A Study of Privacy and Security Concerns on Doctors and Nurses Behavioral Intentions to Use RFID in Hospitals
|
|
- Ambrose Webster
- 5 years ago
- Views:
Transcription
1 th Hawaii International Conference on System Sciences A Study of Privacy and Security Concerns on Doctors and Nurses Behavioral Intentions to Use RFID in Hospitals Thomas Winston Souren Paul Lakshmi Iyer Nova Southeastern University Nova Southeastern University UNC Greensboro thomwins@nova.edu spaul@nova.edu lsiyer@uncg.edu Abstract Radio frequency identification (RFID) is a useful technology that has myriad applications in retail, manufacturing, and healthcare settings. RFID can scan devices in their proximity and report the data to information systems. RFID in healthcare settings presents potential security and privacy concerns to the people and processes being tracked by the devices particularly healthcare workers including nurses and doctors. This research presents a theoretical model that will assess the effect of six independent variables: cognitive factors, perception of external control, privacy concerns regarding surveillance and RFID devices, subjective norms, existence of security policy, and persistence of data on two dependent variables, medical staff, intention to use RFID, and actual use of RFID. The model is validated with an empirical study. The results suggest that cognitive factors, persistence of data captured through RFID, and the awareness of the existence of security policy influence medical staff members use of RFID in hospitals. 1. Introduction Radio frequency identification (RFID) is a useful technology that has myriad applications in retail, manufacturing, and healthcare settings. RFID can scan devices in their proximity and report the information to connected (wired or other wireless) information systems. Once touted as the panacea for home healthcare, RFID is a generic term used to identify devices or objects. RFID devices can add benefit to patients in remote settings. RFID devices have been used to optimize systems in areas such as manufacturing and healthcare to expose inefficiencies in a system or process. Unlike manufacturing however, RFID in healthcare settings presents security and privacy concerns to the people being tracked by the devices particularly healthcare workers including nurses and doctors [5]. Security and privacy issues regarding technology use pose a paradox in most modern contexts where technology is used. A large body of literature covering over 25 years outlines the paradox of privacy vs. security in many contexts, with the primary tenant stated by [27] being To increase security, one must give up some privacy. US laws have considered this carefully, and ran ashore of this paradox when the USA PATRIOT act was promulgated in the fall of 2001 [27]. Lee [27] discovered that security concerns play a role in RFID acceptance. Anderson and Agarwal [5] found that privacy and security are always major concerns with RFID usage in medical contexts; however they were dependent on the emotional state of the patient. RFID usage in mandatory environments could violate a nurse s privacy rights, due to the surveillance capabilities the technology enables [10]. The factors that influence the intention to use RFID by medical staff have not been studied adequately. We intend to address this gap by proposing a theoretical model that integrates the effects of cognitive factors, perception of external control, privacy concerns regarding surveillance and RFID devices, subjective norms, existence of security policy, and persistence of data on medical staffs intention to use RFID. The theoretical model presented in this research is based on the technology acceptance model (TAM) and the extended theory of planned behavior (ETPB). This research extends the extant and well-documented research regarding technology acceptance embodied by TAM, and its variants, and the Extended Theory of Planned Behavior, by adding the dimensions of privacy and security to the ETPB model. The notion of technology acceptance, like the models used to describe it has evolved over the years, in an attempt to better capture the behavioral elements of security and privacy. We conducted a survey to validate the model with empirical data. The rest of the paper is organized as follows. Section 2 presents the literature review. Section /16 $ IEEE DOI /HICSS
2 introduces to the theoretical model of the study. Section 4 explains the research methodology approach; section 5 presents the results of the survey. We end the paper with discussion on future directions and conclusion for research. 2. A Brief Review of the Literature In order to develop the research model used in this proposed research, it was necessary to consider several issues: privacy research in RFID usage, security research in RFID usage as well as models used to determine acceptance of any technology. Since the research proposed here is related to behaviors, the first part of this literature review will consider how extant models of technology acceptance apply to this research, and more importantly how they help formulate the acceptance model presented herein. The second part of the literature review will detail context of the variables chosen for the proposed theoretic model Overview of the Models Used for Technology Acceptance TAM, and its predecessors determined links between perceived usefulness, intention to use and actual use of new technologies. Researchers have used TAM, and its extensions TAM2 and TAM3 to determine whether or not a user population will accept a new technology. TAM2 and TAM3 added constructs to better capture behaviors associated with technology acceptance [39]. The importance of user acceptance of a technology has been stressed IS research [14, 20, 33]. Researchers have used the theory of planned behavior model (TPB) to investigate the factors influencing physicians to accept the Medline System [22]; TAM and TPB and have been used to understand attitudes toward and user acceptance of RFID technology in mixed context (mandatory or voluntary use) healthcare settings [13, 20, 27]. We present the overview of these theories in the next sub-section of the paper Technology Acceptance Research Models Technology Acceptance Model TAM and the Theory of Planned Behavior (TPB) are based on Fishbein and Adjzen s theory of reasoned action (TRA). TAM focuses on how perceptions influence a person s intentions. Critical in its relationship to intention to use, another construct of TAM, these variables build the foundation for whether or not a user accepts information technology. Studies have used the TAM to determine outcomes in information technology adoption [14, 15, and 28]. The Theory of Planned Behavior (TPB) focuses on how an individual s external environment influences his or her intentions, known as subjective norms. Subjective norms are perceptions of social pressure to either engage or not engage in a behavior. [28]. Moreover, along with technological, organizational, and environmental factors of RFID adoption also depends on the expectations and self-efficacy, and the process of continued usage intention involves satisfaction from current use and the degree of self-efficacy [21]. TAM underwent modifications, notably TAM 2 and TAM 3. TAM was extended to TAM 2, to expand upon the construct of perceived ease of use to include control, intrinsic motivation and emotion [37]. TAM 3 focused on interventions, which lead to greater acceptance and effective utilization of Information Technology to help direct leadership decision making processes [39]. Theory of Planned Behavior The first iteration of the TPB was an extension of the Theory of Reasoned Action (TRA), which added a new construct perceived behavioral control [1][4]. The TRA positively correlates intent of an individual to engage in an action with the actual engagement of that action [12]. TPB focuses on relationships between external environments and a person s intentions [28]. The variables of intentions to perform a given activity were related to subjective norms, perceived behavioral control and attitude toward the behavior [2]. TPB has been applied to many information systems adoption problems, regarding adoption, use and disuse. [39.5] [2]. Subjective norm is defined as an individual s perception of whether people important to the individual think the behavior should be performed [2]. The constructs in TPB help researchers to better understand why individuals engage in certain behaviors [2]. TPB is an effective tool in evaluating such decisions in healthcare settings. TPB was used to better understand binge drinking among young people [31]; condom use [7]; and likelihood of physical activity [17]. TPB is also useful in determining technology adoption in mixed (forced or voluntary) control contexts. There are important differences between mandatory and voluntary use environments [11]. Voluntary-use environment as one where users perceive the technology adoption or decision to use as a willful choice [11, p. 284] while in mandatory-use environments, employees have to adopt a particular technology to keep their jobs, thereby eliminating the emphasis on prior beliefs and attitudes about the 3116
