Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
The UTAUT model aims to explain user intentions to use information systems and subsequent usage behavior. It was developed by reviewing and consolidating eight previous models of technology acceptance. The UTAUT model proposes four key constructs that influence usage intention and behavior: performance expectancy, effort expectancy, social influence, and facilitating conditions. Gender, age, experience, and voluntariness of use are hypothesized to moderate the impact of the four constructs. Several studies have applied the UTAUT model to domains such as mobile service adoption, social media adoption, and computer use frequency. Some researchers have also extended the UTAUT model by adding additional constructs. However, others have critiqued the UTAUT model for having many independent variables and
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
This document provides a summary of a systematic literature review conducted to establish factors for developing an eHealth adoption framework for developing countries. The review analyzed 29 papers published between 2009-2021 on eHealth adoption frameworks in developing nations. The most commonly used frameworks were TAM, UTAUT, and TOE, but additional factors were identified. Based on the findings, the researchers derived a novel 8-dimension eHealth adoption framework for developing countries including socio-demographic, technology, information, socio-cultural, organization, governance, ethical/legal, and financial dimensions. Key factors identified included perceived usefulness/ease of use, cultural dimensions, organizational fit, reinforcement, age/education, financial support, and policy/regulatory
IRJET- Campus E-Voting in a Developing Nation: An Application of the Unified ...IRJET Journal
This document summarizes a study that applied the Unified Theory of Acceptance and Use of Technology (UTAUT) model to examine students' perceptions of campus e-voting in Malaysia. A survey was administered to 300 students. The results found that performance expectancy, effort expectancy, social influence, trust, and computer anxiety influenced behavioral intention to use campus e-voting. Specifically, students were most likely to vote online if the system was accessible and they believed it would enhance their performance. Overall, students had positive perceptions of campus e-voting.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
The UTAUT model aims to explain user intentions to use information systems and subsequent usage behavior. It was developed by reviewing and consolidating eight previous models of technology acceptance. The UTAUT model proposes four key constructs that influence usage intention and behavior: performance expectancy, effort expectancy, social influence, and facilitating conditions. Gender, age, experience, and voluntariness of use are hypothesized to moderate the impact of the four constructs. Several studies have applied the UTAUT model to domains such as mobile service adoption, social media adoption, and computer use frequency. Some researchers have also extended the UTAUT model by adding additional constructs. However, others have critiqued the UTAUT model for having many independent variables and
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
This document provides a summary of a systematic literature review conducted to establish factors for developing an eHealth adoption framework for developing countries. The review analyzed 29 papers published between 2009-2021 on eHealth adoption frameworks in developing nations. The most commonly used frameworks were TAM, UTAUT, and TOE, but additional factors were identified. Based on the findings, the researchers derived a novel 8-dimension eHealth adoption framework for developing countries including socio-demographic, technology, information, socio-cultural, organization, governance, ethical/legal, and financial dimensions. Key factors identified included perceived usefulness/ease of use, cultural dimensions, organizational fit, reinforcement, age/education, financial support, and policy/regulatory
IRJET- Campus E-Voting in a Developing Nation: An Application of the Unified ...IRJET Journal
This document summarizes a study that applied the Unified Theory of Acceptance and Use of Technology (UTAUT) model to examine students' perceptions of campus e-voting in Malaysia. A survey was administered to 300 students. The results found that performance expectancy, effort expectancy, social influence, trust, and computer anxiety influenced behavioral intention to use campus e-voting. Specifically, students were most likely to vote online if the system was accessible and they believed it would enhance their performance. Overall, students had positive perceptions of campus e-voting.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
The document discusses the Technology Acceptance Model (TAM) and its viability for determining acceptance of e-learning technologies in higher education institutions. TAM identifies perceived usefulness and perceived ease of use as key factors influencing attitudes toward and use of new technologies. The document reviews literature on TAM and its constructs. It also presents two case studies that applied TAM to evaluate student acceptance of online technologies for communication and public relations courses. Both case studies found TAM to be an effective model for predicting technology use.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
This presentation is about UTAUT and UTAUT 2. In this slide also discuss briefly about UTAUT and changes made in UTAUT 2. It also discuss about how it can be applied in the classroom and the strength and weakness of using it.
_mobile learning lecturers versus students on usage and perception using the ...Lenandlar Singh
This study investigated the usage and perceptions of mobile learning (m-learning) among lecturers and students at the University of Guyana using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. Surveys were administered to 508 students and 63 lecturers to examine factors influencing attitudes and intentions to use m-learning technologies. Path analysis found performance expectancy and facilitating conditions significantly influenced behavioral intention for students, while effort expectancy was most influential for lecturers. Overall, students showed higher levels of performance expectancy, effort expectancy, social influence, and attitudes toward m-learning compared to lecturers. The study recommends further research with larger lecturer samples and addressing facilitating conditions to influence lecturer use of m-learning.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
The case for ubuntu linux operating system performance and usabilMaurice Dawson
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency in the system and regarded it as well integrated.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
Keerthi Thomas is a PhD student at the Open University, supervised by Prof. Bashar Nuseibeh, Dr. Arosha Bandara, and Mr. Blaine Price. Her research focuses on eliciting and analyzing users' privacy requirements for mobile applications. Previous work has shown privacy requirements vary based on users' changing contexts. However, most existing approaches do not address challenges of understanding privacy needs for mobile apps. Thomas proposes a systematic approach using a user-centric model combining contextual and interaction data to capture how privacy requirements are "distilled" from empirical studies of mobile social networking app users.
1. The document discusses the Technology Acceptance Model (TAM), which aims to explain and predict user acceptance of technology. TAM focuses on how perceived ease of use and perceived usefulness influence attitudes, behavioral intention, and actual technology use.
2. The document reviews several studies that have applied TAM across different contexts like education. It finds that TAM is useful for understanding factors that influence teacher and student acceptance of educational technologies.
3. However, the document also notes some weaknesses of TAM, such as its reliance on self-reported data and the broad nature of perceived ease of use and usefulness constructs. It suggests TAM needs more research in primary/secondary school settings.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
This document summarizes Stefan Taubenberger's PhD research on using business process security requirements for IT security risk assessment. The research aims to determine if IT security risks can be reliably evaluated solely based on assessing adherence to security requirements, without using probabilities and events. The approach involves modeling business processes, identifying critical assets and security requirements, and evaluating how well security controls and processes meet the requirements. Preliminary validation using a reinsurance company's processes supports the idea that risks can be determined this way. The research seeks to address limitations of traditional risk assessment approaches.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
Cucumber disease recognition using machine learning and transfer learningriyaniaes
Cucumber is grown, as a cash crop besides it is one of the main and popular vegetables in Bangladesh. As Bangladesh's economy is largely dependent on the agricultural sector, cucumber farming could make economic and productivity growth more sustainable. But many diseases diminish the situation of cucumber. Early detection of disease can help to stop disease from spreading to other healthy plants and also accurate identifying the disease will help to reduce crop losses through specific treatments. In this paper, we have presented two approaches namely traditional machine learning (ML) and CNN-based transfer learning. Then we have compared the performance of the applied techniques to find out the most appropriate techniques for recognizing cucumber diseases. In our ML approach, the system involves five steps. After collecting the image, pre-processing is done by resizing, filtering, and contrast-enhancing. Then we have compared various ML algorithms using k-means based image segmentation after extracted 10 relevant features. Random forest gives the best accuracy with 89.93% in the traditional ML approach. We also studied and applied CNN-based transfer learning to investigate the further improvement of recognition performance. Lastly, a comparison among various transfer learning models such as InceptionV3, MobileNetV2, and VGG16 has been performed. Between these two approaches, MobileNetV2 achieves the highest accuracy with 93.23%.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
Dokumen tersebut membahas struktur komunitas terumbu karang di kawasan wisata Lovina, Bali. Terumbu karang di kawasan tersebut umumnya berupa terumbu penghalang yang tersebar di beberapa titik. Kondisi karang hidup berkisar antara 18-44% dengan kategori buruk hingga sedang. Komunitas karang terdiri atas berbagai jenis karang dan hewan laut.
