The technology acceptance model proposes that perceived ease of use and perceived usefulness predict the acceptance of information technology. Since its inception, the model has been tested with various applications in tens of studies and has become the most widely applied model of user acceptance and usage. Nevertheless, the reported findings on the model are mixed in terms of statistical significance, direction, and magnitude. In this study, we conducted a meta-analysis based on 26 selected empirical studies in order to synthesize the empirical evidence. The results suggest that both the correlation between usefulness and acceptance, and that between usefulness and ease of use are somewhat strong. However, the relationship between ease of use and acceptance is weak, and its significance does not pass the fail-safe test.
Purpose-As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and developed many different information security standards and guidelines. Building on these previous efforts, the purpose of this study is to put forth a framework for ISM. Design/methodology/approach-This framework is derived from the development of an a priori set of objectives and practices as suggested by literature, standards, and reports found in academia and practice; the refinement of these objectives and practices based on survey data obtained from 354 certified information security professionals; and the examination of interrelationships between the objectives and practices. Findings-The empirical analysis suggests: four factors (information integrity, confidentiality, accountability, and availability) serve as critical information security objectives; most of the security areas and items covered under ISO 17799 are valid with one new area-"external" or "inter-organizational information security"; and for moderately information-sensitive organizations, "confidentiality" has the highest correlation with ISM practices; for highly information-sensitive organizations, "confidentiality", "accountability", and "integrity" are the major ISM objectives. The most important contributor to information security objectives is "access control". Research limitations/implications-This study contributes to the domain of information security research by developing a parsimonious set of security objectives and practices grounded in the findings of previous works in academia and practical literature. Practical implications-These findings provide insights for business managers and information security professionals attempting to implement ISM programs within their respective organizational settings. Originality/value-This paper fulfills a need in the information security community for a parsimonious set of objectives and practices based on the many guidelines and standards available in both academia and practice.
The technology acceptance model (TAM) stipulates that both perceived ease of use (PEOU) and perceived usefulness (PU) directly influence the end user’s behavioral intention (BI) to accept a technology. Studies have found that self-efficacy is an important determinant of PEOU. However, there has been no research examining the relationship between self-efficacy and BI. The studies on the effect of self-efficacy on PU are also rare, and findings are inconsistent. In this study, we incorporate Internet self-efficacy (ISE) into the TAM as an antecedent to PU, PEOU, and BI. We conducted a controlled experiment involving a Web-based medical record system and 86 health care participants. We analyzed both direct and indirect effects of ISE on PEOU, PU, and BI using hierarchical regressions. We found that ISE explained 48% of the variation in PEOU. We also found that ISE and PEOU together explained 50% of the variation in PU, and the full model explained 80% of the variance in BI.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.