Dissertations / Theses on the topic 'Information acceptance model (IACM)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Information acceptance model (IACM).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Erkan, Ismail. "The influence of electronic word of mouth in social media on consumers' purchase intentions." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/12972.
Full textGabbard, Ralph Barnhart. "Applying the technology acceptance model to online education." [Bloomington, Ind.] : Indiana University, 2004. http://wwwlib.umi.com/dissertations/fullcit/3162232.
Full textSource: Dissertation Abstracts International, Volume: 66-01, Section: A, page: 0011. Chair: Javed Mostafa. Title from dissertation home page (viewed Oct. 12, 2006).
Chandio, Fida Hussain. "Studying acceptance of online banking information system : a structural equation model." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/6153.
Full textDucey, Adam J. "Predicting Tablet Computer Use: An Extended Technology Acceptance Model." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4471.
Full textGarcia-Smith, Dianna. "Testing a Model to Predict Successful Clinical Information Systems." Diss., The University of Arizona, 2007. http://hdl.handle.net/10150/195846.
Full textCompton, Shane M., and n/a. "Information technology implementation and acceptance: a case study of change management." University of Canberra. Applied Science, 2002. http://erl.canberra.edu.au./public/adt-AUC20050331.145848.
Full textMa, Will Wai-kit. "The development and empirical testing of a longitudinal integrated model on information technology acceptance /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ISMT%202006%20MA.
Full textJones, Cynthia. "Utilizing the Technology Acceptance Model to Assess Employee Adoption of Information Systems Security Measures." NSUWorks, 2009. http://nsuworks.nova.edu/hsbe_etd/49.
Full textZeng, Zili, Xin Hu, and Shuo Mei. "Factors affecting a Mobile Application’s Acceptance : An empirical study of user acceptance of WeChat in China." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-21650.
Full textDavis, Fred D. "A technology acceptance model for empirically testing new end-user information systems : theory and results." Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15192.
Full textMICROFICHE COPY AVAILABLE IN ARCHIVES AND DEWEY.
Bibliography: leaves 233-250.
by Fred D. Davis, Jr.
Ph.D.
Fesenmaier, Margaret Anna. "Permeating the wall: Transmitting knowledge remittances as a strategy for health information campaigns in The Republic of Moldova." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23307.
Full textMaster of Arts
Mohammed, Abdurahman. "Evaluation of electronic prescribing system-User acceptance perspective." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-54165.
Full textMeli, Peggy. "PERSPECTIVES OF HEALTH INFORMATION MANAGEMENT FACULTY USE OF AN E-LEARNING LABORATORY AND TECHNOLOGY ACCEPTANCE." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4173.
Full textPh.D.
Department of Educational Research, Technology and Leadership
Education
Education PhD
Croll, Jasmine. "The impact of usability on clinician acceptance of a health information system." Queensland University of Technology, 2009. http://eprints.qut.edu.au/29973/.
Full textDeGennaro, Alfred Joseph. "Application of Multiple Intelligence Theory to an e-Learning Technology Acceptance Model." Cleveland State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=csu1273053153.
Full textBlue, Jon T. "Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology." VCU Scholars Compass, 2006. http://hdl.handle.net/10156/1543.
Full textMorris, Michael G., and Andrew Dillon. "The Influence of User Perceptions on Software Utilization: Application and Evaluation of a Theoretical Model of Technology Acceptance." IEEE, Inc, 1997. http://hdl.handle.net/10150/106206.
Full textMonestime, Judith. "ICD-10-CM Implementation Strategies: An Application of the Technology Acceptance Model." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1909.
Full textEl-Kordy, Manal Mohammed. "Understanding the utilisation of executive information systems using an integrated technology acceptance model : theoretical base and empirical validation." Thesis, City University London, 2000. http://openaccess.city.ac.uk/8107/.
Full textNassif, George T. "Cloud Computing Adoption in Afghanistan: A Quantitative Study Based on the Technology Acceptance Model." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7831.
Full textSandema-Sombe, Christina Ndiwa. "Relationship Between Perceived Usefulness, Ease of Use, and Acceptance of Business Intelligence Systems." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7736.
Full textWiley-Patton, Sonja. "A test of the Extended Technology Acceptance Model for understanding the Internet adoption behavior of physicians." Thesis, University of Hawaii at Manoa, 2002. http://hdl.handle.net/10125/3046.