Este documento fornece instruções de uso e manutenção para o exaustor de cozinha modelo 3BC8855 e 3BC8880. Contém informações importantes de segurança, modos de operação, limpeza e solução de problemas. O documento está disponível em inglês, espanhol e português.
The document discusses the Technology Acceptance Model (TAM) and its viability for determining acceptance of e-learning technologies in higher education institutions. TAM identifies perceived usefulness and perceived ease of use as key factors influencing attitudes toward and use of new technologies. The document reviews literature on TAM and its constructs. It also presents two case studies that applied TAM to evaluate student acceptance of online technologies for communication and public relations courses. Both case studies found TAM to be an effective model for predicting technology use.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
This presentation is about UTAUT and UTAUT 2. In this slide also discuss briefly about UTAUT and changes made in UTAUT 2. It also discuss about how it can be applied in the classroom and the strength and weakness of using it.
_mobile learning lecturers versus students on usage and perception using the ...Lenandlar Singh
This study investigated the usage and perceptions of mobile learning (m-learning) among lecturers and students at the University of Guyana using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. Surveys were administered to 508 students and 63 lecturers to examine factors influencing attitudes and intentions to use m-learning technologies. Path analysis found performance expectancy and facilitating conditions significantly influenced behavioral intention for students, while effort expectancy was most influential for lecturers. Overall, students showed higher levels of performance expectancy, effort expectancy, social influence, and attitudes toward m-learning compared to lecturers. The study recommends further research with larger lecturer samples and addressing facilitating conditions to influence lecturer use of m-learning.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
The case for ubuntu linux operating system performance and usabilMaurice Dawson
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency in the system and regarded it as well integrated.
CITIZENS’ ACCEPTANCE OF E-GOVERNMENT SERVICESijcseit
The rate of computer and internet usage has been increasing rapidly around the world. In parallel with the
technologic developments in computer science, transformation from traditional services to online services
has gained speed. The aim of this study is to predict the factors that affect e-government service usage. A
research model is developed to achieve this aim. The proposed model bases on Technology Acceptance
Model and Theory of Planned Behaviour. A questionnaire is developed to evaluate the model. This
questionnaire composes of two parts: demographics part and item part. In the items part, 32 items
comprising the factors of the proposed model are asked to participants. 100 participants fill the
questionnaire. Reliability analysis of the questionnaire is evaluated with internal consistency reliability
method. Results show that all items satisfies the reliability conditions. The reliability of whole
questionnaire Cronbach Alpha is 0.885. The Cronbach’s alpha for the overall scale of each of the factors
ranges from 0.878 to 0.890. Regression analysis results showed that all hypotheses are supported. This
study provides some valuable references to understand citizens’ acceptance level of e-government services.
Keerthi Thomas is a PhD student at the Open University, supervised by Prof. Bashar Nuseibeh, Dr. Arosha Bandara, and Mr. Blaine Price. Her research focuses on eliciting and analyzing users' privacy requirements for mobile applications. Previous work has shown privacy requirements vary based on users' changing contexts. However, most existing approaches do not address challenges of understanding privacy needs for mobile apps. Thomas proposes a systematic approach using a user-centric model combining contextual and interaction data to capture how privacy requirements are "distilled" from empirical studies of mobile social networking app users.
1. The document discusses the Technology Acceptance Model (TAM), which aims to explain and predict user acceptance of technology. TAM focuses on how perceived ease of use and perceived usefulness influence attitudes, behavioral intention, and actual technology use.
2. The document reviews several studies that have applied TAM across different contexts like education. It finds that TAM is useful for understanding factors that influence teacher and student acceptance of educational technologies.
3. However, the document also notes some weaknesses of TAM, such as its reliance on self-reported data and the broad nature of perceived ease of use and usefulness constructs. It suggests TAM needs more research in primary/secondary school settings.
José Carlos Sánchez Prieto, Susana Olmos Migueláñez and Francisco J. García-Peñalvo.
Research Group in InterAction and eLearning (GRIAL)
IUCE
University of Salamanca
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
Preliminary Research on Adoption and Diffusion Model of SMEs E-Learning in Th...www.nbtc.go.th
Preliminary Research on Adoption
and Diffusion Model of SMEs
E-Learning in Thailand
Noppadol Tiamnara
Office of the National Broadcasting
and Telecommunications Commission, Thailand
The contribution of SMEs to
economic growth is widely recognized and
Thailand is one of the countries where
SMEs have always played a primary role in
digital economy environment. This paper is
a research-in-progress which aims to
construct a conceptual framework to
understand adoption and diffusion of
e-learning among small and medium-sized
enterprises (SMEs) in Thailand. Various
models of technology acceptance and
adoption are reviewed in this research to
analyze and apply for developing the
conceptual framework of the research. The
future work of the research is explained.
The results of the research in this paper will
provide recommendations to support SMEs
to utilize e-learning to foster the economic
impacts to the country. Analysis in this
research is based on quantitative approach.
Reference
http://www.ijcim.th.org/SpecialEditions/v23nSP2/02_25A_Preliminary.pdf
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
This document summarizes Stefan Taubenberger's PhD research on using business process security requirements for IT security risk assessment. The research aims to determine if IT security risks can be reliably evaluated solely based on assessing adherence to security requirements, without using probabilities and events. The approach involves modeling business processes, identifying critical assets and security requirements, and evaluating how well security controls and processes meet the requirements. Preliminary validation using a reinsurance company's processes supports the idea that risks can be determined this way. The research seeks to address limitations of traditional risk assessment approaches.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
Cucumber disease recognition using machine learning and transfer learningriyaniaes
Cucumber is grown, as a cash crop besides it is one of the main and popular vegetables in Bangladesh. As Bangladesh's economy is largely dependent on the agricultural sector, cucumber farming could make economic and productivity growth more sustainable. But many diseases diminish the situation of cucumber. Early detection of disease can help to stop disease from spreading to other healthy plants and also accurate identifying the disease will help to reduce crop losses through specific treatments. In this paper, we have presented two approaches namely traditional machine learning (ML) and CNN-based transfer learning. Then we have compared the performance of the applied techniques to find out the most appropriate techniques for recognizing cucumber diseases. In our ML approach, the system involves five steps. After collecting the image, pre-processing is done by resizing, filtering, and contrast-enhancing. Then we have compared various ML algorithms using k-means based image segmentation after extracted 10 relevant features. Random forest gives the best accuracy with 89.93% in the traditional ML approach. We also studied and applied CNN-based transfer learning to investigate the further improvement of recognition performance. Lastly, a comparison among various transfer learning models such as InceptionV3, MobileNetV2, and VGG16 has been performed. Between these two approaches, MobileNetV2 achieves the highest accuracy with 93.23%.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
Dokumen tersebut membahas struktur komunitas terumbu karang di kawasan wisata Lovina, Bali. Terumbu karang di kawasan tersebut umumnya berupa terumbu penghalang yang tersebar di beberapa titik. Kondisi karang hidup berkisar antara 18-44% dengan kategori buruk hingga sedang. Komunitas karang terdiri atas berbagai jenis karang dan hewan laut.
