-learning system provides many
benefits to individuals and organizations. Additionally, it enables the employees to access the
training materials from any way at any time which have overcomes the many challenges with the
traditional training methods. Also, such system offers an enjoyable training environment due to
the presentation of the materials in various forms (e.g. video, audio, animation and etc.).
Furthermore, with the increasing demand to improve the employees’ skills and knowledge
reflecting on their work performance and their productivity, web based training system enables
the organizations to offer the training for their employees without any adversely effect on work
performance. Additionally, web based training reduces the training cost and time and support the
customers [12].
2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
46
However, not many studies have been conducted to the acceptance of such system [25], [7] till
now. Therefore, this study investigates the acceptance of web based training.
In the meantime, research on acceptance of e-learning system by universities’ students and
organizations’ employees has generated interest of a lot of information system researchers. They
have identified many constructs that influence people intention to use e-learning system [12],
[17], [14], [26]. These researchers had used many models and theories to explain the acceptance
of information technology. In this respect, the modern model had been used to describe such
acceptance is Unified Theory of Acceptance and Use Technology (UTAUT) [24]. As far as, there
is no trail to extend this theory to include other successful factors for e-learning system
acceptance. This study makes an effort to extend the original UTAUT to include three critical
success factors in the e-learning context including, system flexibility, system enjoyment and
system interactivity [12], [17], [1], [19], [7] (see figure 1).
2.0 THEORETICAL FRAMEWORK AND HYPOTHESES
2.1 Unified Theory of Acceptance and Use Technology (UTAUT)
The acceptance of web based training system may be treated as information system acceptance.
As previously mentioned the modern theory in this field is UTAUT [24]. This theory could
predict the acceptance of an information system in approximately 70% of the cases. Comparing
with TAM, it could only predict the acceptance of an information system in approximately 40%
of the cases. On the other hand, the validity of UTAUT in the information system context needs
further testing [14].
Therefore in this study the extended UTAUT with some of information system successful factors
that mentioned below in this section is going to be tested. Thus, the following hypotheses have
been proposed for this study.
H1. Performance expectancy will have direct effect on the employees’ intention to use web based
training system.
H2. Effort expectancy will have direct effect on the employees’ intention to use web based
training system.
H3. Social influence will have direct effect on the employees’ intention to use web based training
system.
H4. Facilitating conditions will have direct effect on the employees’ intention to use web based
training system.
2.2 System Flexibility
Many scholars introduced the perceived flexibility as one of the critical factors to understand
user’s behavioral acceptance of e-learning system [12], [17], [11], [15]. Flexibility of e-learning
system was defined as the degree to which individual believes that he/she can access the system
from anywhere at any time [12]. Adapting this construct to examine the acceptance of web based
training system by public sector’s employees suggests that they will accept web based training
system if they believe that they can access the system from anywhere at any time. Hsia and Tseng
[12], Sahin and Shelley [17], Nanayakkara [16] and Lim et al. [13] argued that perceived
3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
47
flexibility of e-learning system positively influence user’s intention to use e-learning system.
Therefore, the following hypothesis is proposed.H5. System flexibility has a positive effect on
employees’ intention to use web based training system.
2.3 System Interactivity
Although, few studies have paid attention to this factor, Abbad et al. [1] suggested that system
interactivity has indirect impact on the user’s intention to use e-learning system through
perceived usefulness and perceived ease of use. Additionally, Davis [10] found that perceived
usefulness and perceived ease of use fully mediates effect of system’s characteristics on user’s
intention to use the e-mail technology. Consequently, because many scholars agree that perceived
performance expectancy and perceived effort expectancy similar to perceived usefulness and
perceived ease of use [24], [26], [14] the following hypotheses are proposed.
H6. System interactivity has a positive impact on perceived performance expectancy.
H7. System interactivity has a positive impact on perceived effort expectancy.
2.4 System enjoyment
In the effect of perceived system enjoyment, many studies indicated that perceived system
enjoyment has direct effect on user’s intention to use e-learning system and indirect effect on the
user’s intention through perceived ease of use and perceived usefulness [19], [7], [9]. Thus, the
following hypotheses are proposed.
H8. System enjoyment has a direct impact on perceived performance expectancy.
H9. System enjoyment has a direct impact on perceived effort expectancy.
H10. System enjoyment has a direct impact on employees’ intention to use web based training.
