242 research outputs found

    Saudi Citizens’ Perceptions on Mobile Government (mGov) Adoption Factors

    Get PDF
    The Saudi government has recently paid serious attention towards utilising mobile technology in order to deliver government services electronically to its citizens. This study attempts to explore citizens’ (potential users) perceptions on a number of factors that may be important for encouraging the widespread adoption of mobile government (mGov) services in the context of Saudi Arabia. The factors descriptively explored in this research include: perceived risk, innovativeness; performance expectancy, effort expectancy, social influence, facilitating conditions, perceived value, hedonic motivation and behavioural intension. The survey data utilised in this research was collected through a self-administered questionnaire to 600 participants (with a response rate of 66%) within a convenience sample. The results obtained through a descriptive analysis demonstrated that the aforementioned factors are perceived as important by Saudi citizens and they have strong behavioural intention to adopt mGov services

    The Factors Affected m-Services Adoption in Airports

    Get PDF
    This research focus on the factors which affected m-Services utilization in airport from airport’s functionaries point of view. Also, the background of this research is related to some former researches which defined some models that may increase the exertion of electronic mobile based service application (m-Services) such as: TAM, UTAUT, and UTAUT2. However, the former literature reviews only elucidate the factors which affect the increasing of m-Services or mobile technologies/ self service technology exertion from customer point of view. While, there are less of them apprising the factors affected m-Services adoption from airport’s functionaries point of view. The purpose of this study is fulfilling the lack in the literature review by apprising the study towards airport’s functionaries point of view. To reach the purpose of the study, this study applies literature review method. The literature review’s source of this study is originated from some international journals which discuss the factors of airport’s functionaries side. The result of this study are the Explanation of the factors affected m-Service adoption or mobile technologies/ self-services technology from airport’s functionaries point of view and the development of conceptual model related to the factors affected m-Services adoption from airport’s function perspective

    Construction Industry Hesitation in Accepting Wearable Sensing Devices to Enhance Worker

    Get PDF
    The construction industry is one of the most unsafe industries for workers in the United States. Advancements in wearable technology have been proven to create a safer construction environment. Despite the availability of these devices, use within the construction industry remains low. The objective of this research is to identify and analyze the causes behind the reluctance of the construction industry to implement two specific wearable safety devices, a biometric sensor, and a location tracking system. Device acceptance was analyzed from the perspective of the user (construction field labor) and company decision makers (construction managers). A modified unified theory of acceptance and use of technology (UTAUT) model was developed specific to barriers commonly found within technology adoption in the construction industry including: perceived performance expectancy, perceived effort expectancy, openness to data utilization, social influence, data security, and facilitating conditions. A structured questionnaire was designed to test for association between the mentioned constructs and either behavioral intention or actual use. The questionnaire went through an expert review process, and a pilot study was conducted prior to being distributed to industry. Once all data was received Pearson chi-squared analysis was used to test for association between the constructs. A minority (46%) of labor respondents would not agree to voluntarily use the biometric wearable sensing device. Constructs associated with this finding included perceived performance expectancy, perceived effort expectancy, and social influence. A majority (59%) of labor respondents would not agree to voluntarily use the location tracking wearable sensing device. Constructs associated with this finding included perceived performance expectancy, social influence, and data security. A majority (56%) of management respondents would not implement the biometric wearable sensing device. Constructs found to be associated with this finding included perceived performance expectancy, openness to data utilization, and social influence of the client. A supermajority (68%) of management respondents would not implement the location tracking wearable sensing device. Constructs found to be associated with this finding include perceived performance expectancy, perceived effort expectancy, openness to data utilization, social influence, and data security. This study will aid in the successful implementation of wearable sensing devices within the construction industry. Findings from this study can be used to aid those hoping to implement wearable sensing devices by identifying causes of wearable sensing device rejection. The results of this study can be used by both project managers and health and safety professionals to aid in device acceptance by field labor, and by those whose goal is to increase device use among construction firms

    Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager\u27s Perspective

    Get PDF
    The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers\u27 and doctors\u27 perceptions of the effectiveness of palm vein authentication technology. The research questions were designed to investigate the relationship between intention to adopt palm vein authentication technology and perceived usefulness, complexity, security, peer influence, and relative advantage. The unified theory of acceptance and use of technology was the theoretical basis for this quantitative study. Data were gathered through an anonymous online survey of 109 healthcare managers and doctors, and analyzed using principal axis factoring, Pearson\u27s product moment correlation, multiple linear regression, and 1-way analysis of variance. The results of the study showed a statistically significant positive correlation between perceived usefulness, security, peer influence, relative advantage, and intention to adopt palm vein authentication. No statistically significant correlation existed between complexity and intention to adopt palm vein authentication. These findings indicate that by effectively using palm vein authentication, organizations can mitigate the risk of medical fraud and its associated costs, and positive social change can be realized

    Factors Affecting SMEs' Intention to Adopt a Mobile Travel Application based on the Unified Theory of Acceptance and Use of Technology (UTAUT-2)

    Get PDF
    This study is part of a government research project which aims to synthesise the current evidence on the factors affecting the intention of mobile application adoption called ‘Tripper Notifier Application’ (TNA) for the hospitality and tourism industrial sector in Thailand. The focus is on small and medium enterprises (SMEs), which emphasize restaurants, hotels, and attraction sites. The present article examines various factors influencing the intention to use such applications by employing the Unified Theory of Acceptance and Use of Technology 2 (UTAUT-2) as the theoretical underpinning of this research paradigm. Using 84 selected research papers in Scopus published between 2020 and 2022, A thematic analysis incorporating a grounded theory approach to systematically generate themes was conducted, and the findings found three main themes, including business transformation capabilities (BTC), digital transformation capabilities (DTC), and personal innovativeness (PI), as an extension of UTAUT-2 as mediator and moderator variables. To this end, the study fills the research gaps and extends the UTAUT-2 framework by including an initiative of twelve inside attributes-based lines, including performance expectancy, effort expectancy, social influence, facilitating conditions, hedonic motivation, price value, habit behavior, behavioral intention, and use behavior, together with three moderators: age, gender, and experience. Finally, the context dimensions of the UTAUT-2 extensions were mapped to highlight all the constructs of the TNA adoption framework for future research directions. The novel contribution of this study is to fill the gap with both theoretical and practical knowledge. On the theoretical level, this study constitutes constructs based on UTAUT-2 theory as a research-based setting to fill a gap in research. On the practical level, it provides insights and information about new capabilities that SME owners, managers, and practitioners should consider in order to differentiate their own capabilities. Doi: 10.28991/esj-2021-SP1-014 Full Text: PD

    Understanding the Adoption Intention of AI through the Ethics Lens

    Get PDF
    Understanding users and user behaviors in accepting new technologies such as AI has been ever more important. Meanwhile, information systems with AI inevitably engenders such ethical issues as transparency and accountability related to the consequences of recognition, decisions, and recommendations. Our work adds moral psychology variables to the Theory of Reasoned Action (TRA) in order to better explicate the adoption aspects of AI. For the research, we employed social desirability and self-consistency of moral psychology as underlying attitudes. And also, the moral norm is added to TRA to moderate the effect of the attitudes on the outcome variable. The empirical results indicate a direct and indirect role of the morality-related variables in explaining users’ AI adoption intentions. It was learned that moral psychology plays an important role in explaining user attitudes toward AI and subsequent intentions of adopting an AI system

    Factors encouraging and hindering a wider acceptance and more frequent utilization of mobile payment systems: an empirical study among mobile phone subscribers in Turkey