Full textThesis (Ph. D.)--University of Hawaii at Manoa, 2002.
Includes bibliographical references (leaves 168-180).
Mode of access: World Wide Web.
Also available by subscription via World Wide Web
xv, 180 leaves, bound ill. 29 cm
Liu, Shijing. "Technology Acceptance Model for Determining the Effects of Age, Usability, and Content on Mobile Application Usage." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1339700970.
Full textAlrafi, Aziz. "The technology acceptance model : a critical analysis with reference to the managerial use of information and communication technology (ICT)." Thesis, Leeds Beckett University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485453.
Full textCsonka, Kamilla. "Användaracceptans vid systemimplementering." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20389.
Full textUser acceptance is an important part of all system development projects and is also a very easily influenced variable for a successful implementation. That is why it is important to have an overview of those factors that could influence the user acceptance negatively, one of those factors being delay. This thesis highlights the cohesion between a delayed project and its influence over the user acceptance. By letting a study group answer a survey formed by the Technology Acceptance Model, I have gathered the generalized opinion of the group. The results show that delay as a variable does not influence the user acceptance of this case study.
Reid, Michael Hubert. "Integrating Trust and Computer Self-Efficacy into the Technology Acceptance Model: Their Impact on Customers' Use of Banking Information Systems in Jamaica." NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/283.
Full textZeneli, Egzona. "Hur påverkas du av dina kollegor? : En kvalitativ studie om socialt inflytande vid accepterande av ny teknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17449.
Full textChen, Bo, and Zili Zeng. "ERP Usage in Practice : Understanding End-Users ‘Acceptance of ERP Systems in Chinese large companies by applying UTAUT model." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18637.
Full textHarmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.
Full textLien, Ching-Hao, and 連清皓. "A study of Information Security under Technology Acceptance Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/27936473190950608316.
Full text建國科技大學
自動化工程系暨機電光系統研究所
103
Abstract This study uses theoretical elements of technology acceptance model and secondary literature method to explore personal, relevant policy organizations, defense organizations tripartite using in smart phones (handheld device), and its information security. According to technology acceptance model, intention of the user's use of technology, the perceived usefulness and perceived ease of use of the effect of combination, if the user perception to the new technology is useful, the use of new technology can help improve work efficiency but also feel new technology which is easy to use. There is a higher chance to use smart phones. But information security attendant risks, but by individuals and organizations need to change individual habits and build the organization's overall information security policy, conduct risk control and prevention. The findings are as follows: 1) Personal dependence for smart phones and use habits, will determine the safety of personal information protection. 2) Traditional organizational information security policies must be implemented in order to achieve the BYOD trend. 3) Defense organizations under the influence of various factors, the information security management system implementation ineffective. Follow the full functionality of the smart phone used within the defense organization, still has a long-term need to break away. 4) Finally, the study findings are based on information security issues individuals, organizations, and defense organizations triggered by the smart phone made substantive recommendations.
Chang, Chih Hung, and 張志弘. "Innovation location based information service technology acceptance model analyze." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/30875533496011449598.
Full text長庚大學
資訊管理學系
98
Abstract Overview of the global positioning information services (LBS, Location-Based Service) technology used is becoming more mature, to actively promote navigation related services. Recently, the international mobile phone manufacturers have also introduced several GPS navigation mobile phone. Domestic carriers are also launching "GPS real-time information services" to mobile phones with GPS navigation so people do not check the map before leaving. Built-in mobile positioning services for smart phones is the personal guide, not only to guide the right path, even through mobile phones, collecting in the vicinity of food, fun, finance, hospitals and other landmarks of information, I believe the future will greatly enhance the location information service users. But for the positioning of information services over emphasize the technical, industrial and, as well as strategies face, in the user level, almost no relevant research. In this study, "Integrated Technology Acceptance Model (Unified Theory of Acceptance and Use of Technology / UTAUT" Venkatesh et al., (2003) as the main, as mobile phone users in innovation Location information services accepted hypothetical model behaviors, this study design the questionnaire conducted by the structural equation model fit of the model assumptions and the revised test pattern. After correction mode and interviews with experts to further understand the impact of mobile phone users to locate information service for innovation Acceptance of the main factors in order to provide domestic telecommunications services operators, the competent authorities and positioning, to improve and build the future positioning of the reference information system. Abstract Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT)、Location-Based Service(LBS)、Web 2.0、 Global Positioning System (GPS)
CHIEN, Chao-Kun, and 簡兆堃. "An Empirical Study of Nursing Information System Using Technology Acceptance Model and Information System Success Model." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/06215391370599889652.