Figure 1. Theoretical research framework
Behavioral
Intention
Social
Influence
Facilitating
Conditions
System
enjoyment
Performance
Expectancy
System
Interactivity
System
Flexibility
Effect
Expectancy
H1
H2
H3
H4
H5
H6
H10
H9
H8
H7
4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
48
3.0 RESEACH METHODOLOGY
3.1 Data collection method
A questionnaire has been designed and used to collect a data. This research is going to measure
eight constructs and the questionnaire was divided into nine sections. The first section includes
information regarding the characteristics of respondents (e.g. age, gender, having personal
computer, having internet access, having experience with e-learning system), while each one of
other sections includes questions that measure each of this research model constructs. The total
number of questionnaire’s items is 43. Each item is measured using 7point-likert scale. All such
items have been adapted from [1], [17], [24].
3.2 Sampling and Content Validation
The validity is concerned with reducing the possibility of getting incorrect answers during the
data collection period [18]. In this research, content validity was carried out through
questionnaire pre-test process [27], while, the questionnaire was modified based on the comments
which were received from ten employees who responded to the questionnaire before it was
distributed to the sample of study.
In total, five hundred (500) questionnaires had been distributed to the public sector’s employees
in Jordan. Eventually, only two hundred and ninety employees at a response rate of 58% had
successfully completed and returned the questionnaire. Lately, the Structural Equation Model
(SEM) approach and AMOS software was used to analyze the data.
4.0 DATA ANALYSIS AND RESULTS
4.1 Measure Reliability and construct Validity
AMOS 16.0 statistical software (structural equation model) was used to evaluate the construct
validity and the reliability of the measurement. Interestingly, the following equation was used to
measure the composite reliability (∑ factor loading)2 / (∑ factor loading)2 + ∑ measurement
error. As well as, the average variance extracted (AVE) was measured to examine the convergent
validity using the following equation AVE= ∑ (factor loading)2/∑(factor loading)2 + ∑
measurement error. The results of composite reliability and convergent validity tests provided
evidence of the validity of the measurement’s items, since the reliability and validity of all the
constructs have exceeded the recommended level of 0.7 (see table 2).
5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
49
Table 2. Instrument reliability and validity
Constructs Items Loadings
Composite
reliability
>= 0.7
Convergent
Validity
>= 0.7
Performance
Expectancy
PE 2
PE 3
PE 4
.956
.965
.963
0.97 0.93
Effort Expectancy
EE 5
EE 6
.972
.958
0.96 0.94
System Interactivity
SIN 1
SIN 2
SIN 3
.921
.928
.951
0.96 0.93
System Enjoyable
SE 1
SE 2
.960
.947
0.95 0.95
System Flexibility
SF 1
SF 2
SF 4
.974
.964
.895
0.96 0.95
Social Influence
SI 1
SI 3
SI 4
.897
.949
.890
0.93 0.89
Facilitating
Conditions
FC 1
FC 2
FC 3
FC 5
.936
.958
.944
.927
0.93 0.93
Behavioral Intention
BI 1
BI 2
BI 3
BI 4
.935
.961
.964
.950
0.95 0.95
4.2 The Measurement Model
In order to assess the overall metric model fit, five measures have been applied namely, ratio chi-
square to degrees of freedom (X2/d.f.), Root Mean Square of Error Approximation (RMSEA),
Comparative Fit Index (CFI), Goodness of Fit Index (GFI), and Adjusted Goodness of Fit Index
(AGFI). The final model of this study was obtained through the process including deleting items,
since seven teen items (PE 1, PE 5, PE6, EE 1, EE 2, EE 3, EE4, SIN 4, SIN 5, SE 3, SE 4, SE 5,
SF 3, SI 2, SI 5, BI 5 and FC 4) have been excluded and re-estimating the model. Consequently, it
met all previous goodness of fit measures. Since (X2/d.f.) value is below the 3 threshold [4],
RMSEA’s value is below the 0.08 threshold [6], GFI value is above the 0.9 threshold [5], AGFI
value is above the 0.8 threshold [4], while CFI value is above the 0.9 threshold [20]. Table 3
presents the values of previous model-fit measures.
6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
50
Table 3 Values of overall model- fit measures
Model-fit measures index Recommended values scores
Chi-square to degrees of freedom (X2
/d.f.) ≤ 3 1.149
Comparative Fit Index (CFI) ≥ 0.90 0.997
Root Mean Square of Error Approximation (RMSEA) ≤ 0.08 0.023
Adjusted Goodness of Fit Index (AGFI) ≥ 0.80 0.912
Goodness of Fit Index (GFI) ≥ 0.90 0.933
4.3 Structural Model and Results
In the previous section, CFA was performed to assess the model’s goodness of fit and loading of
the research constructs with items which were used to measure them. In this section, a path
analysis for structural model was conducted to examine the hypothesized relationships that help
to predict employees’ intention to use web based training system. Figure 2 explains the structural
model with the assessed path coefficient and the adjusted coefficient of determination (R2)
scores, while table 4 shows the overall results of hypotheses’ examining.