3 technology [11]. Mandatory-use environments can have deleterious effects on employee perception, possibly leading to delays in implementation, or possibly leading to alternative potentially destructive employee behavior [11, p. 284]. Extended Theory of Planned Behavior TPB was extended later by dividing the construct of perceived behavioral control into two separate variables: self-efficacy and controllability [1][2]. Extended TPB (ETPB) model was used to predict undergraduate students intentions to apply to Northern Ireland civil service [12]. ETPB was used to understand influences on adolescent engagement with social networking technology [6]. Group norm was found to be more useful than the construct subjective norm, in that it significantly predicted behavior intention by explaining 10% of the variance above and beyond standard TPM variable of subjective norm [6]. This finding was consistent with the subsequent research on ETPB [18][23][29]. 3. Proposed Research Model The research model presented in this paper will use the ETPB and TAM3 models and prior research on the willingness to provide access to personal health information [5]. Electronic health information privacy concern and trust in electronic medium influence patient s willingness to provide access to personal health information and intended purpose (of use of the information) and requesting stakeholder have moderating effects on these relationships [5]. Our theoretical model is shown in figure 1. Figure 1. Conceptual Model Specifically, our model considers the effects of subjective norm, data persistence, existence of security policy, perceptions of external control, and cognitive factors of privacy concerns regarding surveillance and RFID devices, as well as trust in the electronic medium on intention to use RFID by nurses and doctors in a healthcare setting. Next, we elaborate the different components of the theoretical model. We start with a discussion on the determinants of intention to use RFID to the medical staff. 3.1 Intention to Use, and its determinants The factors leading a person to use a particular technology, or intention to use can be defined as the sum of the perceived relative weights of attitude toward the behavior and subjective norms toward that behavior. [37]. Persistence of data and subjective norm are expected to affect intention to use based on the fear that requirements to retain data may create privacy risks for patients. Another variable affecting intention to use is existence of security policy Cognitive factors and intention to use RFID. Prior studies investigated privacy issues concerning RFID usage among nurses in a mandatory use environment [32]. According to an unidentified nurses union, mandatory usage of RFID tags on a nurses constituted a violation of privacy rights [32]. Privacy and security issues with devices providing location based information are mentioned in a body of literature that focuses on privacy issues considers the issue of providing location based information on an ongoing basis, as well as the privacy and security risks this poses. Prior studies demonstrate that the willingness to disclose information as a condition for transacting is an outcome variable that is consistent with prior privacy research [8, 19]. These studies investigated ways to mitigate privacy concerns with the constant transmission of personal devices that showed location, using the global positioning system. Prior studies also demonstrate that the users are reluctant to provide context (location) information, particularly when the data is automatically captured by the system [35]. RFID transmission can be intercepted and thus, it poses privacy-based risk with security ramifications, which will almost certainly negatively affect the user intention to engage in the use of the technology. Privacy issues, such as location information security, and trust of electronic medium complicate the potential of location-based [40]. The literature defines LBS as network-based services that integrate a mobile device s location with other location based information to include: entertainment, dining and emergency services options. LBS can also be used in asset tracking, such as in the case of RFID [40]. Prior 3117
4 studies also suggest that personal health related information has gradations of importance, based on the type of information, intended use of the information, and finally the identity of the entity requesting the information [5]. The privacy concerns, described in this study as cognitive factors are negatively related to the intention to use LBS [40]. Hence: Hypothesis 1: The cognitive factors of privacy concerns regarding surveillance and trust in the electronic medium have a negative relationship with intention to use Persistence of data and intention to use RFID users are concerned about the issues of privacy, and value of the data, when it is collected surreptitiously and continuously [25]. Understanding usage of the data, and the security of the data collected relates to the customers understanding of the technology and their perceptions of how the technology adds value. Thus it appears that internalized notions of privacy, and understanding of data usage, storage or persistence will affect a user s view on value add of a given technology. A recurring security concern about persistence of data in a sensor based network, such as RFID can both positively and negatively affect intention to use. Persistence of data is related to privacy concerns in sensor networks [24]. Since push/pull networks such as those used in RFID networks can surreptitiously capture data, and potentially store the data, the perceptions and understanding of the RFID system parameters will affect whether or not an individual willfully uses the technology [24]. Security vulnerabilities of RFID technology, such as a lack of cryptographic capability, the ability clone the device, detect duplicates, and data retention either on the device or in a centralized database cause other security concerns, which would affect intention to use [41]. Security concerns abound as to whether RFID device databases contain simply RFID specific information, or information received, recorded on the device and transmitted back to the others in the RFID network. In a study on consumers intention to use electronic medium, trust and perceived risk are found to be direct antecedents of intention to use the electronic medium for transaction, suggesting that uncertainty reduction is a key component of acceptance [34]. Juels considered the security vulnerabilities of RFID technology, and focused on obvious issues such as a lack of cryptographic capability as well as less obvious ones, like how data retention either on the device or in a centralized database causes other security concerns, which would affect intention to use [41]. Hence: Hypothesis 2: There is a negative relationship between persistence of data and intention to use Subective norm and intention to use A body of literature regarding TAM, TAM2, UTAUT, and the TPB shows a positive correlation between subjective norm and intention to use [12][14][15][36]. Hence: Hypothesis 3: There is a positive relationship between subjective norm and intention to use Security policy and intention to use According to Topa and Karyda in [47], Dinev and Hu explored factors, which showed that technology awareness has a significant impact on the intention to use protective technology (p.172). It is quite reasonable to expect a similar relationship between the existence of security policy and medical staff members intention to use RFID in hospitals, as in some instances RFID devices are used to protect patients and or medical staff. However, it is the awareness of the existence of a security policy (regarding RFID) and not the security policy per se that will influence medical staff members intention to use RFID. Hence: Hypothesis 4: There is a positive relationship between the existence of security policies and intention to use External control and intention to use The perception of external control affects intention to perform actions and the actual action itself. Ajzen [2] stated that perceived behavioral control, together with behavioral intention can be used directly to predict behavioral achievement. Hence: Hypothesis 5: There is a positive relationship between external control and intention to use Intention to use and actual use Taylor and Todd [36] showed a positive relationship between intention to use and actual use. Others such as Davis et al. [15] stated the effects of behavior beliefs and behavior intention on actual use change over time with users employment of the technologies. Hence: Hypothesis 6: There is a positive relationship between intention to use and actual use. 3118