Full text大葉大學
工業工程與科技管理學系
97
At present among research to attend to nursing information system, mostly qualitative description; however, it is lack for quantify way build and construct comparatively, and also for the development of information system at present rapidly and progress of medical science and technology… etc. All questions of the timeliness are subjects faced at present. This research is with DeLone & McLean (2003) information systems forward succeed in regarding systematic quality, service quality and information quality. We called these are outside parameter. Venkatesh & Davis (2000) science and technology after the revision with three literary composition surface cognition getting useful, cognitive ease of use and suitable for attending to the related way to exercise. And by using the relevant literature discussion of the purpose, the basis designed as the questionnaire. Moreover, it also goes on as the respondent to nursing staff of regional hospital, attending to a executive. By way of questionnaire investigation, materials retrieve, count with SPSS software carry on sample analysis, prove and analyze the structural equation model in Amos. Analyze the result of study found the purpose of nursing information system, it is positive for whole structure and brings with system user operate getting easy influence for being most among them. It would improve the effect of studying, systematic stability, maintenance service and exactness that system offer of timeliness of quality can influence user purpose of using too. In addition, constructing and attending to the nursing information system at present, with linking up simple and easy and personnel that are designed. Key word: Information system succeeds model, Technology Accepting Model, Nursing Information System.
Li, Jui-Yang, and 李瑞陽. "A Study on Technology Acceptance Model of Management Information System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/buc98p.
Full text國立中山大學
企業管理學系研究所
96
Abstract Most enterprises reinforce themselves with the Management Information System and the intranet to get information promptly and also the internet to enhance the relationships with customers as one of the most important strategies to survive in the competitive environment. The key success factors of Management Information System are mature system planning, friendly design for users, and end user’s participation, which is recognized as the most crucial factor of the above. Therefore, how to evaluate end user’s satisfaction and acceptance on the Management Information System becomes the most interesting topic for the managers. This study explores the technology acceptance of the end users of Shop Information System from the model of TAM2 (Technology Acceptance Model II). And its purpose is to find the influent factors of Intention to Use and Use Behavior of the end users of Shop Information System. The managers can carry out or improve the MIS according to this study. After the research, this study indicates that there are four components that influenced the degree of acceptance of technology, included the Usefulness of system, the result demonstrability; the ease of use, and ought to use or not. Different factors under several conditions in demography significantly influence the intention of users. The managers can improve the management information system according to the finding of this study.
Yang, Sung-kwan. "Teachers' perception of use of student performance information: technology acceptance model." Thesis, 2003. http://hdl.handle.net/2152/1119.
Full textYang, Sung-kwan Scribner Jay D. "Teachers' perception of use of student performance information technology acceptance model /." 2003. http://wwwlib.umi.com/cr/utexas/fullcit?p3126148.
Full textWu, Ya-Hui, and 吳雅惠. "Apply Technology Acceptance Model to Explore Effectiveness of Nursing Information System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/80806294186478633251.
Full text嘉南藥理科技大學
醫務管理系
101
Because of the development of electronic medical record and constant lackness of nursing workforce, there are more and more medical institutes build their own nurse information system (NIS). The system expects to provide nurses a platform they can utilize during their day-to-day clinical care activities. The goal of using NIS intends to mitigate the burden of nurses during their medical records writing, improve their care quality, and to promote patient safety. In any hospital, not only are most of the medical professionals nurses, but they are also the direct care providers to patients. Therefore, their participations and standpoints play a key role when to evaluate and implement the nurse information system. The purpose of this study is to investigate the effectiveness of implementing NIS, and to discuss several issues affecting a successful deployment from the perspectives of nurses who are the major users of the information system. The methodology is based on the theory of Technology Acceptance Model, TAM. The researcher adopted a Cross-Sectional study method for survey and data collection. 167 questionnaires were handed out to subjects. 158 valid questionnaires, about 94.6 percent were collected, and these data were analyzed by using software including SPSS and PLS. The data analysis depicts that the most significant factors that influence the willingness of nurses to use NIS are their degrees of satisfaction and their usefulness perceptions towards the system. A nurse information system being able to provide functions that lead to characteristics such as usefulness and convenience, avoidance of tedious repeat writing, and improvement of care quality will make nurses feel satisfied about the system and thus stimulate their interests in using NIS on their work. Item analysis revealed that nurses asked very willing to learn and use care information systems, and can be trained to operate him. This result can be used as hospital managers to understand nurses' willingness to use nursing information systems, and can also be served as references for future development of similar information system in the hospital.