Este documento fornece instruções de uso e manutenção para o exaustor de cozinha modelo 3BC8855 e 3BC8880. Contém informações importantes de segurança, modos de operação, limpeza e solução de problemas. O documento está disponível em inglês, espanhol e português.
Moodle es un software diseñado para ayudar a los educadores a crear cursos en línea de alta calidad y entornos de aprendizaje virtuales. Tales sistemas de aprendizaje en línea son algunas veces llamados VLEs (Virtual Learning Environments) o entornos virtuales de aprendizaje.
Clonezilla LiveCD es una utilidad para la clonación y copia de seguridad de disco. Además de los programas comerciales (y pagado), como Norton Ghost o Acronis True Image, el CD de arranque puede ayudar a sus discos o particiones de seguridad y de fácil reubicación.
Como cualquier otro LiveCD de Linux, es capaz de arrancar un gran número de configuraciones y de reconocer muchos periféricos.
It's brief introduction into some types of wearable techs.
We see some examples like google glass and moto 360 or oculus rift in order to get some sense about what happening around this Technology
LM Ericsson is a leading telecommunications equipment manufacturer, providing mobile systems solutions and end-to-end network solutions to operators. The author completed an internship at Ericsson where they learned about technical and corporate skills while helping to upgrade the software on 2000 network nodes in Bangladesh. They gained experience in fields maintenance and saw first-hand how Ericsson maintains high quality networks for its customers.
Guía para la identificación de los peligrosaminta garcia
Este documento presenta la metodología GTC 45 para realizar una identificación y valoración de riesgos. Explica definiciones clave como peligro, riesgo, niveles de probabilidad y consecuencia. Detalla las actividades requeridas como clasificar procesos, identificar peligros, evaluar riesgos y establecer controles. El objetivo es proteger la seguridad y salud de los trabajadores mediante el análisis y control de riesgos laborales.
Adaptaciones curriculares por Viviana Villacísvivica356
El documento habla sobre las adaptaciones curriculares para estudiantes con necesidades educativas especiales. Define las adaptaciones curriculares como ajustes a los elementos educativos comunes para responder a la diversidad de estudiantes. Explica que van de lo menos a lo más significativo y son relativas y cambiantes. Además, detalla diferentes tipos de adaptaciones como las de centro, aula e individualizadas.
A test of the technology acceptance model for understanding theZeinab Zaremohzzabieh
Information and communication technologies (ICTs) open up new opportunities for rural young entrepreneurs to
enhance their businesses. However, the challenges of adopting and using ICTs obstruct these businesses from
growing into drivers for rural-economic development and job creation. The purpose of this paper is to seek to
validate the technology acceptance model (TAM), which measures the volitional aspect of the ICT adoption
behavior of young entrepreneurs in a rural community. In order to test the model, data are collected using
self-administered questionnaires from 400 rural youth entrepreneurs. The structural equation modeling technique
(SEM) was applied to assess the model. The results confirmed that TAM is robust enough to gauge the
dimensions of young entrepreneurs’ adoption of ICT by way of the model accounting for 55 percent of the
variance in intention to use ICT. They also indicated that attitude toward entrepreneurship partially mediated the
relationship between ICT’s usefulness and entrepreneurial intention. This paper will serve to illuminate this
model and reveal new knowledge perspectives. Policy makers could encourage rural youth entrepreneurs to use
ICT in their businesses, which will in turn inspire other entrepreneurs to look up to these adopters and follow
them, thus increasing the use of ICT in rural communities.
El documento habla sobre las adaptaciones curriculares. Explica que son ajustes o modificaciones a los elementos de la propuesta educativa para facilitar que cada alumno logre sus objetivos de la manera más participativa posible. También describe los tipos de adaptación como acceso al currículo, adaptaciones no significativas y adaptaciones significativas. Además, enfatiza la importancia de revisar la planificación para satisfacer las necesidades individuales de cada estudiante.
ADMINISTRACIÓN DEL CONTROL DE PÉRDIDAS, CONTROL TOTAL DE PÉRDIDAS, SISTEMA ...janderi
Factores personales y de trabajo en la seguridad industrial
Las causas básicas están relacionadas a factores personales y de trabajo.
Ayudan a identificar por qué el personal realiza actos subestándares y por qué existen condiciones subestándares.
Constituidos por factores o elementos personales y de trabajo.
This document summarizes a study on how delays and inactivity gaps during an information system implementation affect end user perception. The study examined employees within the accounts team of a company called DFS that was implementing a new accounting system called Ashton over 5 years. The findings showed that short delays during implementation negatively impacted end user perception, while longer delays had a minor effect. However, delays did not influence satisfaction levels during actual system usage. The document reviews literature on how delays are perceived and can impact user acceptance based on models like the Technology Acceptance Model and Expectation Confirmation Model.
This document presents the methodology for evaluating a minimum viable product (MVP) mobile application of the International Classification of Functioning (ICF) through multi-site user testing. The evaluation will assess usability, validity of functioning descriptions, and technology acceptance at test sites in multiple countries. Small groups of 30 users and 2-4 providers will provide feedback over 5 iterations to inform rapid app updates. Both formative and summative evaluations will gather opinions on information quality, system quality, and service quality. The results will contribute to evidence on health and quality of life impacts and efficiency gains from using the ICF mobile solution.
This document presents the methodology for evaluating a minimum viable product (MVP) mobile application of the International Classification of Functioning (ICF) through multi-site user testing. The evaluation will assess information quality, system quality, and service quality to inform further development. Small groups of 30 users and 2-4 providers at each test site will provide feedback over 5 iterations in 6 months. Evaluations in different countries will measure usefulness, ease of use, and acceptance using the Technology Acceptance Model. The results will contribute to understanding health outcomes from using mobile health tools in integrated care.
Technology Readiness and Technology Acceptance of Employees of Bekasi Kota Po...AJHSSR Journal
ABSTRACT : This study aims to determine and analyze the readiness and acceptance of technology in
Polres Metro Bekasi City employees in using information system services. This type of research is
quantitative. The sampling technique used is saturated sampling in which the number of questionnaires are
106 respondents. Data collection techniques by distributing questionnaires. The respondents of this study
were all employees of Polres Metro Bekasi Kota. The analytical method used is a statistical analysis method,
namely Path Analysis on the Technology Readiness Acceptance Model (TRAM). The results of testing the
data using the validity and reliability tests show that the data obtained is valid and reliable. Of the 11
hypotheses in the TRAM, five hypotheses are supported by research results while 6 hypotheses are not
supported. Based on the proof of the hypothesis, in this study sample, the TRAM (Technology Readiness
Acceptance Model) model was not fully implemented in the sample studied. Behavior intention that occurs is
due to its relationship with perceived usefulness; where perceived usefulness is related to optimism and
innovativeness. Perception of ease of use is related to Optimism and Insecurity; however, the perceived easy
of use is not positively related to the perceived usefulness and behavioral intention.
