This study examined how perceptions of convenience influence the evaluation of self-service technologies. Three studies were conducted. Study 1 found that convenience perceptions, specifically speed, accuracy, and willingness to explore, positively influence intentions to use self-service technologies. Study 2 found these convenience perceptions lead to satisfaction, which increases trust and future use. Study 3 replicated Study 2 with non-users and found their perceptions were influenced by trust rather than satisfaction. The research provides insight into how convenience drives the evaluation and adoption of self-service technologies.
An After-Stay Satisfaction Survey of Residents Living in Prefabricated Concre...drboon
We have conducted an after-stay satisfaction survey of residents living in prefab concrete buildings. Many modern fast constructions make use of prefab parts, but no research on living satisfaction has been made. Multiple criteria questionnaire survey has been conducted to find out satisfaction on comfortable lives. Nine criteria have been surveyed: moisture protection, noise prevention, safety of structures, thermal prevention, air flow, external appearance, interior, facility, and overall satisfaction. Comparisons from the survey results in term of five-level Likert scale satisfaction are drawn from prefab-made dormitories, detached houses, and townhouses. The surveyed results are somewhat identical, but noise problems are the most concerns for people living in dormitories. For prefab-made detached houses and townhouses, problems in renovation and augmentation are highly alike in terms of difficulties and complexities, compared to non-prefab-made houses.
Writing a research paper, term paper or other academic works can be quite tiresome. It requires complete dedication, sacrifice and frustrations mostly if you cannot seem to find the information you are seeking. Well, with W.G.I.T, you can put all that into a bed of rest and leave the experts to deliver
Malignant Hyperthermia - Essential Charactistics:
>An inherited disorder of skeletal muscle triggered in susceptibles (human or animal) in most instances by inhalation agents and/or succinylcholine, resulting in hypermetabolism, skeletal muscle damage, hyperthermia, and death if untreated.
>Underlying physiologic mechanism – abnormal handling of intracellular calcium levels.
An After-Stay Satisfaction Survey of Residents Living in Prefabricated Concre...drboon
We have conducted an after-stay satisfaction survey of residents living in prefab concrete buildings. Many modern fast constructions make use of prefab parts, but no research on living satisfaction has been made. Multiple criteria questionnaire survey has been conducted to find out satisfaction on comfortable lives. Nine criteria have been surveyed: moisture protection, noise prevention, safety of structures, thermal prevention, air flow, external appearance, interior, facility, and overall satisfaction. Comparisons from the survey results in term of five-level Likert scale satisfaction are drawn from prefab-made dormitories, detached houses, and townhouses. The surveyed results are somewhat identical, but noise problems are the most concerns for people living in dormitories. For prefab-made detached houses and townhouses, problems in renovation and augmentation are highly alike in terms of difficulties and complexities, compared to non-prefab-made houses.
Writing a research paper, term paper or other academic works can be quite tiresome. It requires complete dedication, sacrifice and frustrations mostly if you cannot seem to find the information you are seeking. Well, with W.G.I.T, you can put all that into a bed of rest and leave the experts to deliver
Malignant Hyperthermia - Essential Charactistics:
>An inherited disorder of skeletal muscle triggered in susceptibles (human or animal) in most instances by inhalation agents and/or succinylcholine, resulting in hypermetabolism, skeletal muscle damage, hyperthermia, and death if untreated.
>Underlying physiologic mechanism – abnormal handling of intracellular calcium levels.
