• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 41
  • 19
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 74
  • 74
  • 33
  • 31
  • 31
  • 19
  • 17
  • 16
  • 16
  • 14
  • 13
  • 13
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

VOD-tjänster : Faktorer för en ökad diffusion och användaracceptans

Brodén, Fredrik, Karamehmedovic, Alen January 2013 (has links)
I den här uppsatsen har faktorer för en ökad användaracceptans och diffusion av Video on demand(VOD)-tjänster identifierats med hjälp av en litteraturgenomgång av tidigare studier i acceptans och diffusion. Litteraturgenomgången ligger till grund för en lista av faktorer som gör en konsument mer villig att anamma en VOD-tjänst. Faktorerna har sedan utvärderas genom en kvantitativ undersökning med hjälp av en webbenkät. Resultatet blev i stor grad det som förväntat där det framgår att utbud och kostnad är de viktigaste faktorerna för en hög acceptans, men även andra faktorer kan spela in som användarvänlighet, kvalitet och sociala faktorer. / This paper has identified factors for increased user acceptance and diffusion of Video on Demand(VOD) services through a literature review of previous studies. The literature review was used to make a list of factors that make a consumer more willing to use a VOD service. The factors are then evaluated through a quantitative study using an online questionnaire. The result was to a large degree what was expected, which shows that content and cost are the main factors for a high acceptance, but other factors may play in as well such as ease-of-use, quality, and social factors.
32

User Acceptance in the Sharing Economy : An explanatory study of Transportation Network Companies in China based on UTAUT2

Chen, Yifan, Salmanian, Wolfram January 2017 (has links)
For many years, research on user acceptance of different technologies has been one of the most important topics within the field of information systems. In markets with the sheer size and uniqueness of the Chinese mobile economy fostered rapid development of sharing economy firms. Transportation Network Companies (TNC) can be regarded as a context of the sharing economy that focuses on personal transportation. Intrigued by the immense success of TNC and notorious competition between TNC companies Uber and DiDi in China, we study why users are susceptible to TNC. In this study, user acceptance is defined as intention to use TNC and the actual use of TNC. This study aims to examine what factors affect user acceptance of TNC in China and to what extent. By this, the thesis aims to provide TNC with adequate recommendations for success. The state of the art user acceptance model UTAUT2 has been used in this research with an explanatory purpose and a deductive approach. The UTAUT2 model consists of factors related to user acceptance, such as Performance Expectancy, Effort Expectancy, Social Influence, Facilitating Conditions, Hedonic Motivation, Price Value and Habit. These factors were individually tested with Simple Linear Regression to determine their influence on user acceptance. These calculations were executed upon quantitative data from an electronically distributed survey. Upon analysis of the findings, research and practical implications are provided such as managerial recommendations for how TNC can raise user acceptance and increase market share.
33

Understanding and Predicting Students' Intention to Pay for Private Cloud Storage Services

Meier, Philip January 2017 (has links)
Date: 05 June 2017 Level: Bachelor Thesis in Business Administration, 15 ECTS Institution: School of Business, Society and Engineering, Mälardalen University Authors: Meier, Philip Soltani, Nazila Khodabandeloo (88/03/11) (93/07/05) Title: Understanding and Predicting Students’ Intention to Pay for Private Cloud Storage Services Tutour: Konstantin Lampou Keywords: cloud storage service, iCloud, technology acceptance model, information systems, user acceptance, intention to pay Research Question: What are students’ intention to pay for private cloud storage services and why? Purpose: The purpose of this study is to investigate students’ intention to pay for private cloud storage services, in order to find out how willing they are to pay for such services and for what reasons. Method: This study takes a qualitative approach, where both primary and secondary data are collected. Secondary data was collected through i.e. empirical studies and annual publications. Primary empirical data was conducted through semi-structured interviews with 21 students of Mälardalen University. The primary empirical data was analysed using a thematic analysis. Conclusion: Conducting this study showed, that most of the factors’ influences on students’ intention to pay for private cloud storages were positive, resulting in an overall high willingness to pay. The perceived monetary sacrifice was regarded as very low, hence not preventing potential customers from paying for the services. Considerable issues were however found in the perceived quality, more precisely in the perceived reliability and the lack of trust expressed in private cloud services. Finally, unused potential for private cloud service providers to positively influence students’ attitudes was found both in the perceived usefulness and subjective norm factors.
34