KEYWORDS : Information System Services, TRAM, technology readiness, technology acceptance.
Mobile Financial Services – Adoption and Challenges in BangladeshAbu Shadath Shaibal
The introduction of prepaid cards and the fallen prices of mobile handsets have led to a rapid spread of mobile phones in the emerging economies. This has opened up diverse opportunities for them to be used over and above voice communication. One of such uses which have emerged lately is the use of mobile phones in financial services. This paper explored the key factors that affect the consumer’s acceptance and use of mobile money transfer by extending using key determinants from TAM and IDT theory.
And go through opportunities, threats, challenges, risks and how to mitigate the risk.
Keywords: TAM, Adoption, Mobile Money, Mobile Money Transfer, Bangladesh, MFS, MFSP.
This document reviews and compares eight prominent models of user acceptance of information technology: the theory of reasoned action, technology acceptance model, motivational model, theory of planned behavior, combined TAM and TPB model, model of PC utilization, innovation diffusion theory, and social cognitive theory. It aims to empirically compare the models, formulate a unified model integrating elements of the eight models called UTAUT, and validate UTAUT using multiple data sets. The eight models are described and their constructs defined. Prior empirical comparisons of the models are discussed, noting limitations that the current study aims to address.
Template- 3. 2019 understanding the adoption of quantified self-tracking wea...UmarHisyamSungkar
This document summarizes a research paper that studied factors influencing the adoption of self-tracking wearable devices by university employees and students. The researchers developed a wearable acceptance model combining the UTAUT model and another framework to identify factors within individual, technology, implementation, and new risk and fashnology contexts. They conducted an online survey of 129 university stakeholders and used partial least squares modeling to test hypotheses about how performance expectancy, effort expectancy, organizational support, privacy concerns, wearability, and aesthetics influence attitudes and intentions to use wearables. The analysis found attitude plays a mediating role and privacy concerns, wearability, and aesthetics had strong direct effects on intended usage, while organizational support negatively influenced usage intentions.
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experiences of Faculty
Dr. Joseph K. Adjei
School of Technology (SOT)
Ghana Institute of Management and Public Administration (GIMPA)
2nd International Conference of the African Virtual University
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...nooriasukmaningtyas
Business intelligence is a collection of methodologies, methods, architectures, and technologies that convert raw data into significant and useful information used by organizations to enable more effective strategic, tactical, and operational insights and decision-making. In spite of several studies have examined the critical success factors and development of business intelligence system, but few relevant studies have investigated perceptions of end-user’s business intelligence systems. Furthermore, none of those studies was performed in a higher education sector in Iraq. Consequently, the study aims to determine the business intelligence system features influencing perceived impact end users’ and of using business intelligence systems in Iraqi educational institutes. A technology acceptance model and technology organization environment framework were syntheses as a basis to develop a research model for business intelligence users' perceived impact and adopt of business intelligence systems named (SMUPIBIS). Later, an online instrument (questionnaire) was designed to gather data from the business intelligence system users in five Iraqi universities. Twentyone hypotheses were proposed and later tested. The main outcomes of this study suggest that decision support, information quality, and real-time reporting are the most significant system characteristics influencing end users' perceived impact and their usage of business intelligence systems.
This document summarizes a meta-analysis of 26 empirical studies that tested the Technology Acceptance Model (TAM). TAM proposes that perceived ease of use and perceived usefulness predict technology acceptance. The meta-analysis found:
1) The relationship between perceived usefulness and acceptance, and between perceived usefulness and perceived ease of use were somewhat strong based on the correlation coefficients.
2) However, the relationship between perceived ease of use and acceptance was weak, and its significance did not pass a fail-safe test.
3) There was mixed evidence across studies for the relationships between the different constructs in TAM. The meta-analysis aimed to synthesize these findings to better understand how TAM applies overall.
Application of technology acceptance model to wi fi user at economics and bus...Alexander Decker
This document summarizes a study that applied the Technology Acceptance Model to examine factors influencing student usage of Wi-Fi at the Economics and Business Faculty of Brawijaya University in Indonesia. The study analyzed how perceived ease of use, perceived usefulness, and perceived playfulness affected student attitudes toward using Wi-Fi, their behavioral intention to use Wi-Fi, and actual Wi-Fi usage. A survey was administered to 100 students to collect data on these variables. The results showed that perceived ease of use, perceived usefulness, and perceived playfulness all significantly influenced student attitudes, intentions, and actual usage of the university's Wi-Fi network.
When to Ask Participants to Think Aloud: A Comparative Study of Concurrent an...CSCJournals
This paper presents the results of a study that compared two think-aloud usability testing methods: the concurrent think-aloud and the retrospective think-aloud methods. Data from task performance, testing experience, and usability problems were collected from 30 participants equally distributed between the two think-aloud conditions. The results suggest that while the thinking aloud method had no impact on task performance and testing experience, participants using the concurrent think-aloud method reported a larger number of problems with the test interface than participants using the retrospective think-aloud method. These findings suggest a reason for preferring the concurrent think-aloud method to the retrospective one.
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
There has been tremendous growth in the field of AI and machine learning. The developments across these
fields have resulted in a considerable increase in other FinTech fields. Cyber security has been described
as an essential part of the developments associated with technology. Increased cyber security ensures that
people remain protected, and that data remains safe. New methods have been integrated into developing AI
that achieves cyber security. The data analysis capabilities of AI and its cyber security functions have
ensured that privacy has increased significantly. The ethical concept associated with data privacy has also
been advocated across most FinTech regulations. These concepts and considerations have all been
engaged with the need to achieve the required ethical requirements. The concept of federated learning is a
recently developed measure that achieves the abovementioned concept. It ensured the development of AI
and machine learning while keeping privacy in data analysis. The research paper effectively describes the
issue of federated learning for confidentiality. It describes the overall process associated with its
development and some of the contributions it has achieved. The widespread application of federated
learning in FinTech is showcased, and why federated learning is essential for overall growth in FinTech.
City i-Tick: The android based mobile application for students’ attendance at...journalBEEI
This paper presents City i-Tick, the android based mobile application for students’ attendance at a university. In this study, we developed mobile application for lecturers to take students’ attendance in City University, Petaling Jaya. Managing students’ attendance during lecture periods has become a difficult challenge. The research objectives for this study are to identify user requirement for City i-Tick, to design and develop City i-Tick, and to demonstrate the prototype of City i-Tick. The study is a narrative participatory design and exploits Design Thinking as the research methodology. City i-Tick was successfully validated by 14 lecturers and System Usability Scale (SUS) was used to determine the findings of the study. We found that City i-Tick is effective for lecturers in taking attendance because it is easy to use, easy to learn, and the users feel confident when using this application.
This document is a technical seminar presentation on enhancing health information security using a modular encryption standard in mobile cloud computing. It contains an introduction explaining mobile cloud computing and its benefits. The objectives section outlines goals of providing secure health information storage, confidentiality, and patient control. The methodology describes a three-step encryption process involving identification, classification, and securing of data at an intermediary "crypto-cloud". Results show the modular analysis, processor and memory utilization, and effectiveness of the proposed encryption scheme. The conclusion states that the layered, modular approach outperforms other techniques but could be improved with quantum computing and blockchain for future work.
A Conceptual Design And Evaluation Framework For Mobile Persuasive Health Tec...Kate Campbell
This document presents a conceptual framework for designing and evaluating the usability of mobile persuasive health technologies. It begins with an introduction on the increasing popularity and use of mobile health apps but also notes that evaluating these apps, particularly with regards to usability, remains a challenge.
