To see the other types of publications on this topic, follow the link: Information acceptance model (IACM).

Dissertations / Theses on the topic 'Information acceptance model (IACM)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information acceptance model (IACM).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Erkan, Ismail. "The influence of electronic word of mouth in social media on consumers' purchase intentions." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/12972.

Full text
Abstract:
The influence of electronic word of mouth (eWOM) on consumers’ purchase intentions has long been known. However, the emergence of social media has brought a new perspective to eWOM through enabling users to communicate with their existing networks on the Internet. On social media, conversely to the other online platforms, users are able to exchange their opinions and experiences about products or services with familiar people, which refers to people who they already know such as friends and acquaintances. This new way of eWOM has the potential for greater impact on consumers. Therefore, the aim of this research is to examine the influence of eWOM in social media on consumers’ purchase intentions. To do so, the research in this thesis involved two major phases. In the first phase, in order to explore the determinants of eWOM information on social media which influences consumers’ purchase intentions, a theoretical model was developed based on the integration of Information Adoption Model (IAM) and related components of Theory of Reasoned Action (TRA). The new model, which is named as Information Acceptance Model (IACM), was validated through structural equation modelling (SEM) based on surveys of 384 social media users in the UK. The results have highlighted that quality, credibility, usefulness and adoption of information, needs of information and attitude towards information are the key factors for eWOM in social media which influence consumers’ purchase intentions. Furthermore, to provide better understanding of the influence of eWOM on social media, the second phase of this research was designed as a comparative study. To explore whether the eWOM between familiar people on social media or the eWOM between anonymous people on other online platforms was more influential on consumers’ purchase intentions, the data collected through survey was reanalysed with a different perspective; and a comparison was conducted based on multiple regression analysis. The results have revealed significant differences and found anonymous reviews to be more influential on consumers’ purchase intentions than friends’ recommendations on social media. However, since these results were contrary to expectations, 10 in-depth interviews were also administered to enlighten the insightful results found through the survey. The interview findings uncovered the survey results. Information quantity, information readiness, detailed information, and dedicated information were discovered as the factors which make online reviews superior than friends’ recommendations in terms of the influence of eWOM. This research contributes to theoretical implications through its validated model and found key dimensions. The research model, IACM, brings a new approach to information adoption by extending IAM and provides new insights to researchers who study Information Systems (IS). In addition, the model highlights the information adoption process as an antecedent of behavioural intention, which is a very important finding for the related literature. Future studies can build new models through considering this relationship between information adoption process and behavioural intention. Moreover, the second phase of this research provides new constructs for future studies through its qualitative findings. The findings reached through in-depth interviews, which explain why consumers prefer anonymous online reviews, can either be tested as components of new theories and models or they can be tested as inclusion of existing theories and models. Both types have potential to provide valuable results for the literature. On the other hand, in terms of practicality, this research provides marketers with a frame of reference to understand the influence of eWOM in social media on consumers’ purchase intentions. Both the contextual and the comparative studies in this research offer valuable insights for marketers; marketers thus can develop better strategies for marketing on social media.
APA, Harvard, Vancouver, ISO, and other styles
2

Gabbard, Ralph Barnhart. "Applying the technology acceptance model to online education." [Bloomington, Ind.] : Indiana University, 2004. http://wwwlib.umi.com/dissertations/fullcit/3162232.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, 2004.
Source: Dissertation Abstracts International, Volume: 66-01, Section: A, page: 0011. Chair: Javed Mostafa. Title from dissertation home page (viewed Oct. 12, 2006).
APA, Harvard, Vancouver, ISO, and other styles
3

Chandio, Fida Hussain. "Studying acceptance of online banking information system : a structural equation model." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/6153.

Full text
Abstract:
Acceptance of information technology (IT) has remained a topic of interest for a last few decades. Several theories, specifically over the conceptualisation of the technology acceptance model (TAM) have emerged and they have been applied in different contexts to investigate new insights into the acceptance behaviour at individual and organisational levels. However, despite TAM’s maturity and validity in different contexts, very little published literature strives to extend its capability to predict individuals’ acceptance behaviour about an online banking information system (OBIS). A possible rational for this gap may be conceptualisation of the TAM under which individuals’ acceptance behaviour can only be predicted with two beliefs: perceived ease of use (PEOU) and perceived usefulness (PU). The evidence in literature shows that PU and PEOU beliefs are not sufficient; hence, they may not explain individuals’ acceptance behaviour in emerging contexts, such as online banking information systems, especially in developing economies such as Pakistan. There is therefore a need for inclusion of any additional factor that can enhance prediction of acceptance of online banking information system by potential users. Extending research on the TAM, this study developed and tested a model of OBIS acceptance. The proposed model integrated key constructs from the information systems acceptance research stream into the theoretical frame of the TAM and other theories from social psychology, such as the theory of reasoned action (TRA), theory of planned behaviour (TPB) and the TAM2. According to the proposed conceptual model, OBIS acceptance was determined by eight main factors, which included perceived usefulness, perceived ease of use, trust, technological self-efficacy, response time, output quality, accessibility, and terminology clarity. In this model, PU was hypothesised to be affected by PEOU, trust, technological self-efficacy (TSE), output quality (OQ) and response time (RT). In addition, PEOU was hypothesised to be determined by three external factors: TSE, accessibility and terminology clarity (TC). The model was tested on a sample of 353 Internet banking users in Pakistan. Using structural equation modelling with Analysis of Moment Structures (AMOS) software, data analysis showed considerable support for the extended hypothesised model. The result indicated that, in order of importance, PU, PEOU and trust explained 45.7 % of the variance in the acceptance behaviour. The trust and the TSE predicted 28.1 % of the variance in the PU. However, the hypothesised relationships between the PU and the PEOU, OQ and RT were found to be not significant. While in the PEOU, 21.8 % of the variance was predicted by the TSE, accessibility and TC. TSE was found to be a more influential determinant of the PEOU than the PU. The consideration of factors that have a significant influence on the acceptance of OBIS, as identified in this research, is important for the managers in the banking sector, especially in developing countries, in order to increase wider acceptance and use of these systems, which provide benefits to both the customers and the service providers.
APA, Harvard, Vancouver, ISO, and other styles
4

Ducey, Adam J. "Predicting Tablet Computer Use: An Extended Technology Acceptance Model." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4471.

Full text
Abstract:
While information technology has rapidly changed work in the United States in the past 50 years, some businesses and industries have been slow to adopt new technologies. Healthcare is one industry that has lagged behind in information technology investment for a variety of reasons. Recent federal initiatives to encourage IT adoption in the healthcare industry provide an ideal context to study factors that influence technology acceptance. Data from 261 practicing pediatricians were collected to evaluate an extended Technology Acceptance Model. Results indicated that individual (i.e., perceived usefulness, perceived ease of use), organizational (i.e., subjective norm), and device (i.e., compatibility, reliability) characteristics collectively influence pediatricians' intention to adopt tablet computers in their medical practice. Theoretical and practical implications are discussed. Future research should examine additional variables that influence information technology adoption in organizations.
APA, Harvard, Vancouver, ISO, and other styles
5

Garcia-Smith, Dianna. "Testing a Model to Predict Successful Clinical Information Systems." Diss., The University of Arizona, 2007. http://hdl.handle.net/10150/195846.

Full text
Abstract:
Even though most clinical information systems (CIS) today are technically sound, the number of successful implementations of these systems is low. For that reason, understanding the characteristics and challenges for organizations implementing CIS is now considered key to successful information technology deployment (Lorenzi & Riley, 1997). Although theory driven information systems models and CIS studies exist, an integrated model to predict a successful CIS has not been evaluated. The purpose of this research was to evaluate the ability of a theoretically-based integrated model of CIS success (CISSM) to predict a successful CIS from the clinicians' perspective. Data were collected and analyzed from 234 registered nurses in 4 hospitals who had used the Cerner PowerChart Admission Health Profile (AHP) longer than 3 months. Construct validity and internal consistency reliability of the 23-item online instrument were established. The results of stepwise multiple regression analyses provided tentative support for the CISSM model.
APA, Harvard, Vancouver, ISO, and other styles
6

Compton, Shane M., and n/a. "Information technology implementation and acceptance: a case study of change management." University of Canberra. Applied Science, 2002. http://erl.canberra.edu.au./public/adt-AUC20050331.145848.