Figure 2. Research structural model
The findings of this study revealed that all of the proposed relationships are accepted and
statistically significant. Additionally, according to the modification indices (SEM analysis) there
were three new significant relationships: (i) between Effort Expectancy (EE) and Performance
Expectance (PE), (ii) between System Flexibility (SF) and Performance Expectance (PE), and
(iii) between Facilitating Conditions (FC) and Effort Expectancy (EE). These three relationships
have been intervened within the structural model, (see table 4 and figure 1).
.228
***
Behavioral
intention
Social
influence
Facilitating
conditions
System
enjoyment
Performance
expectancy
System
interactivity
System
flexibility
Effect
expectancy
.107
***
.265
**
*
.257***
.091
***
.1
**
.419
***
.41***
.13
***
.243
**
.175
***
.219
**
*
7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
51
Interestingly, the first hypothesis (H1) revealed that performance expectancy will have direct
effect on the employees’ intention to use web based training system. This hypothesis was
accepted, since the statistical result showed that there is strong significant relationship between
the performance expectancy and employees’ intention to use web based training system (.107***)
(Table 4). Additionally, the second relationship (H2) indicated that effort expectancy has direct
effect on the employees’ intention to use web based training system. This hypothesis was also
accepted, since statistical result indicated that there is strong relationship between effort
expectancy and employees’ intention to use web based training system (.175***) (Table 4).
Otherwise, statistical results revealed that there is new significant relationship between effort
expectancy and performance expectancy (.228***) (Table 4). This result is consistent with that
Taylor and Todd [21] and Davis [10] who indicated that effort expectancy (ease of use) has
affected on performance expectancy (usefulness) and user attitude.
Furthermore, third hypothesis (H3) indicated that there is significant relationship between social
influence and employees’ intention to use web based training system. Consequently, statistical
results indicated that there is relationship (0.091***) (Table 4) among social influence and user’s
intention to use web training (H4). This finding has supported the findings of Venkatesh et al.
[24] and Venkatesh and Morris [23]. Focusing in this relationship, it can be assumed that,
employees pay much attention about the opinions of other people who are important to them,
when they intend to use web training system. Otherwise, the opinions of the people who
important for employees (e.g. their managers) influence them to use web training system.
Additionally, fourth hypothesis (H4) indicated that facilitating conditions have direct effect on
the employees’ intention to use web based training system. This hypothesis was accepted, since
the statistical result revealed that there is a strong relationship (.257***) (Table 4). This result has
also been confirmed by Thompson et al. [22] and Ajzen [2]. However, it is contrast with
Venkatesh et al. [24] who argued that the facilitating conditions does not have effect on an
individual’s intention to use an information system, but it have direct effect on the actual use
beyond that explained by behavioral intention.
Similar to other studies Hsia and Tseng [7]; Nanayakkara [16] and Lim et al. [13], the
relationship between Flexibility of web based training and employees’ intention to use web
training (H5) has been confirmed (.265***) (Table 4). This relation possibly indicates that, a
trainer intends to use a web training system, if he/she believes that he/she can access the system
from anywhere at any time. In other words, trainees will participate in the e-training process if
they believe that they can choose their training equipment and time themselves. Furthermore,
similar to Hsia and Tseng [12] study, this study found that there is also relationship between
system flexibility and performance expectancy (0.243***) (table 4).
System interactivity is concerned. Since it refers to degree to which employees believe that web
based training can provide interactive communication between members of organizations and
trainees and between trainees themselves. This study provides evidence that system interactivity
has direct effect on the performance expectancy (0.1**) (Table 4) (H6) and effort expectancy
(.132***) (Table 4) (H7). That possibly means when the employees intend to use web based
training to interact with members of organization (e.g. help disk) and together, they also believe
that web based training will enhance their training performance and make the training much easy.
This result is in contrast with Abbad et al. [1] and similar to Lim et al. [13] and Davis [10].