The document then reviews existing models for evaluating usability, including the Persuasive Systems Design (PSD) model, various usability models like ISO and Nielsen, and integrated models like PACMAD. It notes that while PSD is useful for design, it is limited for evaluation as its principles are subjective and cannot be easily quantified.
The paper then proposes extending the PSD model with an integrated usability model and using fuzzy analytic hierarchy process to
In this case study we identify the factors that influence the adoption of a new system in a major company in Saudi Arabia. We develop a theoretical framework to help derive better understanding of system adoption via socio-technical integration.
We formulation of 14 hypotheses that were tested via a survey of 42 system users. Management support and change management were found to be significant factors influencing system adoption. As a result, the 14 null hypotheses were rejected due to their statistical significance (p-value < 0.05). Discussions and recommendations for future research are discussed.
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3):96–116
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick
Housley, and Robert K. Cunningham
SoK: Privacy on Mobile Devices – It’s Complicated
Abstract: Modern mobile devices place a wide variety
of sensors and services within the personal space of their
users. As a result, these devices are capable of transpar-
ently monitoring many sensitive aspects of these users’
lives (e.g., location, health, or correspondences). Users
typically trade access to this data for convenient appli-
cations and features, in many cases without a full appre-
ciation of the nature and extent of the information that
they are exposing to a variety of third parties. Never-
theless, studies show that users remain concerned about
their privacy and vendors have similarly been increas-
ing their utilization of privacy-preserving technologies
in these devices. Still, despite significant efforts, these
technologies continue to fail in fundamental ways, leav-
ing users’ private data exposed.
In this work, we survey the numerous components of
mobile devices, giving particular attention to those that
collect, process, or protect users’ private data. Whereas
the individual components have been generally well
studied and understood, examining the entire mobile de-
vice ecosystem provides significant insights into its over-
whelming complexity. The numerous components of this
complex ecosystem are frequently built and controlled
by different parties with varying interests and incen-
tives. Moreover, most of these parties are unknown to
the typical user. The technologies that are employed to
protect the users’ privacy typically only do so within
a small slice of this ecosystem, abstracting away the
greater complexity of the system. Our analysis suggests
that this abstracted complexity is the major cause of
many privacy-related vulnerabilities, and that a funda-
mentally new, holistic, approach to privacy is needed
going forward. We thus highlight various existing tech-
nology gaps and propose several promising research di-
rections for addressing and reducing this complexity.
Keywords: privacy-preserving technologies, mobile, An-
droid, iOS
DOI 10.1515/popets-2016-0018
Received 2015-11-30; revised 2016-03-01; accepted 2016-03-02.
Chad Spensky: University of California, Santa Barbara,
[email protected]
Jeffrey Stewart: MIT Lincoln Laboratory,
[email protected]
1 Introduction
The rapid proliferation of mobile devices has seen them
become integral parts of many users’ lives. Indeed, these
devices provide their users with a variety of increasingly
essential services (e.g., navigation, communication, and
Internet connectivity), as well as useful functionality
(e.g., entertainment and photography). To accommo-
date these services, modern mobile devices are equipped
with various sensors, capable of collecting extremely rich
information about their users and their surroundings.
Users and de ...
Getting Successful Universal Ehr Is Not Just Technology...Jessica Tanner
Here are the key factors affecting the usefulness of social networking in e-learning according to the passage:
- Perceived usefulness and ease of use as defined in the Technology Acceptance Model (TAM). These factors influence students' and educators' attitudes toward adopting social networking tools.
- Connectedness and communication. Social networking allows for increased interaction, collaboration, and sense of community among students and between students and educators.
- Popularity and familiarity. Using established social networks like Facebook that students are already using makes e-learning tools more approachable and useful.
- Traditional mindsets. Some educators have not embraced social networking and may prohibit its use, reducing its potential usefulness in e-learning.
-
NATIONAL CULTURAL DIMENSIONS AND ELECTRONIC CLINICAL RECORDS ACCEPTANCE: AN E...IJMIT JOURNAL
This document summarizes an exploratory study on the impact of national cultural dimensions on the acceptance of electronic clinical records. The study was conducted at the Ibn Sina Hospital Center in Morocco. The researchers developed a measurement scale based on prior models of technology acceptance and national cultural factors. They administered a survey to healthcare professionals and analyzed the results using exploratory factor analysis and reliability testing to validate the measurement constructs. The findings showed a satisfactory factorial structure and excellent reliability of the measurement items. The researchers' contribution focused on the initial exploratory phase of scale development.
Similar to Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model (20)
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent.
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This talk will discuss technical, human, societal, and policy issues concerning hyperconnectivity and IoT. Additionally, this talk will offer insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
The document discusses gaining control of a situation through intelligence gathering and search techniques in order to find vulnerabilities that can be exploited to perform unparalleled events. It explores controlling the landscape through applying intelligence operations, information warfare, data science, and cybersecurity to search for and sample applications that allow one to exploit and destroy through techniques like searching for PHP errors that enable SQL injection. The session aims to explore this landscape and applications of control, search, exploit, and destroy.
The document summarizes the activities of the Midwest Association for Information Systems (MWAIS) in 2017, provides information about the 2018 annual conference, and makes a call for future conference organizers. Key points:
- MWAIS was recognized for the third year in a row as an outstanding AIS chapter in 2016. The 2017 annual conference in Springfield, Illinois was well attended with over 100 participants.
- The 2018 conference will be held in St. Louis, Missouri in May and focus on the theme of cybersecurity.
- Future conferences will be hosted by the University of Wisconsin-Oshkosh in 2019 and Drake University in 2020. Hosting a conference is an opportunity to showcase a university and
The document provides insights from a student who traveled to Guinea, Conakry to conduct a 2-week training assignment for the agriculture sector. The student trained Agriculture Trainers and Specialized Technicians in computer skills like Microsoft Office and using the Internet as a research tool. The experience helped the student contribute to the global society and learn about Guinean culture. The student advised that such assignments provide professional and personal growth opportunities. The document also discusses establishing an enterprise security architecture and key elements to consider like information, strategies, security mechanisms, and security services. The architecture should be flexible, adaptable, and promote self-regulation to address evolving security threats.
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
This document provides the schedule for the 2018 Midwest Association for Information Systems (MWAIS) Conference taking place May 17-18 at the University of Missouri-St. Louis. The schedule lists the times, locations, and topics for events including keynote speakers, panels, presentations in concurrent sessions, workshops, and social events. Some of the topics covered are cybersecurity, artificial intelligence, healthcare IT, e-commerce, and pedagogical issues related to information systems education. Transportation between the conference hotel and campus is provided via shuttle.
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
Midwest Association for Information Systems
13th Annual Conference
May 24 – 25, 2018
College of Business Administration
University of Missouri – Saint Louis
Saint Louis, Missouri
We invite submissions of completed manuscripts, research-in-progress papers, panel proposals, and workshop proposals addressing behavioral, organizational, and technical aspects of information systems. Two to three parallel sessions are planned. A computer lab will be available if needed. Submitted papers and proposals will undergo a double blind review process by at least two reviewers. To facilitate the blind review, include the title of the paper, names, affiliations, mailing addresses, e-mail addresses, and phone numbers of all authors on a cover page submitted as a separate document from the body of the manuscript. If one or more of the co-authors are students, please clearly indicate so. Include only the title of the paper at the beginning of the manuscript. In the case of multiple-authorship, designate the corresponding author with a footnote on the cover page. Please do not include any author or affiliation identification on any page (except the separate cover page), in headings/footers, or in the properties of the submitted file. Previously published work or work under review elsewhere is not eligible for submission. All submissions should be posted electronically in either MS Word or PDF.
