25 research outputs found

    Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model

    Get PDF
    YesBased on a critical review of the Unified Theory of Acceptance and Use of Technology (UTAUT), this study first formalized an alternative theoretical model for explaining the acceptance and use of information system (IS) and information technology (IT) innovations. The revised theoretical model was then empirically examined using a combination of meta-analysis and structural equation modelling (MASEM) techniques. The meta-analysis was based on 1600 observations on 21 relationships coded from 162 prior studies on IS/IT acceptance and use. The SEM analysis showed that attitude: was central to behavioural intentions and usage behaviours, partially mediated the effects of exogenous constructs on behavioural intentions, and had a direct influence on usage behaviours. A number of implications for theory and practice are derived based on the findings

    An examination of factors that influence the number of information security policy violations in Qatari organizations

    No full text
    Purpose: This paper aims to investigate factors that impact the number of information security policy violations in Qatari organizations and to examine the moderating effect of Hofstede's cultural dimensions on the relationships between the independent factors and the number of information security policy violations. Design/methodology/approach: Grounded in related theories from the fields of criminology, behavioral psychology and theory of planned behavior, two components that affect the number of information security policy violations were identified.Aquantitative approach was used by developing a questionnaire survey to collect the data. The research model was tested using 234 employees from different Qatari organizations. Findings: The results of the study indicate that trust, the impact of implementing information security policy on work environment and the clarity of the scope of the information security policy were significant factors in predicting the number of information security policy violations. The findings also reveal that cultural dimensions such as uncertainty avoidance and collectivism moderate the relationships between trust, clarity of policy scope and impact of information security policy on work environment and the number information security policy violations. Research limitations/implications: The generalizability of the results is limited because the sample of the study was drawn from only one developing country. Therefore, a plausible future research could be testing the proposed model in many developing and developed countries. Practical implications: The paper includes practical implications for developing and implementing security measures and policies in diversified work environments. Originality/value: This study fulfils a gap in investigating the factors that influence the number of information security policy violations and the moderating effect of cultural dimensions in developing countries such as Qatar.Scopu

    The Impacts of System and Human Factors on Online Learning Systems Use and Learner Satisfaction

    No full text
    Success in an online learning environment is tied to both human and system factors. This study illuminates the unique contributions of human factors (comfort with online learning, self-management of learning, and perceived Web self-efficacy) to online learning system success, which is measured in terms of usage and satisfaction. The research model was tested employing SEM on a sample of 674 college students enrolled in at least one online course. The factors of comfort with online learning and perceived Web self-efficacy were significant predictors of satisfaction. Comfort with online learning was significant in predicting usage. The impact of demographic variables was examined.Wiley Online librar

    Modeling the pore level fluid flow in porous media using the immersed boundary method

    Get PDF
    This chapter demonstrates the potential of the immersed boundary method for the direct numerical simulation of the flow through porous media. A 2D compact finite differences method was employed to solve the unsteady incompressible Navier-Stokes equations with fourth-order Runge-Kutta temporal discretization and fourth-order compact schemes for spatial discretization. The solutions were obtained in a Cartesian grid, with all the associated advantages. The porous media is made of equal size square cylinders in a staggered arrangement and is bounded by solid walls. The transverse and longitudinal distances between cylinders are equal to two cylinder diameters and at the inlet a fully developed velocity profile is specified. The Reynolds number based on the cylinder diameter and maximum inlet velocity ranges from 40 to 80. The different flow regimes are identified and characterised, along with the prediction of the Reynolds number at which transition from steady to unsteady flow takes place. Additionally, the average drag and lift coefficients are presented as a function of the Reynolds number
    corecore