65 research outputs found
An Empirical Evaluation of the Effects of Gender Differences and Self-Efficacy in the Adoption of E-Banking in Nigeria: A Modified Technology Acceptance Model
The issues of gender disparity in the usage of information technology (IT), as well as self-efficacy, have
received considerable interest and attention among researchers in recent times. Prior research has
identified that gender differences and self-efficiency affect the attitude towards adoption and use of technology.
In general, females are believed to be disadvantaged compared to their male counterparts with
respect to IT usage and acceptance. The reasoning is that males are mostly more exposed to technology
and tend to have more proficiency with such tools. Very little information exists in the extant literature
regarding perceptions in developing parts of the world, including Africa. In this chapter, an empirical
evaluation of the issues in the context of e-banking will be made in Lagos (Nigeria) and its environs.
An extended Technology Acceptance Model (TAM) will be used as a conceptual framework to guide the
discourse. Data analysis was done on SPSS 15.0. The studyâs results showed that gender differences
moderated the acceptance of e-banking of users in the research context. Namely, computer self efficacy
and perceived ease of use were of concerns to females, but less so for their male counterparts. Also,
perceived usefulness of e-banking is discovered to be the most influencing factor for male users. The
studyâs implications for research and practice are discussed in the chapter
Critical analysis of information security culture definitions
This article aims to advance the understanding of information security culture through a critical reflection on the wide-ranging definitions of information security culture in the literature. It uses the hermeneutic approach for conducting literature reviews. The review identifies 16 definitions of information security culture in the literature. Based on the analysis of these definitions, four different views of culture are distinguished. The shared values view highlights the set of cultural value patterns that are shared across the organization. An action-based view highlights the behaviors of individuals in the organization. A mental model view relates to the abstract view of the individualâs thinking on how information security culture must work. Finally, a problem-solving view emphasizes a combination of understanding from shared value-based and action-based views. The paper analyzes and presents the limitations of these four views of information security culture definitions
Determinants of eGovernment maturity in the transition economies of central and eastern europe
Our research focuses on the possible determinants of eGovernment (E-gov) maturity in the Transition Economies of Central and Eastern Europe (TEECE). E-gov maturity, in this research, refers to the growth levels in a country's online services and its citizens' online participation in governance. Our study of the extant literature indicated that few have discussed the determinants of E-gov maturity in TEECE. Studies from differing parts of the world are needed for theory development. Building on a prior framework, we used the contingency theory and the resource-based view perspective to guide our discourse. In particular, we examined the relationships between macro-environmental factors such as national wealth, technological infrastructure, rule of law, and so forth on E-gov maturity. A 5-year panel data of 16 TECEE selected from two main groupings was used for analysis in conjunction with structural equation modeling technique; the data consisted of 80 observations or data points. The data analysis underscored the relevance of such factors as technological infrastructure, rule of law, and human capital development as possible determinants of E-gov maturity in TEECE. National wealth was found to be an enabler in the research conceptualization. The implications of our study's findings for research and policy making are discussed
Telemedicine adoption issues in the United States and Brazil: Perception of healthcare professionals
Factors that Influence Workersâ Participation in Unhygienic Cyber Practices: A Pilot Study from Nigeria
Part 3: Southern-Driven Human-Computer InteractionInternational audienceParticipation or engagement in unhygienic cyber practices could ultimately harm an organizationâs information and communication technologies, if unchecked. This present study used concepts from the theory of planned behavior and organizational control theory to examine the effects of factors such as attitude, subjective norms, organizational facilitators, monitoring, and self-efficacy on workersâ participation in unhygienic cyber practices. A cross-sectional survey of Nigerian professionals was used to test the formulated hypotheses. Partial least squares technique of structural equation modeling (SEM) was used for data analysis. The results indicate that attitude toward cyber hygiene has a negative effect on workerâs participation in unhygienic cyber practices; similarly, subjective norms have a negative effect on engagement in such acts. The data did not show that organizational facilitators, self-efficacy, and monitoring had a meaningful impact on Nigerian workersâ participation in unhygienic cyber practices. Implications of the study were discussed and contribution to the extant literature noted
- âŠ