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
Recently some countries have fell victim to attacks from nation-states, cyber criminals, and bad actors resulting in loss of critical data or damage to critical infrastructure. Thus there is an urgent need to design, implement, and deliver innovative solutions that meet the challenges through advancements in intellection collection, analysis. This submission will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world concerning multiple sources of intelligence. This submission will provide insights into technological advancement for all cyber intelligence. Additionally, technological advancements for subjects such as open source intelligence, human intelligence, geospatial intelligence, social media intelligence, and data science will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
Data and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
This presentation discusses UMSL's cyber security program which is currently the only and first NSA & DHS CAE in cyber security education in the St. Louis Metropolitan Region.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
2. 4 M. Eltayeb and M. Dawson
services for personal use. In this paper, we refer to PCC as the private and hybrid
cloud computing for the individual user’s usage. PCC has emerged as a new para-
digm model for individual users. It has transformed the user’s computer device
from being device-centric to information-centric [1-7]. PCC enables individuals to
share music, photos, videos, documents, and applications using any computer
devices connected to the network. It provides portable access from anywhere in
the world to information held centrally.
Though PCC demonstrated great potential in terms of scalability and agility,
and is therefore enjoying great popularity and attention, storing data and applica-
tions in the cloud is becoming very risky [8]. Many cloud users have become con-
cerned about security and protection of privacy [9], perhaps not surprisingly as the
cloud functions to store and share private data [10]. The main challenge and dis-
advantage users see in the adoption of cloud computing is that they lack full con-
trol over the hardware [11]. There are, therefore, several issues related to privacy
and security that must be addressed before PCC can be considered reliable.
Very often, data stored in the cloud is seen as valuable to those with malicious
intent [12]. Storing data and applications in the cloud is becoming very risky. It is
very important for users to take personal precautions in order to secure personal,
sensitive information—information they would have stored in their local computer
device (laptop, desktop, phone, tablet, etc.), and now store in the cloud. It is criti-
cal for users to understand the security measures that the cloud provider has in
place [13].
Predicting technology usage and adoption has become a topic of mainstream
study [14]. The rapidly growing importance of technologies has led researchers to
study user technology acceptance intensively. Negative attitudes toward a tech-
nology, its ease of use, and its usefulness may negatively impact the success of
that technology. Indeed, several IT scholars considered the user’s acceptance of a
technology to be the key success factor for the adoption of that technology [15].
The remaining of the paper is organized as follows: in the next section, we pre-
sent the objectives of the study. Section 2 discusses and articulates our theoretical
framework. Section 3 presents the research questions and hypothesis. The popula-
tion sample information are discussed in section 4. A detailed discussion of
the study’s data collection and validation are provided in section 5. Section 6
discusses the data analysis of the study.
Section 5 presents methods used for data collections. Section 6 discusses the
data analysis. Section 7 discusses our findings; and additional findings are dis-
cussed in section 8. Our recommendation and discussion are presented in section 9.
Finally, section 10 concludes the paper.
2 Theoretical Framework
This research was deductive in nature. Therefore, a quantitative method was
selected to understand user’s acceptance of PCC. In particular, a non-experimental
quantitative approach was used. The theoretical framework utilized in this study
3. Understanding User’s Acceptance of Personal Cloud Computing 5
was based on TAM—a widely recognized model in the field of IT, introduced by
Davis in 1986 [16]. Davis [16, 17] recommended TAM as the best model for in-
vestigating end user attitudes towards and acceptance or rejection of a technology.
According to Gao [18], “TAM can serve the purpose of predicting user acceptance
of a technology before the users get heavily involved in the technology and thus is
a cost-effective tool in screening potential candidate systems or programs” (p. 3).
This theoretical framework was used in this study to examine factors influencing
PCC adoption.
TAM proposes two independent variables—perceived ease of use, and perceived
usefulness (PU) of a technology—to predict the user’s attitude toward adopting a
technology [18]. Davis [16, 17] defined PU as the degree to which a user believes
that the adoption of a particular technology will improve the performance of his or
her job. The perceived ease of use, on the other hand, is the degree to which a user
believes that using a particular technology would be effortless [17].
Since the purpose of this study was to understand users’ thoughts, experiences,
expectations, and security concerns with respect to the adoption of PCC, TAM was
found to be the most suitable theoretical approach due to its validity and reliability in
exploring and explaining users’ attitudes toward using technologies [16]. Cloud
computing is a new approach to computing [19], and as new technologies are intro-
duced and are adopted, concerns and challenges emerge [20]. Therefore, this study
on PCC technology has a legitimate place in research on user technology
acceptance.
This research study extended TAM to include attitude towards using (ATU) as
an additional independent variable. This study adapted a survey instrument tested
by Davis [16], and validated by Venkatesh [21]. Overall, this study included three
independent variables and one dependent variable. The independent variables are
perceived ease of use (PEOU), attitude toward using PCC (ATU) and perceived
usefulness of PCC (PU). One dependent variable—Intention to Use PCC (ITC)—
was used broadly in this study.
3 Research Questions and Hypothesis
3.1 Research Question 1: How Does Perceived Ease of Use
Influence the Acceptance of PCC?
H1A: Perceived ease of use positively influences attitude toward the acceptance of
PCC.
H10: Perceived ease of use has no correlation to attitude toward the acceptance of
PCC.
4. 6 M. Eltayeb and M. Dawson
The independent variable PEOU determines the degree to which a user believes
that using PCC would be effortless. PEOU is measured on a typical scale of seven
ordered continuum of response categories: Strongly disagree, Disagree, Slightly
disagree, Neutral, Slightly agree, Agree, Strongly agree.
3.2 Research Question 2: How Does Perceived Usefulness of
PCC Influence the Acceptance of PCC?
H2A: Perceived usefulness positively influences attitude toward the acceptance of
PCC.
H20: Perceived usefulness has no correlation to attitude toward the acceptance of
PCC.
The independent variable PU determines the degree to which a user believes that
the adoption of PCC would improve the performance of his or her job. PU is
measured on a typical scale of seven ordered continuum of response categories:
Strongly disagree, Disagree, Slightly disagree, Neutral, Slightly agree, Agree,
Strongly agree.
Research Question 3: How does attitude toward using PCC influence
acceptance of PCC?
H3A: There will be a correlation between attitude toward using PCC and the
user’s acceptance of PCC.
H30: There will be no correlation between attitude toward using PCC and the
user’s acceptance of PCC.
The independent variable (ATU) determines the degree to which a user’s
acceptance of PCC relates to that user’s attitude toward using PCC. ATU is meas-
ured across a typical scale of seven ordered continuum of response categories:
Strongly disagree, Disagree, Slightly disagree, Neutral, Slightly agree, Agree,
Strongly agree.
4 Population Sample
This study used a simple random sample from Survey Monkey engineering and IT
professionals panels. The minimum representative sampling size (n) was estimated
to be 384 participants for this study, based on a confidence interval of 5% and
a confidence level of 95%. As many participants as possible were included to
increase the accuracy of statistical sampling data.