5 4. Research Design and Methodology The primary goal of this study was to investigate security and privacy concerns on behavioral intentions to use RFID in hospitals among doctors and nurses. After obtaining IRB consent, and developing a survey tool using both validated and new constructs we were able to collect approximately 115 responses from cross-section of doctors and nurses in the USA. The stratified sampling technique focused on a target population of male and female medical doctors and registered nurses aged 18 years and older. We determined using G*Power that a minimum sample size of 100 was required to have a significance level of.05. The survey used a Likert scale as well as two dichotomous scale questions and was derived from previously validated questions such as those created by Xu and Gupta, and Taylor and Todd [36][40]. The statistical technique chosen to test the stated hypotheses was partial least squares (PLS) path analysis, otherwise known as partial least squares structural equation modeling (PLS-SEM). PLS is an advanced statistical method that allows optimal empirical assessment of a structural (theoretical) model [45]. We used the framework specified by Chin [42] and protocols described by Chin [42] and Wong [44] for constructing a PLS path model using SmartPLS software, specifically the computation and evaluation of (1) outer model loadings; (2) internal consistency reliability; (3) convergent validity; (4) discriminant validity; (5) inner model path coefficient sizes and significance; and (6) explanation of variance. Chin [42, p. 656] and Wong [44, p. 5] emphasized that PLS applications Do not use goodness-of-fit (GoF) Index and similarly, Hair [43] concluded that GoF indices are not universally applicable. Chin notes that GoF indices are not prominent in PLS models and that their absence in PLS analyses should not be considered a deficit [42, p.656]. Consequently no goodness of fit indices are provided. A path diagram, defining the hypothesized relationships between the variables, was drawn with the graphic user interface of SmartPLS. The following tests were conducted to validate the model as described by Wong [44]: (a) factorial validity, tested by evaluation of the outer model loading coefficients; (b) internal consistency reliability, tested by the composite reliability coefficient (not Cronbach s alpha, which is not applicable for PLS- SEM); (c) convergent validity, tested by the average variance explained (AVE); and (d) discriminant validity, tested by the square root of AVE. SmartPLS computed the path coefficients or standardized regression weights (β) between the latent variables. Each path coefficient ranged in value from - 1 to +1. The researcher conducted bootstrapping to test for the significance of the path coefficients. A path coefficient was declared to be significantly different from zero if p <.05 for the t-test statistic. The R 2 values computed by SmartPLS were recorded to reflect the effect sizes in terms of the proportions of the variance explained [42][44]. 5. Results The latent variables, the indicators, and the measurement scales used to construct the PLS path model are defined in Figure 2. Figure Measurement Model Analyses Descriptive Statistics The frequency distributions for the latent variables are illustrated in Figure 3. The mean of the values show that the data is slightly left skewed ( ), meaning most values are concentrated on the right of the mean, with extreme values to the left. The mean of the Kurtosis values (0.056) is less than 3, making this a platykurtic distribution, which is flatter than a normal distribution with a wider peak. The probability for extreme values is less than for a normal distribution, and the values are spread wider around the mean. Figure Evaluation of Outer Model Loadings 3119
6 Figure 4 presents a copy the outer model path loadings. All of the outer model path loadings were strong (.5). The high proportion of strong factor loadings provided evidence to support the factorial validity of the model. Figure 4 AU Actual Use; CF Cognitive Factors; DP Data Persistence; EC External Control; IU Intention to Use; PU Perceived Usefulness; SP Security Policy; SN Subjective Norm Figure 6 Convergent and Discriminant Validity of Latent Variables Internal Consistency Reliability Figure 5 presents the composite reliability coefficients, average variance extracted and Cronbach s alpha values for the latent variables. Composite reliability does not assume tau equivalency among the measures with its assumption that all indicators are equally weighted [42]. The composite reliability for Data Persistence and External Control was good (>.8). The composite reliability for Subjective Norm and Security Policy was excellent (>.9). The reliability of Cognitive Factors, Actual Use, and Intention to Use could not be estimated because these three variables were each measured with only one indicator. Figure 5 Correlations among constructs The square root of AVE for each latent variable was computed to test for discriminant validity. Discriminant validity was confirmed because the square roots of AVE were larger than the corresponding inner model path coefficients (betavalues) associated with the latent variables in Figure 8. Figure 7 Heterotrait Monotrait Ratio Criterion Figure 7 shows all values, which according to Henseler, Ringle and Sarstedt [48] prove discriminant validity using the Heterotrait Monotrait criterion. Henseler, et al. [48] state that a conservative estimate of discriminant validity is no values higher than Furthermore, they note that values further from 1.0 are preferable. Both the values lower than 0.85 and their relative distance from 1.0 prove discriminant validity Structural Model Analyses (Note: CR above is Composite Reliability ) Convergent and Discriminant Validity Figure 6 presents the evidence for convergent validity indicated by the average variance explained (AVE) in the latent variables with multiple indicators. Convergent validity was strong (> 50%) for all constructs Inner Model Path Coefficients and Significance The inner model path coefficients or standardized PLS regression weights (β) are presented in Figure 8. The t-test statistics indicating the significance of the path coefficients are also presented in Figure 9. The results of the significance tests with p-values are summarized in Figure 9, as well. 3120
7 Figure 8 Significance of the path coefficients indicated by t- test statistics (Copy of output from SmartPLS). Significance of Inner Model Path Coefficients Note: Significant (p.05) Explanation of Variance and Significance Chin [42] and Hair [43] suggested that the primary criterion for the assessment of a PLS path model is the coefficient of determination (R²), which represents the amount of explained variance in each endogenous latent variable. The R 2 values take into account the fit of each regression equation in the inner model. Only about 1/3 of the variance in Intention to Use (32.5%) was explained by the dependent variables shown below in Figure 8. Figure 9 Note: * Significant (p.05); Hypotheses in bold were supported. The PLS path model provided the statistical evidence at the.05 level to indicate significant positive correlations between (a) perception of external control and intention to use; (b) cognitive factors and intention to use. The beta-value for CF->IU is negative indicating that for every 1-unit decrease in the independent variable, the dependent variable will increase by the beta coefficient value. The proportion of the variance explained in Intention to Use (R 2 = 32.5%) was greater than the proportion of the variance explained in Actual Use (0%). 