65 research outputs found

    An Empirical Evaluation of the Effects of Gender Differences and Self-Efficacy in the Adoption of E-Banking in Nigeria: A Modified Technology Acceptance Model

    Get PDF
    The issues of gender disparity in the usage of information technology (IT), as well as self-efficacy, have received considerable interest and attention among researchers in recent times. Prior research has identified that gender differences and self-efficiency affect the attitude towards adoption and use of technology. In general, females are believed to be disadvantaged compared to their male counterparts with respect to IT usage and acceptance. The reasoning is that males are mostly more exposed to technology and tend to have more proficiency with such tools. Very little information exists in the extant literature regarding perceptions in developing parts of the world, including Africa. In this chapter, an empirical evaluation of the issues in the context of e-banking will be made in Lagos (Nigeria) and its environs. An extended Technology Acceptance Model (TAM) will be used as a conceptual framework to guide the discourse. Data analysis was done on SPSS 15.0. The study’s results showed that gender differences moderated the acceptance of e-banking of users in the research context. Namely, computer self efficacy and perceived ease of use were of concerns to females, but less so for their male counterparts. Also, perceived usefulness of e-banking is discovered to be the most influencing factor for male users. The study’s implications for research and practice are discussed in the chapter

    Critical analysis of information security culture definitions

    Get PDF
    This article aims to advance the understanding of information security culture through a critical reflection on the wide-ranging definitions of information security culture in the literature. It uses the hermeneutic approach for conducting literature reviews. The review identifies 16 definitions of information security culture in the literature. Based on the analysis of these definitions, four different views of culture are distinguished. The shared values view highlights the set of cultural value patterns that are shared across the organization. An action-based view highlights the behaviors of individuals in the organization. A mental model view relates to the abstract view of the individual’s thinking on how information security culture must work. Finally, a problem-solving view emphasizes a combination of understanding from shared value-based and action-based views. The paper analyzes and presents the limitations of these four views of information security culture definitions

    Determinants of eGovernment maturity in the transition economies of central and eastern europe

    No full text
    Our research focuses on the possible determinants of eGovernment (E-gov) maturity in the Transition Economies of Central and Eastern Europe (TEECE). E-gov maturity, in this research, refers to the growth levels in a country's online services and its citizens' online participation in governance. Our study of the extant literature indicated that few have discussed the determinants of E-gov maturity in TEECE. Studies from differing parts of the world are needed for theory development. Building on a prior framework, we used the contingency theory and the resource-based view perspective to guide our discourse. In particular, we examined the relationships between macro-environmental factors such as national wealth, technological infrastructure, rule of law, and so forth on E-gov maturity. A 5-year panel data of 16 TECEE selected from two main groupings was used for analysis in conjunction with structural equation modeling technique; the data consisted of 80 observations or data points. The data analysis underscored the relevance of such factors as technological infrastructure, rule of law, and human capital development as possible determinants of E-gov maturity in TEECE. National wealth was found to be an enabler in the research conceptualization. The implications of our study's findings for research and policy making are discussed

    Factors that Influence Workers’ Participation in Unhygienic Cyber Practices: A Pilot Study from Nigeria

    No full text
    Part 3: Southern-Driven Human-Computer InteractionInternational audienceParticipation or engagement in unhygienic cyber practices could ultimately harm an organization’s information and communication technologies, if unchecked. This present study used concepts from the theory of planned behavior and organizational control theory to examine the effects of factors such as attitude, subjective norms, organizational facilitators, monitoring, and self-efficacy on workers’ participation in unhygienic cyber practices. A cross-sectional survey of Nigerian professionals was used to test the formulated hypotheses. Partial least squares technique of structural equation modeling (SEM) was used for data analysis. The results indicate that attitude toward cyber hygiene has a negative effect on worker’s participation in unhygienic cyber practices; similarly, subjective norms have a negative effect on engagement in such acts. The data did not show that organizational facilitators, self-efficacy, and monitoring had a meaningful impact on Nigerian workers’ participation in unhygienic cyber practices. Implications of the study were discussed and contribution to the extant literature noted
    • 

    corecore