BYOD The Next Big Thing in Recruiting? Examining the Determinants of BYOD Service Adoption Behavior from the Perspective of Future Employees

Size: px
Start display at page:

Download "BYOD The Next Big Thing in Recruiting? Examining the Determinants of BYOD Service Adoption Behavior from the Perspective of Future Employees"

Transcription

1 BYOD The Next Big Thing in Recruiting? Examining the Determinants of BYOD Service Adoption Behavior from the Perspective of Future Employees Michael Loose Faculty of Information Management Neu-Ulm University Wileystr. 1, Neu-Ulm Germany Andy Weeger Center for Research on Service Science Neu-Ulm University Wileystr. 1, Neu-Ulm Germany Heiko Gewald Center for Research on Service Science Neu-Ulm University Wileystr. 1, Neu-Ulm Germany ABSTRACT Bring Your Own Device (BYOD) enables employees to use their privately-owned devices for business purposes. There is an ongoing debate on the costs, benefits and potential threats of this concept amongst practitioners. Surprisingly, employees and their expectations and attitudes towards BYOD are rarely part of these discussions. Contributing to this research area, this study answers questions on the determinants of BYOD adoption and acceptance behavior. For that purpose, the UTAUT model was adapted and extended. Quantitative data was collected from students of business and engineering majors in Germany. Performance expectancy was found to be the strongest determinant of behavioral intention to use BYOD services. However, 'perceived threats' a newly introduced construct also showed to have a significant explanatory value. Additionally, the significant impact of behavioral intention to use a BYOD service on employer attractiveness indicates that the offering of BYOD can indeed be a powerful measure to recruit future employees. KEYWORDS Consumerization of IT, Bring Your Own Device, BYOD, UTAUT, Structural Equation Model, Employer Attractiveness Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

2 INTRODUCTION IT departments have invested a lot of effort in building up standardized service offerings for their clients. These efforts have frequently been driven by objectives such as to decrease costs, ensure manageability and IT-security (Vogel et al., 2010). Nowadays, consumer devices such as mobile phones and tablet PCs are evolving faster than ever. Furthermore, business mobility is becoming an essential part of business operations (Harris et al., 2012). In this regard, standardized services offered by the IT department do frequently not cover the requirements imposed on the employees. Additionally, employees want to use the same devices in a corporate environment as they use in their private lives (Holtsnider et al., 2012). Therefore, IT departments are threatened by two trends which are mutually influencing each other: the need for mobile business capabilities and the consumerization of IT (Harris et al., 2012). If these trends could not be sufficiently addressed by corporate IT, firms may find themselves overwhelmed with innovations aimed at the consumer sector spilling over in the corporate environment (Cummings et al., 2009; Ingalsbe et al., 2011). Consumerization of IT refers to the trend that employees want to use the same devices, applications, and IT services in a corporate environment as they use in their private lives (Holtsnider et al., 2012). Throughout this paper, we apply the definition of Niehaves et al. (2012, p. 2) who regard IT consumerization as a scenario in which employees "invest their own resources to buy, learn, and use consumer technology at their workplace". Using consumer devices for business purpose is currently the most visible kind of IT consumerization behavior. Therefore, the current discussion of IT consumerization primarily focusses on the usage of privately-owned computing devices at workplace (Ingalsbe et al., 2011; Holtsnider et al., 2012; Weiß et al., 2012). IT consumerization focusing on devices not on applications and services is commonly referred to as "Bring your own Device" (BYOD), a sub-trend of consumerization. To address the demands of their employees, an increasing number of IT organizations are offering BYOD services to their customers (Györy et al., 2012). Offering a BYOD service implies that firms open their networks and enable data-access to consumer devices. Furthermore, adopting a BYOD service means that employees have to accept policies regarding the usage of their privately-owned devices for business purposes. These policies are established in order to safeguard security and to govern liability (Vogel et al., 2010; Harris, 2012). Subsequently, we define BYOD service as a service offered by corporate IT that allows employees to bring privately owned device to the workplace, to connect them to the corporate network and to use them for business purposes. This type of service offering is subject to an extensive debate among IT executives. These debates often address the question whether enabling employees to use their own devices does outweigh costs and risks. On the one hand, embracing a mobility strategy and integrating consumer devices in the corporate IT infrastructure requires carefully considered investments in security technology (Harris et al., 2012), as well as management and operation concepts (Weiß et al., 2012). On the other hand, anecdotal evidence indicates that there is a high level of motivation to use private devices in business contexts. As they have been born into the digital age in which technology is ubiquitous (Prensky, 2001), especially young employees are willing and sometimes even demanding to use their own devices for business related tasks. Furthermore, the use of privatelyowned devices is difficult to prevent. Therefore, offering a BYOD service could be a reasonable step to prevent the rise of uncontrollable shadow IT infrastructures established by the users (Györy et al., 2012). Although it is expected that consumerization of IT will gain even more momentum in future (Fenn et al., 2011), IS research does not yet provide adequate guidance on this phenomenon (see literature review). As young people, frequently labeled as 'digital natives' (Prensky, 2001), are supposed to be among the first to adopt new information technology, they can be seen as the drivers of this trend. Therefore, the focus of this study has been on students in their final years of study, i.e. the future employees. In order to gain understanding on the factors driving young employees to adopt BYOD services, we postulate the following research question: What are the determinants of BYOD service adoption among future employees? As a shortage of young workers results in a fierce competition in the personal recruitment market (Köchling, 2003), in particular SMEs are looking for ways to remain and become attractive for young employees. Assuming that future employees are likely to adopt BYOD services, we put a second research question forward: Does the attractiveness of a company for future employees increase if they are able and permitted to use their own devices for business purpose? This paper is structured as follows. In the next section the theoretical background is briefly discussed. Drawing on these findings, the development of the research model and the subsequent research methodology is presented. Finally, the results are discussed, conclusions are drawn and suggestions for future research are presented. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

3 LITERATURE REVIEW AND THEORETICAL BACKGROUND Scientific Literature on IT Consumerization and BYOD Although IT consumerization is of great interest for both scholars and practitioners, scientific literature is unexpectedly rare. Analyzing information systems (IS) conference proceedings and journals, only few papers on BYOD appeared. This finding is supported by the structured literature review provided by Niehaves et al. (2012) who identified only 22 scientific papers focusing on consumerization of IT / BYOD. However, most scholars discuss IT consumerization as a result of a reversed technology adoption life cycle, initiated by employees demanding the same ease of use with corporate IT as consumer products offer (Cummings et al., 2009). IT consumerization is usually defined as the dual use of devices, applications, and services for private and business purpose (Ingalsbe et al., 2011; Holtsnider et al., 2012). Harris et al. (2011, p. 2), for instance, define consumerization of IT as the adoption of consumer application, tools, and devices in the workplace. Other authors, such as Niehaves et al. (2012), regard the ownership as key characteristic and conceptualize IT consumerization as a phenomenon in which employees invest their own resources in order to use consumer technology at work. IT consumerization is expected to positively contribute to work performance (Niehaves et al., 2013) and regularly associated with greater autonomy for employees (Niehaves et al., 2012). Additionally, employees perceive that technology which they chose on their own is easier to use while providing increased user experience (Murdoch et al., 2010; Harris et al., 2011). Nonetheless, the phenomenon is also seen critical. In this regard, a structured literature review points out several disadvantages for employees and organizations (Niehaves et al., 2012). Security issues, increasing complexity, loss of control and performance issues are potentially negative effects for organizations. In this regard, Weiß et al. (2012) discuss the impacts on corporate IT at different stages such as information management, information exchange, information systems and information technology. They conclude that the challenges for IT management in organizations increase without a predictable end. Other scholars expect significant cost reductions for organizations due to consumerization (Ingalsbe et al., 2011; Holtsnider et al., 2012). On the employee level, it is supposed that consumerization increases workload while realizing productivity gains (Ingalsbe et al., 2011; Niehaves et al., 2012). As laid out in the introduction, using consumer devices for business purpose is currently the most visible and most discussed kind of IT consumerization behavior. This sub-trend of IT consumerization is commonly referred to as BYOD. We define BYOD as the act of bringing personally owned device to the workplace, connecting them to the corporate network and using them for business purposes. The BYOD concept can be extended into a complete set of BYOD services. A BYOD service is defined as an offering of the IT organization which allows end users to choose and use the devices that best meet their personal and business needs, instead of getting a standardized device from the IT department. Additionally, the BYOD services can be composed of different financial models describing who is actually paying for the device (Bocker et al., 2012). For instance, Choose Your Own Device (CYOD) means that the employee can select a device from a predefined shopping cart which is financed by the company and may also be used for private purposes (Lang, 2012); whereas We Sponsor Your Device (WSYD) implies that the employee receives a financial compensation for using a privately-owned device for business purpose (Vogel et al., 2010). For this study we adopted the following conception of a BYOD service: A BYOD service offered by corporate IT allows employees to use their private and self-financed IT device at work, connect the device to the corporate network, access corporate data and use it for business purposes to the same extent as devices offered by the company. Using a BYOD service requires that the employee accept the terms of use and security policies and that he or she assumes full responsibility for support, installation and maintenance of the respective device(s). Theoretical Foundation: Technology Acceptance To gain knowledge on the factors driving employees to use a BYOD service, this study builds upon prior technology adoption research. IS research provides several theories to explain individual's technology adoption behavior. Most of these theories are based on the premise that human beings are rational and that they consider the implications of their actions before they decide whether to perform a certain action or not. These theories conceptualize intention as a function of beliefs about the likelihood that performing a particular behavior will lead to a specific outcome. The stronger the intention to engage in a behavior, the more likely that the action will be performed (Ajzen, 1991). For instance, the Technology Acceptance Model (TAM) (Davis, 1989) proposes perceived usefulness and perceived ease of use as determinants of an individual's intention to use a technology. These determinants account for positive outcomes associated with using a technology. In the same vein, other technology acceptance models such as the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al., 2003) hypothesized that the advantages of using a technology and conditions facilitating usage determines an individual s adoption behavior. To decide if technology acceptance models are also suitable for the analysis of service adoption behavior, studies aiming to explain individual s service adoption have been reviewed. These studies indicate that technology acceptance models are capable to explain an individual s adoption behavior in regard to technology based services (Featherman et al., 2003; Amberg Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