8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
52
As regard to the eighth hypothesis (H8), ninth hypothesis (H9) and tenth hypothesis (H10) which
revealed that system enjoyment has a positive impact on perceived performance expectancy, on
perceived effort expectancy, and on the employees’ intention. These hypotheses were accepted,
since statistical results showed that system enjoyment has a strong impact on performance
expectancy (.337***) (Table 4); has a strong impact on effort expectancy (.419***) (Table 4);
and has direct effect on the employees intention (.219***) (Table 4). These results were
supported vary previous studies. Such as Chatzoglou et al. [7] and Abbad et al. [1] found that
there are significant relationships between system enjoyment usefulness (performance
expectancy), ease of use (effort expectancy) and behavioral intention.
Table 4. hypotheses testing results
Hypotheses Path Path coefficient remarks
H1 Performance expectancy and intention 0.107***
accepted
H2 Effort expectancy and intention 0.175***
accepted
H3 Social influence and intention 0.091***
Accepted
H4 Facilitating condition and intention 0.257***
Accepted
H5 System flexibility and intention 0.265***
Accepted
H6
System interactivity and performance
expectancy
0.1 **
Accepted
H7 System interactivity and effort expectancy 0.132***
Accepted
H8 System enjoyment and performance expectancy 0.337***
Accepted
H9 System enjoyment and effort expectancy 0.419***
Accepted
H10 System enjoyment and intention 0.219***
Accepted
New detected relationships
Effort expectancy and Performance expectancy .228***
Facilitating Conditions and Effort Expectancy .410***
System Flexibility and Performance Expectancy .243***
** P < 0.05 level, and *** P < 0.01 level.
5.0 CONCLUSION AND RESEARCH LIMITATIONS
5.1 Conclusion
This research has been conducted to collect data from organizations’ employees in Jordan; in
order to examine the acceptance of web based training system by those employees. The results of
this research has indicted that six factors, namely facilitating conditions; performance expectancy,
effort expectancy, system flexibility, system enjoyment, and social influence, have direct effect
on the employee’s intention to use a web based training system. Furthermore, system
interactivity, system enjoyment, system flexibility, and facilitating conditions, have affected the
performance expectancy and effort expectancy.
These results showed that the employees intend to use web based training system due to improve
their training and complete it more quickly, since performance expectancy have strong effect on
their intention to use web based training system.
9. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
53
Additionally, one of the study contributions is, this study found that perceived system flexibility
impacts intention of the employees to use web based training system, thus, web based training
system’s designers should assure that the system’s components is accessible from anywhere at
any time. Further, the employees pay much attention for the opinions of people who are important
for them (e.g. their supervisors or their peers); since the result showed that social influence
impacts the employees’ intention. Knowledge and resources which necessary in the training
process are concerned, since the result indicates facilitating conditions have a strong effect on the
employees’ intention to use web based training system. Therefore, managers should take into
their account employees’ knowledge and resources which are needed in training process, in order
to motivate them and increase their interest to use web based training system.
Furthermore, the employees should feel joyful and can contact other people (e.g. other trainees,
trainers or organization’s members) during a training process, in order to realize the performance
expectancy and effort expectancy of training process, since the statistical result indicate that
system enjoyment and system interactivity have direct effect on the performance expectancy and
effort expectancy, and have indirect effect on the employees intention to use web based training
system.
5.2 Research Limitations and Future Research
The first limitation of this research relates to sample size, since small one was taken into
consideration (290). Second, other limitation relates to measurement items, whereas just high rate
items (α) were taken into consideration. Additionally, further research should pay attention to
employees’ characteristics (such as, computer anxiety and computer self-efficacy) and assess
changing of these characteristics over the time. Furthermore, as prior mention regards lack of
relevant studies, thus, more studies should be conducted in this context (acceptance of an
information technology by public sector’s employees) to support this study’s findings.
REFERENCES
[1] M.M. Abbad, D. Morris, and C. Nahlik. “Looking under the Bonnet: Factors Affecting Student
Adoption of E-Learning Systems in Jordan.” International Review of Research in Open and Distance
Learning, vol. 10, PP.1-23, April. 2009.
[2] I. Ajzen. “The theory of planned behavior.” Organizational behavior and human Decision Processes,
vol. 50, PP. 179-211, December. 1991.
[3] I. Ajzen and M. fishbein. “Attitude – behavior relations: A theoretical analysis and review of
empirical research,” psychological bulletin, vol. 84, PP. 888- 918, September. 1977.
[4] K.A. Bollen and J. Laing . “Some properties of Hoelter’s CN,” Sociological Methods and Research,
vol. 16, PP. 492-503, May. 1988.
[5] P.M. Bollen. Structural equations with latent variables. New York: Wiley, 1989.
