• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • 1
  • Tagged with
  • 6
  • 6
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

User-centric factors affecting the adoption of mobile government : the case of Oman

Qatoob Al Amri, Salim January 2018 (has links)
The evolution of mobile-phone technologies such as Smartphones Applications and Services enabled the emergence of digital and smart economies, governments and nations. Many developed and developing countries, like Oman, have considerably invested in the area of Smart Technologies, and initiated countless number of projects such as Smart Governments, also known as Mobile or M-Government, to provide timely, secure, satisfactory and high quality of services for the citizens, businesses and other governmental agencies. Although many scholars have investigated this area of interest with huge amount of efforts, the adoption and actual use of M-Government applications and services, remain problematic and face many challenges. In this area of interest, two major themes of research were reported in the literature: User-centred (i.e., Human-Computer Interaction perspective) and System-centred (i.e., Software Engineering perspective). The first theme remains a hot area of interest mainly due to the importance of the role of end-users in the adoption and success of the new technologies like M-Government. Therefore, this study attempted to develop and empirically validate a novel Mobile Government Adoption Model (titled: MGAM) within the culture of Oman. The MGAM model integrates a well-known theory in this domain, the Technology Acceptance Model (TAM), with other theories including Psychometric Paradigm Theory (PPT), Customer Culture Theory (CCT) and Personality Trait Theory (PTT) to identify key factors related to the end-users or citizens; those included their Perception of Risk, Culture and Personality Trait. The study adopted quantitative research with Survey method as a research strategy for data collection and quantitative methodology for data analysis. A new data collection instrument was developed for the purpose of this study and distributed through online facilities to collect data about the variables of the MGAM Model from Users in Oman using the M-Government applications and services. Around 450 samples (302 males and 148 females) were collected and considered for the purpose of data analysis in this study. Several statistical tools and means have been used to analyse the data and valuate the MGAM model including Descriptive and Inferential Statistic, Structural Equation Modelling (SEM), Comparative Fit Index Analysis, Exploratory Factor Analysis (EFA) with Statistical Software Applications, SPSS and AMOS Applications. The study revealed that most of the users in Oman using M-Government applications and services were very positive about the Perceived Ease of Use and the Perceived Usefulness of the technology with very positive Attitude and Behavioural Intention towards this technology. The findings also showed that the research participants have a slightly negative Perception of Risk when using the M-Government applications and services in Oman, and positive perception of Culture in this domain. With reference to the MGAM Model, the model was tested and validated, and the findings indicated that the Personality Trait moderator can strengthen the link between Behavioural Intention and Actual Use of the technology. Based on the findings, the study provided key recommendations for the governmental personnel dealing with the development of M-Government applications and services in Oman, and for public users in Oman. Among those, the study recommends for considering this initiative in Oman as a real and strategic shift in public administration, and to make easy, flexible and dynamic M-Government applications and services through taking into account cultural issues and user-related preferences. The study also recommended offering more than a service in one visit by the users, providing information prior to services and training governmental employees on this technology. The main contribution of this work is the development and validation of a new adoption model in the area of M-Government, the MGAM model. Theoretically, the MGAM Model extends the TAM Model through the integration process with with other theories including PPT, CCT and PTT to identify new key factors with impact on the adoption of M-Government infrastructure. This work also makes a novel contribution in terms of research methodology by developing and applying a new data collection tool, i.e., Mobile Government Adoption Questionnaire. This tool can be used by other researchers to collect data on the same research problem from contexts similar to the Omani one. Practically, this work attempted to identify the key prerequisites for the adoption and actual use of technology in the area of public services administration, and then making contribution towards the success of M-Government initiatives. The use of different tests and methods to statistically understand how the Omani end-users make decisions on the use of M-Government is also a novel practical contribution of this work.
2

User perceptions related to identification through biometrics within electronic business

