• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 293
  • 82
  • 43
  • 21
  • 21
  • 20
  • 11
  • 9
  • 7
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 564
  • 564
  • 382
  • 159
  • 139
  • 105
  • 101
  • 89
  • 77
  • 75
  • 71
  • 71
  • 65
  • 62
  • 62
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Evaluation of Cryptocurrencies Adoption in Colombia via Unified Theory of Acceptance and Use of Technology (UTAUT)

Cabanzo Cadena, Jose Camilo January 2022 (has links)
During the last decade, cryptocurrency and blockchain technology has grown in  popularity as a viable alternative to conventional financial institutions and centralized  markets. In 2021, the crypto industry's total market capitalization increased by nearly  10000 percent since its creation, reaching a total market capitalization at around 2  trillion, and culminating in all-time high record peaks that stunned the entire financial  world. The study of this current subject was conducted in order to determine the key  factors that contributed to the sudden increase in the use of this emerging technology,  which is still perceived to be in its infancy at least. Since the study is targeted for only in  Colombian citizens, a general analysis of prior research on technological disruption of  the relationship between global investors and technology acceptance was conducted  to ensure an effective overview of this phenomena. Furthermore, a variety of  technological adoption models were analyzed in order to determine the most suitable  one for this study. The Unified Theory of Acceptance and Use of Technology (UTAUT) was  explicitly adapted for the purposes of this thesis, since it was found to be the most  important and productive model for evaluating cryptocurrency adoption among  Colombian citizens. The study approach explores people's technology interaction habits,  which are then re-tested by a survey. Over the course of 4 days, were gathered 106  responses from crypto users and non-users using an online survey plus 154 using an  snowball data gathering method for a total of 260. Furthermore, ten Colombians users  who own cryptocurrencies were approached, and open-ended interviews were performed  again using the modified UTAUT model, which aimed to reach a better  understanding of the driving factors behind technological acceptance. Finally, additional  methods are suggested as the blockchain technology grows gaining great levels of  mainstream acceptance as the time passes. The final motivation of this research is to  provide a scientific analysis in order to help regulators in Colombia to assess the  projected forthcoming Crypto-Technology revolution
62

User Acceptance of the Intranet in Restaurant Franchise Systems: An Empirical Study

Park, Kunsoon 09 January 2007 (has links)
This research study examined the acceptance of the intranet in restaurant franchise systems. The widely accepted Technology Acceptance Model (TAM) developed by Davis (1986, 1989) was the basis for this study. TAM is an excellent model to predict information technology (IT) usage and is based on the Theory of Reasoned Action (TRA). Therefore, TAM was adopted in this study of intranet acceptance. Furthermore, this study attempted to see if the earlier results of TAM are still valid. The original model was modified to include one external variable, franchise support. Data were collected from franchise restaurant systems throughout the United States, excluding Alaska and Hawaii. Of 3,500 questionnaires distributed to individual users of intranet, 161 contained usable responses. The results of regression analysis confirm that TAM is valid for additional applications such as evaluating the intranet in restaurant franchise systems. / Ph. D.
63

Strategies Used by Cloud Security Managers to Implement Secure Access Methods

Harmon, Eric 01 January 2018 (has links)
Cloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secure access methods to protect data on the cloud infrastructure. The population for this study was cloud security managers employed by 2 medium size businesses in the Atlanta, Georgia metropolitan area and that have strategies to implement secure access methods to protect data on the cloud infrastructure. The technology acceptance model was used as the conceptual framework for the study. Data were collected from semi-structured interviews of 7 security managers and review of 21 archived documents that reflected security strategies from past security issues that occurred. Data analysis was performed using methodological triangulation and resulted in the identification of three major themes: implementing security policies, implementing strong authentication methods, and implementing strong access control methods. The findings from this research may contribute to positive social by decreasing customers' concerns regarding personal information that is stored on the cloud being compromised.
64