Kuo, Chia-Wei, and 郭嘉偉. "Understanding and predicting information security outsourcing services of firms’ acceptance: An extension of extended outsourcing acceptance model." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/57826500086720633735.
Full text國立高雄應用科技大學
資訊管理研究所碩士班
96
To date, information security is essential for most firms. Researchers have traced recent implementation failures to a lack of professionals and techniques of information security. Therefore, firms are shifted to consider using information security outsourcing. Yet, information security outsourcing is likely to meet some problems that result in many firms do not know whether to accept information security outsourcing. Therefore, this study will explore the impact factors of information security outsourcing services of firms’ acceptance. In this study, by applying the extended outsourcing acceptance model (EOAM), transaction cost theory (TCT), and technology readiness (TR), we proposed an information security outsourcing acceptance model (ISOAM) and took an extended perspective to explain this issue. We designed a questionnaire to survey decision-makers who have the power to make decisions or outsourcing staffs. In a questionnaire, we analyzed the data using structured equation modeling (SEM) to test the strength of the hypothesized relationships, if any, among the constructs, which include transaction cost, prior outsourcing relationship and technology readiness as independent variables, perceived usefulness, perceived risks and attitude of information security outsourcing as intervening variables, and intention to accept information security outsourcing as the dependent variable. The result provided support of ISOAM and confirmed its robustness in predicting decision-makers intention to accept information security outsourcing services. This study contributes the literature to follow by formulating and validating ISOAM to predict information security outsourcing services, and its findings provide useful information for firms or vendors to draw up in strategies of information security outsourcing. Implications for theory and practice are discussed.
曾上亭. "Technology Acceptance Model of E-Learning Case of Chinese and Taiwan information." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/28790075868453081619.
Full text中國文化大學
資訊管理研究所
91
As the Internet of global is glooming in today’s information age, Web-based Learning is the trend of modern distance education development. There is difference between face-to-face learning and learning on World Wide Web. The web-based learning system creates an interactive learning environment, which includes a lot of rich information and managed knowledge. This study empirically examines TAM model reported by Davis, F D in 1989,the relationship between E-Learning intensity and the Perceived usefulness and Perceived ease of use . The effective of professional characteristic and organization attitude to E-Learning intensity and the Perceived usefulness and Perceived ease of use is concerned and discussed. Compared with Taiwan and Mainland China information professional the difference. Based on the questionnaires, the paper analysis the difference of professional characteristics of Taiwan and Mainland China .Compared with Taiwan and Mainland China information professional, the professional in China take less time in browsing Internet, and they are usually more competitive and less loyalty. the professional in Taiwan takes more interest in learning on WWW. It can be concluded that better computer-efficiency and self-expected can promote the professional to accept the way of Web-based learning, and the Web-based learning can enhance one’s learning ability or not would be discussed in the future.
Chen, Jing-Wen, and 陳敬文. "Investigating the Intention of e-Portfolio Usage Combining Information System Success Model with Technology Acceptance Model." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/ypp68p.
Full text臺中技術學院
資訊科技與應用研究所
98
Information Technology (IT) application has become popular in the modern generation. Almost every enterprise establishes the information system to improve its production or service depending on its organization needs. But the investment on IT increases yearly and do not bring reciprocal income. One of the reasons is the degree of the employees’ acceptance toward information science and technology is not high enough, and the enterprise performance is not highly influence by IT. Therefore, to understand and to consider the factor of new science and technology usage and to implement the successful and satisfactory information system seems to be very important. Similarly, it has been a worldwide focus on applying IT to the learning domain, and a principal educational policy on integrating IT with teaching. Many schools have been integrated into an e-Portfolio which has been used as the tool of teaching innovation in teaching and evaluation. The main purpose of this research is to carry on investigating analysis and to inquire into student''s usage attitude, user''s satisfaction and usage intention for "e-Portfolio” based on Information System Success Model and TAM. According to the research object, students of different back ground use e-Portfolio, which holds discrepancy and correlation of student’s usage attitude will help development and popular usage of e-Portfolio in the school and make teacher and student reach the reference of the object of e-Portfolio application of the learning process.