Giesing, Ilse 09 January 2004 (has links)
Concerns over Information Technology security, including theft, fraud and abuse have forced organizations to take a cautious approach to Electronic Commerce. This research study suggests that organizations can keep secure their resources by implementing an effective and accurate identification system, which will enable them to provide a better service to their customers and to prevent individuals from misrepresenting themselves to the organization. Various means of identification are available, but the key focus should be to establish accurate identity. The research study addresses biometric identification methods as a means of improving the security of on-line transactions. The specific focus is an investigation of user perceptions with regard to biometric identification methods. The research study, through a theoretical understanding of the concepts found within the research problem statement, compiles a Technology Adoption Model for understanding why individuals accept or reject Information Technology innovations, which has proved to be one of the most challenging issues in Information Technology research. The exploratory field study section of the research study makes use of interpretive research as a basis to identify various themes related to user perceptions of biometrics. The themes identified are discussed during a focus group session with research participants. The main focus of the exploratory field study section is on user perceptions related to biometric identification methods and to enhance the Technology Adoption Model compiled by gathering user perceptions regarding the Internet, Electronic Business, biometrics and user adoption via a questionnaire to provide a possible solution for the research study problem statement. From the exploratory field study, it was concluded that user perceptions will play a role with regard to identification through biometrics within Electronic Business and that the social factors trust, security, and privacy considerations will also have to be taken into account. / Dissertation (MCom Informatics)--University of Pretoria, 2005. / Informatics / unrestricted
3

Guiding principles for adopting and promoting the use of Enterprise 2.0 collaboration technologies within the enterprise environment

Louw, Robert Leonard 11 1900 (has links)
Although Enterprise 2.0 collaboration technology toolsets present enterprises with a significant amount of business benefits, such as improved enterprise communication, collaboration, creativity and innovation; nevertheless, enterprises are still facing tremendous challenges in promoting and sustaining end-user adoption. The challenges associated with the adoption and promotion of Enterprise 2.0 collaboration technologies can often be linked to a resistance to change, a closed culture environment, and concerns pertaining to information security, technology complexity, as well as an unclear enterprise collaboration technology strategic roadmap. The primary objective of this study was to determine how generic guiding principles could facilitate the adoption and promotion of Enterprise 2.0 collaboration technologies within an enterprise environment. In support of the primary objective, our sub-objectives were to identify the challenges that enterprises, as well as enterprise end-users experience when adopting and promoting Enterprise 2.0 collaboration technologies, as well as to explore and describe the critical success factors for adopting and promoting Enterprise 2.0 collaboration technologies. A case study technique was used to gather the data from a large South African information and communications technology (ICT) enterprise operating within the retail sector based in Johannesburg. Enterprise end-users that formed part of the case study were selected by using purposive sampling. The end-users were selected, based on their experience, project sponsorship, as well as the project-participation roles performed in the adoption of their Enterprise 2.0 collaboration technology toolset. Semi-structured interviews were conducted on three (3) end-users, comprising a business analyst, a technology specialists and a senior executive. Furthermore, administered questionnaires were completed by five (5) end-users, who actively use their Enterprise 2.0 collaboration technology toolset on a daily basis, performing operational, as well as business administrative tasks. This study used a qualitative research approach. Since validity forms a vital role in any qualitative study, this research study incorporated three validity approaches, including: the theoretical, internal and external approaches. The theoretical and external validity approaches were used to validate the identified guiding principles through a systematic review of the existing literature, as well as reviews and comments obtained from two subject-matter experts representing independent enterprises. Furthermore, internal validity was employed to complement and substantiate the research findings, consisting of project documents and reports made available by the enterprise. The main contribution in this research study is a set of ten (10) guiding principles that could be applied by enterprises either planning to, or in the process of adopting an Enterprise 2.0 collaboration technology toolset. Furthermore, the guiding principles could assist enterprises in formulating a Enterprise 2.0 collaboration technology adoption strategy, incorporating key adoption elements, including commitment, promotion and sustainability. / Computing
4

Guiding principles for adopting and promoting the use of Enterprise 2.0 collaboration technologies within the enterprise environment