Practitioner Resistance to Structured Interviews: A Comparison of Two Models

Nesnidol, Samantha A. 07 August 2019 (has links)
No description available.
65

E-Government Adoption Model Extended with Public Value in Peru

Perez, Sebastian, Cabrera, Jorge, Rodriguez, Jose, Raymundo, Carlos 09 May 2019 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / Currently, due to the existing potential regarding technology in the provision of services, the Peruvian government has developed solutions for its inhabitants. A survey conducted by the United Nations in 2016 endorses this fact, showing a high rate of technological development with respect to e-government. However, the same publication showed the low rate of citizen participation about it. These results show how, although there are many government technological services, these do not focus on the citizen or in their active participation, but mainly on technological development. In the present study, an adoption model is proposed, extending the Technology Acceptance Model (TAM) incorporating public value, specifically environmental sustainability, as an external variable. The validation of the proposal was made through a validated survey with experts in the environmental field and applied to citizens of the Peruvian capital. Our results show that environmental sustainability is a factor that positively affects the adoption of e-government in Peru and that should be considered by the authorities as an enhancer of citizen participation about it.
66

Increasing e-government adoption by emphasizing environmental sustainability: an extended case study in Peru

Pérez Chacón, Sebastián Ramón, Rodriguez Vilchez, Jose Luis, Cabrera Berrios, Jorge Antonio, Raymundo Ibañez, Carlos Arturo, Mauricio, David Santos 01 January 2021 (has links)
Purpose: Low citizen adoption rates jeopardize the success and proliferation of e-government systems. This study aims to understand how the perception of environmental sustainability (ES) can influence a citizen’s intention to use e-government systems. Design/methodology/approach: In a case study in Peru, the technology acceptance model (TAM) adoption model is extended with the construct of ES and evaluated with structural equation modeling. An 18-element, in-person survey was constructed and administered to citizens of Lima, Peru who had prior exposure to e-government systems. Findings: The results show that citizens can be positively influenced to adopt e-government systems if they perceive that doing so will contribute to ES. Research limitations/implications: As this was a preliminary study, further research should focus on specific, as opposed to general, e-government systems, as well as encompassing a broader cross section of the population. Practical implications: Administrators of e-government initiatives can consider public-interest factors, alongside of the common self-interest factors, when looking to improve adoption rates of e-government systems. Originality/value: This is the first time that TAM has been extended with the construct of ES.
67

Perspectives Of Health Information Management Faculty Use Of An E-learning Laboratory And Technology Acceptance

Meli, Peggy 01 January 2008 (has links)
As the delivery of healthcare has become more sophisticated, scientific, and complex, the need for HIM (Health Information Management) professionals at all levels has increased, and the role and status of those managing these functions has increased accordingly. (AHIMA, September 24, 2007). Studies by the Institute of Medicine and others have found suboptimal technology use throughout the healthcare industry. The American Health Information Management Association (AHIMA) developed the e-HIM Virtual Lab (V-lab) to train students in the use of new technology applications in response to IOM findings. Faculty are the gatekeepers for use of instructional technology in educational settings. Many disciplines have evaluated instructional technology use by students. There are very few studies on faculty use of instructional technology. There are no published studies of the determinant factors influencing health information management (HIM) faculty use of instructional technology. Therefore, the purpose of this study is to evaluate the faculty's attitude and behavior toward the use of the V-lab instructional technology. A non-random one group pretest posttest design was used to test the hypothetical Instructional Perception -Technology Acceptance Model (IP- TAM) for faculty perceptions regarding system functionality, usability and technology acceptance. The Path Analysis determined the strongest construct indicators for intent to use the V-lab were Perceived Usefulness (PU), Perceived Ease Of Use (PEOU), System Functionality and Usability (SFU). These findings support the recommendation for a collaborative examination of the existing V-lab systems to improve utilization and success.
68

Examining Engineering & Technology Students Acceptance Of Network Virtualization Technology Using The Technology Acceptance Mode

