A Study of Privacy and Security Concerns on Doctors and Nurses Behavioral Intentions to Use RFID in Hospitals

Size: px
Start display at page:

Download "A Study of Privacy and Security Concerns on Doctors and Nurses Behavioral Intentions to Use RFID in Hospitals"

Transcription

1 th Hawaii International Conference on System Sciences A Study of Privacy and Security Concerns on Doctors and Nurses Behavioral Intentions to Use RFID in Hospitals Thomas Winston Souren Paul Lakshmi Iyer Nova Southeastern University Nova Southeastern University UNC Greensboro thomwins@nova.edu spaul@nova.edu lsiyer@uncg.edu Abstract Radio frequency identification (RFID) is a useful technology that has myriad applications in retail, manufacturing, and healthcare settings. RFID can scan devices in their proximity and report the data to information systems. RFID in healthcare settings presents potential security and privacy concerns to the people and processes being tracked by the devices particularly healthcare workers including nurses and doctors. This research presents a theoretical model that will assess the effect of six independent variables: cognitive factors, perception of external control, privacy concerns regarding surveillance and RFID devices, subjective norms, existence of security policy, and persistence of data on two dependent variables, medical staff, intention to use RFID, and actual use of RFID. The model is validated with an empirical study. The results suggest that cognitive factors, persistence of data captured through RFID, and the awareness of the existence of security policy influence medical staff members use of RFID in hospitals. 1. Introduction Radio frequency identification (RFID) is a useful technology that has myriad applications in retail, manufacturing, and healthcare settings. RFID can scan devices in their proximity and report the information to connected (wired or other wireless) information systems. Once touted as the panacea for home healthcare, RFID is a generic term used to identify devices or objects. RFID devices can add benefit to patients in remote settings. RFID devices have been used to optimize systems in areas such as manufacturing and healthcare to expose inefficiencies in a system or process. Unlike manufacturing however, RFID in healthcare settings presents security and privacy concerns to the people being tracked by the devices particularly healthcare workers including nurses and doctors [5]. Security and privacy issues regarding technology use pose a paradox in most modern contexts where technology is used. A large body of literature covering over 25 years outlines the paradox of privacy vs. security in many contexts, with the primary tenant stated by [27] being To increase security, one must give up some privacy. US laws have considered this carefully, and ran ashore of this paradox when the USA PATRIOT act was promulgated in the fall of 2001 [27]. Lee [27] discovered that security concerns play a role in RFID acceptance. Anderson and Agarwal [5] found that privacy and security are always major concerns with RFID usage in medical contexts; however they were dependent on the emotional state of the patient. RFID usage in mandatory environments could violate a nurse s privacy rights, due to the surveillance capabilities the technology enables [10]. The factors that influence the intention to use RFID by medical staff have not been studied adequately. We intend to address this gap by proposing a theoretical model that integrates the effects of cognitive factors, perception of external control, privacy concerns regarding surveillance and RFID devices, subjective norms, existence of security policy, and persistence of data on medical staffs intention to use RFID. The theoretical model presented in this research is based on the technology acceptance model (TAM) and the extended theory of planned behavior (ETPB). This research extends the extant and well-documented research regarding technology acceptance embodied by TAM, and its variants, and the Extended Theory of Planned Behavior, by adding the dimensions of privacy and security to the ETPB model. The notion of technology acceptance, like the models used to describe it has evolved over the years, in an attempt to better capture the behavioral elements of security and privacy. We conducted a survey to validate the model with empirical data. The rest of the paper is organized as follows. Section 2 presents the literature review. Section /16 $ IEEE DOI /HICSS

2 introduces to the theoretical model of the study. Section 4 explains the research methodology approach; section 5 presents the results of the survey. We end the paper with discussion on future directions and conclusion for research. 2. A Brief Review of the Literature In order to develop the research model used in this proposed research, it was necessary to consider several issues: privacy research in RFID usage, security research in RFID usage as well as models used to determine acceptance of any technology. Since the research proposed here is related to behaviors, the first part of this literature review will consider how extant models of technology acceptance apply to this research, and more importantly how they help formulate the acceptance model presented herein. The second part of the literature review will detail context of the variables chosen for the proposed theoretic model Overview of the Models Used for Technology Acceptance TAM, and its predecessors determined links between perceived usefulness, intention to use and actual use of new technologies. Researchers have used TAM, and its extensions TAM2 and TAM3 to determine whether or not a user population will accept a new technology. TAM2 and TAM3 added constructs to better capture behaviors associated with technology acceptance [39]. The importance of user acceptance of a technology has been stressed IS research [14, 20, 33]. Researchers have used the theory of planned behavior model (TPB) to investigate the factors influencing physicians to accept the Medline System [22]; TAM and TPB and have been used to understand attitudes toward and user acceptance of RFID technology in mixed context (mandatory or voluntary use) healthcare settings [13, 20, 27]. We present the overview of these theories in the next sub-section of the paper Technology Acceptance Research Models Technology Acceptance Model TAM and the Theory of Planned Behavior (TPB) are based on Fishbein and Adjzen s theory of reasoned action (TRA). TAM focuses on how perceptions influence a person s intentions. Critical in its relationship to intention to use, another construct of TAM, these variables build the foundation for whether or not a user accepts information technology. Studies have used the TAM to determine outcomes in information technology adoption [14, 15, and 28]. The Theory of Planned Behavior (TPB) focuses on how an individual s external environment influences his or her intentions, known as subjective norms. Subjective norms are perceptions of social pressure to either engage or not engage in a behavior. [28]. Moreover, along with technological, organizational, and environmental factors of RFID adoption also depends on the expectations and self-efficacy, and the process of continued usage intention involves satisfaction from current use and the degree of self-efficacy [21]. TAM underwent modifications, notably TAM 2 and TAM 3. TAM was extended to TAM 2, to expand upon the construct of perceived ease of use to include control, intrinsic motivation and emotion [37]. TAM 3 focused on interventions, which lead to greater acceptance and effective utilization of Information Technology to help direct leadership decision making processes [39]. Theory of Planned Behavior The first iteration of the TPB was an extension of the Theory of Reasoned Action (TRA), which added a new construct perceived behavioral control [1][4]. The TRA positively correlates intent of an individual to engage in an action with the actual engagement of that action [12]. TPB focuses on relationships between external environments and a person s intentions [28]. The variables of intentions to perform a given activity were related to subjective norms, perceived behavioral control and attitude toward the behavior [2]. TPB has been applied to many information systems adoption problems, regarding adoption, use and disuse. [39.5] [2]. Subjective norm is defined as an individual s perception of whether people important to the individual think the behavior should be performed [2]. The constructs in TPB help researchers to better understand why individuals engage in certain behaviors [2]. TPB is an effective tool in evaluating such decisions in healthcare settings. TPB was used to better understand binge drinking among young people [31]; condom use [7]; and likelihood of physical activity [17]. TPB is also useful in determining technology adoption in mixed (forced or voluntary) control contexts. There are important differences between mandatory and voluntary use environments [11]. Voluntary-use environment as one where users perceive the technology adoption or decision to use as a willful choice [11, p. 284] while in mandatory-use environments, employees have to adopt a particular technology to keep their jobs, thereby eliminating the emphasis on prior beliefs and attitudes about the 3116