    Get PDF
    Purpose- This research deals with determining the factors that affect adoption of mobile payment technology among consumers, in Turkey. It seeks to find any patterns and connections that may be of aid in framing an implementation strategy for facilitating further adoption. It has gathered different definitions of “mobile payment” in literature and used a consumer side definition. Methodology- A survey is conducted among mobile phone subscribers in Istanbul, Turkey for primary data collection phase of this research. Istanbul is the city that holds the biggest population and has the highest amount of mobile phone subscribers in the country. Istanbul’s current population is more than 15.6million and mobile phone subscriptions are more than 22million as of 2019. Survey responses have been analysed with structural equation modelling and results are presented in the corresponding sections. Findings- Empirical findings of the research show that factors such as usefulness, security, social influence, ease of use, enjoyment and innovativeness have positive effects on use of mobile payments among consumers. Factors such as attractiveness of alternatives and new technology anxiety have negative effects on use of mobile payments. Conclusion- This research has shown that mobile payments are a potential mainstream trend for the near future. Several benefits of the mobile payment value chain for both technology providers and the consumers have been identified. Other findings of this research can be stated as the challenges which the stakeholders are experiencing while trying to extend mobile payment technologies to a wider consumer base. Therefore, the results and the variables can be used by service providers who want to launch new mobile payment solutions for similar markets and they can take actions for getting more efficient results accordingly.Publisher's Versio

    Consumer Adoption of Self-Service Technologies in the Context of the Jordanian Banking Industry: Examining the Moderating Role of Channel Types

    Get PDF
    YesThis study aimed to examine the key factors predicting Jordanian consumers’ intentions and usage of three types of self-service banking technologies. This study also sought to test if the impacts of these main predictors could be moderated by channel type. This study proposed a conceptual model by integrating factors from the unified theory of acceptance and use of technology (UTAUT), along with perceived risk. The required data were collected from a convenience sample of Jordanian banking customers using a survey questionnaire. The statistical results strongly support the significant influence of performance expectancy, social influence, and perceived risk on customer intentions for the three types of SSTs examined. The results of the X2 differences test also indicate that there are significant differences in the influence of the main predictors due to the moderating effect of channel type. One of the key contributions of this study is that three types of SSTs were tested in a single study, which had not been done before, leading to the identification of the factors common to all three types, as well as the salient factors unique to each type

    Towards a framework to promote the development of secure and usable online information security applications

    Get PDF
    The proliferation of the internet and associated online activities exposes users to numerous information security (InfoSec) threats. Such online activities attract a variety of online users who include novice computer users with no basic InfoSec awareness knowledge. Information systems that collect and use sensitive and confidential personal information of users need to provide reliable protection mechanisms to safeguard this information. Given the constant user involvement in these systems and the notion of users being the weakest link in the InfoSec chain, technical solutions alone are insufficient. The usability of online InfoSec systems can play an integral role in making sure that users use the applications effectively, thereby improving the overall security of the applications. The development of online InfoSec systems calls for addressing the InfoSec problem as a social problem, and such development must seek to find a balance between technical and social aspects. The research addressed the problem of usable security in online InfoSec applications by using an approach that enabled the consideration of both InfoSec and usability in viewing the system as a socio-technical system with technical and social sub-systems. Therefore, the research proposed a socio-technical framework that promotes the development of usable security for online information systems using online banking as a case study. Using a convergent mixed methods research (MMR) design, the research collected data from online banking users through a survey and obtained the views of online banking developers through unstructured interviews. The findings from the two research methods contributed to the selection of 12 usable security design principles proposed in the sociotechnical information security (STInfoSec) framework. The research contributed to online InfoSec systems theory by developing a validated STInfoSec framework that went through an evaluation process by seven field experts. Although intended for online banking, the framework can be applied to other similar online InfoSec applications, with minimum adaptation. The STInfoSec framework provides checklist items that allow for easy application during the development process. The checklist items can also be used to evaluate existing online banking websites to identify possible usable security problems.Computer ScienceD. Phil. (Computer Science
    corecore