6. Conclusions and Future Research We recognize that the lack of significant relationship between IU and AU is counter-intuitive to what is shown in the literature. While it is not immediately apparent, we will investigate this further to see what the reasons might be. One of the previously untested variables - cognitive factors of privacy concerns regarding surveillance and trust in the electronic medium supported its hypothesis with a t- value Data persistence and the existence of security policies did not support their hypotheses. The existence of security policy (SP) and data persistence (DP) did not support their hypotheses with t-values of 1.20, and 1.228, respectively. The t-test values in these three cases were less than 1.96, failing to reject their null hypotheses. A failure to reject the null hypothesis means that the null hypothesis is possible. Furthermore, intention to use was not a significant predictor of actual use. This finding is not supported by the literature. A Further developments to the survey tool regarding trust issues, and RFID usage education could provide a better understanding of how these three variables influence intention to use and actual use. Future research should explore further relationships between data persistence, security policy and cognitive factors. In exploring those relationships researchers should consider other factors that influence intention to use, or perhaps reformulation of the items altogether. There is a large body of literature from the technology acceptance and extended theory of planned behavior research that supports H3, H5, and H6 and this sample although consistent with G*power recommendations likely was not complete enough to well represent those hypotheses [15][2][37]. This research is the first of its type to find a strong relationship between the cognitive factors of privacy concerns regarding surveillance and trust in the electronic medium and intention to use. The theoretical model used in this research should be refined for further research, to better reflect the measures of privacy elements: data persistence and security policy could be combined into one category measures of privacy, and tested with questions that focused more specifically on data breaches and data loss. The theoretical model shown here was tested months before the Blue Cross Anthem data breach, and this alone may have been enough to change the future augmentations to this theoretical model. Developing 3121
8 further lines of questioning that focus on personal data loss, as opposed to general data loss may elicit responses that better support H2 and H4. Finally, a larger population of respondents may provide better statistical power and thus increase the likelihood of rejecting the null hypothesis. 7. References [1] I. Ajzen, From intentions to actions: A theory of planned behavior, Action Control, Springer, New York, NY, 1985, pp [2] I. Ajzen, The theory of planned behavior, Organizational Behavior and Human Decision Processes, 1991, pp [3] I. Ajzen, Perceived behavioral control, self-efficacy, locus of control and the theory of planned behavior, Journal of Applied Social Psychology, 2002, pp [4] C.J. Armitage, M. Comer, Efficacy of the theory of planned behavior: A meta-analytic review, British Journal of Social Psychology, 2001, pp [5] C.L. Anderson, R. Agarwal, The Digitization of Healthcare: Boundary risks, emotion and consumer willingness to disclose personal health information, Information Systems Research, 2011, pp [6] R.K. Baker, K.M White, Predicting adolescents use of social networking sites from an extended theory of planned behaviour perspective, Computers in Human Behavior, 2010, pp [7] P. Bennett, G. Bozionelos, The theory of planned behavior as predictor of condom use: A narrative review, Psychology, Health & Medicine, 2000, pp [8] A. R. Beresford, Location privacy in pervasive computing, Pervasive Computing, IEEE, 2003, pp [9] M. Bertrand, S. Bochard, Applying the technology acceptance model to WR with people who are favorable to its use, Journal of Cyber Therapy and Rehabilitation, 2008 [10] G. Bischoff, RFID privacy issues loom large, Mobile Radio Technology, 2007, p. 10 [11] S. Brown, A. Massey, J. Burkman, and M. Montoya Weiss, Do I really have to? User acceptance of mandated technology, European Journal of Information Systems, 2002, pp [12] T. Cammock, N. Carragher, and G. Prentice, Undergraduate intentions to apply to the Northern Ireland civil service: The application of a theory of planned behavior model, European Journal of Social Psychology, 2009, pp [13] S-L. Chao, P-S. Lin, Critical factors affecting the adoption of container security service: The shippers perspective, International Journal of Production Economics, 2009, pp [14] F.D. Davis, Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quarterly, 1989, pp [15] F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, User acceptance of computer technology: A comparison of two theoretical models, Management Science, 1989, pp [16] A. Dillon, and M.G. Morris, User acceptance of information technology: Theories and models, Annual Review of Information Science and Technology (ARIST), 1996, pp [17] M.S. Hagger, and N.L.D. Chatzisarantis, First- and higher- order models of attitudes, normative influence, and perceived behavioural control in the theory of planned behavior, British Journal of Social Psychology, 2005, pp [18] Hogg, M. A., and Abrams, D. A social psychology of intergroup relations and group processes, Routledge, London UK, [19] J.I. Hong, J.D. Ng, S. Lederer and J.A. Landay, Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques (DIS '04). ACM, New York, 2004, pp [20] M.M. Hossain, and V.R. Prybutok, Consumer acceptance of RFID technology: An exploratory study, Transactions on Engineering Management, 2008, pp [21] M.M. Hossain, and M. Quaddus, The adoption and continued usage intention of RFID: an integrated framework, Information Technology & People, 2011, pp [22] S.Y. Hung, Y.C. Ku, and J.C. Chien, Understanding physicians acceptance of the Medline system for practicing evidence-based medicine: A decomposed TPB model, International Journal of Medical Informatics, 2012, pp [23] K.L. Johnston, and K.M. White, Binge-drinking: A test of the role of group norms in the theory of planned behavior, Psychology and Health, 2003, pp [24] A. Kamra, J. Feldman, V. Misra, and D. Rubenstein, Data persistence for zero-configuration sensor networks SIGCOMM Computers and Communications Review, 2006, pp
9 [25] S. Konomi, Personal privacy assistants for RFID users, Paper presented at the International Workshop Series on RFID in Tokyo, Japan. Retrieved from [26] C-P. Lee, and J.P. Shim, An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry, European Journal of Information Systems, 2007, pp [27] M.S. Lee, An empirical study about RFID acceptance Focus on the employees in Korea, International Journal of Business Economics, Finance and Management Sciences, 2009, pp [28] Liu, D-S., and Chen, W., and Lee, R.(editor), An empirical research on the determinants of user ecommerce acceptance, Software engineering, artificial intelligence, networking and parallel/distributed computing, Springer, Berlin Germany, [29] T.E. Mason, and K.M. White, Applying an extended model of the theory of planned behaviour to breast selfexamination, Journal of Health Psychology, 2008, pp [30] G. Muller-Seitz, K. Dautzenberg, U. Creusen, and C. Stromereder, Customer acceptance of RFID technology: Evidence from the German electronic retail sector, Journal of Retailing and Consumer Services, 2009, pp [31] P. Norman, P. Bennett, and H. Lewis, Understanding binge drinking among young people: an application of the Theory of Planned Behavior, Health Education Research, 1998, pp [32] A. Norten, Nurses acceptance of RFID technology in a mandatory-use environment (Doctoral dissertation). Retrieved from electronic holdings, Nova Southeastern University, [33] O Leary, T.J., & O Leary, L.I., Computing Today. MacGraw-Hill Companies Dubuque, Iowa, [34] P. Pavlou, Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior, MIS Quarterly, 2006, pp [35] C. Röcker, and D. Tanier, O. Gervasi, V. Murgante, E. Pardede, B. O. Apduhan (Eds.), Information privacy in smart office environments: A cross-cultural study analyzing the willingness of users to share context information, Proceedings of the International Conference on Computational Science and Applications (ICCSA'10), LNCS, 2010, Springer, Heidelberg, Germany, pp [36] S. Taylor, and P. Todd, Understanding information technology usage: A test of competing models, Information Systems Research, 1995, pp [37] V. Venkatesh, and F.D. Davis, A theoretical extension of the technology acceptance model: Four longitudinal field studies, Management Science, 2000, pp [38] V. Venkatesh, Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model, Information Systems Research, 2000, pp [39] V. Venkatesh, and H. Bala, Technology Acceptance Model 3 and