41 research outputs found
Assessing factors of behavioral intention to use Big Data Analytics (BDA) in banking and insurance sector: proposition of an integrated model
Banking and insurance sectors have long been largely data-driven by nature. However, with the rise in the predominance of data flooding from several sources resulting from the introduction of new customers and markets, with the help of Big Data Analytics, value can be extracted more effectively, and analysis of this type of unstructured data combined with a wide range of datasets can be used to efficiently and precisely extract commercial value. The aim of this paper is to develop a conceptual framework to explain the intention of information technology practitioners in banks and insurance companies to use Big Data Analytics by exploiting the Technology Acceptance Model (TAM) joined by the Task-Technology-Fit paradigm, information quality, security, trust, and the moderating effect of managerial commitment by top management on the relationship between usersâ perception and their intention to use, in order to conceptualize and test an integrated framework for analyzing and measuring attitudes toward the usage of Big Data Analytics.
This paper contributes by proposing the model to assess the factors that influence usersâ intention towards the use of Big Data Analytics, by asserting usersâ perception towards the technology, trust factor, security and the effect of managerial commitment. Although the model we developed in this paper is conceptual and still needs to be tested empirically, it will serve as a basic framework for further research that is designed to evaluate factors affecting IT practitionersâ attitudes towards the adoption of Big Data Analytics within the finance sector.
Keywords: Big Data Analytics, TAM, TTF, Security, Trust, Managerial commitment, Bank, Insurance
JEL Classification: O32
Paper type: Theoretical ResearchLes secteurs de la banque et de l'assurance sont depuis longtemps largement axĂ©s sur les donnĂ©es par nature. Cependant, avec l'augmentation de la prĂ©dominance de l'inondation de donnĂ©es provenant de plusieurs sources rĂ©sultant de l'introduction de nouveaux clients et marchĂ©s, avec l'aide du Big Data Analytics, la valeur peut ĂȘtre obtenue plus efficacement, et l'analyse de ce type de donnĂ©es non structurĂ©es combinĂ©es Ă un large Ă©ventail d'ensembles de donnĂ©es peut ĂȘtre utilisĂ©e pour extraire efficacement et prĂ©cisĂ©ment la valeur commerciale. L'objectif de cet article est de dĂ©velopper un cadre conceptuel pour expliquer l'intention des praticiens des technologies de l'information dans les banques et les compagnies d'assurance d'utiliser le Big Data Analytics en exploitant le ModĂšle d'Acceptation de la Technologie (TAM) associĂ© au paradigme AdĂ©quation Tache-Technologie, la qualitĂ© de l'information, la sĂ©curitĂ©, la confiance et l'effet modĂ©rateur de l'engagement du management sur la relation entre la perception des utilisateurs et leur intention d'utilisation, afin de conceptualiser et de tester un cadre intĂ©grĂ© pour analyser et mesurer les attitudes envers l'utilisation du Big Data Analytics.
Cet article contribue en proposant un modĂšle pour Ă©valuer les facteurs qui influencent l'intention des utilisateurs vers l'utilisation du Big Data Analytics, en affirmant la perception des utilisateurs envers la technologie, le facteur de confiance, la sĂ©curitĂ© et l'effet de l'engagement managĂ©rial. Bien que le modĂšle que nous avons dĂ©veloppĂ© dans cet article soit conceptuel et nĂ©cessite encore d'ĂȘtre testĂ© empiriquement, il servira de cadre de base pour des recherches ultĂ©rieures conçues pour Ă©valuer les facteurs affectant les attitudes des informaticiens envers l'adoption du Big Data Analytics dans le secteur financier.
