94,341 research outputs found

    THE role of the technology acceptance model in information systems research: a case study

    Get PDF
    Explaining the factors that lead to use and acceptance of information technology (IT), both at individual and organizational levels, has been the focus of information systems (IS) researchers since 1970s. The Technology Acceptance Model (TAM) is known as such an explanatory model and has increasingly gained recognition due to its focus on theories of human behaviour. Although this model has faced with some criticism in terms of not being able to fully explain the social-technical acceptance of technology, it is still known as one of the best IS methodologies that contributes greatly to explaining it. This paper discusses, describes and explains TAM as one of the well-known information system research methodologies and attempts to demonstrate how this model can be applied in practice in IS research projects. TAM is widely used in different areas of IS studies such as e-commerce, e-business, multimedia and mobile commerce. This paper shows how TAM can be applied in an IS research project by referring to a case study conducted in the area of mobile banking in the UK. This paper aims to contribute to IS research by providing an informed criticism of TAM as well as a clear proposal on how to use it

    Why Do People Adopt, or Reject, Smartphone Password Managers?

    Get PDF
    People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers

    (De)convergence in TV: a comparative analysis of the development of Smart TV

    Get PDF
    Against the backdrop of media convergence, Smart TVs are developing rapidly in large parts of the world. Smart TV refers to the integration of broadband Internet and social media features into TV sets. From a media business perspective, the proliferation of Smart TV services may put pressure on the market structure of the TV landscape, and urge for new business models in order to capture the dynamics of media convergence. By means of a comparative analysis in four European markets (Belgium, Germany, the Netherlands and the United Kingdom), the development of Smart TV is sketched in terms of viewing patterns, business models and standardization. The conclusion is that national TV markets are evolving quite differently, so that service providers must adapt their marketing strategies to reflect local market conditions. Hence, the success of Smart TV ultimately depends on the local package of value-added services and the amount of strategic partnerships with content owners, TV broadcasters and pay-TV operators

    Theorizing Digital Divides and Digital Inequalities

    Get PDF
    • …
    corecore