4 et al., 2004; Pagani, 2004; Hung et al., 2005; Carlsson et al., 2006; Chen et al., 2007; Mallat et al., 2008). Almost all of the cited studies show that perceived usefulness and ease of use are important determinants of an individual s service adoption behavior. In particular usefulness was found to be the most significant factor (Pagani, 2004; Chen et al., 2007). On the other hand, the role of social influences as a determinant of service adoption was found to be rather mixed. For instance, Carlsson et al. (2006) found no significant impact of social influence on intention. In contrast, the data of Mallat et al. (2008) indicates an impact of social influence on intention. Overall, these studies confirm the capability of technology acceptance models to explain the determinants of service adoption. Nevertheless, Carlsson et al. (2006) as well as Featherman et al. (2003) point out that modifications on existing technology acceptance models are necessary to explain the adoption of mobile services. RESEARCH MODEL As the UTAUT model has been developed through a review and consolidation of the eight most prominent technology acceptance models (Venkatesh et al., 2003), it seems to be suitable to contribute explanations on the factors influencing BYOD service adoption by future employees. Although, the UTAUT such as other technology acceptance models solely focuses on the advantages of using an technology, the usage of innovative technologies must not always be beneficial (Featherman, 2001). To address potential negative outcomes of BYOD service adoption, perceived threats (PT) was included. Furthermore, facilitating conditions which encompasses organizational and technical infrastructure facilitating technology usage was excluded. Excluding this construct is grounded in two reasons. First, Venkatesh et al. (2003) hypothesize facilitating conditions to impact actual usage behavior, which is not examined in this study. Second, as this study focuses on students in their last semesters with relevant work experience (gained in internships and/or practical semesters and since the majority of these students are not employed in a company, they are not able to assess conditions facilitating the dual use of devices for business and private purposes. Finally, employer attractiveness (EA) was included in order to address the second research question. Table 1 provides the definition of all constructs within the model. Table 1: Construct definitions Construct Definition Type Performance Expectancy (PE) Effort Expectancy (EE) Social Influence (SI) Perceived Threats (PT) Perceived Business Threats (PT-B) Perceived Private Threats (PT-P) Employer Attractiveness (EA) The degree to which an individual believes that using the BYOD service will help him or her to attain gains in job performance (Venkatesh et al., 2003). The degree of ease associated with the use of the service (Venkatesh et al., 2003). The degree to which an individual perceives that important others believe he or she should use the service (Venkatesh et al., 2003). The degree to which an individual believes that the use of a BYOD service is associated with threats that are evoking anxious or emotional reactions (Joshi, 1991; Compeau et al., 1999). The degree to which an individual believes that the usage of a BYOD service is threatening his or her job. The degree to which an individual believes that the usage of a BOYD service is threatening his or her private life. The degree to which the attractiveness of a firm for increases if the firm offers a BYOD service. Number of items Reflective 4 Reflective 3 Reflective 3 Formative 8 Formative 4 Formative 4 Reflective 2 The constructs and their proposed relationships are depicted in Figure 1. Assuming that the UTAUT model is already well known in the IS community, only the modifications of the UTAUT model are discussed in detail below. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

5 Perceived Threats Figure 1: Research Model Using an innovation must not always be perceived as beneficial. As the UTAUT model does not cover negative factors inhibiting BYOD service adoption, perceived threats (PT) was added. This construct was derived from Social Cognitive Theory (SCT) (Compeau et al., 1995; Compeau et al., 1999) and major resistance theories in IS literature (Markus, 1983; Joshi, 1991; Cenfetelli, 2004). Building upon the concept of inhibitors of technology adoption and usage, PT is defined as the degree to which an individual believes that the usage of a BYOD service is associated with threats that are evoking anxious or emotional reactions. In analogy to SCT s anxieties, perceived threats are proposed to negatively impact adoption behavior. BYOD is commonly associated with several threats which have the potential to negatively impact adoption behavior. In accordance to Niehaves et al. (2012), these factors can be distinguished between two dimensions: threats addressing the private life and threats addressing business life. Regarding private life, a loss of private data, the retrieval of private data by the company and blurred boundaries between private and business are threats which have been identified by prior research (Niehaves et al., 2012). On the business side, factors such as a loss of business data, causing corruption of the corporate network with malware and violating company policies are seen as threats imposed by using private devices for business purposes (Niehaves et al., 2012). Following these arguments, it is proposed that both dimensions account on the overall threats perceived by an individual. Subsequently, perceived threats was modelled as a second-order construct encompassing perceived business threats (PT-B) and perceived private threats (PT-P). Furthermore, it is hypothesized that overall perceived threats negatively impacts an individual s intention to adopt a BYOD service. Employer Attractiveness From a company's perspective, anecdotal evidence shows that the impact of offering a BYOD service on its attractiveness for actual and future employees is of particular interest. If BYOD service offerings impact an individual s decision-making about their actual or future employers, BYOD services could be used as an argument for both recruiting new employees and retaining actual employees. To examine if a BYOD service offering contributes to the attractiveness of an employer, BYOD influenced employer attractiveness (EA) has been introduced. EA is defined as the degree to which the attractiveness of a firm increases if the firm offers a BYOD service. It is proposed that behavioral intention (BI) and EA correlate positively such as individuals that tend to have a high intention to adopt a BYOD service will rate a company which is offering a BYOD service as an attractive employer. Hence, it is hypothesized that behavioral intention to adopt a BYOD service positively impacts an individual s employer attractiveness evaluations. METHODOLOGY An empirical study among German university students was conducted to measure the effects of the proposed determinants on future employees' intention to use BYOD services. To minimize bias due to different backgrounds, the focal group consists only of students with business and engineering specialization studying in a small German university. Facing a shortage of young engineers and specialized managers (Köchling, 2003), these students are particularly attractive to medium-sized and large industrial enterprises. These companies, in turn, are heavily keen on understanding BYOD service adoption to guide their decisions whether to offer a BYOD service or not. In order to ensure that students can realistically assess BYOD, only students with relevant work experience (due to an internship or practical semester) have been asked to participate. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

6 To retain measurement validity, items were as far as possible taken from prior technology adoption research. In order to relate the items to the BYOD context, the wording of the items was slightly altered. Prior literature constituted the basis for developing adequate measures for construct which have not been employed in prior research (PT and EA). These items have been intensively discussed within the research team to examine whether the measurement items are capable to capture the constructs. Regarding the formative nature of PT, additional tests have been conducted to ensure that all indicators are clearly distinguished and that the construct is captured in all its facets. Table 1 presents the latent variables, their types (reflective or formative), as well as the source and the number of measurement items assigned to each. To collect data, a standardized questionnaire was designed using the measurement items presented in Appendix A. The questionnaire was published by using an online survey tool. A pretest within the target group has been conducted to ensure that the questionnaire understandable and unambiguous. At total, 177 responses have been collected (response rate of approx. 20%). The responses were reviewed to ensure that each respondent completely finalized the survey. As a result of this analysis, we identified 93 responses with at least one missing value (including demographics). After eliminating the missing values, 84 usable responses left, out of which 8 have been provided from visiting international students. The key demographics are depicted in Table 2. Table 2: Demographics (N=84) Gender Age Study Focus Respondents Percentage Male 57 68% Female 27 32% < 18 years 0 0% years 15 18% years 45 54% years 21 25% > 29 years 3 4% Business Focus 22 26% Engineering Focus 45 54% Inter-disciplinary 17 20% DATA ANALYSIS Following structural equation modeling techniques (Chin et al., 2003), SmartPLS (Ringle et al., 2005) was used to model the latent variables and their proposed causal relationships. There were several reasons for using partial leas squarest (PLS). PLS is a well-established algorithm for technology acceptance research (Venkatesh et al., 2003), PLS makes fewer demands on the sample size and it is capable to analyze formative as well as reflective measurement of latent variables (Chin, 1998). Following the recommendations of Hulland (1999), the analysis of the model was carried out in a two stages approach. First the outer model (component measurements) and subsequently the inner model (structural causal paths) has been evaluated. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