a Research Agenda on Interventions, Decision Sciences, 2008, pp [39.5] Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 2003, pp [40] H. Xu, S. Gupta, and P. Shi, Balancing User Privacy Concerns in the Adoption of Location-Based Services: An empirical analysis, iconference isociety: Research, Education and Engagement. [41] A. Juels, RFID security and privacy: A research survey, Selected Areas in Communications, IEEE, 2006, pp [42] W. Chin, Chapter 28: How to write up and report PLS analyses, Springer Handbooks, 2010, pp [42a] W. Chin, The partial least squares approach for structural equation modeling. In G. Marcoulides (ed.) Modern Methods for Business Research, 1998, pp [43] J. Hair, G. Ringle, and M. Sarstedt, A primer on partial least squares structural equation modeling (PLS-SEM), [44] K. Wong, Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS, Marketing Bulletin, 2013, pp [45] M. Keil; B. Tan; W. Wei T. Saarinen; T. Tuuaninen; A. Wassenaar; A cross-cultural study on escalation of commitment behavior in software projects, MIS Quarterly, 2000, pp [46] C. Aberson, Interpreting Null Results: Improving presentation and conclusions with confidence intervals, Journal for Articles in Support of the Null Hypothesis, 2002, pp [47] S. Fischer-Hubner, C. Lambrinoudakis and J. Lopez (Eds.), Identifying Factors that Influence Employees in Proceedings of 12th International Conference on Trust, Privacy and Security in Digital Business, 2015, Springer, Switzerland. [48] J. Henseler, C. Ringle and M. Sarstedt, A new criterion for assessing discriminant validity in variance-based structural equation modeling, Journal of the Academy of Marketing Science, 2015, pp
An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines
An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines ABSTRACT Heshan Sun Syracuse University hesun@syr.edu The current study is built upon prior research and is an
More informationUnderstanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption
Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce
More informationSystem and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study
System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study Oscar Lorenzo Dueñas-Rugnon, Santiago Iglesias-Pradas, and Ángel Hernández-García Grupo de Tecnologías
More informationADOPTION PROCESS FOR VoIP: THE UTAUT MODEL
ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL Eduardo Esteva-Armida, Instituto Tecnológico y de Estudios Superiores de Monterrey Gral. Ramón Corona 2514, Zapopan, Jalisco, México 45120 Phone: (5233) 3669.3080
More informationUser Acceptance of E-Government Services
User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time
More informationExternal Variables and the Technology Acceptance Model
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 1995 Proceedings Americas Conference on Information Systems (AMCIS) 8-25-1995 External Variables and the Technology Acceptance Model
More informationIssues in Information Systems Volume 17, Issue II, pp , 2016
CONSUMER ADOPTION AND USE OF MOBILE APPLICATIONS: DO PRIVACY AND SECURITY CONCERNS MATTER? Gary Garrison, Belmont University, gary.garrison@belmont.edu Sang Hyun Kim, Kyungpook National University, ksh@knu.ac.kr
More informationa, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey
Available online at www.sciencedirect.com Procedia - Social and Behavioral Scien ce s 8 ( 0 ) nd World Conference on Educational Technology Researches WCETR0 The role of Gender in Pharmacists Attitudes
More informationROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY
ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY Ping Zhang Syracuse University pzhang@syr.edu Abstract. Attitude has been understudied in the information systems (IS) field. Research
More informationExamining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology*
Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Timothy Teo & Chwee Beng Lee Nanyang Technology University Singapore This
More informationexisting statistical techniques. However, even with some statistical background, reading and
STRUCTURAL EQUATION MODELING (SEM): A STEP BY STEP APPROACH (PART 1) By: Zuraidah Zainol (PhD) Faculty of Management & Economics, Universiti Pendidikan Sultan Idris zuraidah@fpe.upsi.edu.my 2016 INTRODUCTION
More informationAnalysis of citizens' acceptance for e-government services: applying the utaut model
Analysis of citizens' acceptance for e-government services: applying the utaut model Author Alshehri, Mohammed, Drew, Steve, Al Ghamdi, Rayed Published 2012 Conference Title Proceedings of the IADIS Multi
More informationAcceptance of E-Government Service: A Validation of the UTAUT
Proceedings of the 5th WSEAS International Conference on E-ACTIVITIES, Venice, Italy, November 20-22, 2006 165 Acceptance of E-Government Service: A Validation of the UTAUT YI-SHUN WANG Department of Information
More informationADOPTION AND USE OF A UNIVERSITY REGISTRATION PORTAL BY UNDERGRADUATE STUDENTS OF BAYERO UNIVERSITY, KANO
Bayero Journal of Pure and Applied Sciences, 9(2): 179-185 Received: June, 2016 Accepted: November, 2016 ISSN 2006 6996 http://dx.doi.org/10.4314/bajopas.v9i2.33 ADOPTION AND USE OF A UNIVERSITY REGISTRATION
More informationPhysicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment
More informationMOBILE HEALTHCARE SERVICES ADOPTION
MOBILE HEALTHCARE SERVICES ADOPTION Research in Progress Genet Shanko, Addis Ababa University, Addis Ababa, Ethiopia, gdekebo2020@gmail.com Solomon Negash, Kennesaw State University, Kennesaw, GA, USA,
More informationTHEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING
THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING Dr. Rajesh Bhatt Head, Department of Business Administration Bhavnagar University, Bhavnagar ABSTRACT The banking services in India
More informationThe Impact of Rewards on Knowledge Sharing
Association for Information Systems AIS Electronic Library (AISeL) CONF-IRM 2014 Proceedings International Conference on Information Resources Management (CONF-IRM) 2014 The Impact of Rewards on Knowledge
More informationUser Acceptance of Mobile Internet Based on. Gender Differences
SOCIAL BEHAVIOR AND PERSONALITY, 2010, 38(3), 415-426 Society for Personality Research (Inc.) DOI 10.2224/sbp.2010.38.3.415 User Acceptance of Mobile Internet Based on THE UNIFIED THEORY OF ACCEPTANCE
More informationResearch on Software Continuous Usage Based on Expectation-confirmation Theory
Research on Software Continuous Usage Based on Expectation-confirmation Theory Daqing Zheng 1, Jincheng Wang 1, Jia Wang 2 (1. School of Information Management & Engineering, Shanghai University of Finance
More informationDoing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling. Olli-Pekka Kauppila Daria Kautto
Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling Olli-Pekka Kauppila Daria Kautto Session VI, September 20 2017 Learning objectives 1. Get familiar with the basic idea
More informationInformation Sharing on Social Networking Sites: the role of perceived control of information and gender
Association for Information Systems AIS Electronic Library (AISeL) WISP 2012 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 11-14-2013 Information Sharing on Social Networking
More informationPanel: Using Structural Equation Modeling (SEM) Using Partial Least Squares (SmartPLS)
Panel: Using Structural Equation Modeling (SEM) Using Partial Least Squares (SmartPLS) Presenters: Dr. Faizan Ali, Assistant Professor Dr. Cihan Cobanoglu, McKibbon Endowed Chair Professor University of
More informationCompleted Research. Birte Malzahn Hochschule für Technik und Wirtschaft Berlin
If at First You Don't Succeed, Try, Try Again Might Not Always Make Sense: On the Influence of Past Technology Category Satisfaction on Technology Usage Abstract Completed Research Claus-Peter H. Ernst
More informationUSER INTERFACE DESIGN: A STUDY OF EXPECTATION- CONFIRMATION THEORY
USER INTERFACE DESIGN: A STUDY OF EXPECTATION- CONFIRMATION THEORY Aslina Baharum 1, 2, and Azizah Jaafar 2 1 Universiti Malaysia Sabah (UMS), Malaysia, aslina@ums.edu.my 2 Universiti Kebangsaan Malaysia,
More informationTHE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA
0F USING International Journal of Research in Computer Science eissn 2249-8265 Volume 5 Issue 1 (2015) pp. 1-8, A Unit of White Globe Publications THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL
More informationThinking Like a Researcher
3-1 Thinking Like a Researcher 3-3 Learning Objectives Understand... The terminology used by professional researchers employing scientific thinking. What you need to formulate a solid research hypothesis.