Hung, Min-chi, and 洪明奇. "The Study of Supply Chain Management Information System Adoption in Technology Acceptance Model." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/17983372175952524689.
Full text國立中正大學
資訊管理學系
90
Now in this business environment full of fierce globalization competition, the contest between each company has had the changeover from simple competition between manufacturers to supply chains; owing to the progress in leaps and bounds of information technology, and the rapid development of internet and E-commerce, using information technology to manage such complicated supply chain activities has become the weapon for each enterprise to create competitive advantage. We used to focus on the technical part of this supply chain technology information research, and pay not much attention to the study of the effect of intentions of enterprises’ ideas adoptions, but for supply chain information technology which would results in broad-spectrum effect, the value of studying the effect of such intentions is not second to technical part research. This research combines three dimensions of factors from the research of “transaction environment”, “organizational factors”, “system supply side”, and use Technology Acceptance Model (TAM) as a basis to construct the research model and research hypothesis. We take first 1,000 manufacturing enterprises in Taiwan as sampling frame of potential respondents, and mail questionnaires to them to proceed research as empirical study in order to probe the affecting factors of enterprises’ supply chain management system cognition and adoption intention effects. Research result reveals that when a company is in a “ highly competitive, uncertain, and mutual-trust integrating ” transaction environment , this company would have better idea of perceived usefulness of supply chain management information technology and adoption intention than one in a “lowly competitive, steady and loose-linked “ transaction environment; as last we use structural equation modeling(SEM) to verify the causal relationship between each latent variable in research model, and result shows that adoption intention of supply chain management related information technology of each enterprise is mainly affected by “perceived usefulness” and “firm size”, and the effect of “perceived ease of use” and “ adoption intention” is not significant; ”perceived usefulness” is affected by ”perceived ease of use”, “information technology infrastructure”, ” transaction climate”; ”top management support”; “perceived ease of use” is affected by “system vendor’s reputation”, “information technology infrastructure”, ”consultant support”, “transaction climate”, “product complexity” and “cost”.
Kripanont, Napaporn. "Examining a technology acceptance model of internet usage by academics within Thai business schools." 2007. http://eprints.vu.edu.au/1512/1/Kripanont.pdf.
Full textLin, Yi-Hsiu, and 林毅修. "An exploration of technology acceptance model in information security - A case study of the Taxation Reform Information System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/74140488047273519917.
Full text國立臺灣大學
商學研究所
100
Despite the fact that information security systems have become more effective and user-friendly, they still can’t effectively appeal to user for smoothly and effective use. In part, it is due to the complexity of the system and unpredictable nature of security events and caused impact. This study aims at exploring the impact of human factors on the adoption of information security system as an attempt to provide a holistic viewpoint into the deployment of information security system. The case of National Taxation Information System in Taiwan was examined. In this system, around 17.6 billions tax payers information are processed annually and the information handling are under strict regulation for the protection of data and personal information privacy. By combining technology acceptance model and big five personality traits, a research model is proposed in which the personality traits are regarded as moderator to the system acceptance. More than a hundred of users at the tax bureau participated in the survey study. The results indicate that perceived usefulness and ease of use significantly affect the user’s behavior intention. Several personalities did play the role in moderating the user’s behavior intention on the use of information security system.
Lee, Chung-Han, and 李宗翰. "The Extension of Post Acceptance Model: An Empirical Study of Highway Disaster Information System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/46781548158396807941.
Full text大同大學
資訊經營學系(所)
100
To promote all levels of disaster relief operations, each government planned to build the disaster information system. Most previous research related to information systems into most users’ satisfaction and willingness as a basis on expectation confirmation theory (ECT). In this study, we extended the post acceptance model (PAM) which was extended from ECT, with information quality, system quality and service quality. According the user experiences of the Highway Administration of Disaster, we collected the feedback by questionnaires. This study adopted partial least squares to analyze the proposed research model, to explore the impact between the various dimensions. Finally, we proposed the managerial implication and discussion for the design guidelines of disaster information system.
Chen, Kuen-yuan, and 陳焜元. "Research of User Participatin in Public Management Information System───Testing of Technology Acceptance Model." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57016378053457420548.