3 technology [11]. Mandatory-use environments can have deleterious effects on employee perception, possibly leading to delays in implementation, or possibly leading to alternative potentially destructive employee behavior [11, p. 284]. Extended Theory of Planned Behavior TPB was extended later by dividing the construct of perceived behavioral control into two separate variables: self-efficacy and controllability [1][2]. Extended TPB (ETPB) model was used to predict undergraduate students intentions to apply to Northern Ireland civil service [12]. ETPB was used to understand influences on adolescent engagement with social networking technology [6]. Group norm was found to be more useful than the construct subjective norm, in that it significantly predicted behavior intention by explaining 10% of the variance above and beyond standard TPM variable of subjective norm [6]. This finding was consistent with the subsequent research on ETPB [18][23][29]. 3. Proposed Research Model The research model presented in this paper will use the ETPB and TAM3 models and prior research on the willingness to provide access to personal health information [5]. Electronic health information privacy concern and trust in electronic medium influence patient s willingness to provide access to personal health information and intended purpose (of use of the information) and requesting stakeholder have moderating effects on these relationships [5]. Our theoretical model is shown in figure 1. Figure 1. Conceptual Model Specifically, our model considers the effects of subjective norm, data persistence, existence of security policy, perceptions of external control, and cognitive factors of privacy concerns regarding surveillance and RFID devices, as well as trust in the electronic medium on intention to use RFID by nurses and doctors in a healthcare setting. Next, we elaborate the different components of the theoretical model. We start with a discussion on the determinants of intention to use RFID to the medical staff. 3.1 Intention to Use, and its determinants The factors leading a person to use a particular technology, or intention to use can be defined as the sum of the perceived relative weights of attitude toward the behavior and subjective norms toward that behavior. [37]. Persistence of data and subjective norm are expected to affect intention to use based on the fear that requirements to retain data may create privacy risks for patients. Another variable affecting intention to use is existence of security policy Cognitive factors and intention to use RFID. Prior studies investigated privacy issues concerning RFID usage among nurses in a mandatory use environment [32]. According to an unidentified nurses union, mandatory usage of RFID tags on a nurses constituted a violation of privacy rights [32]. Privacy and security issues with devices providing location based information are mentioned in a body of literature that focuses on privacy issues considers the issue of providing location based information on an ongoing basis, as well as the privacy and security risks this poses. Prior studies demonstrate that the willingness to disclose information as a condition for transacting is an outcome variable that is consistent with prior privacy research [8, 19]. These studies investigated ways to mitigate privacy concerns with the constant transmission of personal devices that showed location, using the global positioning system. Prior studies also demonstrate that the users are reluctant to provide context (location) information, particularly when the data is automatically captured by the system [35]. RFID transmission can be intercepted and thus, it poses privacy-based risk with security ramifications, which will almost certainly negatively affect the user intention to engage in the use of the technology. Privacy issues, such as location information security, and trust of electronic medium complicate the potential of location-based [40]. The literature defines LBS as network-based services that integrate a mobile device s location with other location based information to include: entertainment, dining and emergency services options. LBS can also be used in asset tracking, such as in the case of RFID [40]. Prior 3117

4 studies also suggest that personal health related information has gradations of importance, based on the type of information, intended use of the information, and finally the identity of the entity requesting the information [5]. The privacy concerns, described in this study as cognitive factors are negatively related to the intention to use LBS [40]. Hence: Hypothesis 1: The cognitive factors of privacy concerns regarding surveillance and trust in the electronic medium have a negative relationship with intention to use Persistence of data and intention to use RFID users are concerned about the issues of privacy, and value of the data, when it is collected surreptitiously and continuously [25]. Understanding usage of the data, and the security of the data collected relates to the customers understanding of the technology and their perceptions of how the technology adds value. Thus it appears that internalized notions of privacy, and understanding of data usage, storage or persistence will affect a user s view on value add of a given technology. A recurring security concern about persistence of data in a sensor based network, such as RFID can both positively and negatively affect intention to use. Persistence of data is related to privacy concerns in sensor networks [24]. Since push/pull networks such as those used in RFID networks can surreptitiously capture data, and potentially store the data, the perceptions and understanding of the RFID system parameters will affect whether or not an individual willfully uses the technology [24]. Security vulnerabilities of RFID technology, such as a lack of cryptographic capability, the ability clone the device, detect duplicates, and data retention either on the device or in a centralized database cause other security concerns, which would affect intention to use [41]. Security concerns abound as to whether RFID device databases contain simply RFID specific information, or information received, recorded on the device and transmitted back to the others in the RFID network. In a study on consumers intention to use electronic medium, trust and perceived risk are found to be direct antecedents of intention to use the electronic medium for transaction, suggesting that uncertainty reduction is a key component of acceptance [34]. Juels considered the security vulnerabilities of RFID technology, and focused on obvious issues such as a lack of cryptographic capability as well as less obvious ones, like how data retention either on the device or in a centralized database causes other security concerns, which would affect intention to use [41]. Hence: Hypothesis 2: There is a negative relationship between persistence of data and intention to use Subective norm and intention to use A body of literature regarding TAM, TAM2, UTAUT, and the TPB shows a positive correlation between subjective norm and intention to use [12][14][15][36]. Hence: Hypothesis 3: There is a positive relationship between subjective norm and intention to use Security policy and intention to use According to Topa and Karyda in [47], Dinev and Hu explored factors, which showed that technology awareness has a significant impact on the intention to use protective technology (p.172). It is quite reasonable to expect a similar relationship between the existence of security policy and medical staff members intention to use RFID in hospitals, as in some instances RFID devices are used to protect patients and or medical staff. However, it is the awareness of the existence of a security policy (regarding RFID) and not the security policy per se that will influence medical staff members intention to use RFID. Hence: Hypothesis 4: There is a positive relationship between the existence of security policies and intention to use External control and intention to use The perception of external control affects intention to perform actions and the actual action itself. Ajzen [2] stated that perceived behavioral control, together with behavioral intention can be used directly to predict behavioral achievement. Hence: Hypothesis 5: There is a positive relationship between external control and intention to use Intention to use and actual use Taylor and Todd [36] showed a positive relationship between intention to use and actual use. Others such as Davis et al. [15] stated the effects of behavior beliefs and behavior intention on actual use change over time with users employment of the technologies. Hence: Hypothesis 6: There is a positive relationship between intention to use and actual use. 3118

