242 research outputs found
Saudi Citizens’ Perceptions on Mobile Government (mGov) Adoption Factors
The Saudi government has recently paid serious attention towards utilising mobile technology in order to deliver government services electronically to its citizens. This study attempts to explore citizens’ (potential users) perceptions on a number of factors that may be important for encouraging the widespread adoption of mobile government (mGov) services in the context of Saudi Arabia. The factors descriptively explored in this research include: perceived risk, innovativeness; performance expectancy, effort expectancy, social influence, facilitating conditions, perceived value, hedonic motivation and behavioural intension. The survey data utilised in this research was collected through a self-administered questionnaire to 600 participants (with a response rate of 66%) within a convenience sample. The results obtained through a descriptive analysis demonstrated that the aforementioned factors are perceived as important by Saudi citizens and they have strong behavioural intention to adopt mGov services
The Factors Affected m-Services Adoption in Airports
This research focus on the factors which affected m-Services utilization in airport from airport’s functionaries point of view. Also, the background of this research is related to some former researches which defined some models that may increase the exertion of electronic mobile based service application (m-Services) such as: TAM, UTAUT, and UTAUT2. However, the former literature reviews only elucidate the factors which affect the increasing of m-Services or mobile technologies/ self service technology exertion from customer point of view. While, there are less of them apprising the factors affected m-Services adoption from airport’s functionaries point of view. The purpose of this study is fulfilling the lack in the literature review by apprising the study towards airport’s functionaries point of view. To reach the purpose of the study, this study applies literature review method. The literature review’s source of this study is originated from some international journals which discuss the factors of airport’s functionaries side. The result of this study are the Explanation of the factors affected m-Service adoption or mobile technologies/ self-services technology from airport’s functionaries point of view and the development of conceptual model related to the factors affected m-Services adoption from airport’s function perspective
Recommended from our members
Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia.
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords.
This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems.
As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study.
From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology.
For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the
iv
research framework, the model has proven its efficiency as a good predictor for the biometric authentication system.
Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant.
This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia.
Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products
Construction Industry Hesitation in Accepting Wearable Sensing Devices to Enhance Worker
The construction industry is one of the most unsafe industries for workers in the United States. Advancements in wearable technology have been proven to create a safer construction environment. Despite the availability of these devices, use within the construction industry remains low. The objective of this research is to identify and analyze the causes behind the reluctance of the construction industry to implement two specific wearable safety devices, a biometric sensor, and a location tracking system. Device acceptance was analyzed from the perspective of the user (construction field labor) and company decision makers (construction managers). A modified unified theory of acceptance and use of technology (UTAUT) model was developed specific to barriers commonly found within technology adoption in the construction industry including: perceived performance expectancy, perceived effort expectancy, openness to data utilization, social influence, data security, and facilitating conditions. A structured questionnaire was designed to test for association between the mentioned constructs and either behavioral intention or actual use. The questionnaire went through an expert review process, and a pilot study was conducted prior to being distributed to industry. Once all data was received Pearson chi-squared analysis was used to test for association between the constructs. A minority (46%) of labor respondents would not agree to voluntarily use the biometric wearable sensing device. Constructs associated with this finding included perceived performance expectancy, perceived effort expectancy, and social influence. A majority (59%) of labor respondents would not agree to voluntarily use the location tracking wearable sensing device. Constructs associated with this finding included perceived performance expectancy, social influence, and data security. A majority (56%) of management respondents would not implement the biometric wearable sensing device. Constructs found to be associated with this finding included perceived performance expectancy, openness to data utilization, and social influence of the client. A supermajority (68%) of management respondents would not implement the location tracking wearable sensing device. Constructs found to be associated with this finding include perceived performance expectancy, perceived effort expectancy, openness to data utilization, social influence, and data security. This study will aid in the successful implementation of wearable sensing devices within the construction industry. Findings from this study can be used to aid those hoping to implement wearable sensing devices by identifying causes of wearable sensing device rejection. The results of this study can be used by both project managers and health and safety professionals to aid in device acceptance by field labor, and by those whose goal is to increase device use among construction firms
Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager\u27s Perspective
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers\u27 and doctors\u27 perceptions of the effectiveness of palm vein authentication technology. The research questions were designed to investigate the relationship between intention to adopt palm vein authentication technology and perceived usefulness, complexity, security, peer influence, and relative advantage. The unified theory of acceptance and use of technology was the theoretical basis for this quantitative study. Data were gathered through an anonymous online survey of 109 healthcare managers and doctors, and analyzed using principal axis factoring, Pearson\u27s product moment correlation, multiple linear regression, and 1-way analysis of variance. The results of the study showed a statistically significant positive correlation between perceived usefulness, security, peer influence, relative advantage, and intention to adopt palm vein authentication. No statistically significant correlation existed between complexity and intention to adopt palm vein authentication. These findings indicate that by effectively using palm vein authentication, organizations can mitigate the risk of medical fraud and its associated costs, and positive social change can be realized
Factors Affecting SMEs' Intention to Adopt a Mobile Travel Application based on the Unified Theory of Acceptance and Use of Technology (UTAUT-2)
This study is part of a government research project which aims to synthesise the current evidence on the factors affecting the intention of mobile application adoption called ‘Tripper Notifier Application’ (TNA) for the hospitality and tourism industrial sector in Thailand. The focus is on small and medium enterprises (SMEs), which emphasize restaurants, hotels, and attraction sites. The present article examines various factors influencing the intention to use such applications by employing the Unified Theory of Acceptance and Use of Technology 2 (UTAUT-2) as the theoretical underpinning of this research paradigm. Using 84 selected research papers in Scopus published between 2020 and 2022, A thematic analysis incorporating a grounded theory approach to systematically generate themes was conducted, and the findings found three main themes, including business transformation capabilities (BTC), digital transformation capabilities (DTC), and personal innovativeness (PI), as an extension of UTAUT-2 as mediator and moderator variables. To this end, the study fills the research gaps and extends the UTAUT-2 framework by including an initiative of twelve inside attributes-based lines, including performance expectancy, effort expectancy, social influence, facilitating conditions, hedonic motivation, price value, habit behavior, behavioral intention, and use behavior, together with three moderators: age, gender, and experience. Finally, the context dimensions of the UTAUT-2 extensions were mapped to highlight all the constructs of the TNA adoption framework for future research directions. The novel contribution of this study is to fill the gap with both theoretical and practical knowledge. On the theoretical level, this study constitutes constructs based on UTAUT-2 theory as a research-based setting to fill a gap in research. On the practical level, it provides insights and information about new capabilities that SME owners, managers, and practitioners should consider in order to differentiate their own capabilities. Doi: 10.28991/esj-2021-SP1-014 Full Text: PD
Understanding the Adoption Intention of AI through the Ethics Lens
Understanding users and user behaviors in accepting new technologies such as AI has been ever more important. Meanwhile, information systems with AI inevitably engenders such ethical issues as transparency and accountability related to the consequences of recognition, decisions, and recommendations. Our work adds moral psychology variables to the Theory of Reasoned Action (TRA) in order to better explicate the adoption aspects of AI. For the research, we employed social desirability and self-consistency of moral psychology as underlying attitudes. And also, the moral norm is added to TRA to moderate the effect of the attitudes on the outcome variable. The empirical results indicate a direct and indirect role of the morality-related variables in explaining users’ AI adoption intentions. It was learned that moral psychology plays an important role in explaining user attitudes toward AI and subsequent intentions of adopting an AI system
Factors encouraging and hindering a wider acceptance and more frequent utilization of mobile payment systems: an empirical study among mobile phone subscribers in Turkey
