There are a number of theories and models that have been employed over the years in understanding and studying users' technology adoption behaviors. These theories and models focus on people's intention to engage in a certain behavior such as the adoption and use of new technologies. The Theory of Reasoned Action (TRA) is one of such theories that have been widely used in technology adoption as well as used in a number of other research fields as a foundation to such studies. Most of the Information Systems scholars, who have used this theory, have used only to set a foundation or help build other theories and models. TRA has therefore been compared with other theories and models for technological innovation, and found to be a strong theory for innovation adoption upon a few additions of other variables such as facilitating conditions, awareness of innovation by users, social pressure and user readiness.
The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This paper was therefore seeking to explore challenges facing mobile phone money services. Qualitative research technique was used. Further, both primary and secondary data was used. The study was conducted in Homa Bay region in Kenya, using ethnography research design. The study established that mobile phone money use and adoption had numerous challenges that had hindered it. Most affected by the challenges were the mobile phone money users and potential users from the rural poor communities. Some of the challenges included lack of national ID cards by potential users, few mobile phone money agents, inadequate cash and e-floats by the agents, awareness and lack of information on how to access and operate certain features in mobile money platform, as well as language barrier.
Abstract:Information is one of the most important assets in Organizations worldwide. To enable secure business operations, an organization must have an effective security governance strategy. The study focused on Information security governance in Public Universities in Kenya by establishing the current status of information security practices. Purposive sampling used to select seven (7) public Universities. A descriptive survey design, involving questionnaire was conducted to collect quantitative data. 394 respondents participated in the study. Data was analyzed using SPSS software. Correlation and multiple Regression analysis were obtained. The findings reveal that information security management's participation level is inadequate to deal effectively with information security governance threats, roles and responsibilities not well defined in support of information security governance practices. The research provides a comprehensive model for ensuring alignment of information security objectives with business objectives.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.