5 4. Research Design and Methodology The primary goal of this study was to investigate security and privacy concerns on behavioral intentions to use RFID in hospitals among doctors and nurses. After obtaining IRB consent, and developing a survey tool using both validated and new constructs we were able to collect approximately 115 responses from cross-section of doctors and nurses in the USA. The stratified sampling technique focused on a target population of male and female medical doctors and registered nurses aged 18 years and older. We determined using G*Power that a minimum sample size of 100 was required to have a significance level of.05. The survey used a Likert scale as well as two dichotomous scale questions and was derived from previously validated questions such as those created by Xu and Gupta, and Taylor and Todd [36][40]. The statistical technique chosen to test the stated hypotheses was partial least squares (PLS) path analysis, otherwise known as partial least squares structural equation modeling (PLS-SEM). PLS is an advanced statistical method that allows optimal empirical assessment of a structural (theoretical) model [45]. We used the framework specified by Chin [42] and protocols described by Chin [42] and Wong [44] for constructing a PLS path model using SmartPLS software, specifically the computation and evaluation of (1) outer model loadings; (2) internal consistency reliability; (3) convergent validity; (4) discriminant validity; (5) inner model path coefficient sizes and significance; and (6) explanation of variance. Chin [42, p. 656] and Wong [44, p. 5] emphasized that PLS applications Do not use goodness-of-fit (GoF) Index and similarly, Hair [43] concluded that GoF indices are not universally applicable. Chin notes that GoF indices are not prominent in PLS models and that their absence in PLS analyses should not be considered a deficit [42, p.656]. Consequently no goodness of fit indices are provided. A path diagram, defining the hypothesized relationships between the variables, was drawn with the graphic user interface of SmartPLS. The following tests were conducted to validate the model as described by Wong [44]: (a) factorial validity, tested by evaluation of the outer model loading coefficients; (b) internal consistency reliability, tested by the composite reliability coefficient (not Cronbach s alpha, which is not applicable for PLS- SEM); (c) convergent validity, tested by the average variance explained (AVE); and (d) discriminant validity, tested by the square root of AVE. SmartPLS computed the path coefficients or standardized regression weights (β) between the latent variables. Each path coefficient ranged in value from - 1 to +1. The researcher conducted bootstrapping to test for the significance of the path coefficients. A path coefficient was declared to be significantly different from zero if p <.05 for the t-test statistic. The R 2 values computed by SmartPLS were recorded to reflect the effect sizes in terms of the proportions of the variance explained [42][44]. 5. Results The latent variables, the indicators, and the measurement scales used to construct the PLS path model are defined in Figure 2. Figure Measurement Model Analyses Descriptive Statistics The frequency distributions for the latent variables are illustrated in Figure 3. The mean of the values show that the data is slightly left skewed ( ), meaning most values are concentrated on the right of the mean, with extreme values to the left. The mean of the Kurtosis values (0.056) is less than 3, making this a platykurtic distribution, which is flatter than a normal distribution with a wider peak. The probability for extreme values is less than for a normal distribution, and the values are spread wider around the mean. Figure Evaluation of Outer Model Loadings 3119

6 Figure 4 presents a copy the outer model path loadings. All of the outer model path loadings were strong (.5). The high proportion of strong factor loadings provided evidence to support the factorial validity of the model. Figure 4 AU Actual Use; CF Cognitive Factors; DP Data Persistence; EC External Control; IU Intention to Use; PU Perceived Usefulness; SP Security Policy; SN Subjective Norm Figure 6 Convergent and Discriminant Validity of Latent Variables Internal Consistency Reliability Figure 5 presents the composite reliability coefficients, average variance extracted and Cronbach s alpha values for the latent variables. Composite reliability does not assume tau equivalency among the measures with its assumption that all indicators are equally weighted [42]. The composite reliability for Data Persistence and External Control was good (>.8). The composite reliability for Subjective Norm and Security Policy was excellent (>.9). The reliability of Cognitive Factors, Actual Use, and Intention to Use could not be estimated because these three variables were each measured with only one indicator. Figure 5 Correlations among constructs The square root of AVE for each latent variable was computed to test for discriminant validity. Discriminant validity was confirmed because the square roots of AVE were larger than the corresponding inner model path coefficients (betavalues) associated with the latent variables in Figure 8. Figure 7 Heterotrait Monotrait Ratio Criterion Figure 7 shows all values, which according to Henseler, Ringle and Sarstedt [48] prove discriminant validity using the Heterotrait Monotrait criterion. Henseler, et al. [48] state that a conservative estimate of discriminant validity is no values higher than Furthermore, they note that values further from 1.0 are preferable. Both the values lower than 0.85 and their relative distance from 1.0 prove discriminant validity Structural Model Analyses (Note: CR above is Composite Reliability ) Convergent and Discriminant Validity Figure 6 presents the evidence for convergent validity indicated by the average variance explained (AVE) in the latent variables with multiple indicators. Convergent validity was strong (> 50%) for all constructs Inner Model Path Coefficients and Significance The inner model path coefficients or standardized PLS regression weights (β) are presented in Figure 8. The t-test statistics indicating the significance of the path coefficients are also presented in Figure 9. The results of the significance tests with p-values are summarized in Figure 9, as well. 3120

7 Figure 8 Significance of the path coefficients indicated by t- test statistics (Copy of output from SmartPLS). Significance of Inner Model Path Coefficients Note: Significant (p.05) Explanation of Variance and Significance Chin [42] and Hair [43] suggested that the primary criterion for the assessment of a PLS path model is the coefficient of determination (R²), which represents the amount of explained variance in each endogenous latent variable. The R 2 values take into account the fit of each regression equation in the inner model. Only about 1/3 of the variance in Intention to Use (32.5%) was explained by the dependent variables shown below in Figure 8. Figure 9 Note: * Significant (p.05); Hypotheses in bold were supported. The PLS path model provided the statistical evidence at the.05 level to indicate significant positive correlations between (a) perception of external control and intention to use; (b) cognitive factors and intention to use. The beta-value for CF->IU is negative indicating that for every 1-unit decrease in the independent variable, the dependent variable will increase by the beta coefficient value. The proportion of the variance explained in Intention to Use (R 2 = 32.5%) was greater than the proportion of the variance explained in Actual Use (0%). 6. Conclusions and Future Research We recognize that the lack of significant relationship between IU and AU is counter-intuitive to what is shown in the literature. While it is not immediately apparent, we will investigate this further to see what the reasons might be. One of the previously untested variables - cognitive factors of privacy concerns regarding surveillance and trust in the electronic medium supported its hypothesis with a t- value Data persistence and the existence of security policies did not support their hypotheses. The existence of security policy (SP) and data persistence (DP) did not support their hypotheses with t-values of 1.20, and 1.228, respectively. The t-test values in these three cases were less than 1.96, failing to reject their null hypotheses. A failure to reject the null hypothesis means that the null hypothesis is possible. Furthermore, intention to use was not a significant predictor of actual use. This finding is not supported by the literature. A Further developments to the survey tool regarding trust issues, and RFID usage education could provide a better understanding of how these three variables influence intention to use and actual use. Future research should explore further relationships between data persistence, security policy and cognitive factors. In exploring those relationships researchers should consider other factors that influence intention to use, or perhaps reformulation of the items altogether. There is a large body of literature from the technology acceptance and extended theory of planned behavior research that supports H3, H5, and H6 and this sample although consistent with G*power recommendations likely was not complete enough to well represent those hypotheses [15][2][37]. This research is the first of its type to find a strong relationship between the cognitive factors of privacy concerns regarding surveillance and trust in the electronic medium and intention to use. The theoretical model used in this research should be refined for further research, to better reflect the measures of privacy elements: data persistence and security policy could be combined into one category measures of privacy, and tested with questions that focused more specifically on data breaches and data loss. The theoretical model shown here was tested months before the Blue Cross Anthem data breach, and this alone may have been enough to change the future augmentations to this theoretical model. Developing 3121