Keywords: Big Data Analytics, TAM, TTF, Security, Trust, Managerial commitment, Bank, Insurance
JEL Classification: O32
Paper type: Theoretical Researc
Analyzing Secure Access Strategies to Protect Clinical-Information Systems in the Healthcare Industry
Securing patient health records within cloud-based health records is a critical security challenge for hospitals and healthcare organizations. Some information technology (IT) leaders working in the U.S. healthcare industry or hospitals are concerned with their patient cloud-based health records due to data breaches in their healthcare systems. Grounded in the task technology fit theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies healthcare information leaders use to implement security procedures to protect patient health records on private cloud-based clinical information systems (CIS). The participants were six IT managers in metropolitan San Francisco Bay healthcare facilities. The data was analyzed using thematic analysis, and four themes emerged: the importance of security procedures and policies, security awareness, cyber security response strategy, and user training. A key recommendation to healthcare IT security personnel is to team up with their cloud-based application security administrators to review current security procedures to ensure their security protocols can mitigate cyber-attacks on their network application servers. The implication for positive social change is to offer hospitals the ability to protect healthcare systems with security procedures and provides patients with assurances that their information is secure
The Challenges of Adopting Cloud Computing in Nigerian Government Organizations
Several technical challenges prevent the adoption of cloud computing by government organizations in Nigeria. Information technology (IT) leaders in the Nigerian government are concerned about this problem because the lack of cloud computing adoption may prevent the Nigerian government from taking advantage of cloud-based information systems to improve its service delivery to citizens and businesses. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine if IT administratorsâ perception of data security and perception of fault tolerance can predict their intentions to adopt cloud computing. Data were collected from 79 IT administrators in government organizations in Nigeria. The results of the multiple regression were significant, F(2, 76) = 31.58, p \u3c .001, R2 = 0.45, with IT administratorsâ perception of data security (ÎČ = .72, p \u3c .001) being the only significant predictor of IT administratorsâ intention to adopt cloud computing; IT administratorsâ perception of fault tolerance (ÎČ = .09, p = .37) was not a significant predictor of IT administratorsâ intention to adopt cloud computing. The Nigerian government may use this study as a pedestal to measure cloud computing practice and maturity in all its organizations, improve existing cloud computing policies, and increase cloud computing training programs for its IT administrators. This studyâs results might contribute to positive social change by helping the Nigerian government improve its service delivery to citizens and businesses through the increased adoption of cloud computing-based information systems
Relationships Among Dimensions of Information System Success and Benefits of Cloud
Despite the many benefits offered by cloud computingâs design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authorsâ validated survey instrument. The multiple regression finding were signification, F(5, 131) = 85.16, p \u3c .001, R2 = 0.76. In the final model, perception of information quality (ÎČ = .188, t = 2.844, p \u3c .05), perception of service quality (ÎČ = .178, t = 2.102, p \u3c .05), and perception of user satisfaction (ÎČ = .379, t = 5.024, p \u3c .001) were statistically significant; perception of system quality and perception of system use were not statistically significant. A recommendation is for IT managers to implement comprehensive customer evaluation of the cloud service(s) to meet customer expectations and afford satisfaction. The implications for positive social change include decision-makers in healthcare, human services, social services, and other critical service organizations better understand the vital predictors of attitude toward system use and user satisfaction of customer-facing cloud-based applications
Improving the decision-making process in the higher learning institutions via electronic records management system adoption
This is an accepted manuscript of an article published by KSII in KSII Transactions on Internet and Information Systems on 31/01/2021, available online: http://itiis.org/digital-library/24232
The accepted version of the publication may differ from the final published version.Electronic Records Management System (ERMS) is a computer program or set of applications that is utilized for keeping up to date records along with their storage. ERMS has been extensively utilized for enhancing the performance of academic institutions. The system assists in the planning and decision-making processes, which in turn enhances the competencies. However, although ERMS is significant in supporting the process of decision-making, the majority of organizations have failed to take an initiative to implement it, taking into account that are some implementing it without an appropriate framework, and thus resulted in the practice which does not meet the accepted standard. Therefore, this study identifies the factors influencing the adoption of ERMS among employees of HLI in Yemen and the role of such adoption in the decision-making process, using the Unified Theory of Acceptance and Use of Technology (UTAUT) along with Technology, Organization and Environment (TOE) as the underpinning theories. The study conducts a cross-sectional survey with a questionnaire as the technique for data collection, distributed to 364 participants in various Yemeni public Higher Learning Institutions (HLI). Using AMOS as a statistical method, the findings revealed there are significant and positive relationships between technology factors (effort expectancy, performance expectancy, IT infrastructure and security), organizational factors (top management support, financial support, training, and policy),environmental factors (competitiveness pressure, facilitating conditions and trust) and behavioral intention to adopt ERMS, which in return has a significant relationship with the process of decision-making in HLI. The study also presents a variety of theoretical and empirical contributions that enrich the body of knowledge in the field of technology adoption and the electronic recordâs domain
Identifying Factors Influencing Senior Leader Technology Readiness
What influences a person's attitude toward technology varies greatly. Does a person's attitude toward technology changes over time? What factors influence changes in attitude towards technology? This dissertation research provides an understanding of Technology Readiness (TR) over time and the factors influencing resultant conditions. The primary factors explored in this research include group interaction, the role of facilitators and training.
This study used the quantitative research paradigm. The principle measure of the effects of the factors was Parasuraman and Colby's Technology Readiness Index (TRI). TR provided a mechanism to evaluate factors influencing Senior Leader Technology Readiness. Technology Readiness is predominantly about an individualâs willingness to adopt or embrace technology. TR is a set of technological beliefs and asserts ones technological competence (Parasuraman, 2000).
