259 research outputs found

    Understanding Involvement in Technology Adoption

    Get PDF
    Adoption research often draws on frameworks such as the Technology Acceptance Model and the Theory of Planned Behaviour to explain an individual\u27s intention to use information technology (IT). Collectively these models suggest that intention to use an information technology (IT) is determined by attitude, subjective norms and perceived behavioural control. However, prior research on the attitude-behaviour link often returns inconsistent results. To address this inconsistency, this study looks at the role of involvement (i.e. an individual\u27s level of interest in a technology) in explaining intention to use IT, in this case, intention to use a mobile Internet phone. The survey results showed involvement was a stronger predictor of intention to use when compared with other determinants (e.g. perceived enjoyment, perceived behavioural control) while attitude was not significant. The findings therefore suggest the usefulness of involvement in explaining intention to use where attitude may fail to do so

    An Integrated Perspective on Factors Influencing Online Health-Information Seeking Behaviours

    Get PDF
    Today medical practice has turned to the development of online health systems and models aimed at helping people to become more independent in managing their well-being and care. Health-information seeking is a key aspect of these new models of engagement, yet studies show there is a decline in health-seeking behaviour (HISB). Focusing on online channels, this research-in-progress paper brings together theoretical insights from the Health Belief Model, the Theory of Reasoned Action and prior work on information channel characteristics to identify key drivers of online health-information seeking. The paper reports the preliminary results of model assessment using data collected from 94 respondents. The results contribute to current understanding of what motivates online HISB and the relative importance of these factors in motivating seeking behaviour

    An Application of Virtual Reality in Fire Emergency Preparedness ā€“ Impacts of Information and System Attributes

    Get PDF
    Virtual reality (VR) is gaining significant attention as a tool for supporting learning and education. However, most studies of virtual reality focus on system aspects such as presence and immersion and their impacts. Few have examined the information aspect of VR applications. Focusing on public fire safety and preparedness education, this study examines the impacts of system and information characteristics on learning and intention to create an escape plan in the event of a fire incident following participant exposure to the ā€˜Escape My Houseā€™, a virtual reality tool that enables people to experience a house fire. The results show that information aspects have significant impacts on learning and intention, and fully mediates the impact of system aspects (i.e. presence) on learning. Implications for future research and practice are discussed

    Conceptualizing Creative Use: An Examination of the Construct and its Determinants

    Get PDF
    Organizations depend on the creativity of their employees in order to get the best possible outcome from the technologies that have been put into place. Yet IT research exhibits few studies in understanding the types of behaviors that yield new and useful ways of using organizational systems. This research therefore examines the creative use of technologies by individuals, that is, the implementation of novel and useful ways of applying organizational systems to solving business problems. Drawing on a well-established body of literature on creativity/innovation, a theory-based conceptualization of creative use is developed. Creative use is then assessed as the dependent variable in the context of Bandura\u27s (1986) self-efficacy theory, which posits the necessity of domain-related self-efficacy and knowledge as prerequisites for creative use. The results support the theorized model and further suggest that breadth of knowledge is the most influential for creative use

    Impact of Artificial Intelligence on Knowledge Sharing in the Workplace

    Get PDF
    The increasing use of digital communication tools in the workplace coupled with the ability of AI gives rise to new ways to capture knowledge from everyday communications such as work email and online meetings, and share this knowledge with others. While this has benefits for organisations, little is known of how employees may respond. The aim of this study is to examine factors that influence employees\u27 willingness to share their knowledge knowing that their communications may be analysed, and the knowledge shared with others. Drawing on the Theory of Reasoned Action (TRA), this study examines the impact of motivating and inhibiting factors on knowledge sharing. The findings point to the importance of self-efficacy, reciprocity, and reputation for enhancing knowledge sharing in this context. However, concerns about being monitored may hinder knowledge sharing

    An Empirical Study of Home User Intentions towards Computer Security

    Get PDF
    Home computer users are solely responsible for implementing security measures on their devices. Although most computers have security software installed, the potential remains for security breaches, which makes it important for home users to take additional steps, such as not sharing oneā€™s password and using strong passwords, to secure their devices further. Drawing on protection motivation theory and findings from prior research, this study evaluates factors that influence individuals to implement additional security measures to protect their home computers. Using SmartPLS and responses from 72 home computer users, the results show that response efficacy, self-efficacy and subjective norms were significant in encouraging persons to implement additional security measures. Maladaptive rewards on the other hand acted as a significant detractor, while neither perceived vulnerability nor perceived severity was significant in relation to willingness to implement additional security measures

    THE FUTURE OF IDENTITY MANAGEMENT: UNDERSTANDING CONSUMER ATTITUDES TOWARDS BIOMETRIC IDENTIFICATION

    Get PDF
    The explosive growth of consumer-facing biometric technology is providing opportunities for organizations to change the way in which they identify and authenticate consumers, and replace traditional forms of identification such as usernames and passwords. For consumers, the benefits include increased account security and convenient access to services. However, these positives can be countered by issues such as concerns about privacy and security. Drawing on Protection Motivation Theory (PMT) and prior research, this study uses data collected from 132 online banking consumers to assess the relative impacts of benefits and concerns on their attitude towards using biometric identification for their banking. Implications for practice and future research are discussed

    Conceptualizing Public Service Value in E-government Services

    Get PDF
    Given the substantive investments that governments are making in information technology and the development of e-government channels to improve interactions with citizens, there is increasing interest in determining whether these investments are paying off, and encouraging citizen use of and migration to less costly e-channels. For research on e-government to advance, it is imperative that we gain a good understanding of what citizens and other public sector \u27customers\u27 mean by value. This research-in-progress paper therefore reports on a study aimed at defining the value e-government from the perspective of the citizen in relation to e-government services

    Investigating Information System Infusion At The Individual Level: Re-Conceptualisation And Operationalization

    Get PDF
    Information Systems are the engine of many organizations, and investments are continuously made with the expectation that employees will utilize the technology to enhance performance. However, researchers have argued that the functional potential of systems are often under-utilized or not used effectively. There are calls for research that focuses on deep usage as opposed to ā€˜mereā€™ or ā€˜vapidā€™ use. This paper focuses on a deep usage, that is, infusion which is regarded as the ā€˜highest level of useā€™. The operational definition for infusion in the literature frequently echoes use to its full potential; however it remains unclear as to what defines full use and in what context should it be evaluated for individuals in organizations. Understandably, the complex, broad and abstract nature of infusion has contributed to inconsistencies in its measures; furthermore, there is a lack of theory applied in understanding its nature. This research proposes a mixed method approach to gain greater insights into the nature of infusion, in terms of the process by which individuals infuse, and its antecedents. The aim of this study is not to criticize extant research on infusion, but to advance our understanding from a theoretical and practical perspective
    • ā€¦
    corecore