The delone and mclean model of information systems successHamideh Iraj
The delone and mclean model of information systems success
The main Resource:
Integrated Series in Information Systems, Volume 28, Information Systems Theory Explaining and Predicting Our Digital Society, Vol. 1, Springer; 2012 edition
Exploring the behavioral intention to use e-government services: Validating t...Mark Anthony Camilleri
This study explores the online users’ behavioral intention to utilize the governments’ websites and their electronic services. The research methodology validates the measuring items from the unified theory of acceptance and use of technology (UTAUT) to better understand the participants’ attitudes toward their performance expectancy, effort expectancy, social norms, facilitating condition and behavioral intention to use the electronic government (e-gov) services. The findings from the structural equations modeling approach reported a satisfactory fit for this study’s research model. The results suggest that there were highly significant, direct effects from the UTAUT constructs, where the utilitarian motives predicted the online users’ behavioral intentions to use e-gov. Moreover, there were significant moderating influences from the demographic variables, including age, gender and experiences that effected the individuals’ usage of the governments’ online services. In conclusion, this contribution identifies its limitations and suggests possible research avenues to academia.
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...QUESTJOURNAL
ABSTRACT: This is a review of theoretical models most recently used in Information Technology adoption research. A literature review approach has been adopted. More than 25 literatures were reviewed in the area of information adoption covering the last 30 years. We identified the strengths and weaknesses of each of the theory used. It is found that Technology Acceptance Model is by far the most used to underpin research work in this area follow by Theory of planned behaviour.
The delone and mclean model of information systems successHamideh Iraj
The delone and mclean model of information systems success
The main Resource:
Integrated Series in Information Systems, Volume 28, Information Systems Theory Explaining and Predicting Our Digital Society, Vol. 1, Springer; 2012 edition
Exploring the behavioral intention to use e-government services: Validating t...Mark Anthony Camilleri
This study explores the online users’ behavioral intention to utilize the governments’ websites and their electronic services. The research methodology validates the measuring items from the unified theory of acceptance and use of technology (UTAUT) to better understand the participants’ attitudes toward their performance expectancy, effort expectancy, social norms, facilitating condition and behavioral intention to use the electronic government (e-gov) services. The findings from the structural equations modeling approach reported a satisfactory fit for this study’s research model. The results suggest that there were highly significant, direct effects from the UTAUT constructs, where the utilitarian motives predicted the online users’ behavioral intentions to use e-gov. Moreover, there were significant moderating influences from the demographic variables, including age, gender and experiences that effected the individuals’ usage of the governments’ online services. In conclusion, this contribution identifies its limitations and suggests possible research avenues to academia.
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...QUESTJOURNAL
ABSTRACT: This is a review of theoretical models most recently used in Information Technology adoption research. A literature review approach has been adopted. More than 25 literatures were reviewed in the area of information adoption covering the last 30 years. We identified the strengths and weaknesses of each of the theory used. It is found that Technology Acceptance Model is by far the most used to underpin research work in this area follow by Theory of planned behaviour.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. Paper profile
Only If It Is Convenient: Understanding How Convenience
Influences Self-Service Technology Evaluation
Author:
1. Joel E. Collier, Department of Marketing, Quantitative Analysis and Business Law,
Mississippi State University
2. Sheryl E. Kimes, School of Hotel Administration, Cornell University
Year: 2012
Periodical: Journal of Service Research
Key words: Self-service technology, convenience, need for interaction, speed,
accuracy, exploration
3.
4. Research Background (1/3)
Self-service advantages:
1. Cost down
2. Reclaiming floor space for additional sales
Many SSTs(self-service technology) come and gone
in the past
1. Companies were unable to convince consumers that SSTs are good
alternatives.
2. Consumers aren’t naturally incline to change channel options
unless motivated to do so.
Why customer want
to perform a service
themselves??
5. Research Background (2/3)
Earlier researches on self-service technology:
1. Convenience is an important attributes of evaluating SST performance.
• Meuter et al., 2000
2. Convenience is a important driver of satisfaction with an SST.
• Collier & Sherrell, 2010 ; Ding, Hu & Sheng, 2011
3. Convenience affects the usage of an SST.
• Durkin, 2004; Evans & Brown, 1988
The goal of this paper:
1. Exploring how convenience perceptions influence the potential benefits
received from an SST.