Hur medarbetare kan introduceras till ett nytt affärssystem : En fallstudie inom Uddeholm AB / How Employees can be Introduced to a new ERP System : A case study within Uddeholm AB

Eriksson, Johanna January 2020 (has links)
Syftet med denna kandidatuppsats i informatik är att ge fallföretaget underlag att använda föratt kunna förbereda sina medarbetare inför ett systembyte och därmed undvika vanligafallgropar. Uddeholm AB är studiens fallföretag och syftet har formulerats utifrån ettkunskapsbehov företaget upplever. Litteraturstudier har använts för att precisera studiensfrågeställningar och som underlag för en intervjuguide som användes i intervjuer medanvändare och systemexperter.Undersökningsfrågorna handlar om vilka åtgärder som behöver vidtas för att förberedaanvändare inför det kommande affärssystemsbytet, samt hur dessa åtgärder ska utföras. Dessafrågor har besvarats från både ett användarperspektiv och perspektiv från systemexperter.Slutsatserna ur ett användarperspektiv var att användarinvolvering var viktigast. Detta menaranvändarna kan göras genom att de får vara delaktiga i att identifiera brister i det nuvarandesystemet och därmed bidra med hur de anser att det kommande systemet ska anpassas. Andraslutsatser var att key users kunde användas till att motivera medarbetarna, att få tid tillutbildning innehållande introduktion, testning i verklig miljö, ta del av nya funktioner menäven att jämföra nya affärsprocesser med nuvarande som användarna inte ville skulle ändras.Manualer ansåg användarna vara oväsentliga medan däremot lathundar, chattfunktioner ochhjälpbubblor hade varit bättre. Aktiva ledningsstöd ansåg användarna vara viktigt och det kangöras genom att de delar med sig av lättillgänglig information, har en kontaktperson blandanvändarna och att användarna får delta i möten och avstämningar.Systemexperterna anser att användarinvolvering är oerhört viktigt och menar att workshopskan användas för detta men berättar inte i vilket syfte. Utbildning i det nya systemet ärmycket väsentligt anser de också. Deras uppfattningar om utbildningens innehållöverensstämmer med användarnas med avseende på introduktion och ta del av nya funktioner.De nämner interaktiva filmer som en del av användarutbildningen vilket inte användarnanämner men deras förslag med testning i verklig miljö kan vara jämförbart. Systemexperternaanser att det kan vara en nödvändighet att användarna ändrar sina arbetsprocesser. Dettaskiljer sig ifrån användarnas önskemål. Systemexperterna anser också att ledningens aktivastöd inte är viktigt vilket också skiljer sig från användarnas uppfattning som menar attledningens stöd är väsentlig.
35

Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia.

Al-Harby, Fahad M. January 2010 (has links)
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
36

The Use Of Learning Management Systems In Primary Schools : A Qualitative Study Among Teachers In Sweden

Zakre, Kenan January 2019 (has links)
Information and Communication Technology is used in the education field in Sweden toimprove learning quality. The aim of this research is to investigate the use of LearningManagement Systems in primary schools, in the specific context of the role of LearningManagement System (LMS) in learning and teaching processes from teachers‟perspectives. Furthermore, This Thesis aims to explore teachers‟ perceptions of how touse this learning management system which is used in primary Swedish schools.Six teachers from two different primary schools in small municipality in the south ofSweden participated in semi-structured interviews. The theoretical model of UnifiedTheory of Acceptance and Use of Technology (UTAUT) inspired this qualitativeresearch along with the other related past studies. This quantitative model was only usedto sensitize the research process, for collecting and analysing qualitative data in thisstudy.The different elements of the theory such as performance expectancy, effort expectancy,social influence and facilitating conditions along with studies helps in conducting studybasedon qualitative approach for analysing the interviews. The research results indicatethat teachers were content with the usage of this learning management system, but thereis a lack of knowledge regarding this system. The system is helpful in performanceevaluation, planning, communication and overall working for routine tasks. Theresponses of interviews showed that teachers are not trained for using the features ofLearning management system in the way that it is designed for. The findings showed thatteachers require the support from professionals to integrate the system into their routineplanning. Furthermore, they also emphasise on the need to make the system user-friendlywith easy navigation. The findings of this study were compared to previous studies, anda further comparison was carried out regarding how it relates to the determinants andmoderating factors such as peer influence, internal perceptions and motivations, timeconstraints, organisational structure and facilitating conditions. Hence, support andtraining are needed to enhance learning and teaching through this Learning managementsystem.
37