7 Table 3: Cross loadings BI EE PE EA SI BI BI BI EE EE EE PE PE PE PE PEA PEA SI SI SI To analyze the component measurements, Average Variance Extracted (AVE), Composite Reliability (CR), Cronbach s Alpha (CA), and Cross loadings were calculated. The cross loadings provided in Table 3 were assessed according to the guidelines of Gefen et al. (2005). All measurement items loaded greater than.707 onto their respective latent variables and were significant at least at the 5% level. The AVE values are also above the recommended threshold of.500 (Fornell et al., 1981). Furthermore, the internal consistency reliability of each reflective measurement item was assessed analyzing CA values, which should be greater than.800 (Nunnally et al., 1994). Only BI and PE do exceed this cut-off value. However, since CA does not take into account that indicators have different loadings and as it is biased against short scales of two or three items, we followed the advice of Chin (1998) and chose CR as an additional measure. All constructs exceed the threshold of.800 which indicates consistency reliability (Nunnally et al., 1994). To assess discriminant validity, the Fornell- Larcker criterion was assessed (1981). This criterion requires a latent variable (LV) to share more variance with the indicators assigned to it than with any other LV. As depicted in Table 5, the square root of the AVE is higher than the LV's correlation with any other LV. Therefore, discriminant validity can be assumed. Table 4: CR, CA and AVE values of the reflective constructs Composite Reliability Cronbach s Alpha Average Variance (CR) (CA) Extracted (AVE) BI EA EE PE SI In contrast to the other latent variables, PT was measured using formative items. Furthermore, the construct includes two meta-facets: the private dimension (PT-P) and the business dimension (PT-B). Therefore PT was modeled as a second order construct, whereas PT-P and PT-B capture both facets of PT. The latent variables PT-P and PT-B are measured by formative indicators. PT itself is captured by the formative indicators associated to the lower order components PT-P and PT-B. This method is based on the recommendations for second-order constructs (repeated indicators approach) provided by Ringle et al. (2012). The indicator weights of the measurement items and the corresponding t-values comply with the limits proposed by Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

8 Chin (1998). In addition, the degree of multicollinearity has been assessed by calculating the variance inflation factor (VIF). All VIF values comply with the threshold proposed by Urbach et al. (2010). B-PT Table 5: Latent variable correlation and Fornell-Larcker criterion PT-B BI EA EE PT-P PE PT SI BI EA EE P-PT PE PT SI The square root of AVE is shown in bold In order to assess the inner model and the hypotheses, PLS path coefficients, their statistical significance and each endogenous LV's coefficient of determination (R²) have calculated 1. Results of the structural model estimation are illustrated in Figure 2Fehler! Verweisquelle konnte nicht gefunden werden.. The significance level is above 0.01 for all path coefficients. In total, the model accounted for a significant amount of variance in BI (R 2 = 60.5%) and EA (R² = 35.2%). Figure 2: PLS structural results DISCUSSION, LIMITATIONS AND FURTHER RESEARCH To understand the factors which drive young employees to adopt a BYOD service and to examine if the intention to adopt a BYOD service is correlated with the attractiveness of companies, a modified UTAUT model was proposed. In contrast to prior UTAUT studies, this study also takes into account potential threats associated with the usage of privately-own devices for business purposes. As the structural results depicted in 1 The PLS algorithms and bootstrapping has been carried out with the following properties: maximum iterations: 300; centroid weighting scheme; individual sign changes; cases: 84; samples: 500. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

9 Figure 2 provide support for almost all hypotheses, this study shows that the proposed research model is capable to explain BYOD service adoption behavior. In addition, a highly significant correlation between the attractiveness of a company for future employees offering the possibility to use privately-owned device and a future employee s intention to adopt a BYOD service was found. Most of the findings regarding the factors determining BYOD service adoption among future employees are in line with prior UTAUT studies. In particular the strong effect of performance expectancies on behavioral intention confirms previous results. Overall, performance expectancies have the strongest influence on behavioral intention (f2 =.337, medium effect). This finding suggests that expectancies regarding gains in job performance due to increased mobility and flexibility are the most important factors leading future employees to adopt BYOD services. Therefore, it could be concluded, that young employees regard the devices they choose and use in private contexts as superior to those provided by corporate IT. On the other hand, future employees also seem to take the sacrifices of BYOD into account. Both, effort expectancies (f2 = 0.081, weak effect) and perceived threats (f2 = 0.137, weak effect) were found to significantly contribute to their behavioural intention. First, the findings show that future employees are aware of the efforts related with using their devices for business purposes (e.g. setting the devices up for work). Second, the results regarding perceived threats indicate that future employees in Germany are aware of the risks associated with BYOD. Furthermore, private and business risk perceptions are pretty much balanced. Hence, it seems as if future employees do not differ between threats related to their private life and threats related to their job. Nevertheless, even the sum of the effects of effort expectancies and perceived threats is weaker than the effect of performance expectancies. This finding indicates that the performance effects expected by future employees outweigh the efforts and the potential threats. These expectations are capable to give an explanation why especially young employees are willing to use their privately-owned device for business purpose even if it is not permitted. In line with Mallat et al. (2008), social influence was also found to significantly contribute to future employees behavioural intention (f2 = 0.162, weak effect). This is an indication that young people identify with the devices they use (Swallow et al., 2005; Lin et al., 2011). Regarding the second research questions, this study shows that the attractiveness of a company for a future employee is positively correlated with his or her intention to adopt a BYOD service. Furthermore, descriptive data reveals that German business and engineering students have a strong tendency to use privately-owned devices for business purposes. Taking these findings into consideration, it can be argued that BYOD services can indeed play a vital role in recruiting these students as future employees. Regarding the strong performance expectancies of young employees associated to BYOD, the dual use of consumer devices could at least at an individual level also contribute to work performance. Descriptive data reveals that business and engineering students in fact have a strong tendency towards BYOD. Subsequently, it can be argued that BYOD services can indeed play a vital role in recruiting these students as future employees. This finding contrasts the data captured in a recent study among 600 senior business and IT leaders in 17 countries. This study found that only 20% of business leaders believe that BYOD services will benefit recruitment and retention efforts (Avanade, 2012). Nevertheless, the study cited above also reports that 32% have already changed policies to make their workplace more appealing to younger employees. As consumerization of IT will gain momentum in future (Fenn et al., 2011), the findings of our study indicates that the effect of BYOD as a recruiting tool should not be underestimated. Regarding implications for practice, our study encourages CIOs to consider extending their service catalogues and pushing their BYOD efforts forward, opening their corporate infrastructure for privately-owned devices while improving their security measures and usage policies. In addition, CIOs should be aware that especially young employees hold strong performance expectancies regarding BYOD outweighing the potential losses. CIOs should be aware that young employees are likely to use privately-owned devices even if it is not permitted by the enterprise. As BYOD is difficult to prevent, CIOs and IT service provider, hence, should put an emphasis on creating secure IT infrastructures in order to prevent security and privacy breaches caused by employees using their private devices at workplace. Although the research model explains a large amount of the variance in behavioral intention, we are well aware of the limitations of our approach. First, this study builds upon the UTAUT model which is intended to explain technology adoption behavior. Although the model provides a reasonable goodness fit, further research should also concentrate on other theoretical approaches which, for instance, also take an individual s relationship with technology into account. Second, our data suggests that more work needs to be done to frame the perceived threats construct more concrete. We suggest that further research could focus on theories from (service) marketing research such as the perceived risk theory (Bauer, 1967). Third, this study solely focuses on students as future employees. Although only students with relevant work experience have been selected (approx. 3 months), their work experience and experiences in dealing with corporate IT devices is still limited. Fourth, the data sample does only cover German students. It would be interesting to examine if there are any cross-cultural differences regarding the determinants of BYOD adoption behavior. Hence, further research should take a broader, crosscultural perspective. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