More informationAn Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use
An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use Heshan Sun Syracuse University hesun@syr.edu Ping Zhang Syracuse University pzhang@syr.edu ABSTRACT Causality
More informationCHAPTER III RESEARCH METHODOLOGY
CHAPTER III RESEARCH METHODOLOGY In this chapter, the researcher will elaborate the methodology of the measurements. This chapter emphasize about the research methodology, data source, population and sampling,
More informationSeminar Medical Informatics 2015
Seminar Medical Informatics 2015 Meeting 11 March 20, 2015 Ronald Batenburg UU/NIVEL 1 Agenda for today Market and context research for medical apps Target audience, end-users, customers Laws, regulation,
More informationWE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE
WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE Aaron X.L. Shen Department of Information Systems, University of Science and Technology of China City University
More informationINVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE
INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE Jeoungkun Kim Graduate School of Management, Korea Advanced Institute Science and Technology, kimjk70@kgsm.kaist.ac.kr Heeseok
More informationTopic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB)
Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Flow Experience Perceived Enjoyment Trust Attitude Subjective Norm Actual Use Self Efficacy Perceived Behavioral Control Introduction
More informationSlacking and the Internet in the Classroom: A Preliminary Investigation
Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2006 Proceedings Special Interest Group on Human-Computer Interaction 2006 Slacking and the Internet in the Classroom: A Preliminary
More informationPatients Behavioral Intentions toward Using WSN based Smart Home Healthcare Systems: An Empirical Investigation
2015 48th Hawaii International Conference on System Sciences Patients Behavioral Intentions toward Using WSN based Smart Home Healthcare Systems: An Empirical Investigation Ahmad Alaiad Lina Zhou Department
More informationRong Quan Low Universiti Sains Malaysia, Pulau Pinang, Malaysia
International Journal of Accounting & Business Management Vol. 1 (No.1), April, 2013 Page: 99-106 ISSN: 2289-4519 This work is licensed under a Creative Commons Attribution 4.0 International License. www.ftms.edu.my/journals/index.php/journals/ijabm
More informationCombining Behavioral and Design Research Using Variance-based Structural Equation Modeling
Combining Behavioral and Design Research Using Variance-based Structural Equation Modeling Course to be held on 1-3 December 2016 at Texas Tech, Lubbock, TX, U.S.A. Instructor: Jörg Henseler, PhD Professor
More informationIssues in Information Systems
ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web
More informationThe moderating impact of temporal separation on the association between intention and physical activity: a meta-analysis
PSYCHOLOGY, HEALTH & MEDICINE, 2016 VOL. 21, NO. 5, 625 631 http://dx.doi.org/10.1080/13548506.2015.1080371 The moderating impact of temporal separation on the association between intention and physical
More informationInvestigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University
Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University Adnan Riaz Department of Business Administration Allama Iqbal Open University
More informationAppendix B Construct Reliability and Validity Analysis. Initial assessment of convergent and discriminate validity was conducted using factor
Appendix B Construct Reliability and Validity Analysis Reflective Construct Reliability and Validity Analysis Initial assessment of convergent and discriminate validity was conducted using factor analysis
More informationIs entrepreneur s photo a crucial element in a crowdfunding webpage?