Louw, Robert Leonard 11 1900 (has links)
Although Enterprise 2.0 collaboration technology toolsets present enterprises with a significant amount of business benefits, such as improved enterprise communication, collaboration, creativity and innovation; nevertheless, enterprises are still facing tremendous challenges in promoting and sustaining end-user adoption. The challenges associated with the adoption and promotion of Enterprise 2.0 collaboration technologies can often be linked to a resistance to change, a closed culture environment, and concerns pertaining to information security, technology complexity, as well as an unclear enterprise collaboration technology strategic roadmap. The primary objective of this study was to determine how generic guiding principles could facilitate the adoption and promotion of Enterprise 2.0 collaboration technologies within an enterprise environment. In support of the primary objective, our sub-objectives were to identify the challenges that enterprises, as well as enterprise end-users experience when adopting and promoting Enterprise 2.0 collaboration technologies, as well as to explore and describe the critical success factors for adopting and promoting Enterprise 2.0 collaboration technologies. A case study technique was used to gather the data from a large South African information and communications technology (ICT) enterprise operating within the retail sector based in Johannesburg. Enterprise end-users that formed part of the case study were selected by using purposive sampling. The end-users were selected, based on their experience, project sponsorship, as well as the project-participation roles performed in the adoption of their Enterprise 2.0 collaboration technology toolset. Semi-structured interviews were conducted on three (3) end-users, comprising a business analyst, a technology specialists and a senior executive. Furthermore, administered questionnaires were completed by five (5) end-users, who actively use their Enterprise 2.0 collaboration technology toolset on a daily basis, performing operational, as well as business administrative tasks. This study used a qualitative research approach. Since validity forms a vital role in any qualitative study, this research study incorporated three validity approaches, including: the theoretical, internal and external approaches. The theoretical and external validity approaches were used to validate the identified guiding principles through a systematic review of the existing literature, as well as reviews and comments obtained from two subject-matter experts representing independent enterprises. Furthermore, internal validity was employed to complement and substantiate the research findings, consisting of project documents and reports made available by the enterprise. The main contribution in this research study is a set of ten (10) guiding principles that could be applied by enterprises either planning to, or in the process of adopting an Enterprise 2.0 collaboration technology toolset. Furthermore, the guiding principles could assist enterprises in formulating a Enterprise 2.0 collaboration technology adoption strategy, incorporating key adoption elements, including commitment, promotion and sustainability. / Computing
5

從創新擴散的觀點探討企業在Inbound Marketing的導入 / Adopting inbound marketing:the perspective of innovation diffusion

陳治平, Chen, Chih Ping Unknown Date (has links)
有關科技創新在擴散上的研究已行之有年,且有不少有關的研究發現及案例。但是創新的層面不只侷限於科技,在近年來服務創新、行銷創新等概念的興起,產生了創新領域內新的研究目標。而這些類型的創新擴散研究更是相當稀少,故本研究希望從此一方向進行探索性研究,期望同時有助於實務與學術的發展。 社會與科技的快速發展,促使網際網路的使用普及化,也影響到公司與消費者間的溝通及行銷模式。行銷創新:Inbound Marketing也是在這樣的情境下誕生。而近來台灣大量公司也採行Inbound Marketing作為重要的行銷手段時。讓公司不斷採納Inbound Marketing的理由及想法應該有可解釋的背後因素,所以本研究期望藉由研究的結果回答三點研究問題:(1) 影響行銷創新採用的重要關鍵因素為何?(2) 行銷創新擴散主要因素為何?(3) 不同產業在採用行銷創新上的異同為何? 本研究藉由文獻與學理的回顧,進一步探討Inbound Marketing行銷創新。以創新擴散、科技接受模式及兩階段理論作為基礎,發展出個案研究的基礎架構。研究架構將創新採用的過程,以創新決策流程作為基礎,區分為動機、啟發、執行及常規化等四個階段,並結合科技接受模式及兩階段理論中所討論的要素,進一步發展出構面。動機構面中含括創新、環境及組織等要素,啟發構面則包含設定標的及尋求創新等項目,執行構面則有重新定義及釐清兩個步驟,最後的構面則是常規化階段。本研究採用多重個案研究法,依前述的架構構面與變項進入深入的探討。 本研究所得到的初步結論包括:(1) 資源、環境及競爭要素是影響行銷創新採用的重要關鍵因素。(2) Inbound Marketing的高創新可近性是行銷創新擴散的主要因素。(3) 消費性電子及連鎖餐飲業在Inbound Marketing行銷創新採用的比較中,產業差異並不顯著。本論文最後進一步提出實務上及後續研究上的建議。 / Studies in innovation distribution and diffusion field have been researched for decades, but most innovation target will focus on technology innovation. Marketing innovation is still a new issue in innovation diffusion field. The study wants to be a base for following research in this topic. Internet quickly developing has totally changed communication tools between customers and companies, and forced new marketing method (or “marketing innovation”) “Inbound Marketing” was generated. And in these years, more and more companies adopt inbound marketing as a regular marketing tool. This study tries to explain the factors and motivation of company adopts marketing innovations, main reason of marketing innovation diffusion and differences of marketing innovation adoption between different industries. This study review innovation, marketing innovation related research, and make sure study target” Inbound Marketing” as a marketing innovation. And the study frame combines innovation diffusion, technology adoption model and two stage theory to analyze all study cases. The study structure is divided into four stages: Motivation, Inspiration, Execution and Routinization. Motivation contains “Innovation”,” Environment” and “Organization” factors. Inspiration includes “setting targets” and “seeking innovation”. Execution has ” Re-define” and “clarify” two stages. Finally companies adopt innovation and “Routinization”. The study finds “Resources”, “Environment” and “Competition” would be the main reason of marketing innovation adoption. And the high accessibility of inbound marketing with “Environment ” and “Competition” is the main factor of marketing innovation diffusion. Finally ,comparing “ Consumer Electronics Industry” and “ Chain restaurants” two industries, the difference in marketing innovation adoption is not obvious.
6