10 REFERENCES 1. Ajzen, I. (1991) The theory of planned behavior, Organizational Behavior and Human Decision Processes, 50, 2, Amberg, M., Hirschmeier, M., and Wehrmann, J. (2004) The Compass Acceptance Model for the analysis and evaluation of mobile services, Int. J. Mob. Commun., 2, 3, Avanade (2012) Global Survey: Dispelling Six Myths of Consumerization of IT, Avanade, Seatle. 4. Bauer, R. A. (1967) Consumer Behavior as Risk Taking in Risk Taking and Information Handling in Consumer Behavior, D. F. Cox (ed.), Harvard University Press, Cambridge, USA, Bocker, J., and Klein, M. (2012) ICT-Innovationen erfolgreich nutzen: Wie Sie Wettbewerbsvorteile für Ihr Unternehmen sichern, Gabler. 6. Carlsson, C., Carlsson, J., Hyvonen, K., Puhakainen, J., and Walden, P. (2006) Adoption of Mobile Devices/Services - Searching for Answers with the UTAUT, HICSS Proceedings. 7. Cenfetelli, R. T. (2004) Inhibitors and Enablers as Dual Factor Concepts in Technology Usage, Journal of the Association for Information Systems, 5, Chen, C.-D., Fan, Y.-W., and Farn, C.-K. (2007) Predicting electronic toll collection service adoption: An integration of the technology acceptance model and the theory of planned behavior, Transportation Research Part C: Emerging Technologies, 15, 5, Chin, W. W. (1998) The Partial Least Squares Approach for Structural Equation Modeling in Modern Methods for Business Research, G. A. Marcoulides (ed.), Erlbaum, Hillsdale, NJ. 10. Chin, W. W., Marcolin, B. L., and Newsted, P. R. (2003) A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and Voice Mail Emotion/Adoption Study, Information Systems Research, 14, 2, Compeau, D., Higgins, C. A., and Huff, S. (1999) Social cognitive theory and individual reactions to computing technology: A longitudinal study, MIS Quarterly, 23, 2, Compeau, D. R., and Higgins, C. A. (1995) Application of Social Cognitive Theory to Training for Computer Skills, Information Systems Research, 6, 2, Cummings, J., Massey, A. P., and Ramesh, V. (2009) Web 2.0 Proclivity: Understanding How Personal Use Influences Organizational Adoption, in Proceedings of the 27th ACM international conference on Design of communication, ACM: Bloomington, Indiana, USA, pp Davis, F. D. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, 13, Featherman, M. (2001) Extending the technology acceptance model by inclusion of perceived risk, AMCIS Proceedings. 16. Featherman, M. S., and Fuller, M. (2003) Applying TAM to E-Service Adoption: The Moderating Role of Perceived Risk, HICSS Proceedings, Hawaii. 17. Fenn, J., and LeHong, H. (2011) Hype Cycle for Emerging Technologies, Gartner. 18. Fornell, C., and Larcker, D. F. (1981) Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, Journal of Marketing Research, 18, Gefen, D., and Straub, D. (2005) A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example, Communications of the Association for Information Systems, 16, Article Györy, A., Cleven, A., Falk, U., and Brenner, W. (2012) Exploring the Shadows: IT Governance Approaches to User- Driven Innovation, ECIS Proceedings. 21. Harris, C. (2012) Mobile Consumerization Trends & Perceptions - IT Executive and CEO Survey, Decisive Analytics, LLC. 22. Harris, J. G., and Junglas, I. (2011) The Genie Is Out of the Bottle: Managing the Infiltration of Consumer IT Into the Workforce, Accenture Institute for High Performance. 23. Harris, M., Patten, K., Regan, E., and Fjermestad, J. (2012) Mobile and Connected Device Security Considerations: A Dilemma for Small and Medium Enterprise Business Mobility, AMCIS Proceedings. 24. Holtsnider, B., and Jaffe, B. D. (2012) IT Manager's Handbook: Getting Your New Job Done, Morgan Kaufmann. 25. Hulland, J. (1999) Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies, Strategic Management Journal, 20, 2, Hung, S.-Y., and Chang, C.-M. (2005) User Acceptance of WAP Services: Test of Competing Theories, Computer Standards & Interfaces, 27, 4, Ingalsbe, J. A., Shoemaker, D., and Mead, N. R. (2011) Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise an overview of considerations, AMCIS Proceedings. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

11 28. Joshi, K. (1991) A model of users perspective on change: the case of information systems technology implementation, MIS Quarterly, 15, Köchling, A. (2003) Human resources management under conditions of demographic change in Ageing and work in Europe: strategies at company level and public policies in selected European countries., Fraunhofer IRB, Stuttgart, Lang, M. (2012) CIO-Handbuch, Symposion Publishing GmbH. 31. Lin, W., Feng, L., Yang, Z., and Kan, S. (2011) Exploring the influencing factors on surfing behavior intention of smartphone users, Advanced Computational Intelligence (IWACI), 2011 Fourth International Workshop on Mallat, N., Rossi, M., Tuunainen, V. K., and Öörni, A. (2008) An empirical investigation of mobile ticketing service adoption in public transportation, Personal Ubiquitous Comput., 12, 1, Markus, L. M. (1983) Power, politics, and MIS implementation, Commun. ACM, 26, 6, Murdoch, R., Harris, J. G., and Dvore, G. (2010) Can Enterprise IT Survive the Meteor of Consumer Technology?, Accenture Institute for High Performance. 35. Niehaves, B., Köffer, S., and Ortbach, K. (2012) IT Consumerization A Theory and Practice Review, in AMCIS, p. Paper Niehaves, B., Köffer, S., and Ortbach, K. (2013) The Effect of Private IT Use on Work Performance - Towards an IT Consumerization Theory, in International Conference on Wirtschaftsinformatik: Leipzig. 37. Nunnally, J. C., and Bernstein, I. H. (1994) Psychometric Theory, McGraw, New York. 38. Pagani, M. (2004) Determinants of adoption of third generation mobile multimedia services, Journal of Interactive Marketing, 18, 3, Prensky, M. (2001) Digital Natives, Digital Immigrants, On the Horizon, 9, 5, Ringle, C. M., Sarstedt, M., and Straub, D. W. (2012) A Critical Look at the Use of PLS-SEM in MIS Quarterly, MIS Quarterly, 36, 1, iii-xiv. 41. Ringle, C. M., Wende, S., and Will, S. (2005) SmartPLS 2.0 (M3) Beta: Hamburg, Swallow, D., Blythe, M., and Wright, P. (2005) Grounding experience: relating theory and method to evaluate the user experience of smartphones, in Proceedings of the 2005 annual conference on European association of cognitive ergonomics, University of Athens: Chania, Greece, pp Urbach, N., and Ahlemann, F. (2010) Structural Equation Modeling in Information Systems Research Using Partial Least Squares, JITTA, 11, 2, Venkatesh, V., Morris, M., Davis, G., and Davis, F. (2003) User Acceptance of Information Technology: Toward a Unified View, Management Information Systems Quarterly, 27, Vogel, R., Kocoglu, T., and Berger, T. (2010) Desktopvirtualisierung: Definitionen - Architekturen - Business-Nutzen, Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbh, Wiesbaden. 46. Weiß, F., and Leimeister, J. (2012) Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT, Business & Information Systems Engineering, 54, 6, Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

12 APPENDIX A Latent Variable Code Measurement (measured with a five-point Likert scale) Origin Performance Expectancy Effort Expectancy Social Influence Perceived Business Threats Perceived Private Threats BYOD Influenced Employer Attractiveness Behavioral Intention PE1 I would find the service useful in my job. TAM PE2 Using the service would increase my effectiveness on the job. TAM PE3 Using the service would increase my job motivation. UTAUT PE4 Using the service would increase my productivity on the job IDT EE1 Using the service would take too much time from my normal duties. MPCU EE2 Learning to use the service would be rather difficult for me. TAM EE3 It would take too long to learn how to use the service to make it worth the effort. MPCU I predict that, SI1 people who are important to me think that I should use the services. TAM SI2 people in a company who use the services have more prestige than those who do not. IDT SI3 people in a company who use the services have a high profile. IDT Using a "Bring Your Own Device" service increase the risk that PT-B1 I lose business data self-designed PT-B2 I violate company policies self-designed PT-B3 I corrupt the corporate network with malware self-designed PT-B4 I am not able to work due to a service failure self-designed Using a "Bring Your Own Device" service increase the risk that PT-P1 I lose private data self-designed PT-B2 too restrictive corporate policies limit the usage of my private device self designed PT-P3 private data can be viewed by my company self-designed PT-P4 increasingly blurred boundary between work and private life endanger my private life self-designed EA1 EA2 I prefer employers during the search for employment which provide a "Bring Your Own Device" service instead of other employers which do not provide such a service. The employer attractiveness of a company would be increased by a provided "Bring Your Own Device" service. self-designed self-designed BI1 If a "Bring your Own Device" service is offered, I intend to use the service. UTAUT BI2 If a "Bring your Own Device" service is offered, I predict I would use the service. UTAUT BI3 If a "Bring your Own Device" service is offered, I plan to use the service. UTAUT TAM: Technology Acceptance Model, Davis (1989) IDT: Innovation Diffusion Theory, Moore and Benbasat (1991) UTAUT: Unified Theory of Acceptance and Use of Technology, Venkatesh et al. (2003) MPCU: Model of PC Utilization, Thompson et al. (1991) Table A1: Measurement Items and Descriptive Statistical Analysis Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

Factors driving employee participation in corporate BYOD programs: A cross-national comparison from the perspective of future employees

Factors driving employee participation in corporate BYOD programs: A cross-national comparison from the perspective of future employees Factors driving employee participation in corporate BYOD programs: A cross-national comparison from the perspective of future employees Xuequn Wang Murdoch University xuequnwang1600@gmail.com Andy Weeger

More information

It s My Tool, I Know How to Use It: A Theory of the Impact of BYOD on Device Competence and Job Satisfaction

It s My Tool, I Know How to Use It: A Theory of the Impact of BYOD on Device Competence and Job Satisfaction BYOD & Job Satisfaction It s My Tool, I Know How to Use It: A Theory of the Impact of BYOD on Device Competence and Job Satisfaction Research-in-Progress Laurie Giddens Baylor University Laurie_Giddens@baylor.edu

More information

Exploring User Behavioral Intention of the Tourist Guiding System by Users' Perspective

Exploring User Behavioral Intention of the Tourist Guiding System by Users' Perspective , March 16-18, 2016, Hong Kong Exploring User Behavioral Intention of the Tourist Guiding System by Users' Perspective Kuo Wei Su*, Hsing Hui Tseng, Ai Ting Wu, and Chen Yu Lien, Abstract Taiwan has lifted

More information

User Acceptance of E-Government Services

User Acceptance of E-Government Services Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 User Acceptance of E-Government Services Ying-Hsun

More information

USER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES

USER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES USER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES Kakoli Bandyopadhyay Lamar University, P.O. Box 10033, Beaumont, TX 77710 Phone: (409) 880-8627, Fax: (409) 880-8235 E-Mail: kakoli.bandyopadhyay@lamar.edu

More information

The Impact of Mobile Shopping Quality on Customer Satisfaction and Purchase Intentions: The IS Success Based Model