8 further lines of questioning that focus on personal data loss, as opposed to general data loss may elicit responses that better support H2 and H4. Finally, a larger population of respondents may provide better statistical power and thus increase the likelihood of rejecting the null hypothesis. 7. References [1] I. Ajzen, From intentions to actions: A theory of planned behavior, Action Control, Springer, New York, NY, 1985, pp [2] I. Ajzen, The theory of planned behavior, Organizational Behavior and Human Decision Processes, 1991, pp [3] I. Ajzen, Perceived behavioral control, self-efficacy, locus of control and the theory of planned behavior, Journal of Applied Social Psychology, 2002, pp [4] C.J. Armitage, M. Comer, Efficacy of the theory of planned behavior: A meta-analytic review, British Journal of Social Psychology, 2001, pp [5] C.L. Anderson, R. Agarwal, The Digitization of Healthcare: Boundary risks, emotion and consumer willingness to disclose personal health information, Information Systems Research, 2011, pp [6] R.K. Baker, K.M White, Predicting adolescents use of social networking sites from an extended theory of planned behaviour perspective, Computers in Human Behavior, 2010, pp [7] P. Bennett, G. Bozionelos, The theory of planned behavior as predictor of condom use: A narrative review, Psychology, Health & Medicine, 2000, pp [8] A. R. Beresford, Location privacy in pervasive computing, Pervasive Computing, IEEE, 2003, pp [9] M. Bertrand, S. Bochard, Applying the technology acceptance model to WR with people who are favorable to its use, Journal of Cyber Therapy and Rehabilitation, 2008 [10] G. Bischoff, RFID privacy issues loom large, Mobile Radio Technology, 2007, p. 10 [11] S. Brown, A. Massey, J. Burkman, and M. Montoya Weiss, Do I really have to? User acceptance of mandated technology, European Journal of Information Systems, 2002, pp [12] T. Cammock, N. Carragher, and G. Prentice, Undergraduate intentions to apply to the Northern Ireland civil service: The application of a theory of planned behavior model, European Journal of Social Psychology, 2009, pp [13] S-L. Chao, P-S. Lin, Critical factors affecting the adoption of container security service: The shippers perspective, International Journal of Production Economics, 2009, pp [14] F.D. Davis, Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quarterly, 1989, pp [15] F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, User acceptance of computer technology: A comparison of two theoretical models, Management Science, 1989, pp [16] A. Dillon, and M.G. Morris, User acceptance of information technology: Theories and models, Annual Review of Information Science and Technology (ARIST), 1996, pp [17] M.S. Hagger, and N.L.D. Chatzisarantis, First- and higher- order models of attitudes, normative influence, and perceived behavioural control in the theory of planned behavior, British Journal of Social Psychology, 2005, pp [18] Hogg, M. A., and Abrams, D. A social psychology of intergroup relations and group processes, Routledge, London UK, [19] J.I. Hong, J.D. Ng, S. Lederer and J.A. Landay, Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques (DIS '04). ACM, New York, 2004, pp [20] M.M. Hossain, and V.R. Prybutok, Consumer acceptance of RFID technology: An exploratory study, Transactions on Engineering Management, 2008, pp [21] M.M. Hossain, and M. Quaddus, The adoption and continued usage intention of RFID: an integrated framework, Information Technology & People, 2011, pp [22] S.Y. Hung, Y.C. Ku, and J.C. Chien, Understanding physicians acceptance of the Medline system for practicing evidence-based medicine: A decomposed TPB model, International Journal of Medical Informatics, 2012, pp [23] K.L. Johnston, and K.M. White, Binge-drinking: A test of the role of group norms in the theory of planned behavior, Psychology and Health, 2003, pp [24] A. Kamra, J. Feldman, V. Misra, and D. Rubenstein, Data persistence for zero-configuration sensor networks SIGCOMM Computers and Communications Review, 2006, pp

9 [25] S. Konomi, Personal privacy assistants for RFID users, Paper presented at the International Workshop Series on RFID in Tokyo, Japan. Retrieved from [26] C-P. Lee, and J.P. Shim, An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry, European Journal of Information Systems, 2007, pp [27] M.S. Lee, An empirical study about RFID acceptance Focus on the employees in Korea, International Journal of Business Economics, Finance and Management Sciences, 2009, pp [28] Liu, D-S., and Chen, W., and Lee, R.(editor), An empirical research on the determinants of user ecommerce acceptance, Software engineering, artificial intelligence, networking and parallel/distributed computing, Springer, Berlin Germany, [29] T.E. Mason, and K.M. White, Applying an extended model of the theory of planned behaviour to breast selfexamination, Journal of Health Psychology, 2008, pp [30] G. Muller-Seitz, K. Dautzenberg, U. Creusen, and C. Stromereder, Customer acceptance of RFID technology: Evidence from the German electronic retail sector, Journal of Retailing and Consumer Services, 2009, pp [31] P. Norman, P. Bennett, and H. Lewis, Understanding binge drinking among young people: an application of the Theory of Planned Behavior, Health Education Research, 1998, pp [32] A. Norten, Nurses acceptance of RFID technology in a mandatory-use environment (Doctoral dissertation). Retrieved from electronic holdings, Nova Southeastern University, [33] O Leary, T.J., & O Leary, L.I., Computing Today. MacGraw-Hill Companies Dubuque, Iowa, [34] P. Pavlou, Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior, MIS Quarterly, 2006, pp [35] C. Röcker, and D. Tanier, O. Gervasi, V. Murgante, E. Pardede, B. O. Apduhan (Eds.), Information privacy in smart office environments: A cross-cultural study analyzing the willingness of users to share context information, Proceedings of the International Conference on Computational Science and Applications (ICCSA'10), LNCS, 2010, Springer, Heidelberg, Germany, pp [36] S. Taylor, and P. Todd, Understanding information technology usage: A test of competing models, Information Systems Research, 1995, pp [37] V. Venkatesh, and F.D. Davis, A theoretical extension of the technology acceptance model: Four longitudinal field studies, Management Science, 2000, pp [38] V. Venkatesh, Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model, Information Systems Research, 2000, pp [39] V. Venkatesh, and H. Bala, Technology Acceptance Model 3 and a Research Agenda on Interventions, Decision Sciences, 2008, pp [39.5] Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 2003, pp [40] H. Xu, S. Gupta, and P. Shi, Balancing User Privacy Concerns in the Adoption of Location-Based Services: An empirical analysis, iconference isociety: Research, Education and Engagement. [41] A. Juels, RFID security and privacy: A research survey, Selected Areas in Communications, IEEE, 2006, pp [42] W. Chin, Chapter 28: How to write up and report PLS analyses, Springer Handbooks, 2010, pp [42a] W. Chin, The partial least squares approach for structural equation modeling. In G. Marcoulides (ed.) Modern Methods for Business Research, 1998, pp [43] J. Hair, G. Ringle, and M. Sarstedt, A primer on partial least squares structural equation modeling (PLS-SEM), [44] K. Wong, Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS, Marketing Bulletin, 2013, pp [45] M. Keil; B. Tan; W. Wei T. Saarinen; T. Tuuaninen; A. Wassenaar; A cross-cultural study on escalation of commitment behavior in software projects, MIS Quarterly, 2000, pp [46] C. Aberson, Interpreting Null Results: Improving presentation and conclusions with confidence intervals, Journal for Articles in Support of the Null Hypothesis, 2002, pp [47] S. Fischer-Hubner, C. Lambrinoudakis and J. Lopez (Eds.), Identifying Factors that Influence Employees in Proceedings of 12th International Conference on Trust, Privacy and Security in Digital Business, 2015, Springer, Switzerland. [48] J. Henseler, C. Ringle and M. Sarstedt, A new criterion for assessing discriminant validity in variance-based structural equation modeling, Journal of the Academy of Marketing Science, 2015, pp

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines ABSTRACT Heshan Sun Syracuse University hesun@syr.edu The current study is built upon prior research and is an

More information

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce

More information

System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study

System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study Oscar Lorenzo Dueñas-Rugnon, Santiago Iglesias-Pradas, and Ángel Hernández-García Grupo de Tecnologías

More information

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL Eduardo Esteva-Armida, Instituto Tecnológico y de Estudios Superiores de Monterrey Gral. Ramón Corona 2514, Zapopan, Jalisco, México 45120 Phone: (5233) 3669.3080

More information

User Acceptance of E-Government Services

User Acceptance of E-Government Services User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time

More information

External Variables and the Technology Acceptance Model

External Variables and the Technology Acceptance Model Association for Information Systems AIS Electronic Library (AISeL) AMCIS 1995 Proceedings Americas Conference on Information Systems (AMCIS) 8-25-1995 External Variables and the Technology Acceptance Model