Full text
Abstract:
The implementation of a new Information Technology in an organization represents a significant change. Little research, however, has been conducted on the collective power of Information Technology acceptance and change management. The current research seeks to integrate a prominent model of technology acceptance and change management theory to develop an holistic approach to Information Technology implementation and acceptance. Using Davis' (1989) Technology Acceptance Model (TAM) (Attitude) and Beer, Eisenstat and Specter's (1990) six step model of change (Change), this three phase longitudinal case study examined the change management of the implementation of a new Information System within a statutory authority. Results from the current study show that the addition of the six step model (Change) adds appreciably to the TAM (Attitude) in the prediction of general service satisfaction and perceived implementation success. Findings also show the temporal salience of the factors of the six step model and the TAM in the prediction of these dependent variables. The current research supports previous work by Davis (1989) and Thompson, Higgins and Howell (1994) who stated that initially people are motivated to use an Information System by affect, but will in time be more concerned with usefulness as habit formation occurs. The current study found that during the pre-implementation phase, commitment through communication and vision are critical to the change process. However, as the change moves into the implementation phase, consensus becomes most important. The shift in factors salient during the change process is what the author refers to as the temporal progression proposition. Strengths and limitations of the current study and recommendations for future research are discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Ma, Will Wai-kit. "The development and empirical testing of a longitudinal integrated model on information technology acceptance /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ISMT%202006%20MA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jones, Cynthia. "Utilizing the Technology Acceptance Model to Assess Employee Adoption of Information Systems Security Measures." NSUWorks, 2009. http://nsuworks.nova.edu/hsbe_etd/49.

Full text
Abstract:
Companies are increasing their investment in technologies to enable better access to information and to gain a competitive advantage. Global competition is driving companies to reduce costs and enhance productivity, increasing their dependence on information technology. Information is a key asset within an organization and needs to be protected. Expanded connectivity and greater interdependence between companies and consumers has increased the damage potential of a security breach to a company's information systems. Improper unauthorized use of computer systems can create a devastating financial loss even to the point of causing the organization to go out of business. It is critically important to understand what causes users to understand, accept and to follow the organization's information systems security measures so that companies can realize the benefits of their technological investments. In the past several years, computer security breaches have stemmed from insider misuse and abuse of the information systems and non-compliance to the information systems security measures. The purpose of this study was to address the factors that affect employee acceptance of information systems security measures. The Technology Acceptance Model was extended and served as the theoretical framework for this study to examine the factors that affect employee adoption of information systems security measures. The research model included three independent dimensions, perceived ease of use, perceived usefulness and subjective norm. These constructs were hypothesized to predict intention to use information systems security measures, moderated by management support affecting subjective norm. Five hypotheses were posited. A questionnaire was developed to collect data from employees across multiple industry segments to test these hypotheses. Partial least squares statistical methodology was used to analyze the data and to test the hypotheses. The results of the statistical analysis supported three of the five hypotheses with subjective norm and management support showing the strongest effect on intention to use information systems security measures. Few studies have used TAM to study acceptance of systems in a mandatory environment and to specifically examine the employee acceptance of computer information systems security measures. This study, therefore, adds to the body of knowledge. Further, it provides important information for senior management and security professionals across multiple industries regarding the need to develop security policies and processes and to effectively communicate them throughout the organization and to design these measures to promote their use by employees in the organization.
APA, Harvard, Vancouver, ISO, and other styles
9

Zeng, Zili, Xin Hu, and Shuo Mei. "Factors affecting a Mobile Application’s Acceptance : An empirical study of user acceptance of WeChat in China." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-21650.

Full text
Abstract:
Along with the development of smart phones and smart phones operating systems, users of smart phones are able to install software, games and other programs provided by third-party providers. WeChat as a third party software that exists in the current market, is an in-stant messaging application that enables users to send voice, video, pictures and text to their contacts through mobile network. Being a new application, the user acceptance of WeChat has not been studied. Therefore, the result of this study will be valuable to fill the knowledge gap about user acceptance study of this mobile application, and future development of other similar instant messaging mobile application could also benefit from this study. This study focuses on WeChat users and answers to the following research questions: 1. What are the factors that affect the users‘ acceptance of WeChat? 2. How could other competing instant messaging applications improve their user acceptance? The purpose of this study is to explain factors that affect the users‘ acceptance of WeChat among WeChat users who are studying in one specific school and working in one specific company. This study adopts a deductive, theory testing approach. The research model was proposed through literature review and expert interview, and six hypotheses were developed based on the research model. A survey was conducted subsequently to collect quantitative data. Hypotheses were tested through analyzing the quantitative data by using SPSS. Through testing the hypotheses, this study concluded that effort expectancy, social influence, facilitating conditions, cost and privacy are the factors that could affect user acceptance of WeChat. Other similar IM mobile applications could take those identified factors as reference in further user acceptance study, and the proposed research model in this study could also help in improving understanding of user acceptance in similar IM mobile application study.
APA, Harvard, Vancouver, ISO, and other styles
10

Davis, Fred D. "A technology acceptance model for empirically testing new end-user information systems : theory and results." Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15192.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 1986.
MICROFICHE COPY AVAILABLE IN ARCHIVES AND DEWEY.
Bibliography: leaves 233-250.
by Fred D. Davis, Jr.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
11

Fesenmaier, Margaret Anna. "Permeating the wall: Transmitting knowledge remittances as a strategy for health information campaigns in The Republic of Moldova." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23307.

Full text
Abstract:
The Republic of Moldova is losing many of its citizens to more lucrative economic opportunities abroad.  Remittances from emigrants, in many various forms, have become vital agents in the Moldovan economy.  This thesis investigated whether remittance activity among immigrants from Moldova in the United States and Canada might be used as a model for an effective strategy to spread public health information amongst Moldovans.  Specifically, two studies examined whether remittance behavior among Moldovans living in The United States and Canada predicted their perceptions that a "knowledge remittance" strategy for public health information would be effective and their interest in participating in a knowledge remittance effort.  Grounded in the extended Technology Acceptance Model (TAM2), two studies evaluated the remittance relationship. Study 1, an exploratory online survey (n = 15), indicated that Moldovan immigrants living in the United States and Canada that have a generally positive attitude towards capital and knowledge remittances will tend to perceive the transmission of knowledge remittances as useful. There was tentative support for the correlation of perceived usefulness with the intention to remit knowledge.  Study 2 (n = 5) consisted of qualitative interviews and found that Moldovan immigrants living in the United States and Canada have access to the Internet and frequently use the technology to contact family in Moldova at home. Interviewees had a generally positive view of both capital and knowledge remittances, though they were in disagreement on the major health risks facing Moldova. The findings of these studies suggest that a remittance propagated health campaign is a possible resolution to poor health knowledge in Moldova.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
12

Mohammed, Abdurahman. "Evaluation of electronic prescribing system-User acceptance perspective." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-54165.

Full text
Abstract:
The use of Electronic Prescribing Systems (EPS) has significant potential role in improving patient safety and reducing adverse drug events. However, the introduction of these systems can have negative outcome on delivery of care if healthcare providers are not utilizing regularly and accept it. This study aims to explore paediatrician’s attitude towards electronic prescribing systems as well as understand the possible factors affecting user acceptance at tertiary care using the Technology Acceptance Model (TAM). A qualitative research methodology was applied. Semi-structured interviews were developed according to TAM model and used as primary source of collecting empirical data. Seven research participants were interviewed. The findings of this study had identified factors that are important for paediatrician’s acceptance of EPS systems. Although paediatricians are positive to the usefulness of EPS, it appears that there are some acceptance problems due to ease of use concerns and usability issues of the system. The acceptance of EPS can be improved by leveraging ease of use as well as enhancing training.
APA, Harvard, Vancouver, ISO, and other styles
13

Meli, Peggy. "PERSPECTIVES OF HEALTH INFORMATION MANAGEMENT FACULTY USE OF AN E-LEARNING LABORATORY AND TECHNOLOGY ACCEPTANCE." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4173.

Full text
Abstract:
"As the delivery of healthcare has become more sophisticated, scientific, and complex, the need for HIM (Health Information Management) professionals at all levels has increased, and the role and status of those managing these functions has increased accordingly." (AHIMA, September 24, 2007). Studies by the Institute of Medicine and others have found suboptimal technology use throughout the healthcare industry. The American Health Information Management Association (AHIMA) developed the e-HIM Virtual Lab (V-lab) to train students in the use of new technology applications in response to IOM findings. Faculty are the gatekeepers for use of instructional technology in educational settings. Many disciplines have evaluated instructional technology use by students. There are very few studies on faculty use of instructional technology. There are no published studies of the determinant factors influencing health information management (HIM) faculty use of instructional technology. Therefore, the purpose of this study is to evaluate the faculty's attitude and behavior toward the use of the V-lab instructional technology. A non-random one group pretest posttest design was used to test the hypothetical Instructional Perception -Technology Acceptance Model (IP- TAM) for faculty perceptions regarding system functionality, usability and technology acceptance. The Path Analysis determined the strongest construct indicators for intent to use the V-lab were Perceived Usefulness (PU), Perceived Ease Of Use (PEOU), System Functionality and Usability (SFU). These findings support the recommendation for a collaborative examination of the existing V-lab systems to improve utilization and success.
Ph.D.
Department of Educational Research, Technology and Leadership
Education
Education PhD
APA, Harvard, Vancouver, ISO, and other styles
14

Croll, Jasmine. "The impact of usability on clinician acceptance of a health information system." Queensland University of Technology, 2009. http://eprints.qut.edu.au/29973/.