The Impact of Mobile Shopping Quality on Customer Satisfaction and Purchase Intentions: The IS Success Based Model The Impact of Mobile Shopping Quality on Customer Satisfaction and Purchase Intentions: The IS Success Based Model Lisa Y. Chen Management, I-Shou University Kaohsiung, 840, Taiwan and William H. Lauffer

More information

International Academic Institute for Science and Technology. Management. Vol. 3, No. 12, 2016, pp ISSN

International Academic Institute for Science and Technology. Management. Vol. 3, No. 12, 2016, pp ISSN International Academic Institute for Science and Technology International Academic Journal of Accounting and Financial Management Vol. 3, No. 12, 2016, pp. 30-37. ISSN 2454-2350 International Academic

More information

Switch to Your Own to Work with the Known: An Empirical Study on Consumerization of IT

Switch to Your Own to Work with the Known: An Empirical Study on Consumerization of IT Switch to Your Own to Work with the Known: An Empirical Study on Consumerization of IT Sabine Dernbecher E-Finance Lab dernbecher@wiwi.uni-frankfurt.de Completed Research Paper Sven Weber E-Finance Lab

More information

INTENTION TO USE OF SMART PHONE IN BANGKOK EXTENDED UTAUT MODEL BY PERCEIVED VALUE

INTENTION TO USE OF SMART PHONE IN BANGKOK EXTENDED UTAUT MODEL BY PERCEIVED VALUE INTENTION TO USE OF SMART PHONE IN BANGKOK EXTENDED UTAUT MODEL BY PERCEIVED VALUE Krittipat Pitchayadejanant 1 * ABSTRACT Smart phones, iphone and Black Berry, are very popular among new generation people

More information

Open Data ISSN Open Data Discourse: Consumer Acceptance of Personal Cloud: Integrating Trust and Risk with the Technology Acceptance Model

Open Data ISSN Open Data Discourse: Consumer Acceptance of Personal Cloud: Integrating Trust and Risk with the Technology Acceptance Model Transactions on R eplication R esearch Open Data ISSN 2473-3458 Open Data Discourse: Consumer Acceptance of Personal Cloud: Integrating Trust and Risk with the Technology Acceptance Model Murad A. Moqbel

More information

AN EXTENDED UTAUT MODEL FOR THE STUDY OF NEGATIVE USER ADOPTION BEHAVIOURS OF MOBILE COMMERCE. Macau

AN EXTENDED UTAUT MODEL FOR THE STUDY OF NEGATIVE USER ADOPTION BEHAVIOURS OF MOBILE COMMERCE. Macau AN EXTENDED UTAUT MODEL FOR THE STUDY OF NEGATIVE USER ADOPTION BEHAVIOURS OF MOBILE COMMERCE Donny Chi-Fai Lai 1, Ivan Ka-Wai Lai 2, and Ernest Jordan 3 1 Department of Computer Science, City University

More information

End-User Acceptance Of E-Government Services In an Indonesia Regency

End-User Acceptance Of E-Government Services In an Indonesia Regency End-User Acceptance Of E-Government Services In an Indonesia Regency Deden Witarsyah Mohd Farhan MD Fudzee Mohamad Aizi Bin Salamat Information System Department Department of Multimedia Department of

More information

THE COLLEGE STUDENTS BEHAVIOR INTENTION OF USING MOBILE PAYMENTS IN TAIWAN: AN EXPLORATORY RESEARCH

THE COLLEGE STUDENTS BEHAVIOR INTENTION OF USING MOBILE PAYMENTS IN TAIWAN: AN EXPLORATORY RESEARCH THE COLLEGE STUDENTS BEHAVIOR INTENTION OF USING MOBILE PAYMENTS IN TAIWAN: AN EXPLORATORY RESEARCH 1 MING LANG YEH, 2 YIN LI TSENG 1,2 Department of Business Administration, Chung Hua University, HsinChu,

More information

Toward Modeling the Effects of Cultural Dimension on ICT Acceptance in Indonesia

Toward Modeling the Effects of Cultural Dimension on ICT Acceptance in Indonesia Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 65 ( 2012 ) 833 838 International Congress on Interdisciplinary Business and Social Science 2012 (ICIBSoS 2012) Toward

More information

Cognitive social capital and project success: The role of knowledge acquisition and exploitation

Cognitive social capital and project success: The role of knowledge acquisition and exploitation Cognitive social capital and project success: The role of knowledge acquisition and exploitation Kwasi Amoako-Gyampah Department of Information Systems & Supply Chain Management Bryan School of Business

More information

The Influence of Individual-level Cultural Orientation on ERP System Adoption

The Influence of Individual-level Cultural Orientation on ERP System Adoption Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Influence of Individual-level Cultural Orientation

More information

A PLS Analysis of hotel guests acceptance of social media networks

A PLS Analysis of hotel guests acceptance of social media networks Authors final version presented at 12 th APacCHRIE Conference 2014 in Kuala Lumpur, Malaysia A PLS Analysis of hotel guests acceptance of social media networks M. Claudia Leue, Timothy Jung* Manchester

More information

Factors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan

Factors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan Factors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan Farooq Alam Khan, Basheer Ahmad Abstract: Much literature on electronic government services

More information

CUSTOMER SATISFACTION WITH MOBILE OPERATORS SERVICES IN LITHUANIAN RURAL AREAS

CUSTOMER SATISFACTION WITH MOBILE OPERATORS SERVICES IN LITHUANIAN RURAL AREAS CUSTOMER SATISFACTION WITH MOBILE OPERATORS SERVICES IN LITHUANIAN RURAL AREAS Lina Pileliene 1, PhD; Viktorija Grigaliunaite 1 Vytautas Magnus University Abstract. In tough competitive conditions of Lithuanian

More information

ScienceDirect. Consumer Online Behaviour: A perspective on Internet Banking Usage in Three Non-Western Countries

ScienceDirect. Consumer Online Behaviour: A perspective on Internet Banking Usage in Three Non-Western Countries Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 23 ( 2015 ) 386 390 2nd GLOBAL CONFERENCE on BUSINESS, ECONOMICS, MANAGEMENT and TOURISM, 30-31 October 2014, Prague,

More information

Which is the best way to measure job performance: Self-perceptions or official supervisor evaluations?

Which is the best way to measure job performance: Self-perceptions or official supervisor evaluations? Which is the best way to measure job performance: Self-perceptions or official supervisor evaluations? Ned Kock Full reference: Kock, N. (2017). Which is the best way to measure job performance: Self-perceptions

More information

Knowledge Management System Adoption and Practice in Taiwan Life Insurance Industry: Analysis via Partial Least Squares

Knowledge Management System Adoption and Practice in Taiwan Life Insurance Industry: Analysis via Partial Least Squares Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 Knowledge Management System Adoption and Practice in

More information

Who Uses a Mobile Phone, and Why?

Who Uses a Mobile Phone, and Why? ABSTRACT Individual adoption of technology has been studied extensively in the workplace (Brown and Venkatesh, 2005). Far less attention has been paid to adoption of technology in the household (Brown

More information

An Analysis of Social Networks Usage for Information Communication in Business Organization

An Analysis of Social Networks Usage for Information Communication in Business Organization An Analysis of Social Networks Usage for Information Communication in Business Organization Gamonkwan Phuk-intr Chulalongkorn Business School, Chulalongkorn University, Thailand. Kanibhatti Nitirojntanad

More information

The Impact of Technology People and Organizational Compatibility Variables on the Use of Knowledge Management Systems

The Impact of Technology People and Organizational Compatibility Variables on the Use of Knowledge Management Systems The Impact of Technology People and Organizational Compatibility Variables on the Use of Knowledge Management Systems Di Ye 1 Zhenyu Liu 1 Tung-Ching Lin 2 Yung-Chih Liou 3 1Department of Management Science,

More information

Viswanath Venkatesh. Walton College of Business, University of Arkansas, Fayetteville, AR U.S.A. Jaime B.

Viswanath Venkatesh. Walton College of Business, University of Arkansas, Fayetteville, AR U.S.A. Jaime B. RESEARCH ARTICLE PERSON ORGANIZATION AND PERSON JOB FIT PERCEPTIONS OF NEW IT EMPLOYEES: WORK OUTCOMES AND GENDER DIFFERENCES Viswanath Venkatesh Walton College of Business, University of Arkansas, Fayetteville,

More information

CHAPTER 5 DATA ANALYSIS AND DISCUSSION

CHAPTER 5 DATA ANALYSIS AND DISCUSSION CHAPTER 5 DATA ANALYSIS AND DISCUSSION 54 5. Data Analysis and Discussion This chapter is organized as follows: Section 5.1 provides the descriptive statistics of the respondents. Sections 5.1 and 5.2

More information

Shopping Online Determining Consumer Acceptance of Online Shops

Shopping Online Determining Consumer Acceptance of Online Shops Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-6-2011 Shopping Online Determining Consumer Acceptance of Online Shops Franziska Brecht Humboldt-Universität

More information

Diffusion of Smart Grid in South Korea: The Relationship between Consumers Awareness and Intention to Use

Diffusion of Smart Grid in South Korea: The Relationship between Consumers Awareness and Intention to Use Int'l Conf. e-learning, e-bus., EIS, and e-gov. EEE'17 37 Diffusion of Smart Grid in South Korea: The Relationship between Consumers Awareness and Intention to Use Jaehun Joo 1 and M. Minsuk Shin 2 1 Professor,