More information

Issues in Information Systems Volume 17, Issue II, pp , 2016

Issues in Information Systems Volume 17, Issue II, pp , 2016 CONSUMER ADOPTION AND USE OF MOBILE APPLICATIONS: DO PRIVACY AND SECURITY CONCERNS MATTER? Gary Garrison, Belmont University, gary.garrison@belmont.edu Sang Hyun Kim, Kyungpook National University, ksh@knu.ac.kr

More information

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey Available online at www.sciencedirect.com Procedia - Social and Behavioral Scien ce s 8 ( 0 ) nd World Conference on Educational Technology Researches WCETR0 The role of Gender in Pharmacists Attitudes

More information

ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY

ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY Ping Zhang Syracuse University pzhang@syr.edu Abstract. Attitude has been understudied in the information systems (IS) field. Research

More information

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology*

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Timothy Teo & Chwee Beng Lee Nanyang Technology University Singapore This

More information

existing statistical techniques. However, even with some statistical background, reading and

existing statistical techniques. However, even with some statistical background, reading and STRUCTURAL EQUATION MODELING (SEM): A STEP BY STEP APPROACH (PART 1) By: Zuraidah Zainol (PhD) Faculty of Management & Economics, Universiti Pendidikan Sultan Idris zuraidah@fpe.upsi.edu.my 2016 INTRODUCTION

More information

Analysis of citizens' acceptance for e-government services: applying the utaut model

Analysis of citizens' acceptance for e-government services: applying the utaut model Analysis of citizens' acceptance for e-government services: applying the utaut model Author Alshehri, Mohammed, Drew, Steve, Al Ghamdi, Rayed Published 2012 Conference Title Proceedings of the IADIS Multi

More information

Acceptance of E-Government Service: A Validation of the UTAUT

Acceptance of E-Government Service: A Validation of the UTAUT Proceedings of the 5th WSEAS International Conference on E-ACTIVITIES, Venice, Italy, November 20-22, 2006 165 Acceptance of E-Government Service: A Validation of the UTAUT YI-SHUN WANG Department of Information

More information

ADOPTION AND USE OF A UNIVERSITY REGISTRATION PORTAL BY UNDERGRADUATE STUDENTS OF BAYERO UNIVERSITY, KANO

ADOPTION AND USE OF A UNIVERSITY REGISTRATION PORTAL BY UNDERGRADUATE STUDENTS OF BAYERO UNIVERSITY, KANO Bayero Journal of Pure and Applied Sciences, 9(2): 179-185 Received: June, 2016 Accepted: November, 2016 ISSN 2006 6996 http://dx.doi.org/10.4314/bajopas.v9i2.33 ADOPTION AND USE OF A UNIVERSITY REGISTRATION

More information

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment

More information

MOBILE HEALTHCARE SERVICES ADOPTION

MOBILE HEALTHCARE SERVICES ADOPTION MOBILE HEALTHCARE SERVICES ADOPTION Research in Progress Genet Shanko, Addis Ababa University, Addis Ababa, Ethiopia, gdekebo2020@gmail.com Solomon Negash, Kennesaw State University, Kennesaw, GA, USA,

More information

THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING

THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING Dr. Rajesh Bhatt Head, Department of Business Administration Bhavnagar University, Bhavnagar ABSTRACT The banking services in India

More information

The Impact of Rewards on Knowledge Sharing

The Impact of Rewards on Knowledge Sharing Association for Information Systems AIS Electronic Library (AISeL) CONF-IRM 2014 Proceedings International Conference on Information Resources Management (CONF-IRM) 2014 The Impact of Rewards on Knowledge

More information

User Acceptance of Mobile Internet Based on. Gender Differences

User Acceptance of Mobile Internet Based on. Gender Differences SOCIAL BEHAVIOR AND PERSONALITY, 2010, 38(3), 415-426 Society for Personality Research (Inc.) DOI 10.2224/sbp.2010.38.3.415 User Acceptance of Mobile Internet Based on THE UNIFIED THEORY OF ACCEPTANCE

More information

Research on Software Continuous Usage Based on Expectation-confirmation Theory

Research on Software Continuous Usage Based on Expectation-confirmation Theory Research on Software Continuous Usage Based on Expectation-confirmation Theory Daqing Zheng 1, Jincheng Wang 1, Jia Wang 2 (1. School of Information Management & Engineering, Shanghai University of Finance

More information

Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling. Olli-Pekka Kauppila Daria Kautto

Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling. Olli-Pekka Kauppila Daria Kautto Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling Olli-Pekka Kauppila Daria Kautto Session VI, September 20 2017 Learning objectives 1. Get familiar with the basic idea

More information

Information Sharing on Social Networking Sites: the role of perceived control of information and gender

Information Sharing on Social Networking Sites: the role of perceived control of information and gender Association for Information Systems AIS Electronic Library (AISeL) WISP 2012 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 11-14-2013 Information Sharing on Social Networking

More information

Panel: Using Structural Equation Modeling (SEM) Using Partial Least Squares (SmartPLS)

Panel: Using Structural Equation Modeling (SEM) Using Partial Least Squares (SmartPLS) Panel: Using Structural Equation Modeling (SEM) Using Partial Least Squares (SmartPLS) Presenters: Dr. Faizan Ali, Assistant Professor Dr. Cihan Cobanoglu, McKibbon Endowed Chair Professor University of

More information

Completed Research. Birte Malzahn Hochschule für Technik und Wirtschaft Berlin

Completed Research. Birte Malzahn Hochschule für Technik und Wirtschaft Berlin If at First You Don't Succeed, Try, Try Again Might Not Always Make Sense: On the Influence of Past Technology Category Satisfaction on Technology Usage Abstract Completed Research Claus-Peter H. Ernst

More information

USER INTERFACE DESIGN: A STUDY OF EXPECTATION- CONFIRMATION THEORY

USER INTERFACE DESIGN: A STUDY OF EXPECTATION- CONFIRMATION THEORY USER INTERFACE DESIGN: A STUDY OF EXPECTATION- CONFIRMATION THEORY Aslina Baharum 1, 2, and Azizah Jaafar 2 1 Universiti Malaysia Sabah (UMS), Malaysia, aslina@ums.edu.my 2 Universiti Kebangsaan Malaysia,

More information

THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA

THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA 0F USING International Journal of Research in Computer Science eissn 2249-8265 Volume 5 Issue 1 (2015) pp. 1-8, A Unit of White Globe Publications THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL

More information

Thinking Like a Researcher

Thinking Like a Researcher 3-1 Thinking Like a Researcher 3-3 Learning Objectives Understand... The terminology used by professional researchers employing scientific thinking. What you need to formulate a solid research hypothesis.