COLLABORATION IN BANKING INFORMATION SYSTEMS : INVESTIGATING THE FUTURE OF BANKING SYSTEMS IN INDIA

Abburi, Sridhar, Chinnappan, Ramakrishnan January 2013 (has links)
Banking systems in India is quite popular and it needs some more changes to reach all the customers. Lack of the service is main problem in Indian baking system. If the common person wants to open the account, it take’s little bit high cost and banks are not near the people location. Due to the Lack of service, people do not want to be a customer of the bank. In the research trying to find the solutions for some of the problems to maintain a banking account, we want to provide the maximum time of service in banking systems and to find the better solution for the common persons to use the banking systems. The research idea Collaboration banking information systems are designed to combine all the account information into a system, to provide a better solution for the customer, and to solve all the internal problems in the banking systems. From this new concept we could establish the bank in each and every village, So that we could reach all the customers by providing them a good quality service and exceeding their expectations. The Collaboration systems are less time consuming and it reduces the burden of both the customers and bank employees. Some banks failed due to the lack of customers and the over burden of interest charged by the government.The research idea is to share all the account details from all the banks into a system that is known as collaboration banking information systems. The collaboration banking systems are entirely different and it reduces the cost maintenance of the Indian banking systems. / Program: Magisterutbildning i informatik
38

Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager's Perspective

Cerda III, Cruz 01 January 2018 (has links)
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The research questions were designed to investigate the relationship between intention to adopt palm vein authentication technology and perceived usefulness, complexity, security, peer influence, and relative advantage. The unified theory of acceptance and use of technology was the theoretical basis for this quantitative study. Data were gathered through an anonymous online survey of 109 healthcare managers and doctors, and analyzed using principal axis factoring, Pearson's product moment correlation, multiple linear regression, and 1-way analysis of variance. The results of the study showed a statistically significant positive correlation between perceived usefulness, security, peer influence, relative advantage, and intention to adopt palm vein authentication. No statistically significant correlation existed between complexity and intention to adopt palm vein authentication. These findings indicate that by effectively using palm vein authentication, organizations can mitigate the risk of medical fraud and its associated costs, and positive social change can be realized.
39

Nutzerakzeptanz von web-basierten „sozialen“ Unternehmensanwendungen

Wilhelm, Daniel B. 15 May 2014 (has links) (PDF)
No description available.
40

Evaluating the Usability and Usefulness of an E-Learning Module for a Patient Clinical Information System at a Large Canadian Healthcare Organization

Dafalla, Tarig Dafalla Mohamed 03 September 2013 (has links)
Alberta Health Services (AHS) has introduced e-learning for health professionals to expand their existing training, offer flexible web-based learning opportunities, and reduce training time and cost. This study is designed to evaluate the usability and usefulness of an e-learning module for a patient clinical information system scheduling application. A cost-effective framework for usability evaluation has been developed and conceptualized as part of this research. Low-Cost Rapid Usability Engineering (LCRUE), Cognitive Task Analysis (CTA), and Heuristic Evaluation (HE) criteria for web-based learning were adapted and combined with the Software Usability Measurement Inventory (SUMI) questionnaire. To evaluate the introduction of the e-learning application, usability was assessed in two groups of users: frontline users and informatics consultant users. The effectiveness of the LCRUE, CTA, and HE when combined with the SUMI was also investigated. Results showed that the frontline users are satisfied with the usability of the e-learning platform. Overall, the informatics consultant users are satisfied with the application, although they rated the application as poor in terms of efficiency and control. The results showed that many areas where usability was problematic are related to general interface usability (GIU), and instructional design and content, some of which might account for the poorly rated aspects of usability. The findings should be of interest to developers, designers, researchers, and usability practitioners involved in development of e-learning systems. / Graduate / 0769 / 0984 / 0541 / tdafalla@uvic.ca; tdafalla@gmail.com

Page generated in 0.4788 seconds