Full text國立政治大學
公共行政學系
84
Osborne & Gaebler在所著的「新政府運動」( Reinventing G-overnment )一書中,曾引述戴明( W. D. Deming ) 博士所倡導的「全面品質管理 」( Total Quality Management )概念指出:員工的參與才能有效的解 決問題,因為員工最了解制度,而且最清楚癥結所在。這樣的提示,雖早 被管理者重視且廣泛地運用在組織活動的設計範疇中,不過,就參與效能 的評估與改善,仍有不少值得再予強調的課題。本研究既係依此觀點,藉 由檢視使用者參與行政管理資訊系統發展過程之現象,提供一個思索的空 間。整體研究架構,以檢證Davis 所提出的技術接受性模式為基準,同時 透過此一模式了解使用者參與在系統使用行為上造成模糊結果的原因,進 而提醒行政管理者,在系統發展或執行過程,勿陷入以效率掛帥的功能主 義典範窠臼,對於溝通、平等與尊重等新人性主義典範所揭示的概念應予 適度關注。也就是說,在民主的工作環境下,應將本身視為組織生活的目 的,而非僅有工具性價值;參與效能的評估不僅須針對「結果」而且應顧 及「過程」。在上述要旨下,關於研究實體部分,經就文獻分析、實證調 查結果的發現與筆者實務經驗,提出以下結論與建議:一、技術接受性模 式,尚可適度詮釋國內行政管理資訊系統使用者的使用行為。惟其適用的 分析情境、態度與行為關係之假定,仍有再作深入探究之必要。二、參與 及系統使用行為關係之研究,不僅可透過置入中介變項的權變研究觀點來 了解,分析使用者在這二行為間的心理歷程,對於改善參與效能而言,亦 是一種可行的途徑。三、使用者對系統有用性及簡易性的認知,是影響系 統使用態度、意向及行為的二大要素。其中有用性的認知更具決定性地位 。四、使用者參與效能的模糊結果,除了源於理論欠紮實、研究模式過於 簡化,以及研究方法上的瑕疵以外,研究上未仔細區辨系統使用情境之差 異亦為主因。不過,參與究非萬靈丹,無定論的結果,並不代表即是一種 錯誤。五、參與效能的改善,除了管理當局的支持與專家協助以外,有賴 從加強系統發展者與使用者的教育訓練著手。六、自主性的系統使用情境 下,使用行為( 頻率 )始能較正確地詮釋使用者接受程度。七、未來應重 視以系統發展者與使用者互動作為分析單元的研究。至於在行政管理實務 上,本研究所欲表達的主要意念是:員工的參與及評估的步驟是缺一不可 的。因為,沒有評估的參與,則參與無法發揮實際的效果,充其量僅具象 徵性的價值;而僅有評估卻無參與活動,這樣的評估除了可能是膚淺、不 切實際以外,在實務上存在的機率亦不大。公部門的決策及管理階層,面 對高度層級節制的組織文化,能否擺脫「官大學問大」心態,而以恢宏的 胸襟與氣度,善用與因應來自員工的意見,塑造具有參與效能的情境,將 是成功地推展各項事務最基本的前提要件。
Hung, Chun-Huo, and 洪誜謋. "A Study of Air Logistics System Integratedly Technology Acceptance And Information System Success Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7tb635.
Full text樹德科技大學
資訊管理系碩士班
103
To enhance the competition of China''s military, the Defense of Ministry tried to promote the establishment of professional military services and information technology management. Coupled with the continuous evolution of computer technology, the applications and development of information systems in the management has also reached the goal of breakthrough, which can be the key factor to effectively control of the use of IT in the national army. Then, the information system is thought to increase productivity , improve decision-making and an to be essential element of competition in the market. The reliability and increasing of "back-up security of information systems'' , which is an quite expensive resource for the Air Force. It implied the increasing costs by time. After the Air Force inputs lot of money and manpower to build "back up security information systems," the high management level officers want to know whether the operation of information system can achieve the desired performance, which can be considered as continued investment or sophisticated reference. The study, which applied the Technology Acceptance Model (TAM) binding Revised Technology Acceptance Model (TAM 2) and Information Systems Success Model , explore the willingness to use the Air Force logistics support staff complement of security information systems and whether can bring an organization to enhance performance. The subjects of the study includes security logistics information systems users, questionnaire distribution is from 18 March 2015 to 20 April 2015, and the number of 493 valid samples using SPSS19.0 statistical software to analyze whether significant affects on the following factors among subjective norm, job-related, system quality, service quality, information quality, perceived usefulness, perceived ease of use , and organizational performance. The hypotheses, except "system quality" of supporting staff on the "perceived usefulness" and H9 "quality of service" for the supporting staff on the "perceived usefulness" was not significantly supported , the others are significantly positive, indicating that the use of logistics information system security patch, the display at the Air Force Air Logistics supporting staff complement insurance information system, will be affected by colleagues or superior. The system quality, service quality, information quality, three dimensions, have a direct impact on perceived usefulness and perceived ease of us.
