41 research outputs found

    Assessing factors of behavioral intention to use Big Data Analytics (BDA) in banking and insurance sector: proposition of an integrated model

    Get PDF
    Banking and insurance sectors have long been largely data-driven by nature. However, with the rise in the predominance of data flooding from several sources resulting from the introduction of new customers and markets, with the help of Big Data Analytics, value can be extracted more effectively, and analysis of this type of unstructured data combined with a wide range of datasets can be used to efficiently and precisely extract commercial value. The aim of this paper is to develop a conceptual framework to explain the intention of information technology practitioners in banks and insurance companies to use Big Data Analytics by exploiting the Technology Acceptance Model (TAM) joined by the Task-Technology-Fit paradigm, information quality, security, trust, and the moderating effect of managerial commitment by top management on the relationship between users’ perception and their intention to use, in order to conceptualize and test an integrated framework for analyzing and measuring attitudes toward the usage of Big Data Analytics. This paper contributes by proposing the model to assess the factors that influence users’ intention towards the use of Big Data Analytics, by asserting users’ perception towards the technology, trust factor, security and the effect of managerial commitment. Although the model we developed in this paper is conceptual and still needs to be tested empirically, it will serve as a basic framework for further research that is designed to evaluate factors affecting IT practitioners’ attitudes towards the adoption of Big Data Analytics within the finance sector.   Keywords: Big Data Analytics, TAM, TTF, Security, Trust, Managerial commitment, Bank, Insurance  JEL Classification: O32 Paper type: Theoretical ResearchLes secteurs de la banque et de l'assurance sont depuis longtemps largement axĂ©s sur les donnĂ©es par nature. Cependant, avec l'augmentation de la prĂ©dominance de l'inondation de donnĂ©es provenant de plusieurs sources rĂ©sultant de l'introduction de nouveaux clients et marchĂ©s, avec l'aide du Big Data Analytics, la valeur peut ĂȘtre obtenue plus efficacement, et l'analyse de ce type de donnĂ©es non structurĂ©es combinĂ©es Ă  un large Ă©ventail d'ensembles de donnĂ©es peut ĂȘtre utilisĂ©e pour extraire efficacement et prĂ©cisĂ©ment la valeur commerciale. L'objectif de cet article est de dĂ©velopper un cadre conceptuel pour expliquer l'intention des praticiens des technologies de l'information dans les banques et les compagnies d'assurance d'utiliser le Big Data Analytics en exploitant le ModĂšle d'Acceptation de la Technologie (TAM) associĂ© au paradigme AdĂ©quation Tache-Technologie, la qualitĂ© de l'information, la sĂ©curitĂ©, la confiance et l'effet modĂ©rateur de l'engagement du management sur la relation entre la perception des utilisateurs et leur intention d'utilisation, afin de conceptualiser et de tester un cadre intĂ©grĂ© pour analyser et mesurer les attitudes envers l'utilisation du Big Data Analytics. Cet article contribue en proposant un modĂšle pour Ă©valuer les facteurs qui influencent l'intention des utilisateurs vers l'utilisation du Big Data Analytics, en affirmant la perception des utilisateurs envers la technologie, le facteur de confiance, la sĂ©curitĂ© et l'effet de l'engagement managĂ©rial. Bien que le modĂšle que nous avons dĂ©veloppĂ© dans cet article soit conceptuel et nĂ©cessite encore d'ĂȘtre testĂ© empiriquement, il servira de cadre de base pour des recherches ultĂ©rieures conçues pour Ă©valuer les facteurs affectant les attitudes des informaticiens envers l'adoption du Big Data Analytics dans le secteur financier.   Keywords: Big Data Analytics, TAM, TTF, Security, Trust, Managerial commitment, Bank, Insurance  JEL Classification: O32 Paper type: Theoretical Researc

    Analyzing Secure Access Strategies to Protect Clinical-Information Systems in the Healthcare Industry