Full text
Abstract:
The two longitudinal case studies that make up this dissertation sought to explain and predict the relationship between usability and clinician acceptance of a health information system. The overall aim of the research study was to determine what role usability plays in the acceptance or rejection of systems used by clinicians in a healthcare context. The focus was on the end users (the clinicians) rather than the views of the system designers and managers responsible for implementation and the clients of the clinicians. A mixed methods approach was adopted that drew on both qualitative and quantitative research methods. This study followed the implementation of a community health information system from early beginnings to its established practice. Users were drawn from different health service departments with distinctly different organisational cultures and attitudes to information and communication technology used in this context. This study provided evidence that a usability analysis in this context would not necessarily be valid when the users have prior reservations on acceptance. Investigation was made on the initial training and post-implementation support together with a study on the nature of the clinicians to determine factors that may influence their attitude. This research identified that acceptance of a system is not necessarily a measure of its quality, capability and usability, is influenced by the user’s attitude which is determined by outside factors, and the nature and quality of training. The need to recognise the limitations of the current methodologies for analysing usability and acceptance was explored to lay the foundations for further research.
APA, Harvard, Vancouver, ISO, and other styles
15

DeGennaro, Alfred Joseph. "Application of Multiple Intelligence Theory to an e-Learning Technology Acceptance Model." Cleveland State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=csu1273053153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Blue, Jon T. "Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology." VCU Scholars Compass, 2006. http://hdl.handle.net/10156/1543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Morris, Michael G., and Andrew Dillon. "The Influence of User Perceptions on Software Utilization: Application and Evaluation of a Theoretical Model of Technology Acceptance." IEEE, Inc, 1997. http://hdl.handle.net/10150/106206.

Full text
Abstract:
This paper presents and empirically evaluates a Technology Acceptance Model (TAM) which can serve as a simple to use, and cost-effective tool for evaluating applications and reliably predicting whether they will be accepted by users. After presenting TAM, the paper reports on a study designed to evaluate its effectiveness at predicting system use. In the study the researchers presented 76 novice users with an overview and hands-on demonstration of Netscape. Following this demonstration, data on user perceptions and attitudes about Netscape were gathered based on this initial exposure to the system. Follow up data was then gathered two weeks later to evaluate actual use of Netscape following the demonstration. Results suggest that TAM is an effective and cost effective tool for predicting end user acceptance of systems. Suggestions for future research and conclusions for both researchers and practitioners are offered.
APA, Harvard, Vancouver, ISO, and other styles
18

Monestime, Judith. "ICD-10-CM Implementation Strategies: An Application of the Technology Acceptance Model." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1909.

Full text
Abstract:
The United States is one of the last countries to transition to the 10th edition of the International Classification of Diseases (ICD-10) coding system. The move from the 35-year-old system, ICD-9, to ICD-10, represents a milestone in the transformation of the 21st century healthcare industry. All covered healthcare entities were mandated to use the ICD-10 system on October 1, 2015, to justify medical necessity, an essential component in determining whether a service is payable or not. Despite the promising outcomes of this shift, more than 70% of healthcare organizations identified concerns related to education efforts, including lack of best practices for the ICD-10 transition. Lack of preparation for the implementation of ICD-10 undermines the clinical, technological, operational, and financial processes of healthcare organizations. This study was an exploration of implementation strategies used to overcome barriers to transition to ICD-10. A single case study was conducted, grounded by the conceptual framework of the technology acceptance model, to learn about ways to mitigate the barriers of this new coding system. Data were gathered from the review of documents, observations, and semistructured interviews with 9 participants of a public healthcare organization in Florida. Data were coded to identify themes. Key themes that emerged from the study included (a) in-depth ICD-10 training, (b) the prevalence of ICD-10 cheat sheets, (c) lack of system readiness, and (d) perception of usefulness of job performance. The results of the study may contribute to social change by identifying successful implementation strategies to mitigate operational disruptions that will allow providers to capture more detailed health information about the severity of patients' conditions.
APA, Harvard, Vancouver, ISO, and other styles
19

El-Kordy, Manal Mohammed. "Understanding the utilisation of executive information systems using an integrated technology acceptance model : theoretical base and empirical validation." Thesis, City University London, 2000. http://openaccess.city.ac.uk/8107/.

Full text
Abstract:
Over the past decade, a growing number of organisations have been developing executive information systems (EIS) to enhance the performance of their executive managers and facilitate their work. Such systems cannot improve individual and organisational performance if they aren't used. Thus, understanding the key determinants of EIS utilisation is an essential step toward enhancing their impact on individual users and organisational performance. Numerous case studies and explorative surveys of EIS development and implementation have been conducted, but an extensive literature review has shown that theory-based systematic investigations of post implementation use of EIS are rare, especially in the UK. The study reported here developed and tested a model of EIS usage. The proposed model integrates key constructs from the information systems success factors research stream into the theoretical frame of the technology acceptance model and other theories from social psychology (the theory of reasoned action, the theory of planned behaviour, and the Triandis model of attitude and behaviour). According to the proposed model, EIS usage is determined by six independent variables, namely perceived usefulness, perceived ease of use, information quality, involvement, subjective norm and facilitating conditions. In turn, perceived usefulness is influenced by perceived ease of use, perceived information quality, user involvement, subjective norm, and facilitating conditions. User involvement, perceived information quality and perceived ease of use are determined by four external factors, namely, user participation, information systems maturity, computer training, and user experience. The model was tested against data from 216 EIS users across various organisations. The results provided considerable support to the research model. In order of importance, subjective norm, perceived usefulness, facilitating conditions, information quality, and ease of use were found to explain 47.1% of the variance in EIS use. User involvement, information quality, subjective norm, ease of use, and facilitating conditions were found to explain 47.6% of the variance in perceived usefulness. Length of EIS use and computer use skill were found to explain 9% of the variance in perceived ease of use. IS maturity and user participation were found to explain 11% of the variance in EIS information quality. Finally, user participation was found to explain 2.4% of the variance in involvement. Implications of the study findings for practitioners and researchers are outlined.
APA, Harvard, Vancouver, ISO, and other styles
20

Nassif, George T. "Cloud Computing Adoption in Afghanistan: A Quantitative Study Based on the Technology Acceptance Model." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7831.

Full text
Abstract:
Cloud computing emerged as an alternative to traditional in-house data centers that businesses can leverage to increase the operation agility and employees' productivity. IT solution architects are tasked with presenting to IT managers some analysis reflecting cloud computing adoption critical barriers and challenges. This quantitative correlational study established an enhanced technology acceptance model (TAM) with four external variables: perceived security (PeS), perceived privacy (PeP), perceived connectedness (PeN), and perceived complexity (PeC) as antecedents of perceived usefulness (PU) and perceived ease of use (PEoU) in a cloud computing context. Data collected from 125 participants, who responded to the invitation through an online survey focusing on Afghanistan's main cities Kabul, Mazar, and Herat. The analysis showed that PEoU was a predictor of the behavioral intention of cloud computing adoption, which is consistent with the TAM; PEoU with an R2 = .15 had a stronger influence than PU with an R2 = .023 on cloud computing behavior intention of adoption and use. PeN, PeS, and PeP significantly influenced the behavioral intentions of IT architects to adopt and use the technology. This study showed that PeC was not a significant barrier to cloud computing adoption in Afghanistan. By adopting cloud services, employees can have access to various tools that can help increase business productivity and contribute to improving the work environment. Cloud services, as an alternative solution to home data centers, can help businesses reduce power consumption and consecutively decrease in carbon dioxide emissions due to less power demand.
APA, Harvard, Vancouver, ISO, and other styles
21

Sandema-Sombe, Christina Ndiwa. "Relationship Between Perceived Usefulness, Ease of Use, and Acceptance of Business Intelligence Systems." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7736.