5. Understanding User’s Acceptance of Personal Cloud Computing 7
A total of 464 participants were randomly chosen to participate in the study.
However, only 399 of the chosen participants fully completed the survey; 20 par-
ticipants opted out and 45 were disqualified either with unanswered questions or
with providing partial data. Only fully completed responses were admitted. There
was a 95.69% completion rate of surveys. Thus, the number of completed responses
exceeded the estimated, representative minimal sample size of 384. Several items in
the survey—gender, age range, education, state, and census region—were included
to further describe demographic characteristics of the sample.
5 Data Collection and Validation
This study used a web survey to collect data from participants. The survey was
hosted by SurveyMonkey.com, which is considered one of the leading providers
of online survey solutions. The identity of participants was kept confidential and
anonymous. Participant had the right to withdraw from participation at any time.
Participants were required to complete a consent form as soon as they login to the
SurveyMonkey.com. The consent form store collected information confidentially.
Information collected by the survey included: gender, age range, state of residence,
and level of education.
The survey questions in this study were designed to express a clearly negative
or positive opinion and avoided neutral opinions to solicit more definitive
responses. The researcher transcribed the data collected through Survey Monkey
into digital documents. Data was downloaded by the researcher after the comple-
tion of data collection. Only fully completed surveys were employed in this study.
Some participants were disqualified either with unanswered questions or with
providing partial data. Incomplete responses and partial data were completely
discarded. Additionally, Survey data was assessed for multicollinearity, homosce-
dasticity, linearity, and normality [22].
6 Data Analysis
The multiple regression test was performed as follows: (1) predictors were se-
lected using their semi-partial correlation with the outcome; (2) predictors were
entered into the model based on a mathematical method using Statistical Package
for the Social Sciences (SPSS) Version 19.0; (3) the selection of predictors was
performed in steps [23].
Descriptive statistics, ANOVA, Chi-square, and Multiple regressions were per-
formed to explore the relationship between the continuous dependent variable
(ITU) and independent variables (PEOU, PU, and ATU). Several descriptive sta-
tistics techniques were used to depict the sample population characteristics.
ANOVA was used to analyze both dependent and independent variables. In addi-
tion, the multiple regression test was performed to assess the impact of each
independent variable (PU, PEOU, and ATU) on the dependent variable (ITU).
6. 8 M. Eltayeb and M. Dawson
7 Findings
TMultiple regressions were performed to explore the relationship between the
continuous dependent variable (ITU) and independent variables (PEOU, PU, and
ATU). This research study tested the relationship between perceived ease of use,
usefulness, attitude toward using PCC, and the acceptance of PCC. The model’s
adequacy was tested in terms of normality, linearity, and collinearity [24].
7.1 First Regression Model
The first regression was performed to determine the relationship between the in-
dependent variable PEOU and the dependent variable ITU. Six predictors of the
independent variable PEOU were tested to address the first research question. The
relationship between the predictors and the outcome were measured using a step-
wise method, so that the unique contribution of each predictor could be assessed to
explain variance of the outcome [24]. The following research question and
hypothesis were tested at this stage:
How does perceived ease of use influence the acceptance of PCC?
H10: Perceived ease of use has no correlation to the acceptance of PCC.
The results of the regression analysis demonstrated a positive correlation between
PEOU and the acceptance of PCC. It was found that approximately 23.5% of the
variance in the acceptance of PCC can be accounted for by PEOU. Therefore, the
null hypothesis was rejected and the alternative was supported.
This result is consistent with other studies showing that there is a positive cor-
relation between PEOU and the user’s acceptance of a technology. Davis [16]
argued that perceived ease of use positively influence attitude toward using a
technology. Perceived ease of use plays an important role in determining and pre-
dicting the user’s intention to use a technology [25]. Ramgovind [26] stated “The
success of modern day technologies highly depends on its effectiveness of the
world’s norms, its ease of use by end users and most importantly its degree of
information security and control” (p. 1).
7.2 Second Regression Model
The second regression was performed to determine the relationship between the
independent variable PU and the dependent variable ITU. Five predictors of the
independent variable PU were tested to address the first research question.
A stepwise regression was performed to build the model. The unique contribution
of each predictor was measured to explain the variance of the outcome [24]. The
following research question and hypothesis were tested at this stage:
7. Understanding User’s Acceptance of Personal Cloud Computing 9
How does perceived usefulness of PCC influence the acceptance of PCC?
H20: Perceived usefulness has no correlation to attitude toward the acceptance of
PCC.
The results of the regression analysis demonstrated a positive correlation between
PU and the acceptance of PCC. It was found that approximately 78.2% of the
variance in the acceptance of PCC can be accounted for by PU. Therefore, the null
hypothesis was rejected and the alternative was supported. This result is consistent
with other studies showing that there is a positive correlation between PU and the
user’s acceptance of a technology.
7.3 Third Regressions Model
The third regression was performed to determine the relationship between the
independent variable ATU and the dependent variable ITU. Four predictors of
the independent variable ATU were tested to address the first research question.
The relationship between the predictors and the outcome were measured using
stepwise regression. The unique contribution of each predictor was measured to
explain the variance of the [24]. The unique contribution of each predictor is
measured to explain the variance of the outcome. The following research question
and hypothesis were tested at this stage:
How does attitude toward using PCC influence user’s acceptance of PCC?
H30: There will be no correlation between attitude toward using PCC and user’s
acceptance of PCC.
The independent variable ATU was used for determining the degree in which
there is a correlation between attitude toward using PCC and users’ intention to
use. The results of the regression analysis demonstrated a significant correlation
between ATU and the acceptance of PCC. It was found that approximately 38.2%
of the variance in the acceptance of PCC can be accounted for by ATU. Therefore,
the null hypothesis was rejected and the alternative was supported.
8 Additional Findings
Statistically significant differences were found between age group means, as indi-
cated by results of the one-way ANOVA (F (5, 2.801)=2.801, p=.017). The output
result of the one-way ANOVA showed that the age group significantly contributed
to the variation in the respondent’s acceptance of the PCC technology. Because
the output result of the one-way ANOVA test demonstrated significant differences
between the age groups, a Post Hoc test was conducted to further investigate
which means were significantly different from each other. The Post Hoc test result
8. 10 M. Eltayeb and M. Dawson
indicated that the score of the age group 40-49 was much higher than the other age
groups. Also, age groups 21-29 and 30-39 appeared to accept PCC more easily
compared with age groups 18-20, 50-59, and 60-80.
A chi-square test of independence was performed to examine the relation
between independent variables (PU, PEOU, and ATU) and the acceptance of PCC.
A significant relationship was found between the independent variables and the
frequency of acceptance of PCC at p-value <0.01, and degrees of freedom of 36.
Additionally, a chi-square test of independence was performed to examine the
relation between age group and acceptance of PCC. No significant relationship
was found between age group and the frequency of acceptance of PCC, X2(10,
N=399) =17.24, p-value=.069. The acceptance of PCC among the age group was
as follows: approximately 66.6% of the age group “18-20;” 75% of the age group
of “21-29;” 73% of the age group “30-39;” 80.5% of the age group “40-49;”
69.9% of the age group “50-59;” and 67.3% of the age group “60-80.” Over-
whelming majority of users that accepted PCC were in the “40-49” age group. On
the other hand, the majority of users that did not have intention to use PCC were
in the age group “60-80.”
