16,535 research outputs found

    Electronic government procurement adoption behavior amongst Malaysian SMEs

    Get PDF
    The aim of this study is to investigate the relationship between a model of electronic procurement (e-procurement) adoption behavior and the level of Government e-procurement adoption amongst Small Medium Enterprise (SME) in Malaysia. Data was collected through questionnaires that were distributed to SME selected randomly in all SME in Malaysia.The data were analyzed using factor analysis, reliability analysis, independent-sample t-test, descriptive statistics, Pearson Correlation and multiple regressions. Regression results reveals that ‘power’, ‘trust’ and ‘value’ have a positive relationship with the level of e-procurement adoption amongst SME in Malaysia.All dimensions, namely; the power of supplier, power of procurement, trust on supplier, trust on information technology, value of implementation system efficiency and value of cost efficiency were also correlated with the level of e-procurement adoption amongst SME. Past studies on e-procurement are beset by problems of buyer-seller relationship perspective.In addition, these studies are skewed towards Government-SME relationship perspective which the Government possesses more power than SME and provide a better incentive to educate and influence SME to adopt e-procurement.In investigation the relationship between a model of e-procurement adoption behavior and the level of Government e-procurement adoption amongst SME in Malaysia, this study also tries to provides recommendation to Malaysian government for improving the level of e-procurement adoption amongst SME

    An Empirical Investigation of the Level of Users’ Acceptance of E-Banking in Nigeria

    Get PDF
    Nigeria was depicted to be the fastest growing telecommunications nation in African. Presently, all members of the Nigeria banking industry have engaged the use of Information and Communication Technology (ICT) as a platform for effective and efficient means of conducting financial transactions. This paper focuses on determining the level of users’ acceptance of the electronic banking services and investigating the factors that determine users’ behavioral intentions to use electronic banking systems in Nigeria. The survey instrument employed involved design and administration of a total of 500 survey questionnaires within the Lagos metropolis and its environs. An extended Technology Acceptance Model (TAM) was employed as a conceptual framework to investigate the factors that influence users’ acceptance and intention to use electronic banking. To test the model, data was collected from 292 customers from various commercial banks in Nigeria. The model measured the impact of Perceived Credibility (PC), Computer Self-Efficacy (CSE), Perceived Usefulness (PU), and Perceived Ease of Use (PEOU) on customer attitude and customer attitude on customer adaptation. The result of this research shows that ATM still remains the most widely used form e-Banking service. Banks’ customers who are active users of e-Banking system use it because it is convenient, easy to use, time saving and appropriate for their transaction needs. Also the network security and the security of the system in terms of privacy are the major concerns of the users and constitute hindrance to intending users

    Linking consumer trust perception in constructing an e-commerce trust model

    Get PDF
    Trust issues is still considered as a main obstacle in the implementation of eCommerce Due to the increasing numbers of cyber crimes committed today, consumers are faced with doubt to engage in online shopping. As a safety precaution, consumers will take certain measures to protect their information by evaluating and assessing these websites trustworthiness before an actual purchase occurs. This paper describes a model that examines the elements related to online consumer behavior and to investigate this behavior towards building and increasing trust. The applicability of the model was tested in attempt to view consumers' acceptance towards the model and its component. The fmdings indicate the respondents are aware of the trust issue surrounding e-Commerce implementation as they accept and agreed with the model and its components

    The State of e-Banking Implementation in Nigeria: A Post-Consolidation Review

    Get PDF
    The most widely used e-Banking instrument in �igeria is e-Payment, particularly the automatic teller machine (ATM) card. However, with the adoption of e-Banking by all the banks in �igeria, the volume of cash in circulation has continued to increase pre-and-post bank recapitalization/consolidation exercise. Furthermore, some of the 25 banks that survived the exercise were found lately to have depleted their capital base and have lost credibility before the consumers, e-Banking implementation notwithstanding. Therefore, in this paper, we review the state of e-Banking implementation in �igeria and evaluate the influence of trust on the adoption of e-Payment using an extended technology acceptance model (TAM). Similarly, we investigate organizational reputation, perceived risk and perceived trust in the management of banks as a factor for enhancing customer loyalty. The findings in this work reveal that perceived ease of use and perceived usefulness are not only antecedent to ebanking acceptance, they are also factors to retain customers to the use of e-banking system such as organizational reputation, perceived risk and trust

    “This is the way ‘I’ create my passwords ...":does the endowment effect deter people from changing the way they create their passwords?

    Get PDF
    The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to ownership of physical artifacts. If computer users also "own", and are attached to, their personal security routines, such feelings could conceivably activate the same endowment effect. This would, in turn, lead to their over-estimating the \value" of their existing routines, in terms of the protection they afford, and the risks they mitigate. They might well, as a consequence, not countenance any efforts to persuade them to adopt a more secure routine, because their comparison of pre-existing and proposed new routine is skewed by the activation of the endowment effect.In this paper, we report on an investigation into the possibility that the endowment effect activates when people adopt personal password creation routines. We did indeed find evidence that the endowment effect is likely to be triggered in this context. This constitutes one explanation for the failure of many security awareness drives to improve password strength. We conclude by suggesting directions for future research to confirm our findings, and to investigate the activation of the effect for other security routines

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
    • …
    corecore