    Get PDF
    Securing patient health records within cloud-based health records is a critical security challenge for hospitals and healthcare organizations. Some information technology (IT) leaders working in the U.S. healthcare industry or hospitals are concerned with their patient cloud-based health records due to data breaches in their healthcare systems. Grounded in the task technology fit theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies healthcare information leaders use to implement security procedures to protect patient health records on private cloud-based clinical information systems (CIS). The participants were six IT managers in metropolitan San Francisco Bay healthcare facilities. The data was analyzed using thematic analysis, and four themes emerged: the importance of security procedures and policies, security awareness, cyber security response strategy, and user training. A key recommendation to healthcare IT security personnel is to team up with their cloud-based application security administrators to review current security procedures to ensure their security protocols can mitigate cyber-attacks on their network application servers. The implication for positive social change is to offer hospitals the ability to protect healthcare systems with security procedures and provides patients with assurances that their information is secure

    The Challenges of Adopting Cloud Computing in Nigerian Government Organizations

    Get PDF
    Several technical challenges prevent the adoption of cloud computing by government organizations in Nigeria. Information technology (IT) leaders in the Nigerian government are concerned about this problem because the lack of cloud computing adoption may prevent the Nigerian government from taking advantage of cloud-based information systems to improve its service delivery to citizens and businesses. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine if IT administrators’ perception of data security and perception of fault tolerance can predict their intentions to adopt cloud computing. Data were collected from 79 IT administrators in government organizations in Nigeria. The results of the multiple regression were significant, F(2, 76) = 31.58, p \u3c .001, R2 = 0.45, with IT administrators’ perception of data security (ÎČ = .72, p \u3c .001) being the only significant predictor of IT administrators’ intention to adopt cloud computing; IT administrators’ perception of fault tolerance (ÎČ = .09, p = .37) was not a significant predictor of IT administrators’ intention to adopt cloud computing. The Nigerian government may use this study as a pedestal to measure cloud computing practice and maturity in all its organizations, improve existing cloud computing policies, and increase cloud computing training programs for its IT administrators. This study’s results might contribute to positive social change by helping the Nigerian government improve its service delivery to citizens and businesses through the increased adoption of cloud computing-based information systems

    Relationships Among Dimensions of Information System Success and Benefits of Cloud

    Get PDF
    Despite the many benefits offered by cloud computing’s design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authors’ validated survey instrument. The multiple regression finding were signification, F(5, 131) = 85.16, p \u3c .001, R2 = 0.76. In the final model, perception of information quality (ÎČ = .188, t = 2.844, p \u3c .05), perception of service quality (ÎČ = .178, t = 2.102, p \u3c .05), and perception of user satisfaction (ÎČ = .379, t = 5.024, p \u3c .001) were statistically significant; perception of system quality and perception of system use were not statistically significant. A recommendation is for IT managers to implement comprehensive customer evaluation of the cloud service(s) to meet customer expectations and afford satisfaction. The implications for positive social change include decision-makers in healthcare, human services, social services, and other critical service organizations better understand the vital predictors of attitude toward system use and user satisfaction of customer-facing cloud-based applications

    Improving the decision-making process in the higher learning institutions via electronic records management system adoption