Yousif, Wael K. 01 January 2010 (has links)
This causal and correlational study was designed to extend the Technology Acceptance Model (TAM) and to test its applicability to Valencia Community College (VCC) Engineering and Technology students as the target user group when investigating the factors influencing their decision to adopt and to utilize VMware as the target technology. In addition to the primary three indigenous factors: perceived ease of use, perceived usefulness, and intention toward utilization, the model was also extended with enjoyment, external control, and computer self-efficacy as antecedents to perceived ease of use. In an attempt to further increase the explanatory power of the model, the Task-Technology Fit constructs (TTF) were included as antecedents to perceived usefulness. The model was also expanded with subjective norms and voluntariness to assess the degree to which social influences affect students decision for adoption and utilization. This study was conducted during the fall term of 2009, using 11 instruments: (1) VMware Tools Functions Instrument; (2) Computer Networking Tasks Characteristics Instrument; (3) Perceived Usefulness Instrument; (4) Voluntariness Instrument; (5) Subjective Norms Instrument; (6) Perceived Enjoyment Instrument; (7) Computer Self-Efficacy Instrument; (8) Perception of External Control Instrument; (9) Perceived Ease of Use Instrument; (10) Intention Instrument; and (11) a Utilization Instrument. The 11 instruments collectively contained 58 items. Additionally, a demographics instrument of six items was included to investigate the influence of age, prior experience with the technology, prior experience in computer networking, academic enrollment status, and employment status on student intentions and behavior with regard to VMware as a network virtualization technology. Data were analyzed using path analysis, regressions, and univariate analysis of variance in SPSS and AMOS for Windows. The results suggest that perceived ease of use was found to be the strongest determinant of student intention. The analysis also suggested that external control, measuring the facilitating conditions (knowledge, resources, etc) necessary for adoption was the highest predictor of perceived ease of use. Consistent with previous studies, perceived ease of use was found to be the strongest predictor of perceived usefulness followed by subjective norms as students continued to use the technology. Even though the integration of the task-technology fit construct was not helpful in explaining the variance in student perceived usefulness of the target technology, it was statistically significant in predicting student perception of ease of use. The study concluded with recommendations to investigate other factors (such as service quality and ease of implementation) that might contribute to explaining the variance in perceived ease of use as the primary driving force in influencing student decision for adoption. A recommendation was also made to modify the task-technology fit construct instruments to improve the articulation and the specificity of the task. The need for further examination of the influence of the instructor on student decision for adoption of a target technology was also emphasized.
69

User Acceptance of Technology: an Empirical Examination of Factors Leading to Adoption of Decision Support Technologies for Emergency Management

Jennings, Eliot A. 08 1900 (has links)
This study examines factors that influence the intent to use and actual use of decision support software (DSS) technology by emergency management officials to facilitate disaster response management. The unified theory of acceptance and use of technology popularized by scholars from the field of information sciences (IS) for the private sector is adapted and extended to examine technology use in the public sector, specifically by emergency managers. An e-survey was sent to 1, 452 city and county emergency management officials from FEMA region VI and complete responses obtained from 194 were analyzed. Findings suggest that social influence is the strongest predictor of intent to use DSS technology by emergency managers, unlike private sector studies where performance expectancy was the strongest predictor. Additionally, effort expectancy, collaboration, social vulnerability, professionalism, performance expectancy, and gender explained 40 percent of their intent to use DSS technology. Factors explaining actual use of technology were intent to use technology, having an in house GIS specialist, and age of the emergency manager. This research successfully closes the gap in IS and disaster literature by being the first to focus on factors influencing technology use by emergency managers for decision making in disaster response. It underscores the importance of collaboration not only for post-disaster activities but also as a precursor to better disaster preparedness planning that calls for information sharing and technology acceptance and adoption across partnering jurisdictions.
70

Why Do Users Accept Innovative Technologies? A Critical Review of Models and Theories of Technology Acceptance in The Information System Literature

Alkhwaldi, A.F.A., Kamala, Mumtaz A. 08 1900 (has links)
Yes / Earlier literature illustrates that the selection of the appropriate theoretical model has always prescribed as a crucial task for the research community in the information systems (IS) field. According to the authors' knowledge, there are few articles aims to review IT acceptance theories and models at the individuals' level. Thus, this paper aims to bridge this gap by presenting a critical review of ten of the most influential models/theories that have been employed in predicting and explaining the human acceptance behavior of different technologies at the individuals' level. This paper also provides a summary of their evolution, pointed out the main constructs, strengths, related fields, and criticisms based on a selected published literature appeared in IS research. This review offers a holistic view for future scholars to select appropriate constructs/models owing to their strengths and criticisms as well explanatory or predictive power. This paper concluded that the well-established and comprehensive theoretical model should consider the parsimony in the term of simplifying the model with the least constructs and the highest predictive power, also the ability to integrate the relevant context's factors (e.g., UTAUT2).

Page generated in 0.2148 seconds