2. Three constructs related to convenience: Speed, Accuracy, Information
Both for
users and
non-users
6. Research Background (3/3)
Resource Matching Theory(Anand and Sternthal, 1990):
1. Consumers have limited resources to process information or finish a task.
2. Are these necessary resources for accessing service exceed what customers
have?
• Effectiveness or Ineffectiveness
Related topics:
1. Branding, advertising, cognitive evaluation of products
2. Recently, this theory is also applied in SSTs.
8. Study I (1/ 4)
Constructs selection & Hypotheses
1. Exploration :
A crucial component in maximizing customer’s experience. Exploring available options.
(Babin, Darden, and Griffin 1994; Chandon, Wansink, and Laurent 2000).
Triability.
(Rogers, 1983)
A relation between convenience evaluations and the intentions to explore through SST.
(Ahn, Ryu, and Han, 2007)
Study 1
9. Study I (2/ 4)
Constructs selection & Hypotheses
2. Speed of transaction
Time saving
(Langeard et al., 1981; Bateson, 1985; Lovelock & Young, 1979)
3. Accuracy
An important evaluation factor to the quality of service experience
(Bienstock, Mentzer, and Bird 1997; Mentzer, Flint, and Hult 2001)
Consumers have greater accuracy perceptions in online service.
(Wolfinbarger & Gilly, 2001)
Study 1
10. Study I (3/ 4)
Methodology
Questionnaire
1. Likert 5 point scale
2. 15 items on speed, accuracy and exploration
(Baumgartner and Steenkamp 1996; Collier and Sherrell 2010; Dabholkar
1996; Parasuraman, Zeithaml, and Berry 1988; Seiders et al. 2007).
Smaple
1. 260 online reservation system users (U.S.)
Measurement
1. MANOVA (Multivariate Analysis of Variance)
Study 1
12. Study II (1/ 4)
Constructs selection & Hypotheses
1. Trust
Pivotal and mediating role in the intent of using and overall evaluating.
(Ha and Stoel, 2009; Johnson, Bardhi & Dunn, 2008)
Study 2
13. Study II (2/ 4)
Constructs selection & Hypotheses
2. Satisfaction
A determinant for future use
(Ding, Hu, and Sheng 2011; Makarem, Mudambi & Podoshen 2009)
Relationship with previous constructs
Speed of transaction
(Meuter et al. 2000; Pujari 2004)
Accuracy
(Collier and Bienstock, 2006; Ding, Hu & Sheng, 2011)
Exploration behaviors
(Demangeot & Broderick, 2010)
Study 2
14. Study II (2/ 4)
Constructs selection & Hypotheses
3. Need for Human Interaction
the desire for human contact by the customer during a service experience
(Dabholkar, 1996)
Early research found no support that human interaction affects SST
adoption.
(Langeard et al. 1981)
Recent researches listed the need for human interaction as one of the main
reasons for not adopting a SST.
(Dabholkar, Bobbitt, and Lee 2003; Meuter et al. 2000; Meuter et al. 2003).
Study 2
15. Study II (3/ 4)
Methodology
Questionnaire
1. Likert 5 point scale
2. 23 items on trust, satisfaction
(Collier and Sherrell 2010; Meuter et al. 2005; Oliver and Swan 1989)
Smaple
1. Another 228 online reservation system users (U.S.)
Measurement
1. Confirmatory Factor Analysis
17. Study III (1/ 2)
Constructs selection & Hypotheses & Methodology
1. Non-users perceoption
To fully assess how consumer view SST, study 3 replicated what study 2 did by
surveying non-users of the online SST.
2. Full assessment of the framework
3. Methodology
Sample: 242 online SST non-users. [Who are familiar with online tech but not SST
users]
Questionnaire: same items as study 2
Measurement: Confirmatory Factor Analysis / SEM (Structural Equation Model)
19. Discussion
Speed, Accuracy and Exploration show importance in the
SSTs quality evaluation.
What makes customers need less human interaction?
For SST users, satisfaction is the only influence.
For SST non-users, trust is the only influence.