Li, Mei-Yan, and 李美燕. "The Technology Acceptance Model in Assessment of Networking Management Systems for Military Information Administrators." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/24179387507738109226.
Full text中原大學
資訊管理研究所
103
With the development of the Internet, the networking management system is experiencing rapid growth. It was expected that the networking management system has offered avenue to enhance Working efficiency and performance. The use of the network management systems control feature that allows companies to maintain the network environment stability and security of the state. The purpose of this study is to evaluate the effectiveness of networking management system applied in military information administrators. This research combines the DeLone and McLean’s Information System Success Model (IS Success Model) and Davis’s Technology Acceptance Model (TAM), and adds four research variables, information quality, organization support, Personal characteristics and Tasks feature interactivity to propose a new hybrid technology acceptance model to study military information administrators’ satisfaction and behavioral intentions to use the networking management system. Data were collected from 150 military information administrators who were registered or have the using experience of the system in the military. This research has adopted multiple regression analysis for its data analysis to study the causalities among all parameters constructed in the proposed model. The conclusions of this study were summarized as followings. System quality, service quality and top managers’ support positively affected the users’ perceived usefulness of the networking management system.System quality、service quality and top managers support positively affected the users’perceived ease of use of the networking management system.Perceived ease of use positively affected the Perceived usefulness.Perceived usefulness and perceived ease of use both affected the users’ satisfaction of networking management systems.The users’ satisfaction positively affected the users’ behavioral intention to use.
Lin, Jun-Ting, and 林俊霆. "User Acceptance Model Analysis of Mobile Service- Campus Activities Information System as an Example." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/49446789519274817863.
Full text國立高雄第一科技大學
資訊管理研究所
101
For many students, smart phone has become an indispensible element in their lives, with campus information system today also integrating internal information, acting as a bridge. In this way, students can connect the mobile phone to network and gain access easily to information about activities on campus. In this study, based on, Davis (1989) “Technology Acceptance Model, TAM , Davis (1989)”as research framework, we conduct the research, from the user''s perspective through the "School Activities Information System", developed by researchers, combining the concept in innovation feature from “Diffusion of Innovations, DOI” with three external influence dimensions: "Compatibility", "Result Demonstrability", and "Convenience", and propose the integration research model, "Information navigation services". With this model, we conduct the empirical research according to users’ behavioral motive on adopting the “Campus activities Information System”, expecting to understand the main factors that affect users’ behavioral intention on adopting new information technology, and to provide relevant personnel reference on designing campus activities information system in the future. The study collected 152 valid questionnaires from internet survey. Through structural equation, we conduct quantitative and statistical analysis. The results show that both "Compatibility” and "Result Demonstrability" as well as “Convenience” have significant influences on "perceived usefulness." Also, “perceived usefulness” and “perceived usability” have direct and significant impact on users’ intention on adopting campus information navigation system, which means “Compatibility”, “Result Demonstrability”, and “Convenience” show significant influence on behavioral intention on adopting new system. Consequently, through the empirical result from this study, we can improve the weakness on developing following systems, and thus provide service with more convenient and more useful functions as well as content with high quality.
-shen, Tai, and 朱泰深. "The mobile information devices adoption in police department based on the Technology Acceptance Model." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/11936285009095487815.