Full text
Abstract:
In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. A 9-question survey was used to collect data from end-users of BIS in strategic managerial positions from retail organizations in the eastern United States who reported using BIS within the past 5 years. A total of 106 complete survey responses were collected and analyzed using multiple linear regression and Pearson’s product-moment correlation. The results of the multiple linear regression indicated the model’s ability to predict user acceptance, F(2,103) = 21.903, p < .000, R2 = 0.298. In addition, PU was a statistically significant predictor of user acceptance (t = -3.947, p = .000), which decreased with time as shown by the results from Pearson’s product-moment correlation, r = -.540, n = 106, p < .01. The implications of this study for positive social change include the potential for business leaders to leverage BIS in addressing the underlying causes of social and economic challenges in the communities they serve.
APA, Harvard, Vancouver, ISO, and other styles
22

Wiley-Patton, Sonja. "A test of the Extended Technology Acceptance Model for understanding the Internet adoption behavior of physicians." Thesis, University of Hawaii at Manoa, 2002. http://hdl.handle.net/10125/3046.

Full text
Abstract:
Information technology (IT) has become pervasive in the healthcare industry. Many view the Internet as a strategic healthcare tool. The Medical Records Institute suggests that Internet-based health applications (IHA), for example, electronic health records, e-prescribing, and mobile health are the goals of most healthcare organizations (2002). The use of the Internet for electronic medical records, e-billing and patient scheduling can enable the health care industry to reduce its inefficiencies and errors in care delivery (HlMSS/IBM Leadership Survey, 2000). While the use of IT in healthcare has increased tremendously, key players, specifically physicians still have not fully embraced the valuable resource of the Internet. Despite the purported advantages of lT investments in healthcare many doctors do not widely use Internet-based health applications in their clinical practices. Physicians often misunderstand the functions and full potential of the Internet (Wang & Song, 1997). Health & Health Care 20 I0 report that less than 5% of physicians use computers to record all clinical information for an average patient. The present study examined physicians' intentions to adopt Internet-based health applications for use in their clinical practices. This research reports on the test-retest reliability of the extended Technology Acceptance Model-TAM2 (Venkatesh & Davis, 2000). Data were collected from a survey of pediatricians to evaluate the effectiveness and appropriateness of the model in the medical environment. Results from the study indicate that TAM2 is appropriate but not completely applicable to the unique characteristic of physicians. The test-retest indicated reliable results with the exception of the result demonstrability construct. The results of multiple regression analyses indicated that perceived ease of use was not significant in predicting physicians' behavioral intentions in this study. As theorized the primary predictor variable perceived usefulness was a strong determinant of intention to use. Results indicate that physicians tend to be pragmatic in their IT acceptance decisions. Physicians focus more on the technology's usefulness rather than its ease of use. This dissertation discusses the implications, limitations and presents possible explanations for the inconsistencies within the extended technology acceptance model when it is applied to a professional group not commonly examined in IS research.
Thesis (Ph. D.)--University of Hawaii at Manoa, 2002.
Includes bibliographical references (leaves 168-180).
Mode of access: World Wide Web.
Also available by subscription via World Wide Web
xv, 180 leaves, bound ill. 29 cm
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Shijing. "Technology Acceptance Model for Determining the Effects of Age, Usability, and Content on Mobile Application Usage." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1339700970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Alrafi, Aziz. "The technology acceptance model : a critical analysis with reference to the managerial use of information and communication technology (ICT)." Thesis, Leeds Beckett University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485453.

Full text
Abstract:
Studying how individuals accept new computer systems is one of the main issues in information systems research. Organisations need to develop and implement information and communication technology systems successfully. Successful implementation of any system depends op, its acceptance and use by potential users. This thesis investigates how managers make their decisions towards new information and communication technology systems. It is a new extension to the technology acceptance model, which includes new factors which have direct and indirect influence on managers' decisions to use new technology. The thesis pursues an answer for the research question 'what factors affect managers' decisions to accept or reject a new information and communication technology system?' This research adds more constructs to the original technology acceptance model which are adapted from the theory of reasoned action, the theory of planned behaviour and other information systems development theories such as user participation, user interface design and management support. This research adopts action research, case study and web survey methods to test the 22 hypotheses. The results confirm the new extended technology acceptance model which is an addition to the literature of computer systems adoption.
APA, Harvard, Vancouver, ISO, and other styles
25

Csonka, Kamilla. "Användaracceptans vid systemimplementering." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20389.

Full text
Abstract:
Användaracceptans är en viktig del i alla systemutvecklingsprojekt och är också en väldigt lättpåverkad variabel för en lyckad implementering. Därför är det viktigt att ha översikt på sådana faktorer som kan påverka användaracceptansen negativt, en sådan faktor är försening. Denna uppsats belyser sammanhanget mellan hur en försening påverkar användaracceptansen. Genom att låta en undersökningsgrupp genomgå en enkät utformad efter Technology Acceptance Model har jag samlat upp en generaliserad åsikt. Resultaten visar att försening som variabel inte påverkar användaracceptansen för fallstudien.
User acceptance is an important part of all system development projects and is also a very easily influenced variable for a successful implementation. That is why it is important to have an overview of those factors that could influence the user acceptance negatively, one of those factors being delay. This thesis highlights the cohesion between a delayed project and its influence over the user acceptance. By letting a study group answer a survey formed by the Technology Acceptance Model, I have gathered the generalized opinion of the group. The results show that delay as a variable does not influence the user acceptance of this case study.
APA, Harvard, Vancouver, ISO, and other styles
26

Reid, Michael Hubert. "Integrating Trust and Computer Self-Efficacy into the Technology Acceptance Model: Their Impact on Customers' Use of Banking Information Systems in Jamaica." NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/283.

Full text
Abstract:
In recent times, there has been a rapid increase in technological initiatives to promote electronic commerce. Delivery of services via the Internet or other remote computing technology now represents the trend for most organizations. In keeping with market trends, the banking industry in Jamaica and other countries worldwide have also adapted a variety of technological initiatives to enhance the delivery of services to remote customers. As these trends continue, there is heightened interest in information systems (IS) research to understand the factors that motivate or encourage individuals to use these technologies. This situation exists because interactions in these environments are significantly different from the traditional face to face settings. The original Technology Acceptance Model (TAM) has long been studied, modified, and extended by IS researchers as a classical model for understanding individual's intention to use (IU) an IS. According to TAM, IU an IS is based on two constructs: perceived ease of use (PEOU) and perceived usefulness (PU). Researchers have identified other factors such as trust (TRST) and computer self-efficacy (CSE) that impact an individual's IU an IS. In this predictive study, the researcher examined the integration of TRST and CSE into TAM and their overall impact on customers' intentions to use banking information systems (BIS) in Jamaica. A 32-item Web-based survey instrument was used to collect data from 374 customers of three major banks in Jamaica. A revised TAM model was proposed and SPSS's AMOS 7.0 statistical package was used to perform data analysis and model fit testing based on structural equation modeling (SEM). Results showed that while CSE did not significantly predict TRST and PEOU, it significantly predicted PU. Additionally, TRST significantly predicted both PEOU and PU, and PEOU positively predicted PU and attitude (ATT) towards BIS. Furthermore, PU was a significant predictor of ATT and IU, and ATT significantly impacted IU. The findings also revealed that only TRST varied significantly across males and females and the original TAM had a slightly better fit than the revised TAM. The research laid the foundation for future exploratory studies of TAM in specialized contexts such as BIS in Jamaica.
APA, Harvard, Vancouver, ISO, and other styles
27

Zeneli, Egzona. "Hur påverkas du av dina kollegor? : En kvalitativ studie om socialt inflytande vid accepterande av ny teknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17449.

Full text
Abstract:
Problematiska delen som organisationer har är att veta hur man på bästa sätt ska implementera nya teknologier. Teknologiacceptans blev en känd term av den mest applicerade teoretiska modellen inom informationssystem Technology acceptance model – TAM. Teknologiacceptans innebär det positiva beslutet att använda sig av en teknologi och inom denna studie kommer fokus ligga på socialt inflytande inom teknologiacceptans. Socialt inflytande innebär mellanmänsklig övervägande faktor vid beslut, vilket tar hänsyn till att beslutet att acceptera ny teknologi görs oftast tillsammans i grupp eller hur individens beslut gör så att de passar in i gruppen eller hur beslutet påverkar andra personer. En undersökning gjordes för att undersöka följande frågeställning: Hur påverkar socialt inflytande teknologiacceptansen för obligatoriska system? Frågan har undersökt genom en enkät som användes för att få en överblick i problemområdet vilket sedan blev grunden för intervjufrågorna. Totalt deltog 12 stycken personer inom enkäten och 4 stycken inom intervjun. Sammanfattningen av resultatet bildades rekommendationer som organisationer kan tänka på innan de påbörjar införandet av ny teknologi inom organisationen.
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Bo, and Zili Zeng. "ERP Usage in Practice : Understanding End-Users ‘Acceptance of ERP Systems in Chinese large companies by applying UTAUT model." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18637.