[6] M.W. Browne and R. Cudeck. Alternative ways of assessing model fit. In: Testing structural equation
models, Bollen, K. A., and Long. Newbury park, CA: Sage Publication, 1993, PP. 136-162.
[7] P.D. Chatzoglou, L. Sarigiannidis, E. Vraimaki, and E. Diamantidis, “Investigating Greek employees’
intention to use web-based training,” Computers & Education, vol. 5, PP. 877–889, 2009.
[8] T. Chesney. “An acceptance model for useful and fun information system. ”Interdisciplinary Journal
of Humans in ICT Environment, vol. 2, PP. 225-235, 2006.
[9] F. Davis, R. Bagozzi and P. Warshaw. “Extrinsic and Intrinsic Motivation to Use Computer in the
Workplace.” Journal of Applied Social Psychology, Vol. 22, PP. 1111-1132, July 1992.
10. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
54
[10] F. Davis. “Perceived usefulness, perceived ease of use, and user acceptance.” MIS Quarterly, vol. 13,
PP. 318-341, Sep. 1989.
[11] C.M. Hermans, D.L. Haytko, and M.B. Stenerson. “Student satisfaction in web enhanced learning
environments.” Journal of instructional pedagogies, vol. 43, PP. 211-223, 2009.
[12] J.W. Hsia and A.H. Tseng. “An enhanced technology acceptance model for e-learning systems in
[13] high-tech companies in Taiwan: analyzed by structural equation modeling.” International
Conference on Cyberworlds, pp 39-44, 2008.
[14] B.C. Lim, H.S. Kian and T.W. Kock. “Acceptance of e-learning among distance learners: A
Malaysian perspective.” Proceedings ascilite Melbourne, 2008, pp. 541-551
[15] J. Marchewka, C. Liu and K. Kostiwa. “An Application of the UTAUT Model for Understanding
Student Perceptions Using Course Management Software.” Communications of the IIMA, vol. 7, PP.
93-104, 2007.
[16] C. Nanayakkara. “A Model of User Acceptance of Learning Management Systems: a study within
Tertiary Institutions in New Zealand.” International Journal of Learning, vol. 13, PP. 223-232, 2005
[17] C. Nanayakkara and D. Whiddett . “A model of user acceptance of e-learning technologies: A case
study of a Polytechnic in New Zealand,” Presented at 4th International Conference on Information
Systems Technology and its Application (ISTA’2005), Palmerston North, New Zealand, 2005.
[18] I. Sahin and M. Shelley. “Considering Students’ Perceptions: The Distance Education Student
Satisfaction Model.” Educational Technology & Society, vol. 11, PP. 216–223, 2008
[19] U. Sekaran. Research methods for business. United States of America: Acid-free paper, 2003.
[20] Z. Sheng, Z. Jue and T. Weiwei. “Extending TAM for Online Learning Systems: An Intrinsic
Motivation Perspective.” TSINGHUA SCIENCE AND TECHNOLOGY, vol. 13, pp. 312-317, 2008
[21] T.D. Smith and B.F. McMillan. “A primer of model fit indices in structural equation model,”
Presented at the annual meeting of the southwest educational research association, New Orleans, LA,
2001.
[22] S. Taylor and P. Todd. “Understanding Information Technology Usage: A Test of Competing
Models.” Information Systems Research, vol. 6, PP. 144-176, 1995
[23] R.L. Thompson, C.A. Higgins and J.M. Howell. “Personal Computing: Toward a Conceptual Model
of Utilization.” MIS Quarterly, vol. 15, pp. 124-143, Mar.1991.
[24] V. Venkatesh and M.G. Morris. “Why don’t men ever stop to ask for direction? Gender, social
influence, and their role in technology acceptance and usage behavior.” MIS Quarterly, vol. 24, PP.
115-139, 2000.
[25] V. Venkatesh, M.G. Morris, G.B. Davis and F.D. Davis. ”User acceptance of information
technology: toward a unified view.” MIS Quarterly, vol. 27, PP. 425-478, 2003.
[26] S. Walczak and J.E. Scott. “Cognitive engagement with a multimedia ERP training tool: Assessing
compter self-efficacy and technology acceptance.” Information and Management, vol. 46, PP. 221-
232, 2009.
[27] T.S. Wang and D. Jong. “Students acceptance of web based learning system,” international
symposium on web information system and application (WISA ‘09), Nanchang, China, 2009.
[28] W.G. Zikmund. Business research methods (7th ed.). Mason: Thomson/ South-Western, 2003.