9 Discussion and Recommendation
Given the results of the data analysis in this study, it is arguable that PCC is here
to stay. However, there are several issues related to security and privacy that must
be tackled to increase user’s acceptance of PCC. Hardly a day goes by without
hearing news about privacy and security concerns of users. The findings of this
study demonstrated that users are concerned about the way security and privacy is
handled in the cloud. Protecting users’ privacy in the cloud is big business for
cloud providers. The success of a technology depends greatly on its ease of use
but even more crucially its degree of security [26]. According to Koved [27],
“When end-users' perceptions of risk are not aligned with those on which the sys-
tem is based, there is a mismatch in perceived benefit, leading to poor user ac-
ceptance of the technology” (p. 1). Thus, users’ understanding of privacy and
security in the cloud rapidly becomes obsolete as the PCC technology progresses.
Privacy and security must be evaluated continuously to achieve information privacy
and security objectives and, thereby, user acceptance.
Prior research has shown that perceived privacy and security risks in the cloud
negatively influence attitude toward using cloud computing. There are always secu-
rity risks when moving towards cloud computing [28]. Though computer users
would like to use PCC, they are concerned with utilizing a system they do not con-
trol. Data stored in the cloud is often seen as valuable to those with malicious intent
[12]. It is very important for users to take precautions in order to secure personal,
sensitive information—information they would have stored in their local computer
device and now store in the cloud. It is critical for users to understand the security
measures the cloud provider has in place before moving toward PCC [13].
9. Understanding User’s Acceptance of Personal Cloud Computing 11
10 Conclusion
The study’s objective was to understand users’ acceptance of PCC and a web sur-
vey was conducted to assess it. Several key findings emerged from this research
study. The results of the data analysis showed that the majority of respondents had
a positive view about PCC, but the participants seemed particularly concerned
about security, privacy, and data theft in the cloud. User’s attitude towards PCC
appeared to be the most critical factor among the three suggested determinants of
PCC acceptance in this study.
References
1. Ularu, E.G., Puican, F.C., Suciu, G., Vulpe, A., Todoran, G.: Mobile computing and
cloud maturity Introducing machine learning for ERP configuration automation.
Informatica Economica 17(1), 40–52 (2013)
2. Onyegbula, F., Dawson, M., Stevens, J.: Understanding the need and importance of the
cloud computing environment within the National Institute of Food and Agriculture, an
agency of the United States Department of Agriculture. Journal of Information
Systems Technology & Planning 4(8), 17–42 (2011)
3. Dhar, S.: From outsourcing to cloud computing: Evolution of IT services. Management
Research Review 35(8), 664–675 (2012)
4. Okezie, C.C., Chidiebele, U.C., Kennedy, O.C.: Cloud computing: A cost effective
approach to enterprise web application implementation (A case for cloud ERP web
model). Academic Research International 3(1), 432–443 (2012)
5. Reavis, D.: Information evaporation: The migration of information to cloud computing
platforms. International Journal of Management & Information Systems (Online)
16(4), 291 (2012)
6. Lin, A., Chen, N.C.: Cloud computing as an innovation: Perception, attitude, and adop-
tion. International Journal of Information Management 32(6), 533–540 (2012)
7. Tian, Y., Song, B., Huh, E.N.: Towards the development of PCC for mobile thin-
clients. In: 2011 International Conference on Information Science and Applications
(ICISA). IEEE (2011). doi:10.1109/ICISA.2011.5772368
8. Dutta, A., Peng, G.C.A., Choudhary, A.: Risks in enterprise cloud computing: The per-
spective of its experts. The Journal of Computer Information Systems 53(4), 39–48
(2013)
9. Han, Y., Sun, J., Wang, G., Li, H.: A cloud-based BPM architecture with user-end dis-
tribution of non-compute-intensive activities and sensitive data. Journal of Computer
Science and Technology 25(6), 1157–1167 (2010)
10. Wang, H.: Privacy-preserving data sharing in cloud computing. Journal of Computer
Science and Technology 25(3), 401–414 (2010)
11. Katzan Jr., H.: On the privacy of cloud computing. International Journal of Manage-
ment and Information Systems 14(2), 1–12 (2010)
12. Chakraborty, R., Ramireddy, S., Raghu, T.S., Rao, H.R.: The information assurance
practices of cloud computing vendors. IT Professional Magazine 12(4), 29–37 (2010)
13. Alzain, M.A., Soh, B., Pardede, E.: A new model to ensure security in cloud compu-
ting services. Journal of Service Science Research 4(1), 49–70 (2012)
10. 12 M. Eltayeb and M. Dawson
14. Selamat, Z., Jaffar, N.: IT acceptance: From perspective of Malaysian bankers. Interna-
tional Journal of Business and Management 6(1), 207–217 (2011)
15. Cocosila, M.: Role of user a priori attitude in the acceptance of mobile health: An
empirical investigation. Electronic Markets 23(1), 15–27 (2013)
16. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of IT.
MIS Quarterly 13(3), 318–342 (1989)
17. Davis, F.D.: User acceptance of IT: System characteristics, user perceptions and be-
havioral impacts. International Journal of Man-Machine Studies 38(3), 475–487 (1993)
18. Gao, Y.: Applying the technology acceptance model (TAM) to educational hyperme-
dia: A field study. Journal of Educational Multimedia and Hypermedia 14(3), 237–247
(2005)
19. Khan, S., Khan, S., Galibeen, S.: Cloud computing an emerging technology: Changing
ways of libraries collaboration. International Research: Journal of Library and Infor-
mation Science 1(2), 151–159 (2011)
20. Paquette, S., Jaeger, P., Wilson, S.: Identifying the security risks associated with gov-
ernmental use of cloud computing. Government Information Quarterly 27, 245–253
(2010)
21. Venkatesh, V.P.: An assessment of security vulnerabilities comprehension of cloud
computing environments: a quantitative study using the unified theory of acceptance
and use. (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses.
(Order No. 3564324, Capella University) (2013)
22. Vogt, P.: Quantitative research methods for professionals. Pearson Education, Boston
(2007)
23. Field, A.: Discovering statistics using SPSS. Sage, Thousand Oaks (2009)
24. Fabozzi, F.J., Focardi, S.M., Rachev, S.T., Arshanapalli, B.G.: Building and testing a
multiple linear regression model. In: The Basics of Financial Econometrics: Tools,
Concepts, and Asset Management Applications, pp. 81–102. John Wiley & Sons,
Hoboken (2014)
25. Hackbarth, G., Grover, V., Yi, M.Y.: Computer playfulness and anxiety: Positive and
negative mediators of the system experience effect on perceived ease of use. Infor-
mation & management 40(3), 221–232 (2003)
26. Ramgovind, S., Eloff, M. M., Smith, E.: The management of security in cloud compu-
ting. In: Information Security for South Africa (ISSA), pp. 1–7. IEEE (2010)
27. Koved, L., Trewin, S., Swart, C., Singh, K., Cheng, P.C., Chari, S.: Perceived security
risks in mobile interaction. In: Symposium on Usable Privacy and Security (SOUPS),
July 2013. http://cups.cs.cmu.edu/soups/2013/risk/Koved-RP-IT-2013.pdf
28. Aleem, A., Christopher, R.S.: Let me in the cloud: Analysis of the benefit and risk
assessment of cloud platform. Journal of Financial Crime 20(1), 6–24 (2013)