Users’ perceptions on security of mobile computing for adoption of e-applications in South Africa

Mapande, Fhatuwani Vivian January 2018 (has links)
M.Tech (Department of Information technology, Faculty of Applied and Computer Science), Vaal University of Technology. / The advancement of technology, particularly in the area of mobile computing, revolutionizes the way business is done in many industries such as the education sector, government sector, financial institutions, retail sector and the way people conduct their daily activities. The current technology provides influential tools for organisations and can significantly influence their operation, structure and approach. The development of mobile computing has created a new innovation for various industries by increasing the availability, frequency and speed of communication between the organisations and the individuals. However, users’ perceptions can play an important role towards the adoption of these new developments. The overriding purpose of this study was to investigate the users’ perceptions on the security of mobile computing in South Africa for adoption of e-applications. The literature review was concentrated on the process of progressive development occurring during the study. To accomplish that goal it became necessary to reach some essential objectives i.e. investigating the users’ perceptions models in literature. For the purpose of the study, it was important to propose a research framework for users’ perceptions on the security of mobile computing with the potential for the adoption of e-applications in South Africa. The research evaluated the proposed framework to establish if there is any relationship between the e-application adoption factors. Furthermore, the hypotheses were tested to determine which factors would influence the adoption of e-applications in South Africa. Technology Adoption Model 2 (TAM2) and Diffusion of Innovation (DOI) provide the theoretical basis for explaining how users perceive e-application services that they access and operate through mobile computing. To achieve that, a quantitative study was conducted with South African residents, with respect to mobile security perceptions; 476 valid questionnaires were received from the participants who were selected non-randomly. Questionnaires were developed from the proposed research framework derived from DOI and TAM2 and the items were adopted from other prior technology adoption studies. Through the use of the survey instrument developed for this study, data were collected in order to address the importance of this study based on the problem statement posed in the first chapter of this dissertation. The valid questionnaires were analysed by using the Statistical Package for the Social Sciences (SPSS), Version 24.0. Reliability analysis, principal component analysis, correlations and multiple linear regression tests were conducted. Among other things this study made sure that ethical considerations are adhered to. The findings revealed positive relationships between perceived usefulness of security mechanisms, perceived ease of use of security mechanisms, subjective norm on security mechanisms, relative advantage of security mechanisms, compatibility of security mechanisms, complexity of security mechanisms, aesthetics of security mechanisms interface and intention to adopt e-applications. Furthermore, subjective norm on security mechanisms was strongly correlated to intention to adopt e-applications, complexity of security mechanisms strongly correlated to perceived usefulness of security mechanisms, relative advantage of security mechanisms and aesthetic of security mechanisms interface strongly correlated to perceived usefulness of security mechanisms. In addition, subjective norm of security mechanisms strongly influence intention to adopt eapplications in South Africa. Also, aesthetics of security mechanisms interface strongly influence both perceived usefulness of security mechanisms and perceived ease of use of security mechanisms. The reason behind it may be interpreted as users nowadays seeing the beauty as the platform to attract and encourage them to use e-applications. Finally, the proposed model analysis and survey evaluation will enable South African organizations to make informed decisions about the use of e-applications services. These findings contribute to a road map for the education sector, government sector, financial institutions, and retail sector as well as to encourage their customers or clients to adopt e-applications.

Page generated in 0.1776 seconds