More information

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use Heshan Sun Syracuse University hesun@syr.edu Ping Zhang Syracuse University pzhang@syr.edu ABSTRACT Causality

More information

CHAPTER III RESEARCH METHODOLOGY

CHAPTER III RESEARCH METHODOLOGY CHAPTER III RESEARCH METHODOLOGY In this chapter, the researcher will elaborate the methodology of the measurements. This chapter emphasize about the research methodology, data source, population and sampling,

More information

Seminar Medical Informatics 2015

Seminar Medical Informatics 2015 Seminar Medical Informatics 2015 Meeting 11 March 20, 2015 Ronald Batenburg UU/NIVEL 1 Agenda for today Market and context research for medical apps Target audience, end-users, customers Laws, regulation,

More information

WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE

WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE Aaron X.L. Shen Department of Information Systems, University of Science and Technology of China City University

More information

INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE

INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE Jeoungkun Kim Graduate School of Management, Korea Advanced Institute Science and Technology, kimjk70@kgsm.kaist.ac.kr Heeseok

More information

Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB)

Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Flow Experience Perceived Enjoyment Trust Attitude Subjective Norm Actual Use Self Efficacy Perceived Behavioral Control Introduction

More information

Slacking and the Internet in the Classroom: A Preliminary Investigation

Slacking and the Internet in the Classroom: A Preliminary Investigation Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2006 Proceedings Special Interest Group on Human-Computer Interaction 2006 Slacking and the Internet in the Classroom: A Preliminary

More information

Patients Behavioral Intentions toward Using WSN based Smart Home Healthcare Systems: An Empirical Investigation

Patients Behavioral Intentions toward Using WSN based Smart Home Healthcare Systems: An Empirical Investigation 2015 48th Hawaii International Conference on System Sciences Patients Behavioral Intentions toward Using WSN based Smart Home Healthcare Systems: An Empirical Investigation Ahmad Alaiad Lina Zhou Department

More information

Rong Quan Low Universiti Sains Malaysia, Pulau Pinang, Malaysia

Rong Quan Low Universiti Sains Malaysia, Pulau Pinang, Malaysia International Journal of Accounting & Business Management Vol. 1 (No.1), April, 2013 Page: 99-106 ISSN: 2289-4519 This work is licensed under a Creative Commons Attribution 4.0 International License. www.ftms.edu.my/journals/index.php/journals/ijabm

More information

Combining Behavioral and Design Research Using Variance-based Structural Equation Modeling

Combining Behavioral and Design Research Using Variance-based Structural Equation Modeling Combining Behavioral and Design Research Using Variance-based Structural Equation Modeling Course to be held on 1-3 December 2016 at Texas Tech, Lubbock, TX, U.S.A. Instructor: Jörg Henseler, PhD Professor

More information

Issues in Information Systems

Issues in Information Systems ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web

More information

The moderating impact of temporal separation on the association between intention and physical activity: a meta-analysis

The moderating impact of temporal separation on the association between intention and physical activity: a meta-analysis PSYCHOLOGY, HEALTH & MEDICINE, 2016 VOL. 21, NO. 5, 625 631 http://dx.doi.org/10.1080/13548506.2015.1080371 The moderating impact of temporal separation on the association between intention and physical

More information

Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University

Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University Adnan Riaz Department of Business Administration Allama Iqbal Open University

More information

Appendix B Construct Reliability and Validity Analysis. Initial assessment of convergent and discriminate validity was conducted using factor

Appendix B Construct Reliability and Validity Analysis. Initial assessment of convergent and discriminate validity was conducted using factor Appendix B Construct Reliability and Validity Analysis Reflective Construct Reliability and Validity Analysis Initial assessment of convergent and discriminate validity was conducted using factor analysis

More information

Is entrepreneur s photo a crucial element in a crowdfunding webpage?

Is entrepreneur s photo a crucial element in a crowdfunding webpage? Second International Conference on Economic and Business Management (FEBM 2017) Is entrepreneur s photo a crucial element in a crowdfunding webpage? Xin Wang, Huaxin Wang *, Yu Zhao Department of Business

More information

One-dimensional, Multidimensional and Unidimensional Perspectives in a Multifunctional Device: Comparison of Three Models

One-dimensional, Multidimensional and Unidimensional Perspectives in a Multifunctional Device: Comparison of Three Models Association for Information Systems AIS Electronic Library (AISeL) ACIS 2010 Proceedings Australasian (ACIS) 2010 One-dimensional, Multidimensional and Unidimensional Perspectives in a Multifunctional

More information

Measurement for Analyzing Instant Messenger Application Adoption Using Unified Theory of Acceptance and Use of Technology 2 (utaut2)

Measurement for Analyzing Instant Messenger Application Adoption Using Unified Theory of Acceptance and Use of Technology 2 (utaut2) Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 259-268 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 Measurement

More information

Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment

Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Marshall University Marshall Digital Scholar Management Faculty Research Management, Marketing and MIS Fall 11-14-2009 Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Wai Kwan

More information

Main Factors Influencing Mobile Commerce Adoption

Main Factors Influencing Mobile Commerce Adoption Main Factors Influencing Mobile Commerce Adoption 1 Mohammadjafar Esmaeili University of Dayton mesmaeili1@udayton.edu Ali Eydgahi Eastern Michigan University aeydgahi@emich.edu Abstract Mobile commerce

More information

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm Project Guidelines Perceived usefulness Attitude Intention Use E-filing Ease of use Perceived behavioral control Subjective norm Introduction Introduction should include support/justification why the research

More information

The Role of Habit in Information Systems Continuance: Examining the Evolving Relationship Between Intention and Usage

The Role of Habit in Information Systems Continuance: Examining the Evolving Relationship Between Intention and Usage Association for Information Systems AIS Electronic Library (AISeL) ICIS 2005 Proceedings International Conference on Information Systems (ICIS) December 2005 The Role of Habit in Information Systems Continuance:

More information

Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,*

Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,* 2017 International Conference on Applied Mechanics and Mechanical Automation (AMMA 2017) ISBN: 978-1-60595-471-4 Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Applications 10 (2011) 408 417 Contents lists available at ScienceDirect Electronic Commerce Research and Applications journal homepage: www.elsevier.com/locate/ecra The

More information

Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version:

Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version: Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version: Taghian, Mehdi and D'Souza, Clare 2007, A cross-cultural

More information

Why Do People Like to Play Social Network Games with Their Friends? A Focus on Sociability and Playability

Why Do People Like to Play Social Network Games with Their Friends? A Focus on Sociability and Playability Association for Information Systems AIS Electronic Library (AISeL) PACIS 2013 Proceedings Pacific Asia Conference on Information Systems (PACIS) 6-18-2013 Why Do People Like to Play Social Network Games

More information

PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY

PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY Yujong Hwang and Mun Y. Yi University of South Carolina yujongh@yahoo.com myi@moore.sc.edu Abstract This study

More information

Investigating the Post-Adoption Attitude of the Web Based Content Management System within Organization

Investigating the Post-Adoption Attitude of the Web Based Content Management System within Organization Investigating the Post-Adoption Attitude of the Web Based Content Management 1,2 2 and 3 1 DePaul University, School of Accountancy & MIS, Chicago, USA, yhwang1@depaul.edu 2 Kyung Hee University, College

More information

USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW 1

USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW 1 RESEARCH ARTICLE USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW 1 By: Viswanath Venkatesh Robert H. Smith School of Business University of Maryland Van Munching Hall College Park, MD

More information

Towards an instrument for measuring sensemaking and an assessment of its theoretical features

Towards an instrument for measuring sensemaking and an assessment of its theoretical features http://dx.doi.org/10.14236/ewic/hci2017.86 Towards an instrument for measuring sensemaking and an assessment of its theoretical features Kholod Alsufiani Simon Attfield Leishi Zhang Middlesex University

More information

Journal of Emerging Trends in Computing and Information Sciences

Journal of Emerging Trends in Computing and Information Sciences Determinants of Acceptance and Use of DHIS2: Survey Instrument Validation and Preliminary Findings using PLS-SEM 1 Josephine Karuri, 2 Peter Waiganjo, 3 Daniel Orwa 1, 2, 3 School of Computing & Informatics,

More information

What are the Relationships Between Transformational Leadership and Organizational Citizenship Behavior? An Empirical Study