Second International Conference on Economic and Business Management (FEBM 2017) Is entrepreneur s photo a crucial element in a crowdfunding webpage? Xin Wang, Huaxin Wang *, Yu Zhao Department of Business
More informationOne-dimensional, Multidimensional and Unidimensional Perspectives in a Multifunctional Device: Comparison of Three Models
Association for Information Systems AIS Electronic Library (AISeL) ACIS 2010 Proceedings Australasian (ACIS) 2010 One-dimensional, Multidimensional and Unidimensional Perspectives in a Multifunctional
More informationMeasurement for Analyzing Instant Messenger Application Adoption Using Unified Theory of Acceptance and Use of Technology 2 (utaut2)
Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 259-268 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 Measurement
More informationPersonality Traits Effects on Job Satisfaction: The Role of Goal Commitment
Marshall University Marshall Digital Scholar Management Faculty Research Management, Marketing and MIS Fall 11-14-2009 Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Wai Kwan
More informationMain Factors Influencing Mobile Commerce Adoption
Main Factors Influencing Mobile Commerce Adoption 1 Mohammadjafar Esmaeili University of Dayton mesmaeili1@udayton.edu Ali Eydgahi Eastern Michigan University aeydgahi@emich.edu Abstract Mobile commerce
More informationPerceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm
Project Guidelines Perceived usefulness Attitude Intention Use E-filing Ease of use Perceived behavioral control Subjective norm Introduction Introduction should include support/justification why the research
More informationThe Role of Habit in Information Systems Continuance: Examining the Evolving Relationship Between Intention and Usage
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2005 Proceedings International Conference on Information Systems (ICIS) December 2005 The Role of Habit in Information Systems Continuance:
More informationTourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,*
2017 International Conference on Applied Mechanics and Mechanical Automation (AMMA 2017) ISBN: 978-1-60595-471-4 Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi
More informationElectronic Commerce Research and Applications
Electronic Commerce Research and Applications 10 (2011) 408 417 Contents lists available at ScienceDirect Electronic Commerce Research and Applications journal homepage: www.elsevier.com/locate/ecra The
More informationDeakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version:
Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version: Taghian, Mehdi and D'Souza, Clare 2007, A cross-cultural
More informationWhy Do People Like to Play Social Network Games with Their Friends? A Focus on Sociability and Playability
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2013 Proceedings Pacific Asia Conference on Information Systems (PACIS) 6-18-2013 Why Do People Like to Play Social Network Games
More informationPREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY
PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY Yujong Hwang and Mun Y. Yi University of South Carolina yujongh@yahoo.com myi@moore.sc.edu Abstract This study
More informationInvestigating the Post-Adoption Attitude of the Web Based Content Management System within Organization
Investigating the Post-Adoption Attitude of the Web Based Content Management 1,2 2 and 3 1 DePaul University, School of Accountancy & MIS, Chicago, USA, yhwang1@depaul.edu 2 Kyung Hee University, College
More informationUSER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW 1
RESEARCH ARTICLE USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW 1 By: Viswanath Venkatesh Robert H. Smith School of Business University of Maryland Van Munching Hall College Park, MD
More informationTowards an instrument for measuring sensemaking and an assessment of its theoretical features
http://dx.doi.org/10.14236/ewic/hci2017.86 Towards an instrument for measuring sensemaking and an assessment of its theoretical features Kholod Alsufiani Simon Attfield Leishi Zhang Middlesex University
More informationJournal of Emerging Trends in Computing and Information Sciences
Determinants of Acceptance and Use of DHIS2: Survey Instrument Validation and Preliminary Findings using PLS-SEM 1 Josephine Karuri, 2 Peter Waiganjo, 3 Daniel Orwa 1, 2, 3 School of Computing & Informatics,
More informationWhat are the Relationships Between Transformational Leadership and Organizational Citizenship Behavior? An Empirical Study
2012 International Conference on Economics, Business Innovation IPEDR vol.38 (2012) (2012) IACSIT Press, Singapore What are the Relationships Between Transformational Leadership and Organizational Citizenship
More informationBehavioral Intention to use Knowledge Sharing Tools: Positive and Negative Affect on Affective Technology Acceptance Model
Behavioral Intention to use Knowledge Sharing Tools: Positive and Negative Affect on Affective Technology Acceptance Model Angela Lee Siew Hoong and Tong-Ming Lim Sunway University, Malaysia, {angelal;
More informationHow Self-Efficacy and Gender Issues Affect Software Adoption and Use
How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize
More informationA Productivity Review Study on Theory of Reasoned Action Literature Using Bibliometric Methodology
0 International Conference on Management and Service Science IPEDR vol.8 (0) (0) IACSIT Press, Singapore A Productivity Review Study on Theory of Reasoned Action Literature Using Bibliometric Methodology
More informationAcceptance and Usage of Innovative Healthcare Service for the Elderly People: A System Dynamics Modeling Approach
2012 2 nd International Conference on Economics, Trade and Development IPEDR vol.36 (2012) (2012) IACSIT Press, Singapore Acceptance and Usage of Innovative Healthcare Service for the Elderly People: A
More informationVisual Information Priming in Internet of Things: Focusing on the interface of smart refrigerator
Visual Information Priming in Internet of Things: Focusing on the interface of smart refrigerator Hyeonjin Kim 1, Sangmee Lee 1, and Donghee Shin 1, * 1 Department of Interaction Science, Sungkyunkwan
More informationA Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan
A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan Pei Liu School of Management and Economics, North China Zhen Li Data Science
More informationThe Adoption of Mobile Games in China: An Empirical Study
The Adoption of Mobile Games in China: An Empirical Study Shang Gao 1,2, Zhe Zang 1, and John Krogstie 2 1 School of Business Administration, Zhongnan University of Economics and Law, Wuhan, China 2 Department
More informationTOJET: The Turkish Online Journal of Educational Technology April 2012, volume 11 Issue 2
EXAMINING THE RELATIONSHIP BETWEEN TEACHERS ATTITUDES AND MOTIVATION TOWARD WEB-BASED PROFESSIONAL DEVELOPMENT: A STRUCTURAL EQUATION MODELING APPROACH Hui-Min CHIEN, Cheng Shiu University, Taiwan chm@csu.edu.tw
More informationThe Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks
Computer Communication & Collaboration (Vol. 2, Issue 3, 2014) The Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks Robert W. Stone (corresponding author) Department of Accounting,
More informationThe empirical study of automotive telematics acceptance in Taiwan: comparing three Technology Acceptance Models
50 Int. J. Mobile Communications, Vol. 7, No. 1, 2009 The empirical study of automotive telematics acceptance in Taiwan: comparing three Technology Acceptance Models Huei-Huang Chen* Department of Information
More informationUsing the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions
Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Introduction Technology enables consumers to undertake everything from relatively simple
More informationHow Does Person-Organization Fit Affect Behavioral And Attitudinal Outcomes?
How Does Person-Organization Fit Affect Behavioral And Attitudinal Outcomes? The Mediating Role of Psychological Empowerment Working Paper Series 09-01 February 2009 Brian T. Gregory, Ph.D. Assistant Professor
More informationPERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH
PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH DANIEL Z. LEVIN Management and Global Business Dept. Rutgers Business School Newark and New Brunswick Rutgers
More informationNational Culture Dimensions and Consumer Digital Piracy: A European Perspective
National Culture Dimensions and Consumer Digital Piracy: A European Perspective Abstract Irena Vida, irena.vida@ef.uni-lj.si Monika Kukar-Kinney, mkukarki@richmond.edu Mateja Kos Koklič, mateja.kos@ef.uni-lj.si
More informationDeterminants of Continuance Intention of RFID in Australian Livestock Industry: An Empirical Study
Association for Information Systems AIS Electronic Library (AISeL) ACIS 2011 Proceedings Australasian (ACIS) 2011 Determinants of Continuance Intention of RFID in Australian Livestock Industry: An Empirical
More informationEffect of job characteristics on satisfaction and performance: A test in Egyptian agricultural extension system
Vol. 8(48), pp. 6126-6130, 12 December, 2013 DOI: 10.5897/AJAR09.698 ISSN 1991-637X 2013 Academic Journals http://www.academicjournals.org/ajar African Journal of Agricultural Research Full Length Research
More informationEXAMINING FACTORS AFFECTING COLLEGE STUDENTS INTENTION TO USE WEB-BASED INSTRUCTION SYSTEMS: TOWARDS AN INTEGRATED MODEL
EXAMINING FACTORS AFFECTING COLLEGE STUDENTS INTENTION TO USE WEB-BASED INSTRUCTION SYSTEMS: TOWARDS AN INTEGRATED MODEL Yi-Cheng CHEN Department of Information Science & Management Systems National Taitung
More informationIssues in Information Systems Volume 15, Issue I, pp , 2014
THE IMPORTANCE AND IMPACT OF DETERMINANTS INFLUENCING BUSINESS INTELLIGENCE SYSTEMS EMBEDDEDNESS Tanja Grublješič, Faculty of Economics, University of Ljubljana, Slovenia, tanja.grubljesic@ef.uni-lj.si
More informationPHYSICIAN ACCEPTANCE BEHAVIOR OF THE ELECTRONIC MEDICAL RECORDS EXCHANGE: AN EXTENDED DECOMPOSED THEORY OF PLANNED BEHAVIOR
PHYSICIAN ACCEPTANCE BEHAVIOR OF THE ELECTRONIC MEDICAL RECORDS EXCHANGE: AN EXTENDED DECOMPOSED THEORY OF PLANNED BEHAVIOR Pi-Jung Hsieh, Department of Hospital and Health Care Administration, Chia Nan
More informationMeasurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D.