Full text
Abstract:
Introduction: The Enterprise  Resource  Planning system is  an  emerging  technology  that belongs to the scientific discipline of information systems. In simple words the ERP system integrates an organization’s resources and also involves business processes and organiza-tional changes. With the ubiquitous growth of IS investment, ERP systems implementation grows strongly. More and more companies introduced ERP systems. However many ERP implementation success stays at technical perspective. Users’ acceptance of ERP system is the key to the ERP implementation. Purpose: The purpose of this study is to investigate and research factors that have affected the  end-users’ acceptance of the ERP  system  during  post-implementation  phase  of  the ERP implantation lifecycle. Method: In  order  to  understand the ERP  system  acceptance  in practices,  this  study  will collect data from two Chinese companies. Employees from two Chinese companies will be selected as  target  group  for  user  acceptance research.  With the  analysis  of  collected  data, user acceptance of the ERP system in those two Chinese companies will be studied. Inter-views and questionnaire are used in this study. This study will interview with ERP export and  generate  the  factors that could  have possible affected users’ acceptance. Hypotheses will  be  deduced by  those  factors. Based  on  the  primary  data  of questionnaires regression analysis is used to test those hypotheses to identify those factors.  Results: Research results show the factors that influence end-user acceptance of the ERP system. The factors are: Business process adoption, ERP system performance, ERP com-munication, ERP  functionality, Computer nervousness, Technological  innovation, Social impact and support, ERP support. Organizations need to pay attention to those important factors in order to improve the ERP system acceptance among end-users.
APA, Harvard, Vancouver, ISO, and other styles
29

Harmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.

Full text
Abstract:
Cloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secure access methods to protect data on the cloud infrastructure. The population for this study was cloud security managers employed by 2 medium size businesses in the Atlanta, Georgia metropolitan area and that have strategies to implement secure access methods to protect data on the cloud infrastructure. The technology acceptance model was used as the conceptual framework for the study. Data were collected from semi-structured interviews of 7 security managers and review of 21 archived documents that reflected security strategies from past security issues that occurred. Data analysis was performed using methodological triangulation and resulted in the identification of three major themes: implementing security policies, implementing strong authentication methods, and implementing strong access control methods. The findings from this research may contribute to positive social by decreasing customers' concerns regarding personal information that is stored on the cloud being compromised.
APA, Harvard, Vancouver, ISO, and other styles
30

Lien, Ching-Hao, and 連清皓. "A study of Information Security under Technology Acceptance Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/27936473190950608316.

Full text
Abstract:
碩士
建國科技大學
自動化工程系暨機電光系統研究所
103
Abstract This study uses theoretical elements of technology acceptance model and secondary literature method to explore personal, relevant policy organizations, defense organizations tripartite using in smart phones (handheld device), and its information security. According to technology acceptance model, intention of the user's use of technology, the perceived usefulness and perceived ease of use of the effect of combination, if the user perception to the new technology is useful, the use of new technology can help improve work efficiency but also feel new technology which is easy to use. There is a higher chance to use smart phones. But information security attendant risks, but by individuals and organizations need to change individual habits and build the organization's overall information security policy, conduct risk control and prevention. The findings are as follows: 1) Personal dependence for smart phones and use habits, will determine the safety of personal information protection. 2) Traditional organizational information security policies must be implemented in order to achieve the BYOD trend. 3) Defense organizations under the influence of various factors, the information security management system implementation ineffective. Follow the full functionality of the smart phone used within the defense organization, still has a long-term need to break away. 4) Finally, the study findings are based on information security issues individuals, organizations, and defense organizations triggered by the smart phone made substantive recommendations.
APA, Harvard, Vancouver, ISO, and other styles
31

Chang, Chih Hung, and 張志弘. "Innovation location based information service technology acceptance model analyze." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/30875533496011449598.

Full text
Abstract:
碩士
長庚大學
資訊管理學系
98
Abstract Overview of the global positioning information services (LBS, Location-Based Service) technology used is becoming more mature, to actively promote navigation related services. Recently, the international mobile phone manufacturers have also introduced several GPS navigation mobile phone. Domestic carriers are also launching "GPS real-time information services" to mobile phones with GPS navigation so people do not check the map before leaving. Built-in mobile positioning services for smart phones is the personal guide, not only to guide the right path, even through mobile phones, collecting in the vicinity of food, fun, finance, hospitals and other landmarks of information, I believe the future will greatly enhance the location information service users. But for the positioning of information services over emphasize the technical, industrial and, as well as strategies face, in the user level, almost no relevant research. In this study, "Integrated Technology Acceptance Model (Unified Theory of Acceptance and Use of Technology / UTAUT" Venkatesh et al., (2003) as the main, as mobile phone users in innovation Location information services accepted hypothetical model behaviors, this study design the questionnaire conducted by the structural equation model fit of the model assumptions and the revised test pattern. After correction mode and interviews with experts to further understand the impact of mobile phone users to locate information service for innovation Acceptance of the main factors in order to provide domestic telecommunications services operators, the competent authorities and positioning, to improve and build the future positioning of the reference information system. Abstract Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT)、Location-Based Service(LBS)、Web 2.0、 Global Positioning System (GPS)
APA, Harvard, Vancouver, ISO, and other styles
32

CHIEN, Chao-Kun, and 簡兆堃. "An Empirical Study of Nursing Information System Using Technology Acceptance Model and Information System Success Model." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/06215391370599889652.

Full text
Abstract:
碩士
大葉大學
工業工程與科技管理學系
97
At present among research to attend to nursing information system, mostly qualitative description; however, it is lack for quantify way build and construct comparatively, and also for the development of information system at present rapidly and progress of medical science and technology… etc. All questions of the timeliness are subjects faced at present. This research is with DeLone & McLean (2003) information systems forward succeed in regarding systematic quality, service quality and information quality. We called these are outside parameter. Venkatesh & Davis (2000) science and technology after the revision with three literary composition surface cognition getting useful, cognitive ease of use and suitable for attending to the related way to exercise. And by using the relevant literature discussion of the purpose, the basis designed as the questionnaire. Moreover, it also goes on as the respondent to nursing staff of regional hospital, attending to a executive. By way of questionnaire investigation, materials retrieve, count with SPSS software carry on sample analysis, prove and analyze the structural equation model in Amos. Analyze the result of study found the purpose of nursing information system, it is positive for whole structure and brings with system user operate getting easy influence for being most among them. It would improve the effect of studying, systematic stability, maintenance service and exactness that system offer of timeliness of quality can influence user purpose of using too. In addition, constructing and attending to the nursing information system at present, with linking up simple and easy and personnel that are designed. Key word: Information system succeeds model, Technology Accepting Model, Nursing Information System.
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Jui-Yang, and 李瑞陽. "A Study on Technology Acceptance Model of Management Information System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/buc98p.

Full text
Abstract:
碩士
國立中山大學
企業管理學系研究所
96
Abstract Most enterprises reinforce themselves with the Management Information System and the intranet to get information promptly and also the internet to enhance the relationships with customers as one of the most important strategies to survive in the competitive environment. The key success factors of Management Information System are mature system planning, friendly design for users, and end user’s participation, which is recognized as the most crucial factor of the above. Therefore, how to evaluate end user’s satisfaction and acceptance on the Management Information System becomes the most interesting topic for the managers. This study explores the technology acceptance of the end users of Shop Information System from the model of TAM2 (Technology Acceptance Model II). And its purpose is to find the influent factors of Intention to Use and Use Behavior of the end users of Shop Information System. The managers can carry out or improve the MIS according to this study. After the research, this study indicates that there are four components that influenced the degree of acceptance of technology, included the Usefulness of system, the result demonstrability; the ease of use, and ought to use or not. Different factors under several conditions in demography significantly influence the intention of users. The managers can improve the management information system according to the finding of this study.
APA, Harvard, Vancouver, ISO, and other styles
34

Yang, Sung-kwan. "Teachers' perception of use of student performance information: technology acceptance model." Thesis, 2003. http://hdl.handle.net/2152/1119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Yang, Sung-kwan Scribner Jay D. "Teachers' perception of use of student performance information technology acceptance model /." 2003. http://wwwlib.umi.com/cr/utexas/fullcit?p3126148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wu, Ya-Hui, and 吳雅惠. "Apply Technology Acceptance Model to Explore Effectiveness of Nursing Information System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/80806294186478633251.