What are the Relationships Between Transformational Leadership and Organizational Citizenship Behavior? An Empirical Study 2012 International Conference on Economics, Business Innovation IPEDR vol.38 (2012) (2012) IACSIT Press, Singapore What are the Relationships Between Transformational Leadership and Organizational Citizenship

More information

Behavioral Intention to use Knowledge Sharing Tools: Positive and Negative Affect on Affective Technology Acceptance Model

Behavioral Intention to use Knowledge Sharing Tools: Positive and Negative Affect on Affective Technology Acceptance Model Behavioral Intention to use Knowledge Sharing Tools: Positive and Negative Affect on Affective Technology Acceptance Model Angela Lee Siew Hoong and Tong-Ming Lim Sunway University, Malaysia, {angelal;

More information

How Self-Efficacy and Gender Issues Affect Software Adoption and Use

How Self-Efficacy and Gender Issues Affect Software Adoption and Use How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize

More information

A Productivity Review Study on Theory of Reasoned Action Literature Using Bibliometric Methodology

A Productivity Review Study on Theory of Reasoned Action Literature Using Bibliometric Methodology 0 International Conference on Management and Service Science IPEDR vol.8 (0) (0) IACSIT Press, Singapore A Productivity Review Study on Theory of Reasoned Action Literature Using Bibliometric Methodology

More information

Acceptance and Usage of Innovative Healthcare Service for the Elderly People: A System Dynamics Modeling Approach

Acceptance and Usage of Innovative Healthcare Service for the Elderly People: A System Dynamics Modeling Approach 2012 2 nd International Conference on Economics, Trade and Development IPEDR vol.36 (2012) (2012) IACSIT Press, Singapore Acceptance and Usage of Innovative Healthcare Service for the Elderly People: A

More information

Visual Information Priming in Internet of Things: Focusing on the interface of smart refrigerator

Visual Information Priming in Internet of Things: Focusing on the interface of smart refrigerator Visual Information Priming in Internet of Things: Focusing on the interface of smart refrigerator Hyeonjin Kim 1, Sangmee Lee 1, and Donghee Shin 1, * 1 Department of Interaction Science, Sungkyunkwan

More information

A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan

A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan Pei Liu School of Management and Economics, North China Zhen Li Data Science

More information

The Adoption of Mobile Games in China: An Empirical Study

The Adoption of Mobile Games in China: An Empirical Study The Adoption of Mobile Games in China: An Empirical Study Shang Gao 1,2, Zhe Zang 1, and John Krogstie 2 1 School of Business Administration, Zhongnan University of Economics and Law, Wuhan, China 2 Department

More information

TOJET: The Turkish Online Journal of Educational Technology April 2012, volume 11 Issue 2

TOJET: The Turkish Online Journal of Educational Technology April 2012, volume 11 Issue 2 EXAMINING THE RELATIONSHIP BETWEEN TEACHERS ATTITUDES AND MOTIVATION TOWARD WEB-BASED PROFESSIONAL DEVELOPMENT: A STRUCTURAL EQUATION MODELING APPROACH Hui-Min CHIEN, Cheng Shiu University, Taiwan chm@csu.edu.tw

More information

The Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks

The Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks Computer Communication & Collaboration (Vol. 2, Issue 3, 2014) The Antecedents of Students Expectation Confirmation Regarding Electronic Textbooks Robert W. Stone (corresponding author) Department of Accounting,

More information

The empirical study of automotive telematics acceptance in Taiwan: comparing three Technology Acceptance Models

The empirical study of automotive telematics acceptance in Taiwan: comparing three Technology Acceptance Models 50 Int. J. Mobile Communications, Vol. 7, No. 1, 2009 The empirical study of automotive telematics acceptance in Taiwan: comparing three Technology Acceptance Models Huei-Huang Chen* Department of Information

More information

Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions

Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Introduction Technology enables consumers to undertake everything from relatively simple

More information

How Does Person-Organization Fit Affect Behavioral And Attitudinal Outcomes?

How Does Person-Organization Fit Affect Behavioral And Attitudinal Outcomes? How Does Person-Organization Fit Affect Behavioral And Attitudinal Outcomes? The Mediating Role of Psychological Empowerment Working Paper Series 09-01 February 2009 Brian T. Gregory, Ph.D. Assistant Professor

More information

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH DANIEL Z. LEVIN Management and Global Business Dept. Rutgers Business School Newark and New Brunswick Rutgers

More information

National Culture Dimensions and Consumer Digital Piracy: A European Perspective

National Culture Dimensions and Consumer Digital Piracy: A European Perspective National Culture Dimensions and Consumer Digital Piracy: A European Perspective Abstract Irena Vida, irena.vida@ef.uni-lj.si Monika Kukar-Kinney, mkukarki@richmond.edu Mateja Kos Koklič, mateja.kos@ef.uni-lj.si

More information

Determinants of Continuance Intention of RFID in Australian Livestock Industry: An Empirical Study

Determinants of Continuance Intention of RFID in Australian Livestock Industry: An Empirical Study Association for Information Systems AIS Electronic Library (AISeL) ACIS 2011 Proceedings Australasian (ACIS) 2011 Determinants of Continuance Intention of RFID in Australian Livestock Industry: An Empirical

More information

Effect of job characteristics on satisfaction and performance: A test in Egyptian agricultural extension system

Effect of job characteristics on satisfaction and performance: A test in Egyptian agricultural extension system Vol. 8(48), pp. 6126-6130, 12 December, 2013 DOI: 10.5897/AJAR09.698 ISSN 1991-637X 2013 Academic Journals http://www.academicjournals.org/ajar African Journal of Agricultural Research Full Length Research

More information

EXAMINING FACTORS AFFECTING COLLEGE STUDENTS INTENTION TO USE WEB-BASED INSTRUCTION SYSTEMS: TOWARDS AN INTEGRATED MODEL

EXAMINING FACTORS AFFECTING COLLEGE STUDENTS INTENTION TO USE WEB-BASED INSTRUCTION SYSTEMS: TOWARDS AN INTEGRATED MODEL EXAMINING FACTORS AFFECTING COLLEGE STUDENTS INTENTION TO USE WEB-BASED INSTRUCTION SYSTEMS: TOWARDS AN INTEGRATED MODEL Yi-Cheng CHEN Department of Information Science & Management Systems National Taitung

More information

Issues in Information Systems Volume 15, Issue I, pp , 2014

Issues in Information Systems Volume 15, Issue I, pp , 2014 THE IMPORTANCE AND IMPACT OF DETERMINANTS INFLUENCING BUSINESS INTELLIGENCE SYSTEMS EMBEDDEDNESS Tanja Grublješič, Faculty of Economics, University of Ljubljana, Slovenia, tanja.grubljesic@ef.uni-lj.si

More information

PHYSICIAN ACCEPTANCE BEHAVIOR OF THE ELECTRONIC MEDICAL RECORDS EXCHANGE: AN EXTENDED DECOMPOSED THEORY OF PLANNED BEHAVIOR

PHYSICIAN ACCEPTANCE BEHAVIOR OF THE ELECTRONIC MEDICAL RECORDS EXCHANGE: AN EXTENDED DECOMPOSED THEORY OF PLANNED BEHAVIOR PHYSICIAN ACCEPTANCE BEHAVIOR OF THE ELECTRONIC MEDICAL RECORDS EXCHANGE: AN EXTENDED DECOMPOSED THEORY OF PLANNED BEHAVIOR Pi-Jung Hsieh, Department of Hospital and Health Care Administration, Chia Nan

More information

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D.