Understanding individual TR and the propensity for technology adoption is important, particularly in organizations where technology is critical to success. Gartner predicts by 2017, half of employers will require employees to provide their own device for work. (Gartner 2013). Tangentially, mobile initiatives are putting pressure on the work force to use and understand technology. From a practitionerâs standpoint, how do companies know where current employees or future candidates stand regarding their technology competence and importantly the willingness to adopt? Parasuraman and Colby provided empirical evidence, through their quantitative and qualitative research, that individuals possess both positive and negative technology beliefs.
This research examines whether cohort-style learning, electronic delivery of information and informal training influences a person's TR. The results of this study indicate two dimensions were consistent across the study and two dimensions (innovativeness and discomfort) varied between the initial and last data collection points. Both of these latter two dimensions displayed statistical significance between the two data collection points. Additionally, two of the dimensions (innovativeness and optimism) predicted an individualâs willingness to use their iPad by providing a statistically significant correlation between these two dimensions and device application downloads. Lastly, the treatment group receiving both treatments accounted for a statistically significant Technology Readiness change
Infrastructure as Code Strategies and Benefits in Cloud Computing
Hybrid and multicloud infrastructure implementation without automation and versioning strategy can negatively impact organizationsâ productivity. Organization leaders must ensure that infrastructures are implemented using the infrastructure as code (IaC) strategy because implementation solutions, including automated and DevOps procedures, provide assets for repeatable infrastructure implementation use cases. Grounded in the disruptive innovation theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies solution architects use to implement IaC architecture using repeatable assets with DevOps procedures in cloud computing. The participants were seven solution architects in the information technology (IT) industry within the United States who have successfully implemented IaC in hybrid and multicloud within the past 3 years in cloud computing with DevOps procedures. Data were collected using semi-structured interviews, a focus group, and IT industry documents. The data analysis processes were analyzed using thematic analysis Eight themes emerged: IaC benefits, IaC cloud computing models, IaC cloud service providers, IaC configuration best practices, IaC DevOps practices, IaC implementation tools, IaC Kubernetes platforms, and IT infrastructure design practices. A specific recommendation is for organizational leaders to implement the IaC approach as it offers sustaining and disruptive innovation benefits, in addition, space agencies such as the National Aeronautics and Space Administration (NASA), European Space Agency (ESA), et al., could use this study in their mission infrastructures. The implications for positive social change include the potential to make the user application offerings affordable as it supports IT innovation in hybrid and multicloud globally
Recommended from our members
Environmental enforcement technology adoption: Marine environment in the Kingdom of Bahrain
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonResearch Background: Entities responsible for environmental enforcement around the world are facing increasing pressure to deal with the alarming rate of environmental degradation and crime, despite the limited resources available to them. They are continuously searching for technological advancements to enhance their effectiveness and efficiency. This research aims to explore and develop effective technology adoption insights for environmental compliance and enforcement in the Kingdom of Bahrain.
Research Gap: Existing technology adoption studies in law enforcement were mainly conducted on criminal law enforcement. Studies conducted on technology adoption of users involved in environmental enforcement were very scarce, especially from the perspective of environmental enforcers. Environmental enforcement was found to be a unique field of law enforcement with unique challenges and characteristics. This gap in the literature gives interest to acquire further knowledge and understanding of the technology use and adoption of users involved in environmental enforcement.
Methodology: This study has adapted a qualitative approach with multiple case studies triangulated with onsite observations, documents, and interviews with relevant stakeholders to explore the use and adoption of technology in environmental compliance and enforcement in the Kingdom of Bahrain.
Findings: Numerous significant findings were made during the research. The research found that technology use in the field of environmental enforcement in the marine environment in Bahrain has a significant impact on the effectiveness and efficiency of these systems, mainly through providing increased accuracy, speed, cost reduction and transparency. The technologies vary from basic technologies such as GPS to complex integrated systems, the type of technology utilized is mainly driven by the role and task of the organization or individual. The research also finds many aspects of theories from previous studies on technology adoption in the field of law enforcement to be applicable to this researchâs field, mainly the M-TAM which is based on the TAM model. The research found that technology adoption in environmental enforcement in the Kingdom is mandatory in nature, in which intent to use the technology has no influence since the user does not have the choice not to use the technology provided. Rather the extent to which the technology is used is influenced mainly by attitude, perceived usefulness, degree of necessity of the use of the technology, and various external factors (management style, cognitive acceptance, and stakeholder environment). Furthermore, the research identified additional unique factors affecting technology adoption in environmental enforcement, mainly the stakeholderâs environment. The study's findings led to the development of a modified model of technology adoption for environmental enforcement. The model illustrates the complex interaction between many factors influencing users' adoption and usage of technology in the field of environmental enforcement in the Kingdom of Bahrain.