Purpose- This research deals with determining the factors that affect adoption of mobile payment technology among consumers, in Turkey. It seeks to find any patterns and connections that may be of aid in framing an implementation strategy for facilitating further adoption. It has gathered different definitions of “mobile payment” in literature and used a consumer side definition. Methodology- A survey is conducted among mobile phone subscribers in Istanbul, Turkey for primary data collection phase of this research. Istanbul is the city that holds the biggest population and has the highest amount of mobile phone subscribers in the country. Istanbul’s current population is more than 15.6million and mobile phone subscriptions are more than 22million as of 2019. Survey responses have been analysed with structural equation modelling and results are presented in the corresponding sections. Findings- Empirical findings of the research show that factors such as usefulness, security, social influence, ease of use, enjoyment and innovativeness have positive effects on use of mobile payments among consumers. Factors such as attractiveness of alternatives and new technology anxiety have negative effects on use of mobile payments. Conclusion- This research has shown that mobile payments are a potential mainstream trend for the near future. Several benefits of the mobile payment value chain for both technology providers and the consumers have been identified. Other findings of this research can be stated as the challenges which the stakeholders are experiencing while trying to extend mobile payment technologies to a wider consumer base. Therefore, the results and the variables can be used by service providers who want to launch new mobile payment solutions for similar markets and they can take actions for getting more efficient results accordingly.Publisher's Versio
Consumer Adoption of Self-Service Technologies in the Context of the Jordanian Banking Industry: Examining the Moderating Role of Channel Types
YesThis study aimed to examine the key factors predicting Jordanian consumers’ intentions and
usage of three types of self-service banking technologies. This study also sought to test if the
impacts of these main predictors could be moderated by channel type. This study proposed a
conceptual model by integrating factors from the unified theory of acceptance and use of
technology (UTAUT), along with perceived risk. The required data were collected from a
convenience sample of Jordanian banking customers using a survey questionnaire. The
statistical results strongly support the significant influence of performance expectancy, social
influence, and perceived risk on customer intentions for the three types of SSTs examined. The
results of the X2 differences test also indicate that there are significant differences in the
influence of the main predictors due to the moderating effect of channel type. One of the key
contributions of this study is that three types of SSTs were tested in a single study, which had
not been done before, leading to the identification of the factors common to all three types, as
well as the salient factors unique to each type
Towards a framework to promote the development of secure and usable online information security applications
The proliferation of the internet and associated online activities exposes users to numerous
information security (InfoSec) threats. Such online activities attract a variety of online
users who include novice computer users with no basic InfoSec awareness knowledge.
Information systems that collect and use sensitive and confidential personal information
of users need to provide reliable protection mechanisms to safeguard this information.
Given the constant user involvement in these systems and the notion of users being the
weakest link in the InfoSec chain, technical solutions alone are insufficient. The usability
of online InfoSec systems can play an integral role in making sure that users use the
applications effectively, thereby improving the overall security of the applications.
The development of online InfoSec systems calls for addressing the InfoSec problem as
a social problem, and such development must seek to find a balance between technical
and social aspects. The research addressed the problem of usable security in online
InfoSec applications by using an approach that enabled the consideration of both InfoSec
and usability in viewing the system as a socio-technical system with technical and social
sub-systems. Therefore, the research proposed a socio-technical framework that promotes
the development of usable security for online information systems using online banking
as a case study.
Using a convergent mixed methods research (MMR) design, the research collected data
from online banking users through a survey and obtained the views of online banking
developers through unstructured interviews. The findings from the two research methods
contributed to the selection of 12 usable security design principles proposed in the sociotechnical
information security (STInfoSec) framework.
The research contributed to online InfoSec systems theory by developing a validated
STInfoSec framework that went through an evaluation process by seven field experts.
Although intended for online banking, the framework can be applied to other similar
online InfoSec applications, with minimum adaptation. The STInfoSec framework provides
checklist items that allow for easy application during the development process. The
checklist items can also be used to evaluate existing online banking websites to identify
possible usable security problems.Computer ScienceD. Phil. (Computer Science
- …