Measurement of Constructs in Psychosocial Models of Health Behavior March 26, 2012 Neil Steers, Ph.D. Importance of measurement in research testing psychosocial models Issues in measurement of psychosocial
More informationIntention to consent to living organ donation: an exploratory study. Christina Browne B.A. and Deirdre M. Desmond PhD
Intention to consent to living organ donation: an exploratory study Christina Browne B.A. and Deirdre M. Desmond PhD Department of Psychology, John Hume Building, National University of Ireland Maynooth,
More informationAttitude Change Process toward ERP Systems Using the Elaboration Likelihood Model
Attitude Change Process toward ERP Systems Using the Elaboration Likelihood Model Euisung Jung University of Wisconsin-Milwaukee Lubar School of Business junge@uwm.edu William D. Haseman University of
More informationModeling the Influential Factors of 8 th Grades Student s Mathematics Achievement in Malaysia by Using Structural Equation Modeling (SEM)
International Journal of Advances in Applied Sciences (IJAAS) Vol. 3, No. 4, December 2014, pp. 172~177 ISSN: 2252-8814 172 Modeling the Influential Factors of 8 th Grades Student s Mathematics Achievement
More informationFactors Influencing the Usage of Websites: The Case of a Generic Portal in the Netherlands
e-everything: e-commerce, e-government, e-household, e-democracy 14 th Bled Electronic Commerce Conference Bled, Slovenia, June 25-26, 2001 Factors Influencing the Usage of Websites: The Case of a Generic
More informationWhy We Don t Block 3rd Party Trackers: An Attributional Theory Perspective
Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:
More informationA LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS IN CONSUMER ACCEPTANCE OF AN ESERVICE: THE CASE OF ONLINE HEALTH SERVICES
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS
More informationGender differences in condom use prediction with Theory of Reasoned Action and Planned Behaviour: the role of self-efficacy and control
Gender differences in condom use prediction with Theory of Reasoned Action and Planned Behaviour: the role of self-efficacy and control Alicia Muñoz-Silva, Manuel Sánchez-García, Cristina Nunes, Ana Martins
More informationUnderstanding Knowledge Management Systems Continuance: A Decomposed Model
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 Understanding Knowledge Management Systems Continuance:
More informationA Model of Unethical Usage of Information Technology
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 A Model of Unethical Usage of Information Technology Sutirtha
More informationCHAPTER 3 RESEARCH METHODOLOGY
CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction 3.1 Methodology 3.1.1 Research Design 3.1. Research Framework Design 3.1.3 Research Instrument 3.1.4 Validity of Questionnaire 3.1.5 Statistical Measurement
More informationTHEORETICAL FRAMEWORK. Noor Hazlina Ahmad, PhD School of Management 6 th January th PhD Colloquium School of Management
THEORETICAL FRAMEWORK Noor Hazlina Ahmad, PhD School of Management 6 th January 2014 30 th PhD Colloquium School of Management Tara Brabazon (2010) gives her top ten tips for doctoral failure Tips no 3:
More informationINVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND
INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND Alexander M. Janssens Siam University Bangkok, Thailand research@alexanderjanssens.com ABSTRACT This research investigates
More informationA Modified Technology Acceptance Model for Camera Mobile Phone Adoption: Development and validation
A Modified Technology Acceptance Model for Camera Mobile Phone Adoption: Development and validation Dr Kamel ROUIBAH College of Business Administration Kuwait University Email: Krouibah@cba.edu.kw Dr Hasan
More informationLife Quality and Job Satisfaction: A Case Study on Job Satisfaction of Bike Participants in Chiayi County Area
Life Quality and Job Satisfaction: A Case Study on Job Satisfaction of Bike Participants in Chiayi County Area Chin-Tsai Kuo, Associate Professor, Office of Physical Education, Nanhua University, Taiwan
More informationAn Empirical Study of Health Consumer Beliefs, Attitude and Intentions toward the Use of Self- Service Kiosks
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-6-2011 An Empirical Study of Health Consumer Beliefs, Attitude and Intentions toward the Use
More informationDeterminants of Perceived Usefulness and Perceived Ease of Use in Individual Adoption of Social Network Sites
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-2010 Determinants of Perceived Usefulness and Perceived Ease
More informationHIGH-ORDER CONSTRUCTS FOR THE STRUCTURAL EQUATION MODEL
HIGH-ORDER CONSTRUCTS FOR THE STRUCTURAL EQUATION MODEL Enrico Ciavolino (1) * Mariangela Nitti (2) (1) Dipartimento di Filosofia e Scienze Sociali, Università del Salento (2) Dipartimento di Scienze Pedagogiche,
More informationUnderstanding Tourist Environmental Behavior An Application of the Theories on Reasoned Action Approach
University of Massachusetts Amherst ScholarWorks@UMass Amherst Tourism Travel and Research Association: Advancing Tourism Research Globally 2012 ttra International Conference Understanding Tourist Environmental
More informationQuantitative Research. By Dr. Achmad Nizar Hidayanto Information Management Lab Faculty of Computer Science Universitas Indonesia
Quantitative Research By Dr. Achmad Nizar Hidayanto Information Management Lab Faculty of Computer Science Universitas Indonesia Depok, 2 Agustus 2017 Quantitative Research: Definition (Source: Wikipedia)
More informationCALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors
CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY Guest Co-Editors Philip Bobko Gettysburg College pbobko@gettysburg.edu Alex J. Barelka Illinois State
More informationPhysicians Intention To Use Electronic Medical Records In Sri Lanka
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 3, ISSUE 12 48 Physicians Intention To Use Electronic Medical Records In Sri Lanka Tharaniga Jeyakodi, Dillina Herath
More informationPACDEFF 2017 Melbourne - Australia
PACDEFF 2017 Melbourne - Australia Risk Perception and Cultural Intelligence in Human Factors: The Interaction of Emotional Intelligence and Organisational Culture in High Risk Industries Across Borders
More information