58 research outputs found

    Building consumers’ confidence in adopting e-commerce: A Malaysian case

    Get PDF
    Consumers’ confidence on the online transactions is vital for the continuous growth and development of electronic commerce. In the present study, we experimentally investigate the measures of consumers’ perceived security and privacy over online transactions as well as the perceived trust and reliability of online vendors in order to influence consumers’ overall confidence in e-commerce transactions. On the basis of responses from 163 participants, it is concluded that the major concerns in e-commerce adoption are: security and privacy over online transaction process and trust and reliability of online vendors. In order to be successful in electronic marketplace, the organisations are expected to expend their resources and exert efforts to ensure that consumers’ concerns are adequately addressed.e-commerce; security and privacy; trust; online vendors; consumer behaviour; Malaysia

    Internet banking adoption : information content richness, convenience and computer self-efficacy

    Get PDF
    The purpose of this research study is to examine factors influencing the adoption of Internet Banking among staff in a public university in Malaysia. We investigated three factors that we believed to influence internet banking adoption. A research model was developed to show the relationship between the factors investigated. We used the quantitative method by distributing survey questionnaire to the participants. Ninety seven usable questionnaires were gathered for analysis. The findings indicated that the there are significant relationship between the three factors towards internet banking adoption

    Evaluating Malaysia's e-government flagship applications using the DeLone and McLean

    Get PDF
    This study had used the DeLone and McLean (2003, 2004) up-stream model of e-commerce success to evaluate Malaysia’s e-government flagship applications In this article, we present the evaluation results of Malaysia’s six e-government flagship applications from internal end-users’ perspective. The six flagship applications assessed were eservices, e-procurement, generic office environment, human resource management information system, project monitoring system and electronic labor exchange.This study adopted a cross-sectional survey research approach. A total of 437 questionnaires were distributed to non-clerical staff at seven lead implementing agencies namely the Road Transport Department (RTD), Treasury, the Malaysia Administration and Modernisation Planning Unit (MAMPU), Public Service Department (PSD), Ministry of Human Resources (MOHR), the Implementation Coordination Unit (ICU) and the Ministry of Health (MOH). The usable response rate was 29.7%. There was evidence to suggest that the e-government applications were generally successful in lead implementing agencies

    Open source software in Information Technology education

    Get PDF
    As Malaysia strengthens its position as an outsourcing hub, there continues to be many job opportunities in information technology in Malaysia. This paper looks at the ranking of open source software skills in demand. Further, it provides insights into graduates' perception of usefulness for courses using open source software versus proprietary software at a local institution of higher learning

    Information disclosure behaviour in social media among Malaysian youth: the impact of privacy concern, risk and trust

    Get PDF
    People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users’ protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and Privacy Concer

    Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust

    Get PDF
    People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users? protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and Privacy Concern

    Enabling Change Factors and IT Success in the Malaysian E-government Implementation

    Get PDF
    This article examines the role of enabling change factors in information technology (IT) success in the Malaysian e-government implementation. Enabling change factors are defined as the capability of organizations to bring about desired changes in terms of possessing the appropriate mechanisms like human skills, tool, technology, methodology etc. (Nance 1996). Based on previous research, this study posits three enabling change factors namely organizational support for change, project-planning process and proactive technological orientation. This study also proposes measures for these respective factors. The study adopted a cross-sectional survey research approach. Respondents were officers and directors who were users of e-services, e-procurement, generic office environment, human resource management information system, project monitoring system and electronic labor exchange based at seven lead e-government agencies in Putrajaya and the Klang Valley. There was evidence to suggest that in the Malaysian e-government environment, there was a link between enabling change factors and IT success

    Computer ethics awareness among undergraduate students in Malaysian higher education institutions

    Get PDF
    This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples T-test for differences was performed across four distinct groups, that is, university, gender, age, and duration of computer use. The results of the tests conducted indicate that the ethical awareness of computer use of the students differ most significantly on the basis of the university itself. There were minimal differences across gender, age and duration of computer use. This suggests that computer ethics awareness training is needed for university users. The results are discussed and the implications for studies in an education context are outlined

    Information security behaviour : a descriptive analysis on a Malaysian public university

    Get PDF
    The critical issues of information security have gradually increased. Effective information security management require a great understanding both technological and human dimensions. Thus, the purpose of this research is to investigate the university student?s behavior towards information security and to examine factors influencing information security behavior. The study adopted the quantitative approach by conducting a survey among students in one of the public universities in Malaysia. Questionnaires were distributed to the targeted respondents. Then, the SPSS software was used to systematically analyze all data obtained and generate statistical information and detailed analyses of the survey results. This study is helpful in exploring issues related to information security behavior. Hopefully, this study contributed to an understanding of the influencing factors towards the university students? behavior in relation to information security

    The supply-side IT outsourcing competencies and relationship exchange in Malaysia

    Get PDF
    IT outsourcing (ITO) has experienced a considerable growth in recent years, so much so that some authors suggest we find ourselves in the outsourcing era. ITO growth seems to be guaranteed at least in the near future. Many past researches on IT outsourcing were done in North America, Europe and Australasia contexts with little evidence from developing countries perspectives [13, 26]. IT outsourcing relationship researches revealed its importance in improving the success of IT outsourcing arrangements. Many researches on relationship, however, were investigated from demand-side perspectives. Hence, it is the aim of this study to complement these one-dimensional findings by investigating the IT outsourcing relationship exchange from service providers’ perspectives in Malaysian context. This report presents the first phase qualitative findings of an on-going research on IT outsourcing competencies and relationship. The study comprises three phases: 1) a focus group and in-depth interviews; 2) mass survey; and 3) final group discussion. The authors have arranged an expert focus group deliberating on the emerging issues and subsequently interviewed five senior executive managements in the service provider firms to explore further on key variables. The unstructured interviews were recorded and transcribed and analysed based on Miles and Huberman (1994) recommendations. The study found that all the variables are, in practice, important determinants of successful outsourcing projects as claimed by many other researches in the western context. The ranking of the determinants or factors, however, were of varying disputes depending on the types of ITO configurations the parties entered into
    corecore