    Get PDF
    This is an accepted manuscript of an article published by KSII in KSII Transactions on Internet and Information Systems on 31/01/2021, available online: http://itiis.org/digital-library/24232 The accepted version of the publication may differ from the final published version.Electronic Records Management System (ERMS) is a computer program or set of applications that is utilized for keeping up to date records along with their storage. ERMS has been extensively utilized for enhancing the performance of academic institutions. The system assists in the planning and decision-making processes, which in turn enhances the competencies. However, although ERMS is significant in supporting the process of decision-making, the majority of organizations have failed to take an initiative to implement it, taking into account that are some implementing it without an appropriate framework, and thus resulted in the practice which does not meet the accepted standard. Therefore, this study identifies the factors influencing the adoption of ERMS among employees of HLI in Yemen and the role of such adoption in the decision-making process, using the Unified Theory of Acceptance and Use of Technology (UTAUT) along with Technology, Organization and Environment (TOE) as the underpinning theories. The study conducts a cross-sectional survey with a questionnaire as the technique for data collection, distributed to 364 participants in various Yemeni public Higher Learning Institutions (HLI). Using AMOS as a statistical method, the findings revealed there are significant and positive relationships between technology factors (effort expectancy, performance expectancy, IT infrastructure and security), organizational factors (top management support, financial support, training, and policy),environmental factors (competitiveness pressure, facilitating conditions and trust) and behavioral intention to adopt ERMS, which in return has a significant relationship with the process of decision-making in HLI. The study also presents a variety of theoretical and empirical contributions that enrich the body of knowledge in the field of technology adoption and the electronic record’s domain

    Identifying Factors Influencing Senior Leader Technology Readiness

    Get PDF
    What influences a person's attitude toward technology varies greatly. Does a person's attitude toward technology changes over time? What factors influence changes in attitude towards technology? This dissertation research provides an understanding of Technology Readiness (TR) over time and the factors influencing resultant conditions. The primary factors explored in this research include group interaction, the role of facilitators and training. This study used the quantitative research paradigm. The principle measure of the effects of the factors was Parasuraman and Colby's Technology Readiness Index (TRI). TR provided a mechanism to evaluate factors influencing Senior Leader Technology Readiness. Technology Readiness is predominantly about an individual’s willingness to adopt or embrace technology. TR is a set of technological beliefs and asserts ones technological competence (Parasuraman, 2000). Understanding individual TR and the propensity for technology adoption is important, particularly in organizations where technology is critical to success. Gartner predicts by 2017, half of employers will require employees to provide their own device for work. (Gartner 2013). Tangentially, mobile initiatives are putting pressure on the work force to use and understand technology. From a practitioner’s standpoint, how do companies know where current employees or future candidates stand regarding their technology competence and importantly the willingness to adopt? Parasuraman and Colby provided empirical evidence, through their quantitative and qualitative research, that individuals possess both positive and negative technology beliefs. This research examines whether cohort-style learning, electronic delivery of information and informal training influences a person's TR. The results of this study indicate two dimensions were consistent across the study and two dimensions (innovativeness and discomfort) varied between the initial and last data collection points. Both of these latter two dimensions displayed statistical significance between the two data collection points. Additionally, two of the dimensions (innovativeness and optimism) predicted an individual’s willingness to use their iPad by providing a statistically significant correlation between these two dimensions and device application downloads. Lastly, the treatment group receiving both treatments accounted for a statistically significant Technology Readiness change

    Infrastructure as Code Strategies and Benefits in Cloud Computing

    Get PDF
    Hybrid and multicloud infrastructure implementation without automation and versioning strategy can negatively impact organizations’ productivity. Organization leaders must ensure that infrastructures are implemented using the infrastructure as code (IaC) strategy because implementation solutions, including automated and DevOps procedures, provide assets for repeatable infrastructure implementation use cases. Grounded in the disruptive innovation theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies solution architects use to implement IaC architecture using repeatable assets with DevOps procedures in cloud computing. The participants were seven solution architects in the information technology (IT) industry within the United States who have successfully implemented IaC in hybrid and multicloud within the past 3 years in cloud computing with DevOps procedures. Data were collected using semi-structured interviews, a focus group, and IT industry documents. The data analysis processes were analyzed using thematic analysis Eight themes emerged: IaC benefits, IaC cloud computing models, IaC cloud service providers, IaC configuration best practices, IaC DevOps practices, IaC implementation tools, IaC Kubernetes platforms, and IT infrastructure design practices. A specific recommendation is for organizational leaders to implement the IaC approach as it offers sustaining and disruptive innovation benefits, in addition, space agencies such as the National Aeronautics and Space Administration (NASA), European Space Agency (ESA), et al., could use this study in their mission infrastructures. The implications for positive social change include the potential to make the user application offerings affordable as it supports IT innovation in hybrid and multicloud globally

    Role of affect and task category-knowledge sharing tools fit on behavioural intention to use KS tools among knowledge workers

    Get PDF
    Knowledge sharing is an essential practice by organizations of the 21st century. To leverage on knowledge sharing activities and cultivate a knowledge based ecosystem, organizations have invested and deployed many types of Knowledge Sharing tools (KS tools). KS tools allow knowledge workers to share and use knowledge in organizations. The low usage of KS tools justify the need to study the usage and also the intention to use these tools in organizations particularly among knowledge workers. In addition, the decline of Knowledge Economy Index (KEI) and Knowledge Index (KI) for Malaysia showed that knowledge sharing and knowledge contribution in education, innovation, and ICT are deteriorating. The need to investigate knowledge workers' intention to use knowledge sharing tools to support knowledge practices seems a reasonable research goal. In this research, the focus is on the behavioral intention of knowledge workers to use KS tools among knowledge workers in Multimedia Super Corridor (MSC) status organizations. MSC-status organizations play a key role that contributes to the national KEI and KI for Malaysia. The main objective of this study is to identify factors that influence the intention to use KS tools among knowledge workers. In an attempt to provide answers to the research objective, Affective Technology Acceptance Model (A.T.A Model) is developed to examine the antecedents that influence the attitude and behavioral intention of the knowledge workers to use KS tools in their day-to-day tasks. The A.T.A Model integrates Technology Acceptance Model with Task-Technology Fit to examine the acceptance of technology by hypothesize fit between Task Category and KS tools to Behavioral Intention to use KS tools. The proposed research model also includes the role of affect drawing from theories by Russell’s Circumplex of Affect and Watson, Clark and Tellegen’s Consensual Model of Affect into the propose model. The A.T.A model also considers organizational factors and motivational factors that influence the Behavioral Intention to use KS tools among knowledge workers. Quantitative method using survey approach is adopted to collect data from respondents. The proposed A.T.A model is empirically examined using two hundred ninety five (295) respondents who comprised of knowledge workers from a sampling frame of two thousand five hundred and five (2505) knowledge workers in twenty-three (23) MSC-status organizations that participated in this research. The outcomes of the analysis support the overall structure of the model whereby sixteen (16) of the twenty two (22) hypothesis are supported. The Behavioral Intention to use KS tools is supported and explained by knowledge workers' Attitude, Task-Category and KS tools fit, Positive Affect and Trust. In this research, Attitude has the highest impact on Behavioral Intention, followed by Task Category-KS tools fit, Positive Affect and Trust. On the other hand, Negative Affect influences Behavioral Intention knowledge workers for three (3) different points in time only ("At the Moment", "Past Few Days", and "Past Few Weeks"). However, Extrinsic and Intrinsic Rewards are found to have no influence on Behavioral Intention to use KS tools. The findings highlighted that change in Positive Affect is able to create a positive impact in Behavioral Intention of knowledge workers to use KS tools besides Attitude and TCK fit. The findings highlighted that Positive Affect has an influence on Perceived Usefulness, but Negative Affect has no influence on it. However, both Positive and Negative Affect have an influence on Perceived Ease of Use. The results also found that Task Category KS tools fit influences Behavioral Intention significantly. This is consistent with past research, which claimed that integrating Task Category-KS tools fit to acceptance model is able to provide better explanation on the intention of individuals to use KS tools. On the contrary, this research found Extrinsic and Intrinsic Rewards, and Management Support have no significant relationship with Behavioral Intention to used KS tools in the proposed A.T.A model. Overall, the results of this study contribute to the literature of technology acceptance by shedding light on the behavioral intention to use KS tools among knowledge workers
    corecore