The aim of this study was to explore the importance of service need along with perceived technology attributes in potentially influence the acceptance of teleconsultation. The study was conducted based on the concurrent triangulation design involving qualitative and quantitative study methods. These entailed interviews with key informants and questionnaires survey of health care providers who practiced in the participating hospitals in Malaysia. Thematic analysis involving iterative coding was conducted on qualitative data. Scale reliability test and hypothesis testing procedures were performed on quantitative data. Subsequently, both data were merged, compared and interpreted. In particular, this study utilized a qualitative priority such that a superior emphasis was placed on the qualitative method to demonstrate an overall understanding. Based on the responses of 20 key informants, there was a significant need for teleconsultation as a tool to extend health services to patients under constrained resources and critical conditions. Apparently, the latest attributes of teleconsultation technology have generally met users' expectation but rather perceived as supportive facets in encouraging the usage. Concurrently, based on the survey engaging 72 health care providers, teleconsultation acceptance was statistically proven to be strongly associated with service need and not originated exclusively from the technological attributes. Additionally, the results of this study can be used to promote teleconsultation as an effective means in delivering better health services. Thus, the categories emerged from this study may be further revised and examined for explaining the acceptance of teleconsultation technology in other relevant contexts.
Technology acceptance studies are a common medium of determining approval and predicting future use of technologies in the field of Information Systems. Numerous technology acceptance studies have been done in the area of education however there still remain hindrances in the use of computer in education. The aim of this study is to analyse published research materials in the area of technology acceptance in education and identify the current research patterns. Upon identifying these patterns, a future research path is presented. For this purpose, initially the popular technology acceptance theories are studied so as to build a firm base for examining the technology acceptance works in education domain. The technology acceptance research works were thoroughly scrutinized to identify important aspects like acceptance theory used, constructs used, causal relationships and user types. Based on all these aspects a future research pathway is suggested.
<p>This study presents an amended Unified Theory of Acceptance and Use of<br />Technology (UTAUT) which explores key factors affecting Malaysian<br />consumers &#39; willingness to accept mobile-commerce. A questionnaire survey<br />has been used to collect information from 400 Malaysian smartphone users<br />using a random stratified sample and analyzed using Structural Equation<br />Modelling (SEM); with the use of Smart PLS 3.0. Results show that<br />acceptance and use of mobile-commerce services can also be predicted by<br />the behavioural intentions of users, whose performance expectancy, efforts<br />expectations, social effects, mobility, personal innovations and perceived<br />trust are significantly affected. From these variables, perceived trust is the<br />most significant determinant that directly affects behavioural intention to use<br />mobile-commerce services in Malaysia. It is then followed by Mobility,<br />Personal Innovation, Social Influence, Performance Expectancy then Effect<br />Expectancy. Facilitating Conditions and moderating variables such as<br />gender, age, education, income, marital status, experience and payment have<br />no significant effect on Behavioral Intention to use mobile-commerce<br />services in Malaysia. In conclusion, this study shows that behavioural<br />intention and the use of mobile commerce services in Malaysia have a direct<br />effect. The study will help dealers to avoid spending thousands of dollars on<br />investments that have little impact on whether the customer is embracing and<br />using mobile-commerce. The study also provides quantified indicators and<br />offers a framework for the understanding of the Malaysia mobile-commerce<br />system. The report concludes with a study of the effects of the research<br />findings and provides recommendations for future research.</p>
The paper aims to identify behavioural theories that influence information security policies compliance behaviour. A systematic review of empirical studies from eleven online databases (ACM digital library, Emerald Insight, IEEE Xplore digital library, Springer link, Science direct, Scopus, Web of Science, Oxford academic journals, SAGE journals, Taylor & Francis and Wiley online library) are conducted. This review identified 29 studies met its criterion for inclusion. The investigated theories were extracted and analysed. Total of 19 theories have been identified and studied concerning to security policy compliance behaviour. The result indicated that the most established theories in information security compliance behaviour studies are the Theory of Planned Behavior and Protection Motivation theory. Meanwhile, General Deterrence Theory, Neutralization theory, Social Bond Theory / Social Control Theory are used moderately in this research area. Less explored theories are namely Self Determination Theory, Knowledge, Attitude, and Behavior, Social Cognitive Theory, Involvement Theory, Health belief model, Theory of Interpersonal Behavior, Extended Parallel Processing Model, Organisational Control Theory, Psychological Reactance Theory, Norm Activation Theory, Organizational Behaviour Theory, Cognitive Evaluation Theory and Extended Job Demands-Resources. The results from this review may guide the development and evaluation of theories promoting information security compliance behaviours. This will further contribute in the development of an integrated theory of information security compliance behaviour.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.