Full text
Abstract:
碩士
嘉南藥理科技大學
醫務管理系
101
Because of the development of electronic medical record and constant lackness of nursing workforce, there are more and more medical institutes build their own nurse information system (NIS). The system expects to provide nurses a platform they can utilize during their day-to-day clinical care activities. The goal of using NIS intends to mitigate the burden of nurses during their medical records writing, improve their care quality, and to promote patient safety. In any hospital, not only are most of the medical professionals nurses, but they are also the direct care providers to patients. Therefore, their participations and standpoints play a key role when to evaluate and implement the nurse information system. The purpose of this study is to investigate the effectiveness of implementing NIS, and to discuss several issues affecting a successful deployment from the perspectives of nurses who are the major users of the information system. The methodology is based on the theory of Technology Acceptance Model, TAM. The researcher adopted a Cross-Sectional study method for survey and data collection. 167 questionnaires were handed out to subjects. 158 valid questionnaires, about 94.6 percent were collected, and these data were analyzed by using software including SPSS and PLS. The data analysis depicts that the most significant factors that influence the willingness of nurses to use NIS are their degrees of satisfaction and their usefulness perceptions towards the system. A nurse information system being able to provide functions that lead to characteristics such as usefulness and convenience, avoidance of tedious repeat writing, and improvement of care quality will make nurses feel satisfied about the system and thus stimulate their interests in using NIS on their work. Item analysis revealed that nurses asked very willing to learn and use care information systems, and can be trained to operate him. This result can be used as hospital managers to understand nurses' willingness to use nursing information systems, and can also be served as references for future development of similar information system in the hospital.
APA, Harvard, Vancouver, ISO, and other styles
37

Kuo, Chia-Wei, and 郭嘉偉. "Understanding and predicting information security outsourcing services of firms’ acceptance: An extension of extended outsourcing acceptance model." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/57826500086720633735.

Full text
Abstract:
碩士
國立高雄應用科技大學
資訊管理研究所碩士班
96
To date, information security is essential for most firms. Researchers have traced recent implementation failures to a lack of professionals and techniques of information security. Therefore, firms are shifted to consider using information security outsourcing. Yet, information security outsourcing is likely to meet some problems that result in many firms do not know whether to accept information security outsourcing. Therefore, this study will explore the impact factors of information security outsourcing services of firms’ acceptance. In this study, by applying the extended outsourcing acceptance model (EOAM), transaction cost theory (TCT), and technology readiness (TR), we proposed an information security outsourcing acceptance model (ISOAM) and took an extended perspective to explain this issue. We designed a questionnaire to survey decision-makers who have the power to make decisions or outsourcing staffs. In a questionnaire, we analyzed the data using structured equation modeling (SEM) to test the strength of the hypothesized relationships, if any, among the constructs, which include transaction cost, prior outsourcing relationship and technology readiness as independent variables, perceived usefulness, perceived risks and attitude of information security outsourcing as intervening variables, and intention to accept information security outsourcing as the dependent variable. The result provided support of ISOAM and confirmed its robustness in predicting decision-makers intention to accept information security outsourcing services. This study contributes the literature to follow by formulating and validating ISOAM to predict information security outsourcing services, and its findings provide useful information for firms or vendors to draw up in strategies of information security outsourcing. Implications for theory and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
38

曾上亭. "Technology Acceptance Model of E-Learning Case of Chinese and Taiwan information." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/28790075868453081619.

Full text
Abstract:
碩士
中國文化大學
資訊管理研究所
91
As the Internet of global is glooming in today’s information age, Web-based Learning is the trend of modern distance education development. There is difference between face-to-face learning and learning on World Wide Web. The web-based learning system creates an interactive learning environment, which includes a lot of rich information and managed knowledge. This study empirically examines TAM model reported by Davis, F D in 1989,the relationship between E-Learning intensity and the Perceived usefulness and Perceived ease of use . The effective of professional characteristic and organization attitude to E-Learning intensity and the Perceived usefulness and Perceived ease of use is concerned and discussed. Compared with Taiwan and Mainland China information professional the difference. Based on the questionnaires, the paper analysis the difference of professional characteristics of Taiwan and Mainland China .Compared with Taiwan and Mainland China information professional, the professional in China take less time in browsing Internet, and they are usually more competitive and less loyalty. the professional in Taiwan takes more interest in learning on WWW. It can be concluded that better computer-efficiency and self-expected can promote the professional to accept the way of Web-based learning, and the Web-based learning can enhance one’s learning ability or not would be discussed in the future.
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Jing-Wen, and 陳敬文. "Investigating the Intention of e-Portfolio Usage Combining Information System Success Model with Technology Acceptance Model." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/ypp68p.

Full text
Abstract:
碩士
臺中技術學院
資訊科技與應用研究所
98
Information Technology (IT) application has become popular in the modern generation. Almost every enterprise establishes the information system to improve its production or service depending on its organization needs. But the investment on IT increases yearly and do not bring reciprocal income. One of the reasons is the degree of the employees’ acceptance toward information science and technology is not high enough, and the enterprise performance is not highly influence by IT. Therefore, to understand and to consider the factor of new science and technology usage and to implement the successful and satisfactory information system seems to be very important. Similarly, it has been a worldwide focus on applying IT to the learning domain, and a principal educational policy on integrating IT with teaching. Many schools have been integrated into an e-Portfolio which has been used as the tool of teaching innovation in teaching and evaluation. The main purpose of this research is to carry on investigating analysis and to inquire into student''s usage attitude, user''s satisfaction and usage intention for "e-Portfolio” based on Information System Success Model and TAM. According to the research object, students of different back ground use e-Portfolio, which holds discrepancy and correlation of student’s usage attitude will help development and popular usage of e-Portfolio in the school and make teacher and student reach the reference of the object of e-Portfolio application of the learning process.
APA, Harvard, Vancouver, ISO, and other styles
40

Hung, Min-chi, and 洪明奇. "The Study of Supply Chain Management Information System Adoption in Technology Acceptance Model." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/17983372175952524689.

Full text
Abstract:
碩士
國立中正大學
資訊管理學系
90
Now in this business environment full of fierce globalization competition, the contest between each company has had the changeover from simple competition between manufacturers to supply chains; owing to the progress in leaps and bounds of information technology, and the rapid development of internet and E-commerce, using information technology to manage such complicated supply chain activities has become the weapon for each enterprise to create competitive advantage. We used to focus on the technical part of this supply chain technology information research, and pay not much attention to the study of the effect of intentions of enterprises’ ideas adoptions, but for supply chain information technology which would results in broad-spectrum effect, the value of studying the effect of such intentions is not second to technical part research. This research combines three dimensions of factors from the research of “transaction environment”, “organizational factors”, “system supply side”, and use Technology Acceptance Model (TAM) as a basis to construct the research model and research hypothesis. We take first 1,000 manufacturing enterprises in Taiwan as sampling frame of potential respondents, and mail questionnaires to them to proceed research as empirical study in order to probe the affecting factors of enterprises’ supply chain management system cognition and adoption intention effects. Research result reveals that when a company is in a “ highly competitive, uncertain, and mutual-trust integrating ” transaction environment , this company would have better idea of perceived usefulness of supply chain management information technology and adoption intention than one in a “lowly competitive, steady and loose-linked “ transaction environment; as last we use structural equation modeling(SEM) to verify the causal relationship between each latent variable in research model, and result shows that adoption intention of supply chain management related information technology of each enterprise is mainly affected by “perceived usefulness” and “firm size”, and the effect of “perceived ease of use” and “ adoption intention” is not significant; ”perceived usefulness” is affected by ”perceived ease of use”, “information technology infrastructure”, ” transaction climate”; ”top management support”; “perceived ease of use” is affected by “system vendor’s reputation”, “information technology infrastructure”, ”consultant support”, “transaction climate”, “product complexity” and “cost”.
APA, Harvard, Vancouver, ISO, and other styles
41

Kripanont, Napaporn. "Examining a technology acceptance model of internet usage by academics within Thai business schools." 2007. http://eprints.vu.edu.au/1512/1/Kripanont.pdf.