More information

The Adoption of E-government Services in the Iraqi Higher Education Context: An application of the UTAUT Model in the University of Kufa

The Adoption of E-government Services in the Iraqi Higher Education Context: An application of the UTAUT Model in the University of Kufa The Adoption of E-government Services in the Iraqi Higher Education Context: An application of the UTAUT Model in the University of Kufa Ahmed A. Talib Al Imarah, Ammar Abdulameer Ali Zwain, Laith Ali

More information

Post-Publication Review

Post-Publication Review Post-Publication Review Salim, S. A., Sedera, D., Sawang, S., Alarifi, A. H. E., & Atapattu, M. (2015). Moving from evaluation to trial: How do SMEs start adopting cloud ERP? Australasian Journal of Information

More information

An Examination of Mobile Application Use Intention through the Unified Theory of Acceptance and Use Technology Model

An Examination of Mobile Application Use Intention through the Unified Theory of Acceptance and Use Technology Model An Examination of Mobile Application Use Intention through the Unified Theory of Acceptance and Use Technology Model Mu-Cheng Wu, Assistant Professor, Physical Education Office, National Chin-Yi University

More information

Customer Brand Engagement on Online Social Media Platforms: A Conceptual Model and Empirical Analysis

Customer Brand Engagement on Online Social Media Platforms: A Conceptual Model and Empirical Analysis University of Aarhus From the SelectedWorks of Polymeros Chrysochou 2013 Customer Brand Engagement on Online Social Media Platforms: A Conceptual Model and Empirical Analysis Justina Malciute Polymeros

More information

GENERATION C AND WORK LIFE BALANCE: ROLE OF INFORMATION SYSTEM QUALITY

GENERATION C AND WORK LIFE BALANCE: ROLE OF INFORMATION SYSTEM QUALITY GENERATION C AND WORK LIFE BALANCE: ROLE OF INFORMATION SYSTEM QUALITY Sharmini Gopinathan 1 Murali Raman 2 Miruthula Segaran 3 Abstract: The challenges of integrating education, work and personal responsibilities

More information

Knowledge of Security Protocols and Acceptance of E-commerce

Knowledge of Security Protocols and Acceptance of E-commerce Knowledge of Security Protocols and Acceptance of E-commerce Sumendra Singh, Faculty of Business and IT, Webster University, Thailand. E-mail: singh89sumendra@gmail.com Leslie Klieb, Faculty of Business

More information

Issues in Information Systems Volume 16, Issue IV, pp , 2015

Issues in Information Systems Volume 16, Issue IV, pp , 2015 ANTECEDENT DETERMINANTS OF BELIEFS UNDERPINNING THE INTENTION TO ACCEPT AND USE BUSINESS INTELLIGENCE SYSTEMS: THE IMPORTANCE OF ORGANIZATIONAL FACTORS Tanja Grublješič, Faculty of Economics, University

More information

ASSESSMENT OF THE IMPORTANCE OF BENEFITS PROVIDED BY RURAL TOURISM HOMESTEADS IN LITHUANIA

ASSESSMENT OF THE IMPORTANCE OF BENEFITS PROVIDED BY RURAL TOURISM HOMESTEADS IN LITHUANIA Proceedings of the 2015 International Conference ECONOMIC SCIENCE FOR RURAL DEVELOPMENT No39 Jelgava, LLU ESAF, 23-24 April 2015, pp. 116-123 ASSESSMENT OF THE IMPORTANCE OF BENEFITS PROVIDED BY RURAL

More information

Prediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model

Prediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model Prediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model 1 Yong-Wee Sek, 2 Siong-Hoe Lau, 2 Kung-Keat Teoh, 3 Check-Yee Law 1 Shahril Bin Parumo 1 Faculty

More information

Structural equation model to investigate the factors influencing quality performance in Indian construction projects

Structural equation model to investigate the factors influencing quality performance in Indian construction projects Sādhanā Vol. 40, Part 6, September 2015, pp. 1975 1987. c Indian Academy of Sciences Structural equation model to investigate the factors influencing quality performance in Indian construction projects

More information

Examining factors affecting budget overrun of construction projects undertaken through management procurement method using PLS-SEM approach

Examining factors affecting budget overrun of construction projects undertaken through management procurement method using PLS-SEM approach Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 107 ( 2013 ) 120 128 ELPIIC 2013 Evaluation of Learning for Performance Improvement International Conference,

More information

AN EVALUATION OF USER ACCEPTANCE OF A CORPORATE INTRANET

AN EVALUATION OF USER ACCEPTANCE OF A CORPORATE INTRANET AN EVALUATION OF USER ACCEPTANCE OF A CORPORATE INTRANET Barnes, Stuart, Norwich Business School, University of East Anglia, Norwich NR4 7TJ, UK, stuart.barnes@uea.ac.uk Vidgen, Richard, School of Management,

More information

Exploring Chinese Users Acceptance of Social Commerce Sites

Exploring Chinese Users Acceptance of Social Commerce Sites Exploring Chinese Users Acceptance of Social Commerce Sites Jia Shen Department of Information Systems and Supply Chain Management College of Business Administration Rider University Lawrenceville, NJ,

More information

Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation

Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Integrating Trust in Electronic Commerce with

More information

DO AS YOUR COMPETITORS DO? ANALYZING COMPETITORS INFLUENCE ON THE NON-ADOPTION OF INFORMATION SYSTEMS IN ORGANIZATIONS

DO AS YOUR COMPETITORS DO? ANALYZING COMPETITORS INFLUENCE ON THE NON-ADOPTION OF INFORMATION SYSTEMS IN ORGANIZATIONS DO AS YOUR COMPETITORS DO? ANALYZING COMPETITORS INFLUENCE ON THE NON-ADOPTION OF INFORMATION SYSTEMS IN ORGANIZATIONS Laumer, Sven, University of Bamberg, Centre of Human Resources Information Systems,

More information

Understanding resistance to mobile banking adoption: Evidence from South Africa

Understanding resistance to mobile banking adoption: Evidence from South Africa Understanding resistance to mobile banking adoption: Evidence from South Africa Introduction In the last decade, the convergence of the Internet, wireless technologies, and mobile devices has made possible

More information

CHAPTER 5 DATA ANALYSIS AND RESULTS

CHAPTER 5 DATA ANALYSIS AND RESULTS 5.1 INTRODUCTION CHAPTER 5 DATA ANALYSIS AND RESULTS The purpose of this chapter is to present and discuss the results of data analysis. The study was conducted on 518 information technology professionals

More information

Will Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF

Will Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF Will Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF Research-in-Progress Yi-Ming Tai National Pingtung Institute of Commerce ymtai@npic.edu.tw Yi-Cheng Ku Providence

More information

Effects of Innovation Characteristics and Emotional Attachment on Adoption of the Digital Magazine

Effects of Innovation Characteristics and Emotional Attachment on Adoption of the Digital Magazine Effects of Innovation Characteristics and Emotional Attachment on Adoption of the Digital Magazine S. Eiamkanchanalai 1 and N. Assarut 1 1 Faculty of Commerce and Accountancy, Chulalongkorn University,

More information

An Empirical Investigation of Consumer Experience on Online Purchase Intention Bing-sheng YAN 1,a, Li-hua LI 2,b and Ke XU 3,c,*

An Empirical Investigation of Consumer Experience on Online Purchase Intention Bing-sheng YAN 1,a, Li-hua LI 2,b and Ke XU 3,c,* 2017 4th International Conference on Economics and Management (ICEM 2017) ISBN: 978-1-60595-467-7 An Empirical Investigation of Consumer Experience on Online Purchase Intention Bing-sheng YAN 1,a, Li-hua

More information

USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS

USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS Ganesh Vaidyanathan, Indiana University South Bend, gvaidyan@iusb.edu Asghar Sabbaghi, Indiana University

More information

This chapter will present the research result based on the analysis performed on the

This chapter will present the research result based on the analysis performed on the CHAPTER 4 : RESEARCH RESULT 4.0 INTRODUCTION This chapter will present the research result based on the analysis performed on the data. Some demographic information is presented, following a data cleaning

More information

AIS Contribution in Navigation Operation- Using AIS User Satisfaction Model

AIS Contribution in Navigation Operation- Using AIS User Satisfaction Model International Journal on Marine Navigation and Safety of Sea Transportation Volume 1 Number 3 September 2007 AIS Contribution in Navigation Operation- Using AIS User Satisfaction Model A. Harati-Mokhtari

More information

Understanding Clients Intentions to Explore Software-as-a-Service (SaaS) Features: A Social Capital Theory Perspective

Understanding Clients Intentions to Explore Software-as-a-Service (SaaS) Features: A Social Capital Theory Perspective Association for Information Systems AIS Electronic Library (AISeL) PACIS 2015 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2015 Understanding Clients Intentions to Explore Software-as-a-Service

More information

Do Business Intelligence Systems Actually Improve Information Quality?