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D. Measurement of Constructs in Psychosocial Models of Health Behavior March 26, 2012 Neil Steers, Ph.D. Importance of measurement in research testing psychosocial models Issues in measurement of psychosocial

More information

Intention to consent to living organ donation: an exploratory study. Christina Browne B.A. and Deirdre M. Desmond PhD

Intention to consent to living organ donation: an exploratory study. Christina Browne B.A. and Deirdre M. Desmond PhD Intention to consent to living organ donation: an exploratory study Christina Browne B.A. and Deirdre M. Desmond PhD Department of Psychology, John Hume Building, National University of Ireland Maynooth,

More information

Attitude Change Process toward ERP Systems Using the Elaboration Likelihood Model

Attitude Change Process toward ERP Systems Using the Elaboration Likelihood Model Attitude Change Process toward ERP Systems Using the Elaboration Likelihood Model Euisung Jung University of Wisconsin-Milwaukee Lubar School of Business junge@uwm.edu William D. Haseman University of

More information

Modeling the Influential Factors of 8 th Grades Student s Mathematics Achievement in Malaysia by Using Structural Equation Modeling (SEM)

Modeling the Influential Factors of 8 th Grades Student s Mathematics Achievement in Malaysia by Using Structural Equation Modeling (SEM) International Journal of Advances in Applied Sciences (IJAAS) Vol. 3, No. 4, December 2014, pp. 172~177 ISSN: 2252-8814 172 Modeling the Influential Factors of 8 th Grades Student s Mathematics Achievement

More information

Factors Influencing the Usage of Websites: The Case of a Generic Portal in the Netherlands

Factors Influencing the Usage of Websites: The Case of a Generic Portal in the Netherlands e-everything: e-commerce, e-government, e-household, e-democracy 14 th Bled Electronic Commerce Conference Bled, Slovenia, June 25-26, 2001 Factors Influencing the Usage of Websites: The Case of a Generic

More information

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:

More information

A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS IN CONSUMER ACCEPTANCE OF AN ESERVICE: THE CASE OF ONLINE HEALTH SERVICES

A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS IN CONSUMER ACCEPTANCE OF AN ESERVICE: THE CASE OF ONLINE HEALTH SERVICES Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS

More information

Gender differences in condom use prediction with Theory of Reasoned Action and Planned Behaviour: the role of self-efficacy and control

Gender differences in condom use prediction with Theory of Reasoned Action and Planned Behaviour: the role of self-efficacy and control Gender differences in condom use prediction with Theory of Reasoned Action and Planned Behaviour: the role of self-efficacy and control Alicia Muñoz-Silva, Manuel Sánchez-García, Cristina Nunes, Ana Martins

More information

Understanding Knowledge Management Systems Continuance: A Decomposed Model

Understanding Knowledge Management Systems Continuance: A Decomposed Model Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 Understanding Knowledge Management Systems Continuance:

More information

A Model of Unethical Usage of Information Technology

A Model of Unethical Usage of Information Technology Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 A Model of Unethical Usage of Information Technology Sutirtha

More information

CHAPTER 3 RESEARCH METHODOLOGY

CHAPTER 3 RESEARCH METHODOLOGY CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction 3.1 Methodology 3.1.1 Research Design 3.1. Research Framework Design 3.1.3 Research Instrument 3.1.4 Validity of Questionnaire 3.1.5 Statistical Measurement

More information

THEORETICAL FRAMEWORK. Noor Hazlina Ahmad, PhD School of Management 6 th January th PhD Colloquium School of Management

THEORETICAL FRAMEWORK. Noor Hazlina Ahmad, PhD School of Management 6 th January th PhD Colloquium School of Management THEORETICAL FRAMEWORK Noor Hazlina Ahmad, PhD School of Management 6 th January 2014 30 th PhD Colloquium School of Management Tara Brabazon (2010) gives her top ten tips for doctoral failure Tips no 3:

More information

INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND

INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND Alexander M. Janssens Siam University Bangkok, Thailand research@alexanderjanssens.com ABSTRACT This research investigates

More information

A Modified Technology Acceptance Model for Camera Mobile Phone Adoption: Development and validation

A Modified Technology Acceptance Model for Camera Mobile Phone Adoption: Development and validation A Modified Technology Acceptance Model for Camera Mobile Phone Adoption: Development and validation Dr Kamel ROUIBAH College of Business Administration Kuwait University Email: Krouibah@cba.edu.kw Dr Hasan

More information

Life Quality and Job Satisfaction: A Case Study on Job Satisfaction of Bike Participants in Chiayi County Area

Life Quality and Job Satisfaction: A Case Study on Job Satisfaction of Bike Participants in Chiayi County Area Life Quality and Job Satisfaction: A Case Study on Job Satisfaction of Bike Participants in Chiayi County Area Chin-Tsai Kuo, Associate Professor, Office of Physical Education, Nanhua University, Taiwan

More information

An Empirical Study of Health Consumer Beliefs, Attitude and Intentions toward the Use of Self- Service Kiosks

An Empirical Study of Health Consumer Beliefs, Attitude and Intentions toward the Use of Self- Service Kiosks Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-6-2011 An Empirical Study of Health Consumer Beliefs, Attitude and Intentions toward the Use

More information

Determinants of Perceived Usefulness and Perceived Ease of Use in Individual Adoption of Social Network Sites

Determinants of Perceived Usefulness and Perceived Ease of Use in Individual Adoption of Social Network Sites Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-2010 Determinants of Perceived Usefulness and Perceived Ease

More information

HIGH-ORDER CONSTRUCTS FOR THE STRUCTURAL EQUATION MODEL

HIGH-ORDER CONSTRUCTS FOR THE STRUCTURAL EQUATION MODEL HIGH-ORDER CONSTRUCTS FOR THE STRUCTURAL EQUATION MODEL Enrico Ciavolino (1) * Mariangela Nitti (2) (1) Dipartimento di Filosofia e Scienze Sociali, Università del Salento (2) Dipartimento di Scienze Pedagogiche,

More information

Understanding Tourist Environmental Behavior An Application of the Theories on Reasoned Action Approach

Understanding Tourist Environmental Behavior An Application of the Theories on Reasoned Action Approach University of Massachusetts Amherst ScholarWorks@UMass Amherst Tourism Travel and Research Association: Advancing Tourism Research Globally 2012 ttra International Conference Understanding Tourist Environmental

More information

Quantitative Research. By Dr. Achmad Nizar Hidayanto Information Management Lab Faculty of Computer Science Universitas Indonesia

Quantitative Research. By Dr. Achmad Nizar Hidayanto Information Management Lab Faculty of Computer Science Universitas Indonesia Quantitative Research By Dr. Achmad Nizar Hidayanto Information Management Lab Faculty of Computer Science Universitas Indonesia Depok, 2 Agustus 2017 Quantitative Research: Definition (Source: Wikipedia)

More information

CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors

CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY Guest Co-Editors Philip Bobko Gettysburg College pbobko@gettysburg.edu Alex J. Barelka Illinois State

More information

Physicians Intention To Use Electronic Medical Records In Sri Lanka

Physicians Intention To Use Electronic Medical Records In Sri Lanka INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 3, ISSUE 12 48 Physicians Intention To Use Electronic Medical Records In Sri Lanka Tharaniga Jeyakodi, Dillina Herath

More information

PACDEFF 2017 Melbourne - Australia

PACDEFF 2017 Melbourne - Australia PACDEFF 2017 Melbourne - Australia Risk Perception and Cultural Intelligence in Human Factors: The Interaction of Emotional Intelligence and Organisational Culture in High Risk Industries Across Borders

More information