Full text
Abstract:
Information Technology has been a significant research area for some time, but its nature has changed considerably since the Internet became prominent just over a decade ago. Many researchers have studied and proposed theories and models of technology acceptance in order to predict and explain user behaviour with technology to account for rapid change in both technologies and their environments. Each theory or model has been proposed with different sets of determinants and moderators and most of them have been developed in the U.S. It is therefore questioned whether the theories and models of technology acceptance that have been developed, modified, and extended in the U.S. can be used in other countries, especially in Thailand. It is also questioned whether there might be other determinants and moderators that also play important roles in this specific environment. This thesis (1) reviewed literature in respect of nine prominent theories and models, (2) reviewed previous literature about IT acceptance and usage within four contexts of study, (3) investigated the extent to which academics use and intend to use the Internet in their work, (4) investigated how to motivate academics to make full use of the Internet in their work, (5) investigated to what extent using the Internet helps in improving academics’ professional practice, professional development and quality of working life, (6) formulated a research model of technology acceptance regarding Internet usage by Thai academics, and (7) generated and validated the research model that best describes Thai academics’ Internet usage behaviour and behaviour intention. These last two objectives represent the main focus of the thesis. Questionnaire survey method was used to collect primary data from 927 academics within Business Schools in 20 Public Universities in Thailand. The survey yielded 455 usable questionnaires, with a response rate of 49%. Statistical analysis methods and Structural Equation Modelling with AMOS version 6.0 were used to analyse data. The research model was formulated with five core determinants of usage and up to nine moderators of key relationships. It was then tested and modified, the final modified model evidenced by goodness of fit of the model to the data, explained 31.6% (Square Multiple Correlation) of the variance in usage behaviour in teaching , 42.6% in usage behaviour in other tasks, 55.7% in behaviour intention in teaching and 59.8% in behaviour intention in other tasks. From the findings, three core determinants: perceived usefulness, perceived ease of use and self-efficacy significantly determined usage behaviour in teaching. Two core determinants: perceived usefulness and self-efficacy significantly determined usage behaviour in other tasks. Finally, usage behaviour significantly influenced behaviour intention. In addition three moderators: age, e-university plan and level of reading and writing, impacted the influence of key determinants toward usage behaviour. Only two moderators: age and research university plan, impacted the influence of usage behaviour toward behaviour intention. The rest including gender, education level, academic position, experience and Thai language usage did not impact the influence of the key determinants toward usage behaviour and did not impact the influence of usage behaviour toward behaviour intention. Consequently, the final modified research model which is called the “Internet Acceptance Model” or “IAM” has the power to explain and predict user behaviour in a Thai Business Schools environment. A thorough understanding of the model may help practitioners to analyse the reasons for resistance toward the technology and also help them to take efficient measures to improve user acceptance and usage of the technology.
APA, Harvard, Vancouver, ISO, and other styles
42

Lin, Yi-Hsiu, and 林毅修. "An exploration of technology acceptance model in information security - A case study of the Taxation Reform Information System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/74140488047273519917.

Full text
Abstract:
碩士
國立臺灣大學
商學研究所
100
Despite the fact that information security systems have become more effective and user-friendly, they still can’t effectively appeal to user for smoothly and effective use. In part, it is due to the complexity of the system and unpredictable nature of security events and caused impact. This study aims at exploring the impact of human factors on the adoption of information security system as an attempt to provide a holistic viewpoint into the deployment of information security system. The case of National Taxation Information System in Taiwan was examined. In this system, around 17.6 billions tax payers information are processed annually and the information handling are under strict regulation for the protection of data and personal information privacy. By combining technology acceptance model and big five personality traits, a research model is proposed in which the personality traits are regarded as moderator to the system acceptance. More than a hundred of users at the tax bureau participated in the survey study. The results indicate that perceived usefulness and ease of use significantly affect the user’s behavior intention. Several personalities did play the role in moderating the user’s behavior intention on the use of information security system.
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Chung-Han, and 李宗翰. "The Extension of Post Acceptance Model: An Empirical Study of Highway Disaster Information System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/46781548158396807941.

Full text
Abstract:
碩士
大同大學
資訊經營學系(所)
100
To promote all levels of disaster relief operations, each government planned to build the disaster information system. Most previous research related to information systems into most users’ satisfaction and willingness as a basis on expectation confirmation theory (ECT). In this study, we extended the post acceptance model (PAM) which was extended from ECT, with information quality, system quality and service quality. According the user experiences of the Highway Administration of Disaster, we collected the feedback by questionnaires. This study adopted partial least squares to analyze the proposed research model, to explore the impact between the various dimensions. Finally, we proposed the managerial implication and discussion for the design guidelines of disaster information system.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Kuen-yuan, and 陳焜元. "Research of User Participatin in Public Management Information System───Testing of Technology Acceptance Model." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57016378053457420548.

Full text
Abstract:
碩士
國立政治大學
公共行政學系
84
Osborne & Gaebler在所著的「新政府運動」( Reinventing G-overnment )一書中,曾引述戴明( W. D. Deming ) 博士所倡導的「全面品質管理 」( Total Quality Management )概念指出:員工的參與才能有效的解 決問題,因為員工最了解制度,而且最清楚癥結所在。這樣的提示,雖早 被管理者重視且廣泛地運用在組織活動的設計範疇中,不過,就參與效能 的評估與改善,仍有不少值得再予強調的課題。本研究既係依此觀點,藉 由檢視使用者參與行政管理資訊系統發展過程之現象,提供一個思索的空 間。整體研究架構,以檢證Davis 所提出的技術接受性模式為基準,同時 透過此一模式了解使用者參與在系統使用行為上造成模糊結果的原因,進 而提醒行政管理者,在系統發展或執行過程,勿陷入以效率掛帥的功能主 義典範窠臼,對於溝通、平等與尊重等新人性主義典範所揭示的概念應予 適度關注。也就是說,在民主的工作環境下,應將本身視為組織生活的目 的,而非僅有工具性價值;參與效能的評估不僅須針對「結果」而且應顧 及「過程」。在上述要旨下,關於研究實體部分,經就文獻分析、實證調 查結果的發現與筆者實務經驗,提出以下結論與建議:一、技術接受性模 式,尚可適度詮釋國內行政管理資訊系統使用者的使用行為。惟其適用的 分析情境、態度與行為關係之假定,仍有再作深入探究之必要。二、參與 及系統使用行為關係之研究,不僅可透過置入中介變項的權變研究觀點來 了解,分析使用者在這二行為間的心理歷程,對於改善參與效能而言,亦 是一種可行的途徑。三、使用者對系統有用性及簡易性的認知,是影響系 統使用態度、意向及行為的二大要素。其中有用性的認知更具決定性地位 。四、使用者參與效能的模糊結果,除了源於理論欠紮實、研究模式過於 簡化,以及研究方法上的瑕疵以外,研究上未仔細區辨系統使用情境之差 異亦為主因。不過,參與究非萬靈丹,無定論的結果,並不代表即是一種 錯誤。五、參與效能的改善,除了管理當局的支持與專家協助以外,有賴 從加強系統發展者與使用者的教育訓練著手。六、自主性的系統使用情境 下,使用行為( 頻率 )始能較正確地詮釋使用者接受程度。七、未來應重 視以系統發展者與使用者互動作為分析單元的研究。至於在行政管理實務 上,本研究所欲表達的主要意念是:員工的參與及評估的步驟是缺一不可 的。因為,沒有評估的參與,則參與無法發揮實際的效果,充其量僅具象 徵性的價值;而僅有評估卻無參與活動,這樣的評估除了可能是膚淺、不 切實際以外,在實務上存在的機率亦不大。公部門的決策及管理階層,面 對高度層級節制的組織文化,能否擺脫「官大學問大」心態,而以恢宏的 胸襟與氣度,善用與因應來自員工的意見,塑造具有參與效能的情境,將 是成功地推展各項事務最基本的前提要件。
APA, Harvard, Vancouver, ISO, and other styles
45

Hung, Chun-Huo, and 洪誜謋. "A Study of Air Logistics System Integratedly Technology Acceptance And Information System Success Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7tb635.

Full text
Abstract:
碩士
樹德科技大學
資訊管理系碩士班
103
To enhance the competition of China''s military, the Defense of Ministry tried to promote the establishment of professional military services and information technology management. Coupled with the continuous evolution of computer technology, the applications and development of information systems in the management has also reached the goal of breakthrough, which can be the key factor to effectively control of the use of IT in the national army. Then, the information system is thought to increase productivity , improve decision-making and an to be essential element of competition in the market. The reliability and increasing of "back-up security of information systems'' , which is an quite expensive resource for the Air Force. It implied the increasing costs by time. After the Air Force inputs lot of money and manpower to build "back up security information systems," the high management level officers want to know whether the operation of information system can achieve the desired performance, which can be considered as continued investment or sophisticated reference. The study, which applied the Technology Acceptance Model (TAM) binding Revised Technology Acceptance Model (TAM 2) and Information Systems Success Model , explore the willingness to use the Air Force logistics support staff complement of security information systems and whether can bring an organization to enhance performance. The subjects of the study includes security logistics information systems users, questionnaire distribution is from 18 March 2015 to 20 April 2015, and the number of 493 valid samples using SPSS19.0 statistical software to analyze whether significant affects on the following factors among subjective norm, job-related, system quality, service quality, information quality, perceived usefulness, perceived ease of use , and organizational performance. The hypotheses, except "system quality" of supporting staff on the "perceived usefulness" and H9 "quality of service" for the supporting staff on the "perceived usefulness" was not significantly supported , the others are significantly positive, indicating that the use of logistics information system security patch, the display at the Air Force Air Logistics supporting staff complement insurance information system, will be affected by colleagues or superior. The system quality, service quality, information quality, three dimensions, have a direct impact on perceived usefulness and perceived ease of us.
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Mei-Yan, and 李美燕. "The Technology Acceptance Model in Assessment of Networking Management Systems for Military Information Administrators." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/24179387507738109226.