Do Business Intelligence Systems Actually Improve Information Quality? Do Business Intelligence Systems Actually Improve Information Quality? JURIJ JAKLIC Department of Information management University of Ljubljana, Faculty of Economics Kardeljeva pl. 17, 1000 Ljubljana

More information

DECISION SCIENCES INSTITUTE An Analysis of the Effects of Global Sourcing Practices on Ethical Consumption in the United States. Full Paper Submission

DECISION SCIENCES INSTITUTE An Analysis of the Effects of Global Sourcing Practices on Ethical Consumption in the United States. Full Paper Submission DECISION SCIENCES INSTITUTE An Analysis of the Effects of Global Sourcing Practices on Ethical Consumption in the United States Full Paper Submission Robert L. Bregman University of Houston RBregman@uh.edu

More information

Evaluating key factors affecting knowledge exchange in social media community

Evaluating key factors affecting knowledge exchange in social media community Evaluating key factors affecting knowledge exchange in social media community Li-Wen Chuang 1 and Shu-Ping Chiu 2,a 1 Department of Film and TV Technology, Fuzhou University of International Studies and

More information

Online consumer retention: development of new habits

Online consumer retention: development of new habits University of Wollongong Research University of Wollongong in Dubai - Papers University of Wollongong in Dubai 2005 consumer retention: development of new habits Mohamed Khalifa City University of Hong

More information

INTERNATIONAL JOURNAL OF ebusiness AND egovernment STUDIES Vol 3, No 1, 2011 ISSN: (Online)

INTERNATIONAL JOURNAL OF ebusiness AND egovernment STUDIES Vol 3, No 1, 2011 ISSN: (Online) APPLYING MOBILE TECHNOLOGIES FOR PERSONNEL RECRUITING AN ANALYSIS OF USER-SIDED ACCEPTANCE FACTORS Susanne J. Niklas Scientific Research Assistant, RheinMain University of Applied Sciences Faculty of Media

More information

Management Science Letters

Management Science Letters Management Science Letters 8 (2018) 173 186 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Investigating the role of unified theory of acceptance

More information

Evaluation Of Knowledge Management System Using Technology Acceptance Model

Evaluation Of Knowledge Management System Using Technology Acceptance Model Evaluation Of Knowledge Management System Using Technology Acceptance Model Jarot S. Suroso jsembodo@binus.edu Astari Retnowardhani aretnowardhani@binus.edu Abraham Fernando fernando.inoer@gmail.com Abstract

More information

Examining User Acceptance of E-Syariah Portal Among Syariah Users in Malaysia

Examining User Acceptance of E-Syariah Portal Among Syariah Users in Malaysia Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 67 ( 2012 ) 349 359 The 3 rd International Conference on E-Learning ICEL2011, 23-24 November 2011, Bandung, Indonesia

More information

Issues in Information Systems

Issues in Information Systems INFORMATION QUALITY AS A DETERMINANT OF TASK-TECHNOLOGY FIT IN USING COMMUNICATION TECHNOLOGY FOR SIMPLE TASK ChongWoo Park, Georgia Gwinnett College, cpark@ggc.edu Arjan Raven, aredraven@gmail.com ABSTRACT

More information

The Acceptance and Adoption of Smartphone Use among Chinese College Students

The Acceptance and Adoption of Smartphone Use among Chinese College Students The Acceptance and Adoption of Smartphone Use among Chinese College Students Dan Pan, Na Chen, and Pei-Luen Patrick Rau Department of Industrial Engineering, Tsinghua University, Beijing 100084, P.R. China

More information

Applying Technology Acceptance Model, Theory of Planned Behavior and Social Cognitive Theory to Mobile Data Communications Service Acceptance

Applying Technology Acceptance Model, Theory of Planned Behavior and Social Cognitive Theory to Mobile Data Communications Service Acceptance Association for Information Systems AIS Electronic Library (AISeL) PACIS 2004 Proceedings Pacific Asia Conference on Information Systems (PACIS) 12-31-2004 Applying Technology Acceptance Model, Theory

More information

STUDENT S ATTITUDE TOWARD WEBCAST LECTURE: AN ONLINE SURVEY RESULT. Paulus Insap Santosa 1)

STUDENT S ATTITUDE TOWARD WEBCAST LECTURE: AN ONLINE SURVEY RESULT. Paulus Insap Santosa 1) STUDENT S ATTITUDE TOWARD WEBCAST LECTURE: AN ONLINE SURVEY RESULT Paulus Insap Santosa 1) Abstract This paper reports the result of an online survey that has been conducted to observe students attitude

More information

E-Procurement Institutionalization in Construction Industry in Developing Countries: A Model and Instrument

E-Procurement Institutionalization in Construction Industry in Developing Countries: A Model and Instrument E-Procurement Institutionalization in Construction Industry in Developing Countries: A Model and Instrument QUANG-DUNG TRAN 1,2, DE-CHUN HUANG 1 1) Industrial Economics Institute of Business School Hohai

More information

PLS-MGA A Non-Parametric Approach to Partial Least Squares-based Multi-Group Analysis

PLS-MGA A Non-Parametric Approach to Partial Least Squares-based Multi-Group Analysis PLS-MGA A Non-Parametric Approach to Partial Least Squares-based Multi-Group Analysis Jörg Henseler 1 Institute for Management Research, Radboud University Nijmegen, Thomas van Aquinostraat 3, 6525 GD

More information

Exploring Subscription Renewal Intention of Operational Cloud Enterprise Systems A Stakeholder Perspective

Exploring Subscription Renewal Intention of Operational Cloud Enterprise Systems A Stakeholder Perspective Exploring Subscription Renewal Intention of Operational Cloud Enterprise Systems A Stakeholder Perspective Sebastian Walther University of Bayreuth s.walther@uni-bayreuth.de Darshana Sedera Queensland

More information

ARTICLE EMPIRICAL STUDY ON INTENTION TO USE BIKE-SHARING IN VIETNAM

ARTICLE EMPIRICAL STUDY ON INTENTION TO USE BIKE-SHARING IN VIETNAM ISSN: 0976-3104 ARTICLE EMPIRICAL STUDY ON INTENTION TO USE BIKE-SHARING IN VIETNAM ABSTRACT Nguyen Thi Ngan*, Bui Huy Khoi Faculty of Business Administration, Industrial University of Ho Chi Minh City,

More information

DETERMINANTS OF THE INTENTION TO USE CORPORATE PORTALS: A PERSPECTIVE FROM AN INDONESIAN STATE-OWNED ENTERPRISE

DETERMINANTS OF THE INTENTION TO USE CORPORATE PORTALS: A PERSPECTIVE FROM AN INDONESIAN STATE-OWNED ENTERPRISE DETERMINANTS OF THE INTENTION TO USE CORPORATE PORTALS: A PERSPECTIVE FROM AN INDONESIAN STATE-OWNED ENTERPRISE 1 MUHAMMAD RIFKI SHIHAB, 2 MOEHAMMAD ARIEF FURQON 3 ACHMAD NIZAR HIDAYANTO 1,2,3 Faculty

More information

DEALING WITH THE TRANSITION FROM WEB TO MOBILE SERVICES: THE ROLE OF CONSISTENCY AND TRUST

DEALING WITH THE TRANSITION FROM WEB TO MOBILE SERVICES: THE ROLE OF CONSISTENCY AND TRUST DEALING WITH THE TRANSITION FROM WEB TO MOBILE SERVICES: THE ROLE OF CONSISTENCY AND TRUST Yongqiang Sun, School of Information Management, Wuhan University, Wuhan, China, sunyq@whu.edu.cn Xiao-Liang Shen,

More information

Evaluation of Future Mobile Services Based on the Technology Acceptance Model

Evaluation of Future Mobile Services Based on the Technology Acceptance Model Association for Information Systems AIS Electronic Library (AISeL) ECIS 2008 Proceedings European Conference on Information Systems (ECIS) 2008 Evaluation of Future Services Based on the Technology Acceptance

More information

Factors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers

Factors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers th The 7 Smart Collaboration for Business in Technology and Information Industries 2016 Factors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers Andi Muhammad Iqbal

More information

Conceptualizing Software Engineering People Issues

Conceptualizing Software Engineering People Issues Conceptualizing Software Engineering People Issues Medha Umarji, Carolyn Seaman Dept. of Information Systems Univ. of Maryland Baltimore County Baltimore, USA {medha1, cseaman} @umbc.edu Abstract. The

More information

Understanding the Role of Individual Perception on Mobile Payment: Moderating or Mediating

Understanding the Role of Individual Perception on Mobile Payment: Moderating or Mediating Understanding the Role of Individual Perception on Mobile Payment: Moderating or Mediating Qiang Zeng and Jifeng Ma Shantou University Business School, Shantou, China Email: {qzeng, 12jfma}@stu.edu.cn

More information

Predicting and explaining use intention and purchasing intention in online g roup shopping

Predicting and explaining use intention and purchasing intention in online g roup shopping Association for Information Systems AIS Electronic Library (AISeL) BLED 2012 Proceedings BLED Proceedings Spring 6-20-2012 Predicting and explaining use intention and purchasing intention in online g roup

More information

An Integrative Model of Clients' Decision to Adopt an Application Service Provider

An Integrative Model of Clients' Decision to Adopt an Application Service Provider Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) December 2003 An Integrative Model of Clients' Decision to Adopt

More information

Investigating Social Influence on Acceptance of Executive Information Systems: A UTAUT Framework Approach

Investigating Social Influence on Acceptance of Executive Information Systems: A UTAUT Framework Approach Association for Information Systems AIS Electronic Library (AISeL) SAIS 2007 Proceedings Southern (SAIS) 3-1-2007 Investigating Social Influence on Acceptance of Executive Information Systems: A UTAUT