Full text國立高雄第一科技大學
企業管理研究所
99
The technology of information and communication has dramatic developed in recent years. The public sectors always adapt varied of related equipments or facilitates to simplify operational processes and to improve efficiency. Would it guarantee the desired results when public substantial budget purchased of new equipment? There is a gap between the publicly known statistics reports and the users’ actual feelings. Under the decision-making assessment, it is noteworthy to evaluate how to manage and maintain the information technology equipment and operations for the purpose of obtaining the efficiency of technology management. The study designed the TAM questionnaire with basis on Technology Acceptance Model (TAM) and the new information systems success model, which combined seven factors and 29 items of affecting system. The policemen who use the mobile information devices (M-Police mobile computer) in Kaohsiung City were sampling. The Public Technology Acceptance Model (PTAM) would be applied to interpret the interaction situation of “the pros and cons of the equipment” and “users’ capabilities”, followed with the design of management questionnaires and the compiled viewpoints of the industry executives and the police department managers. The study showed that of the public sector would make the equipments purchase strategy based on the analysis result of APAA process (with the steps of "assessment", "procurement", "application", and "effect analysis") to buy, lease or rent off. It would set up a contract clearly defined the provider’s the responsibilities and obligations and establish the expertise mechanisms to evaluate the effectiveness of the equipments. Effective promotion management of equipments purchase project would affect mostly on several key aspects such as setting up a dedicated person on management and operations, users training, improving the users’ intention and satisfaction, reward systems, applying the mechanisms of the evaluation effectiveness and archiving the responding strategies. Operated with both hardware and software, the current mobile information systems could promptly transfer the requested information, to and fro, through the wireless communication network. However, today''s smart phones and the flat computers with powerful computing and functions could be replaced traditional huge heavy equipments. Therefore, both the touching mode phone and flat screen combined the customization of particular operations software; it could largely reduce the expenses of the hardware purchase and minimize the police’s burden of carrying too much equipment on duty.
Chou, Cheng-hung, and 周政宏. "A Study of User Behavior in Hospital Information System with Technology Acceptance Model 3." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/80773544265237152398.
Full text世新大學
資訊管理學研究所(含碩專班)
101
The computerization has been affected many industries around the world. Medical information is not easy to execute under several effects such as change of health insurance policy, impact of e-commerce and complicated medical matters. However, all medical institutes try to reach the goal to improve medical quality, decrease costs and improve administrative efficiency. Base on Technology Acceptance Model 3, this study uses questionnaire to analyze factors of affecting users on hospital information system. The major empirical results were shown as follow: 1. Subjective norm was positively significant to image. 2. Job relevance, result demonstrability and perceived ease of use were positively significant to perceived usefulness. 3. Computer self-efficacy, computer anxiety, computer playfulness and perceived enjoyment were positively significant to perceived ease of use. 4. Subjective norm, perceived usefulness and perceived ease of use were positively significant to behavioral intention to use. 5. Behavioral intention to use was positively significant to actual system. Results of this study can be consideration before medical institutes implement the hospital information system, as well as recommendation after implementing. This study helps medical institutes to build more complete hospital information system.
Yi-Cheng, Chung, and 鐘義承. "A Construction With Information Security Of The Accounting-Related Employees In Information Technology Acceptance Model - A Cloud Computing Study." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/06152765138871680688.
Full text國立中正大學
會計與資訊科技研究所
100
Accounting-related employees in Taiwan has a long history of information technology, and a rise of cloud computing, BS 7799 has also been given information security is defined as "information for the organization is an asset, and other important operating assets, valuable, and therefore need to continue to provide proper protection. Information security protects information from a variety of threats to ensure continuous operation, the operating losses to a minimum, the most lucrative return on investment and opportunities. "accounting-related employees in the use of information technology such as the willingness of Cloud Computing is an important issue. In this study, "Accounting practitioners point of view, by the Information Security (Information Security), and recalling the behavior of school-related theory, and based on technology acceptance and use of the unified theory (UTAUT), procedural justice theory to explain the behavior of users, to understand the influencing factors of the will of the impact of accounting practitioners Cloud Computing information technology. Expect results as the future of business organizations, government import cloud computing and its related reference information technology, and increase the information technology to promote the success rate, in order to enhance corporate organizations to use cloud computing information technology capability and increase ability to profit efficiency. Empirical analysis, this study confirmed that the security will affect the intended use of the accounting practitioners cloud computing information technology. So, in terms of organization and management, organizations should be strengthened education and training of employees, enabling employees to develop adequate information security awareness and the ability to reduce the risk to the organization for employees of different ages, suitable strategies to improve their use of cloud services wishes. Different strategies for different gender in the ease of use and community, such as education and training for all levels of staff and to develop an incentive plan to encourage employees to use, and to strengthen the information literacy of staff for information security capabilities. When the internal flow of information security within an organization is fair, then also information security will be a consensus within the organization.