Implications: The model illustrates the factors that influence technology adoption by users involved in environmental enforcement in the Kingdom of Bahrain. The main contribution of the research and the model is the ability to predict and explain technology adoption of users in the unique field of environmental enforcement. This knowledge is critical for the Kingdom, which has made significant investments in technological solutions across a variety of sectors, including environmental enforcement. Understanding and taking into account the factors influencing technology adoption will increase the likelihood of effective technology being adopted successfully in the Kingdom of Bahrain, resulting in more efficient usage, increased productivity, and ultimately improved performance toward the achievement of goals and targets.Ministry of Interior of the Kingdom of Bahrai
Role of affect and task category-knowledge sharing tools fit on behavioural intention to use KS tools among knowledge workers
Knowledge sharing is an essential practice by organizations of the 21st century. To leverage on knowledge sharing activities and cultivate a knowledge based ecosystem,
organizations have invested and deployed many types of Knowledge Sharing tools (KS tools). KS tools allow knowledge workers to share and use knowledge in
organizations. The low usage of KS tools justify the need to study the usage and also the intention to use these tools in organizations particularly among knowledge
workers. In addition, the decline of Knowledge Economy Index (KEI) and Knowledge Index (KI) for Malaysia showed that knowledge sharing and knowledge contribution
in education, innovation, and ICT are deteriorating. The need to investigate knowledge workers' intention to use knowledge sharing tools to support knowledge practices
seems a reasonable research goal. In this research, the focus is on the behavioral intention of knowledge workers to use KS tools among knowledge workers in Multimedia Super Corridor (MSC) status organizations. MSC-status organizations play a key role that contributes to the national KEI and KI for Malaysia. The main objective of this study is to identify factors that influence the intention to use KS tools among knowledge workers.
In an attempt to provide answers to the research objective, Affective Technology Acceptance Model (A.T.A Model) is developed to examine the antecedents that influence the attitude and behavioral intention of the knowledge workers to use KS tools in their day-to-day tasks. The A.T.A Model integrates Technology Acceptance Model with Task-Technology Fit to examine the acceptance of technology by hypothesize fit between Task Category and KS tools to Behavioral Intention to use KS tools. The proposed research model also includes the role of affect drawing from theories by Russellâs Circumplex of Affect and Watson, Clark and Tellegenâs Consensual Model of Affect into the propose model. The A.T.A model also considers organizational factors and motivational factors that influence the Behavioral Intention to use KS tools among knowledge workers. Quantitative method using survey approach is adopted to collect data from respondents. The proposed A.T.A model is empirically examined using two hundred ninety five (295) respondents who comprised of knowledge workers from a sampling frame of two thousand five hundred and five (2505) knowledge workers in twenty-three (23)
MSC-status organizations that participated in this research. The outcomes of the analysis support the overall structure of the model whereby sixteen (16) of the twenty
two (22) hypothesis are supported. The Behavioral Intention to use KS tools is supported and explained by knowledge workers' Attitude, Task-Category and KS tools
fit, Positive Affect and Trust. In this research, Attitude has the highest impact on Behavioral Intention, followed by Task Category-KS tools fit, Positive Affect and Trust. On the other hand, Negative Affect influences Behavioral Intention knowledge workers for three (3) different points in time only ("At the Moment", "Past Few Days",
and "Past Few Weeks"). However, Extrinsic and Intrinsic Rewards are found to have no influence on Behavioral Intention to use KS tools. The findings highlighted that
change in Positive Affect is able to create a positive impact in Behavioral Intention of knowledge workers to use KS tools besides Attitude and TCK fit. The findings
highlighted that Positive Affect has an influence on Perceived Usefulness, but Negative Affect has no influence on it. However, both Positive and Negative Affect
have an influence on Perceived Ease of Use. The results also found that Task Category KS tools fit influences Behavioral Intention significantly. This is consistent with past research, which claimed that integrating Task Category-KS tools fit to acceptance model is able to provide better explanation on the intention of individuals to use KS
tools. On the contrary, this research found Extrinsic and Intrinsic Rewards, and Management Support have no significant relationship with Behavioral Intention to
used KS tools in the proposed A.T.A model. Overall, the results of this study contribute to the literature of technology acceptance by shedding light on the behavioral intention to use KS tools among knowledge workers