More information

The Technology Acceptance Model for Competitive Software Products

The Technology Acceptance Model for Competitive Software Products The Technology Acceptance Model for Competitive Software Products Hock Chuan CHAN Department of Information Systems National University of Singapore chanhc@comp.nus.edu.sg Jing YANG Department of Information

More information

Thangiah Murugan, Shuib Basri, and Dhanapal Durai Domnic

Thangiah Murugan, Shuib Basri, and Dhanapal Durai Domnic Available online at www.pelagiaresearchlibrary.com Advances in Applied Science Research, 2019, 10(1):6-11 ISSN : 0976-8610 CODEN (USA): AASRFC Analyzing the Conceptual Model for Exploratory Testing Framework

More information

Open Source Software (OSS) Implementation Strategy from a Fit Perspective: Empirical Evidence of Influence on Productivity

Open Source Software (OSS) Implementation Strategy from a Fit Perspective: Empirical Evidence of Influence on Productivity Open Source Software (OSS) Implementation Strategy from a Fit Perspective: Empirical Evidence of Influence on Productivity Completed Research Paper Kaushik Ghosh Lamar University kghosh@lamar.edu Jiban

More information

Factors influencing the organizational adoption of cloud computing: a survey among cloud workers

Factors influencing the organizational adoption of cloud computing: a survey among cloud workers ISSN (print):2182-7796, ISSN (online):2182-7788, ISSN (cd-rom):2182-780x Available online at www.sciencesphere.org/ijispm Factors influencing the organizational adoption of cloud computing: a survey among

More information

Online Purchase Intention in B2C E-Commerce: An Empirical Study

Online Purchase Intention in B2C E-Commerce: An Empirical Study Association for Information Systems AIS Electronic Library (AISeL) WHICEB 2013 Proceedings Wuhan International Conference on e-business Summer 5-25-2013 Online Purchase Intention in B2C E-Commerce: An

More information

Available online at ScienceDirect. Procedia Economics and Finance 27 ( 2015 )

Available online at  ScienceDirect. Procedia Economics and Finance 27 ( 2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 27 ( 2015 ) 567 573 22nd International Economic Conference IECS 2015 Economic Prospects in the Context of Growing

More information

THE EFFECT OF PRODUCT PORTFOLIO ON PURCHASE INTENTION IN E-COMMERCE WEB SITES. Dr. Mustafa Emre Civelek & Dr. Adnan Veysel Ertemel

THE EFFECT OF PRODUCT PORTFOLIO ON PURCHASE INTENTION IN E-COMMERCE WEB SITES. Dr. Mustafa Emre Civelek & Dr. Adnan Veysel Ertemel THE EFFECT OF PRODUCT PORTFOLIO ON PURCHASE INTENTION IN E-COMMERCE WEB SITES Dr. & Dr. Adnan Veysel Ertemel OUTLINE PROBLEM IDETIFICATION CONCEPTUAL MODEL HYPOTHESES DIMENSIONS MEASURES AND SAMPLING RESEARCH

More information

The Effects of Employee Ownership in the Context of the Large Multinational : an Attitudinal Cross-Cultural Approach. PhD Thesis Summary

The Effects of Employee Ownership in the Context of the Large Multinational : an Attitudinal Cross-Cultural Approach. PhD Thesis Summary The Effects of Employee Ownership in the Context of the Large Multinational : an Attitudinal Cross-Cultural Approach. PhD Thesis Summary Marco CARAMELLI The University of Montpellier II Marco.Caramelli@iae.univ-montp2.fr

More information

Consumer Behavior towards Continued Use of Online Shopping: An Extend Expectation Disconfirmation Model

Consumer Behavior towards Continued Use of Online Shopping: An Extend Expectation Disconfirmation Model Consumer Behavior towards Continued Use of Online Shopping: An Extend Expectation Disconfirmation Model Min Qin School of Communication, Jiangxi Normal University, P.R. China, 330022 helenqin126@163.com

More information

Effects of Mobile Design Quality and Innovation Characteristics on Intention to Use Mobile Tourism Guide

Effects of Mobile Design Quality and Innovation Characteristics on Intention to Use Mobile Tourism Guide Effects of Mobile Design Quality and Innovation Characteristics on Intention to Use Mobile Tourism Guide Numtip Trakulmaykee, Ahmad Suhaimi Baharudin, Muhammad Rafie Mohd. Arshad Abstract This study investigates

More information

User Acceptance of SaaS ERP Considering Perceived Risk, System Performance and Cost

User Acceptance of SaaS ERP Considering Perceived Risk, System Performance and Cost User Acceptance of SaaS ERP Considering Perceived Risk, System Performance and Cost Tong-Ming Lim, Angela Siew-Hoong Lee, Mun-Keong Yap Department of Information Systems Sunway University Malaysia tongmingl@sunway.edu.my,

More information

An Empirical Study on the relationships between social capital, rational cognition and knowledge sharing in product development

An Empirical Study on the relationships between social capital, rational cognition and knowledge sharing in product development 2012 International Conference on Economics, Business and Marketing Management IPEDR vol.29 (2012) (2012) IACSIT Press, Singapore An Empirical Study on the relationships between social, rational cognition

More information

An Empirical Study on the Influence of Online Service Quality on Customer Satisfaction: A Study of Royal Jordanian Airline

An Empirical Study on the Influence of Online Service Quality on Customer Satisfaction: A Study of Royal Jordanian Airline An Empirical Study on the Influence of Online Service Quality on Customer Satisfaction: A Study of Royal Jordanian Airline Rukana Ghalib M. Alshweesh Department of Management Information System Faculty

More information

FACTORS INHIBITING THE ADOPTION OF RFID TECHNOLOGY: A CASE OF THAILAND

FACTORS INHIBITING THE ADOPTION OF RFID TECHNOLOGY: A CASE OF THAILAND FACTORS INHIBITING THE ADOPTION OF RFID TECHNOLOGY: A CASE OF THAILAND Terachote Banjurtrungkajorn, Yuthakarn Kamolvarin, Chalisa Ketsawatdiwong, Phat Nimmandnaruz, Pisit Chanvarasuth School of Management

More information

Organizational Excellence as the Driver for Organizational Performance: A Study on Dubai Police

Organizational Excellence as the Driver for Organizational Performance: A Study on Dubai Police International Journal of Business and Management; Vol. 11, No. 2; 2016 ISSN 1833-3850 E-ISSN 1833-8119 Published by Canadian Center of Science and Education Organizational Excellence as the Driver for

More information

NANYANG TECHNOLOGICAL UNIVERSITY

NANYANG TECHNOLOGICAL UNIVERSITY NANYANG TECHNOLOGICAL UNIVERSITY Analysis and Findings of the Worldwide Mobile Data Services Survey (2010) Proposal for K6399 Critical Inquiry M.Sc. (Knowledge Management) School of Communication and Information

More information

VIRTUAL WORLD CONSUMER BEHAVIOR DISSERTAION ANGIE M. COX, PHD BA, TRIDENT UNIVERSITY INTERNATIONAL

VIRTUAL WORLD CONSUMER BEHAVIOR DISSERTAION ANGIE M. COX, PHD BA, TRIDENT UNIVERSITY INTERNATIONAL VIRTUAL WORLD CONSUMER BEHAVIOR DISSERTAION ANGIE M. COX, PHD BA, TRIDENT UNIVERSITY INTERNATIONAL 1 AGENDA Motivation, Originality, Significance and Contribution Problem Statement, Research Purpose, Research

More information

Research on the impact mechanism of user satisfaction with Software as a Service

Research on the impact mechanism of user satisfaction with Software as a Service Research on the impact mechanism of user satisfaction with Software as a Service Shuwen Li 1,2,a 1 Hohai University, 210098, Nanjing, Jiangsu, P.R. China 2 Jiangsu University of Science and Technology,

More information

Factors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan

Factors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan Vol. 7, No.1, January 2017, pp. 322 328 E-ISSN: 2225-8329, P-ISSN: 2308-0337 2017 HRMARS www.hrmars.com Factors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan Farah Hanna

More information

An Empirical Assessment of the Impact of ERP Task-Technology Fit on Decision Quality

An Empirical Assessment of the Impact of ERP Task-Technology Fit on Decision Quality An Empirical Assessment of the Impact of ERP Task-Technology Fit on Decision Quality Arun Madapusi Department of Decision Sciences LeBow College of Business Drexel University 204 Academic Building Philadelphia,

More information

Understanding the Adoption of Mobile Banking Services: An Empirical Assessment

Understanding the Adoption of Mobile Banking Services: An Empirical Assessment Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-5-2011 Understanding the Adoption of Mobile Banking Services: An Empirical Assessment Khawaja

More information

THE MODERATING ROLE OF UTILITARIAN/HEDONIC USER MOTIVATION ON USER BEHAVIOR TOWARDS WEB 2.0 APPLICATIONS

THE MODERATING ROLE OF UTILITARIAN/HEDONIC USER MOTIVATION ON USER BEHAVIOR TOWARDS WEB 2.0 APPLICATIONS THE MODERATING ROLE OF UTILITARIAN/HEDONIC USER MOTIVATION ON USER BEHAVIOR TOWARDS WEB 2.0 APPLICATIONS Chen-Ya Wang, Department of Information Management, National Taiwan University, Taiwan; Department

More information