Full text
Abstract:
碩士
中原大學
資訊管理研究所
103
With the development of the Internet, the networking management system is experiencing rapid growth. It was expected that the networking management system has offered avenue to enhance Working efficiency and performance. The use of the network management systems control feature that allows companies to maintain the network environment stability and security of the state. The purpose of this study is to evaluate the effectiveness of networking management system applied in military information administrators. This research combines the DeLone and McLean’s Information System Success Model (IS Success Model) and Davis’s Technology Acceptance Model (TAM), and adds four research variables, information quality, organization support, Personal characteristics and Tasks feature interactivity to propose a new hybrid technology acceptance model to study military information administrators’ satisfaction and behavioral intentions to use the networking management system. Data were collected from 150 military information administrators who were registered or have the using experience of the system in the military. This research has adopted multiple regression analysis for its data analysis to study the causalities among all parameters constructed in the proposed model. The conclusions of this study were summarized as followings. System quality, service quality and top managers’ support positively affected the users’ perceived usefulness of the networking management system.System quality、service quality and top managers support positively affected the users’perceived ease of use of the networking management system.Perceived ease of use positively affected the Perceived usefulness.Perceived usefulness and perceived ease of use both affected the users’ satisfaction of networking management systems.The users’ satisfaction positively affected the users’ behavioral intention to use.
APA, Harvard, Vancouver, ISO, and other styles
47

Lin, Jun-Ting, and 林俊霆. "User Acceptance Model Analysis of Mobile Service- Campus Activities Information System as an Example." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/49446789519274817863.

Full text
Abstract:
碩士
國立高雄第一科技大學
資訊管理研究所
101
For many students, smart phone has become an indispensible element in their lives, with campus information system today also integrating internal information, acting as a bridge. In this way, students can connect the mobile phone to network and gain access easily to information about activities on campus. In this study, based on, Davis (1989) “Technology Acceptance Model, TAM , Davis (1989)”as research framework, we conduct the research, from the user''s perspective through the "School Activities Information System", developed by researchers, combining the concept in innovation feature from “Diffusion of Innovations, DOI” with three external influence dimensions: "Compatibility", "Result Demonstrability", and "Convenience", and propose the integration research model, "Information navigation services". With this model, we conduct the empirical research according to users’ behavioral motive on adopting the “Campus activities Information System”, expecting to understand the main factors that affect users’ behavioral intention on adopting new information technology, and to provide relevant personnel reference on designing campus activities information system in the future. The study collected 152 valid questionnaires from internet survey. Through structural equation, we conduct quantitative and statistical analysis. The results show that both "Compatibility” and "Result Demonstrability" as well as “Convenience” have significant influences on "perceived usefulness." Also, “perceived usefulness” and “perceived usability” have direct and significant impact on users’ intention on adopting campus information navigation system, which means “Compatibility”, “Result Demonstrability”, and “Convenience” show significant influence on behavioral intention on adopting new system. Consequently, through the empirical result from this study, we can improve the weakness on developing following systems, and thus provide service with more convenient and more useful functions as well as content with high quality.
APA, Harvard, Vancouver, ISO, and other styles
48

-shen, Tai, and 朱泰深. "The mobile information devices adoption in police department based on the Technology Acceptance Model." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/11936285009095487815.

Full text
Abstract:
碩士
國立高雄第一科技大學
企業管理研究所
99
The technology of information and communication has dramatic developed in recent years. The public sectors always adapt varied of related equipments or facilitates to simplify operational processes and to improve efficiency. Would it guarantee the desired results when public substantial budget purchased of new equipment? There is a gap between the publicly known statistics reports and the users’ actual feelings. Under the decision-making assessment, it is noteworthy to evaluate how to manage and maintain the information technology equipment and operations for the purpose of obtaining the efficiency of technology management. The study designed the TAM questionnaire with basis on Technology Acceptance Model (TAM) and the new information systems success model, which combined seven factors and 29 items of affecting system. The policemen who use the mobile information devices (M-Police mobile computer) in Kaohsiung City were sampling. The Public Technology Acceptance Model (PTAM) would be applied to interpret the interaction situation of “the pros and cons of the equipment” and “users’ capabilities”, followed with the design of management questionnaires and the compiled viewpoints of the industry executives and the police department managers. The study showed that of the public sector would make the equipments purchase strategy based on the analysis result of APAA process (with the steps of "assessment", "procurement", "application", and "effect analysis") to buy, lease or rent off. It would set up a contract clearly defined the provider’s the responsibilities and obligations and establish the expertise mechanisms to evaluate the effectiveness of the equipments. Effective promotion management of equipments purchase project would affect mostly on several key aspects such as setting up a dedicated person on management and operations, users training, improving the users’ intention and satisfaction, reward systems, applying the mechanisms of the evaluation effectiveness and archiving the responding strategies. Operated with both hardware and software, the current mobile information systems could promptly transfer the requested information, to and fro, through the wireless communication network. However, today''s smart phones and the flat computers with powerful computing and functions could be replaced traditional huge heavy equipments. Therefore, both the touching mode phone and flat screen combined the customization of particular operations software; it could largely reduce the expenses of the hardware purchase and minimize the police’s burden of carrying too much equipment on duty.
APA, Harvard, Vancouver, ISO, and other styles
49

Chou, Cheng-hung, and 周政宏. "A Study of User Behavior in Hospital Information System with Technology Acceptance Model 3." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/80773544265237152398.

Full text
Abstract:
碩士
世新大學
資訊管理學研究所(含碩專班)
101
The computerization has been affected many industries around the world. Medical information is not easy to execute under several effects such as change of health insurance policy, impact of e-commerce and complicated medical matters. However, all medical institutes try to reach the goal to improve medical quality, decrease costs and improve administrative efficiency. Base on Technology Acceptance Model 3, this study uses questionnaire to analyze factors of affecting users on hospital information system. The major empirical results were shown as follow: 1. Subjective norm was positively significant to image. 2. Job relevance, result demonstrability and perceived ease of use were positively significant to perceived usefulness. 3. Computer self-efficacy, computer anxiety, computer playfulness and perceived enjoyment were positively significant to perceived ease of use. 4. Subjective norm, perceived usefulness and perceived ease of use were positively significant to behavioral intention to use. 5. Behavioral intention to use was positively significant to actual system. Results of this study can be consideration before medical institutes implement the hospital information system, as well as recommendation after implementing. This study helps medical institutes to build more complete hospital information system.
APA, Harvard, Vancouver, ISO, and other styles
50

Yi-Cheng, Chung, and 鐘義承. "A Construction With Information Security Of The Accounting-Related Employees In Information Technology Acceptance Model - A Cloud Computing Study." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/06152765138871680688.

Full text
Abstract:
碩士
國立中正大學
會計與資訊科技研究所
100
Accounting-related employees in Taiwan has a long history of information technology, and a rise of cloud computing, BS 7799 has also been given information security is defined as "information for the organization is an asset, and other important operating assets, valuable, and therefore need to continue to provide proper protection. Information security protects information from a variety of threats to ensure continuous operation, the operating losses to a minimum, the most lucrative return on investment and opportunities. "accounting-related employees in the use of information technology such as the willingness of Cloud Computing is an important issue. In this study, "Accounting practitioners point of view, by the Information Security (Information Security), and recalling the behavior of school-related theory, and based on technology acceptance and use of the unified theory (UTAUT), procedural justice theory to explain the behavior of users, to understand the influencing factors of the will of the impact of accounting practitioners Cloud Computing information technology. Expect results as the future of business organizations, government import cloud computing and its related reference information technology, and increase the information technology to promote the success rate, in order to enhance corporate organizations to use cloud computing information technology capability and increase ability to profit efficiency. Empirical analysis, this study confirmed that the security will affect the intended use of the accounting practitioners cloud computing information technology. So, in terms of organization and management, organizations should be strengthened education and training of employees, enabling employees to develop adequate information security awareness and the ability to reduce the risk to the organization for employees of different ages, suitable strategies to improve their use of cloud services wishes. Different strategies for different gender in the ease of use and community, such as education and training for all levels of staff and to develop an incentive plan to encourage employees to use, and to strengthen the information literacy of staff for information security capabilities. When the internal flow of information security within an organization is fair, then also information security will be a consensus within the organization.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography