Top 10 Read Articles of Managing Information Technology - June 2021

Page 1

TOP 10 READ ARTICLES OF IJMIT JUNE 2021 INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)

http://airccse.org/journal/ijmit/ijmit.html

ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)


THE ADOPTION AND CHALLENGES OF ELECTRONIC VOTING TECHNOLOGIES WITHIN THE SOUTH AFRICAN CONTEXT Mourine Achieng and Ephias Ruhode Cape Peninsula University of Technology, Cape Town, South Africa

ABSTRACT

Literature has shown that countries such as Brazil and India have successfully implemented electronic voting systems and other countries are at various piloting stages to address many challenges associated with manual paper based system such ascosts of physical ballot paper and other overheads, electoral delays, distribution of electoral materials, and general lack of confidence in the electoral process. It is in this context that this study explores how South African can leverage the opportunities that e-voting presents. Manual voting is often tedious, non-secure, and time-consuming, which leads us to think about using electronic facilities to make the process more efficient. This study proposes that the adoption of electronic voting technologies could perhaps mitigate some of these issues and challengesin the process improving the electoral process. The study used an on-line questionnaire which was administered to a broader group of voters and an in-depth semi-structured interview with the Independent Electoral Commission officials. The analysis is based on thematic analysis and diffusion of innovations theory is adopted as a theoretical lens of analysis. The findings reveal that relative advantage, compatibility and complexity would determine the intentions of South African voters and the Electoral Management Bodies (IEC) to adopt e-voting technologies. Moreover, the findings also reveal several other factorsthat could influence the adoption process. The study is limited to only voters in Cape Town and these voters were expected to have some access to the internet. The sample size limits the generalizability of the findings of this study. KEYWORDS

Electronic voting technology, Diffusion of Innovation (DoI), E-democracy, &E-governance

For More Details:

http://airccse.org/journal/ijmit/papers/5413ijmit01.pdf

http://airccse.org/journal/ijmit/vol5.html


REFERENCES

[1] Garson, G. David.(2006) Public Information Technology and E-Governance: Managing the Virtual State. Sudbury, MA: Jones & Bartlett. [2] Clift, S. (2003) E-Government and Democracy: Representation and citizen engagement in the information age. United Nations-DESA. [3] Lai, R., & Haleem (2002), a.. E-Governance: An Emerging Paradigm. Vision: The Journal of Business Perspective, Vol. 6 No. 2 pp. 99–109. [4] Bedi, K., Singh P. J. & Srivastava, S. (2001) Government@net: New Governance opportunities for India, Sage Publications, New Delhi. [5] Holmes,D. (2001) eGov: eBusinness Strategies for Government, Nicholas Brealey, London. [6] Okot-Uma, R.W. (2000)Electronic Governance: Re-Inventing Good Governance, Commonwealth Secretariat, London. [7] Islam, M. S. (2008) Towards a sustainable e-Participation implementation model. European Journal of ePractice, Vol.5, No.10 . [8] Rosenstone, S. J. (1993), Hansen, J. M. Mobilization, participation and democracy in America.,New York: Macmillan. [9] ACE Electoral Knowledge Network 2010. http://aceproject.org/aceen/focus/e-voting/countries

Last

accessed

June

[10] Republic of South Africa 1996. Last accessed June http://www.acts.co.za/constitutionof-the-republic-of-south-africa-act-1996/

5,

20,

2013,

from

2013

from

[11] Southafrica.info (2006) http://www.southafrica.info/ [12] Worldbank South Africa 2009 http://www.worldbank.org/en/country/southafrica [13] Kersting, N. (2009). Africa Spectrum, 125–133 . [14] EISA Interim statement: Eisa observer mission to the 2009 South Africa national &Provincial elections 2009. Last accessed July 5, 2013. www.eisa.org.za/PDF/eusa2009bk.pdf [15] Kroukamp, H. (2005) E-governance in South Africa: are we coping? ACTA ACADEMICAUNIVERSITY OF THE FREE STATE Vol. 37,pp. 52–69, Last accessed May 25,2013 http://www.sabinet.co.za/abstracts/academ/academ_v37_n2_a3.html [16] Booz Allen Hamilton. (2002)Re-Learning e-Learning last accessed on June 28 from www.boozallen.com [17] Smith, E., &Macintosh, A. (2003) E-voting: Powerful symbol of E-democracy. Electronic Government, 1064.


[18] Macintosh, A. (2004) Characterizing e-participation in policy-making. System Sciences, Proceedings of the 37th …, 00(C), 1–10. 2004 Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1265300 [19] Qadah, G., & Taha, R. Electronic voting systems: Requirements, design, and implementation. Computer Standards Interfaces, Vol. 29No.3 pp. 376–386, 2007 doi:10.1016/j.csi.2006.06.001 [20] Sæbø, Ø., Rose, J., & Skiftenes Flak, L. (2008)The shape of eParticipation: Characterizing an emerging research area. Government Information Quarterly, Vol.25, No.3pp. 400–428. [21] Svensson, J., & Leenes, R.( 2003) E-voting in Europe: Divergent democratic practice. Information Polity, Vol .8 No.1, pp. 3–15. [22] Xenakis, A. & Macintosh, A. (2005) “E-electoral Administration: Organizational Lessons Learned from the Deployment of E-voting in the UK”, ACM International Conference Proceeding Series, Vol. 89, Atlanta, Georgia.


DEFINING ICT IN A BOUNDARYLESS WORLD : THE DEVELOPMENT OF A WORKING HIERARCHY Colrain M. Zuppo Marion Technical College (MTC) ABSTRACT

Subsequent to rapid information and communication technology development, the scope of the definition of Information and Communication Technologies (ICT or ICTs) has been utilized within diverse contexts including economic development, education, IT, business and personal usage. A review of academic literature, trade publications and general information was undertaken to establish a hierarchy of applications for the term ICT or ICTs.. KEYWORDS

ICT, ICTs, education, economics, digital communication, hierarchy.

For More Details:

http://airccse.org/journal/ijmit/papers/4312ijmit02.pdf

http://airccse.org/journal/ijmit/vol4.html


REFERENCES [1] International Telecommunication Union. (2007). Measuring village ICT in sub-Saharan Africa.

Retrieved from http://www.itu.int/ITU-D/ict/statistics/material/Africa_Village_ICT_2007.pdf. [2] United Nations University. (2010). Greater Access to Cell Phones than Toilets in India. Retrieved from http://www.inweh.unu.edu/News/2010-04_UNU-INWEH_News-Release_Sanitation.pdf . [3] International Telecommunication Union. (n.d.). Who we are. Retrieved,from http://www.itu.int/en/about/Pages/default.aspx. [4] World Health Organization. (2011). 2011-last update: Information and communication technologies for public health emergency management. Retrieved from http://www.who.int/csr/ict4phem/en/index.html [5] World Health Organization. (2006). Health aspects of disaster preparedness and response: Report from a regional meeting of countries of South East Asia, Bangkok, Thailand, 21-23 November 2005. Prehospital & Disaster Medicine, 21(5), 62-78. [6] Yang, C., Yang, J., Luo, X., and Gong, P. (2009). Use of mobile phones in an emergency reporting system for infectious disease surveillance after the Sichuan earthquake in China. Bulletin of the World Health Organization, 87(8), 619-623. [7] Organisation for Co-operation and Development (OECD). (2002). Retrieved from http://www.oecd.org/dataoecd/63/60/1933354.pdf. [8] Angeleski, M., Mitrevski, P., and Janeska, M. (2009). “Composite index of e-business strategy readiness of the enterprises in the Republic of Macedonia” in ICT Innovations 2009, Davcev, D., and Marx Gomex, J., (Eds.), p. 265-275. Springer-Verlag Berlin Heidelberg, Scientific Publishing Services Pvt. Ltd. [9] Cohen, D., Garibaldi, P., and Scarpetta, S., (Eds.). (2004). The ICT Revolution: Productivity, Differences and the Digital Divide. Oxford University Press, University of Oxford. [10] Educational Testing Service. (2007). Digital transformation: A framework for ICT literacy. A report of the International ICT Literacy Panel. Retrieved from http://www.ets.org/Media/Tests/Information_and_Communication_Technology_Literacy/ictreport.pd f. [11] Jarnieson-Proctor, R., Watson, G., Finger, G., Grimbeek, P., & Burnett, P. C. (2007). Measuring the use of Information and Communication Technologies (ICTs) in the classroom. Computers in the Schools, 24(1/2), 167-184. doi:10.1300/J025v24n01̱11. [12] Clark, L., Demont-Heinrich, C., & Webber, S. (2005). Parents, ICTs, and children's prospects for success: Interviews along the digital “Access Rainbow”. Critical Studies in Media Communication, 22(5), 409-426. doi:10.1080/07393180500342985. [13] Selwin, N., Gorard, S., & Furlong, J. (2006). Adult learning in the digital age: Information technology and the learning society. Routledge, Taylor & Francis Group.


[14] Zhang, P., Aikman, S., & Sun, H. (2008). Two types of attitudes in ICT acceptance and use. International Journal of Human Interaction, 24(7), 628-648. doi: 10.1080/10447310802335482. [15] Information Technology Infrastructure Library [ITIL]. (n.d.). ITIL glossaries. Retrieved from http://www.itil-officialsite.com/InternationalActivities/ITILGlossaries_2.aspx. [16] TechTerms.com. (n.d.). Definition of ICT. Retrieved from http://www.techterms.com/definition/ict. [17] Innovation Value Institute at National University of Ireland Maynooth. (n.d.). IVI and CEPIS develop European Framework for ICT Professionalism. Retrieved from http://ivi.nuim.ie/news-events/iviandcepis-develop-european-framework-ict-professionalism [18] Institute of IT Professionals, New Zealand. (n.d.). ITCP – IT Certified Professional. Retrieved from http://www.itcp.org.nz/about [19] Professional Standards Board, Australian Computer Society. (2012.). The ICT professional body of knowledge. Retrieved from http://www.acs.org.au/__data/assets/pdf_file/0007/7792/The-ICTProfessionBody-of-Knowledge-July-2012.pdf [20] Galperin, H., and Mariscal, J. (2007). Digital Poverty: Latin American and Caribbean Perspectives. International Development Research Centre, Intermediate Technology Publications Ltd. [21] National Geographic News. (2005). The deadliest tsumani in history? Retrieved from http://news.nationalgeographic.com/news/2004/12/1227_041226_tsunami.html. [22] The Telegraph. (2011). Japan earthquake, tsunami and Fukushima nuclear disaster: 2011 review. Retrieved from http://www.telegraph.co.uk/news/worldnews/asia/japan/8953574/Japan-earthquaketsunami-and-Fukushimanuclear-disaster-2011-review.html.

AUTHOR Colrain M. Zuppo earned a PhD in Technology Management from Indiana State University with a specialization in Human Resource Development and Industrial Training. Cori’s dissertation research was entitled “Organizations as consumers of human capital via technology: A policy study of information and communication technologies”. Cori also holds an M.A.Ed. from The George Washington University and a B.S. in Conflict Resolution from Ohio University. Cori is a Professor in the Department of Business and Information Technology at Marion Technical College (MTC) and served as part time faculty and doctoral fellow at Bowling Green State University, conducting research and teaching in the areas of technology management, academic research and instructional design & delivery.


CHALLENGES OF E-LEARING IN NIGERIAN UNIVERSITY EDUCATION BASED ON THE EXPERIENCE OF DEVELOPED COUNTRIES N.D. Oye1, Mazleena Salleh2, N. A. Iahad3 Faculty of Computer Science and Information systems Universiti Teknologi Malaysia

1,2,3

ABSTRACT

This paper present a review of the challenges of e-learning in Nigerian University education based on the experience of four developed countries, UK, Australia, Korea and France. The survey shows that these countries have: (i) vision and action plans for e-learning, (ii) they have good government policies and financial support, (iii) they earmark action programs and set committees with sufficient funds to pursue it goals, (iv) they believe in research as a fundamental part of e-learning strategy, and lastly (v) they embark on awareness, training and motivational programs. The paper pointed out that, for the challenges of Nigerian university education to be reduced to minimum, the Federal Government should improve on educational funding as UNESCO recommended 26% of the annual budget. In addition the government should fulfill her promise on the issue of improving Electricity supply in the country. Furthermore, the university administrators should embark on awareness and training of staff on the use of ICTs, with motivations attached. The Internet is a major driver of ICT in education and bandwidth is a major issue in the deployment of e-learning. Therefore government should make Internet connectivity a priority for higher education to be able to leverage on the promises and opportunities ICTs present.. KEYWORDS

E-learning; ICT; Developed Countries,;Nigerian University; Challenges; Education; Internet..

For More Details:

http://airccse.org/journal/ijmit/papers/3211ijmit04.pdf

http://airccse.org/journal/ijmit/vol3.html


REFERENCES

[1] Aduke, A F ( 2008). Usage and Challenges of Information and Technology (ICT) in Teaching and Learning in Nigerian Universities. Asian Journal of Information Technology, 7(7), 290-295. [2] Ajadi TO, Salawu, IO and Adeoye, FA (2008). E-learning and Distance Education in Nigeria. The Turkish Online Journal of Educational Technology, 7(4), Article 7. [3] Arikpo I I, Osofisan, A and Usoro, A ( 2009). Bridging the digital divide: the Nigerian journey so far. International Journal of Global Business, 2 (1), 181-204. [4] Asogwa, U D ( 2006). E-learning: A panacea for access, equity and quality higher education in Nigeria. Paper presented at the 30th annual conference of Nigerian Association for Educational Administration and Planning (NAEAP) held at the Faculty of Education Hall, Enugu State University of Science and Technology. [5] Cook J, Holley D, Smith C, Bradley C and Haynes, R (2006). A Blended M-Learning Design for Supporting Teamwork in Formal and Informal Settings. Mobile Learning 2006, 14-16 July, Dublin. [6] Erah, PO (2006). Introduction to e-learning protocols. Paper presented at ETF capacity building workshop for lecturers of Universities in Nigeria at the University of Uyo. [7] Folorunso O, Ogunseye OS and Sharma SK( 2006). An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities. Information Management and Computer Security Journals, 14 (5), 496-505. [8] HEFCE (2005). HEFCE strategy http://www.hefce.ac.uk/pubs/hefce/2005/05_12/

for

e-learning,

March

2005,

available

at

[9] JAMB (2009). JAMB Statistics: Application and Admission (UME and PCE) Retrieved April 30, 2009, from http://www.jambng.com [10] NUC (2009). List of Nigerian Universities and Years Founded Retrieved April 30, 2009, from http://www.nuc.edu.ng/pages/universities.asp [11] Omofaye, JO( 2007). Challenges facing ICT Infrastructure and successful online education in Africa, Available online at Http//: www.google.com Downloaded 15th June 2007. [ 12] Oye ND, Salleh M and Ai.ahad N (2010). Holistic E-learning in Nigerian Higher Education Institutions. Journal ofComputing, vol 2(11), p20-26. [13] QAA (2004). Code of practice for the assurance of academic quality and standards in higher education - Section 2: Collaborative provision and flexible and distributed learning (including e-learning), September 2004, available at http://www.qaa.ac.uk/academicinfrastructure/codeOfPractice/section2/collab2004.pdf

[14] Resnick, M (2002). Rethinking Learning in the Digital Age. //web.media.mit.edu/~mres/papers/wef.pdf (last accessed: 2007-01-08).

Online.

URL: http:


[15] Sharma R, Ekundayo M S and Ng E (2009). Beyond the digital divide: policy analysis for knowledge societies. Journal of Knowledge Management, 13(5), 373-386. [16] Schmidt, A (2005). Knowledge maturing and the continuity of context as a unifying concept for knowledge management and e-learning. In: Proceedings of I-Know ‘05, Special Track on Integrating Working and Learning, Graz, Austria, pp. 424-431. [17] Schulmeister, R (2006). ELearning: Einsichten und Aussichten. München; Wien: Oldenbourg Verlag. [18] UNESCO (2009). UNESCO portal on Higher Education Institutions: Nigeria Retrieved April 30, 2009, from http://portal.unesco.org/education/en/ev.phpURL_ID=51421&URL_DO=DO_TOPIC&URL_SECTION= 201.htm [ 19] Yang, G (2010) “The effect of e-learning for the teachers in Information Society” Proc. Second International Workshop on Education Technology and Computer Science, pp621-624. [20] Zook, M (2004). Internet Users Worldwide - statistic 2004. Online. URL: http://www. zooknic.com/Users/global_2004_09.html (last accessed: 2007-01- 08).


SOCIAL BUSINESS TRANSFORMATION THROUGH GAMIFICATION Jitendra Maan Tata Consultancy Services Ltd., ABSTRACT

Being an emerging business practice, gamification is going to the mainstream to enable and transform social business initiatives across enterprises. With the consistent focus on customer behavior and experience, there is a paradigm shift in thinking about how Gamification and Social initiatives together help to increase the engagement level of knowledge worker, yielding better business results. Business scenarios for gamification are wide spread ranging from customer service and support to communities and collaboration. The Paper discusses the characteristics & mechanism to learn from games that are important for businesses to understand and apply. It also gives insights on gamification trends, real-world business challenges and also describes on how game thinking can revolutionize the business and create an engaging experience. KEYWORDS

Gaming Techniques, Gamification, Game elements, Game Dynamics, Game mechanics, Enterprise Gamification, Gamification Platforms, Social gaming elements, Social Collaboration, Social technologies

For More Details:

http://airccse.org/journal/ijmit/papers/5313ijmit02.pdf

http://airccse.org/journal/ijmit/vol5.html


REFERENCES

[1] C. Stafford, M.A. Mearns: What happens when organisations embrace social networking? Knowledge sharing at a multinational business solutions corporation, South African Journal of Information Management, Vol 11, No.4, 2009 [2] Darryl Charles, Therese Charles, Michael McNeill, David Bustard, Michaela Black: Game-based feedback for edu-cational multi-user virtual environments, British Journal of Educational Technology, Volume 42, Issue 4, pages 638-654, July 2011 [3] Blacksmith, N; Harter, J: (2011, October). Majority Of American Workers Not Engaged In Their Jobs [Electronic version]. Gallup Wellbeing, Retrieved January 17, 2012 [4] A. J. Bradley and M. P. McDonald, "The Social Organization," Harvard Business Review Press, October 2011 [5] Cheshire, T: (2011, March). In Depth: How Rovio Made Angry Birds A Winner (And What'sNext)[Electronic ver-sion].Wired,Retrieved January 17, 2012, from www.wired. co.uk/magazine/archive/2011/04/features/how-rovio-made-angry-birds-a-winner?page=all. [6] King, R: (2011, April). The Games Companies Play [Electronic version]. Bloomberg Businessweek, Retrieved May 14, 2012, from www.businessweek.com/technology/content /apr2011/tc2011044_943586.htm. [7] Van der Walt, C., 2003, ‘Knowledge sharing via enterprise intranets’, unpublished Masters dissertation, University of Johannesburg. [8] Doug Palmer, Steve Lunceford and Aaron J. Patton: The Engagement Economy - How gamification is reshaping businesses, Deloitte Review Report, http://www.deloitte.com/ view/en_US/us/Insights/Browseby-Content-Type/deloitte-review/c7cee86d96498310 VgnVCM1000001956f00aRCRD.htm [9] Maslow, A: (1943). A Theory Of Human Motivation [Electronic version]. Classics in the History of Psychology, Retrieved January 20, 2012, from http://psychclassics.yorku. ca/Maslow/motivation.htm [10] McGonigal, J: (2011, January). Be A Gamer, Save The World [Electronic version]. Wall Street Journal, Retrieved January 17, 2012, from http://online.wsj.com/ article/SB100014240527487 04590704576092460302990884.html. [11] Gabe Zichermann, The Six Rules of Gamification, http://www.gamification.co/2011/ 11/29/the sixrules-of-gamification, November, 2011 [12] Amabile, T; Kramer, S: (2011). The Progress Principle: Using Small Wins To Ignite Joy, Engagement, and Creativity at Work. USA: Harvard Business Review Press.


THE ROLE OF TECHNOLOGY ACCEPTANCE MODEL IN EXPLAINING EFFECT ON E-COMMERCE APPLICATION SYSTEM Md Gapar Md Johar1 and Janatul Akmar Ahmad Awalluddin2 1

Information Technology and Innovation Center, Management and Science University, Selangor, Malaysia

2

Graduate School of Management, Management and Science University, Kuala Lumpur, Malaysia

ABSTRACT

Today e-commerce has become crucial element to transform some of the world countries into an information society. Business to consumer (B2C) in the developing countries is not yet a normalcy as compared to the developed countries. Consumer behaviour research has shown disappointing results regarding the overall use of the Web for online shopping, despite its considerable promise as a channel for commerce. As the use of the Internet continues to grow in all aspects of daily life, there is an increasing need to better understand what trends of internet usage and to study the barriers and problem of ecommerce adoption. Hence, the purpose of this research is to define how far Technology Acceptance Model (TAM) contributed in e-commerce adoption. Data for this study was collected by the means of a survey conducted in Malaysia in 2010. A total of 611 questionnaire forms were delivered to respondents. The location of respondents was within Penang state. By studying this sample, conclusions would be drawn to generalize the interests of the population. KEYWORDS

E-commerce, Technology Acceptances Model (TAM), e-commerce application, online shopping, online Banking, online payment & buying online.

For More Details:

http://airccse.org/journal/ijmit/papers/3311ijmit01.pdf

http://airccse.org/journal/ijmit/vol4.html


REFERENCES

[1] Ahmed, M., Hussein, R., Minakhatun, R. and Islam R., (2007) “Building consumers’ confidence in adopting e-commerce: A Malaysian case”, International Journal Business & Systems Research, Vol. 1, No. 2, pp236-255. [2] Alhudaithy, A.I. and Kitchen, P.J., (2009) “Rethinking models of technology adoption for Internet banking: The role of website features”, Journal of Financial Services Marketing, Vol. 14, No. 1, pp56–69. [3] Amin, H., (2009) “An analysis of online banking usage intentions: An extension of technology acceptance model”, International Journal Business and Society, Vol. 10, No. 1, pp27-40. [4] Habibu, S. and Ho, S. “RM1bil initiative to promote high-speed broadband usage” [Online] Available at http://thestar.com.my/news/story.asp?file=/2010/3/25/nation/5931577&sec=nation. Accessed on November 5th 2010. [5] Internet World Stats. “Internet usage in ASEAN” [Online] http://www.internetworldstats.com/stats3.htm. Accessed on November 5th 2010

Available

at

[6] Kaur. K., (2005) “Consumer protection in e-commerce in Malaysia: An overview”, Journal of the UNE Asia Centre, No., pp1-14. [7] Lee, H.H., Fiore, A.M. and Kim, J., (2006) “The role of the technology acceptance model in explaining effects of image interactivity technology on consumer responses” International Journal of Retail & Distribution Management, Vol. 34, No. 8, pp 621-644. [8] Legris, P., Ingham, J. and Collerette, P., (2003) “Why do people use information technology? A critical review of the technology acceptance model” Journal of Information & Management, No. 40, pp191–204. [9] “Malaysia : E-commerce Success Story” [Online] http://www.zerogrey.com/index.php/eshop/info/on/Zerogrey-Malaysia:-Ecommerce SuccessStory.html/cId/359/. Accessed on November 5th 2010

Available

at

[10] “Malaysia's E-Commerce Statistics” from http://malaysiacrunch.blogspot.com/2009/09/malaysias ecommerce-statistics.html. Accessed on November 5th 2010 [11] Mirandah, G. “Internet law – The future of e-commerce in Malaysia” [Online] Available at http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1917. Accessed on November 5th 2010 [12] Monsuwe, T.P., Dellaert, B.G.C. and Ruyter, K.D., (2004) “What drives consumers to shop online? A literature review”, International Journal of Service Industry Management, Vol. 15, No. 1, pp102-121. [13] Nicoles, C.L., Castillo, F.J.M. and Bouwman, H. , (2008) “An assessment of advanced mobile services acceptance: Contributions [14] Rogers, E., (1995) “Diffusion of Innovation”, fourth ed., New York: Free Press.


[15] Sekaran, U. and Bougie, R., (2010) “Theoretical framework In theoretical framework and hypothesis development”. Research Methods for Business: A Skill Building Approach, United Kingdom: Wiley, pp. 80 [16] So, W.C.M., Wong, T.N.D and Sculli, D., (2005) “Factors affecting intentions to purchase via the internet”, Journal of Industrial Management & Data Systems, Vol. 105, No. 9, pp1225-1244. [17] “Telecommunications and IT” from http://www.aseansec.org/7808.htm. Accessed on November 5th 2010


KNOWLEDGE SHARING IN WORKPLACE: MOTIVATORS AND DEMOTIVATORS 1

Oye, N.D. 2Mazleena Salleh 3Noorminshah, A. Faculty of Computer Science and Information System Universiti Technologi Malaysia 81310 Skudai, Johor ABSTRACT

This paper gives an overview of knowledge sharing in workplace. Based on the review of critical literatures by the authors, they infer that knowledge sharing in workplace can be influenced by motivators and demotivators. Activities of knowledge sharing in organizations may be on organization level or individual level. Knowledge sharing of both levels is critical to the success or failure of knowledge management inside and outside of organizations. Age, culture, and industry were all found to affect knowledge sharing among workers. A common stereotype is that older workers hoard knowledge because they are more insecure and feel threatened by younger workers. Since older workers have more valuable knowledge, younger workers needed to entice their older colleagues to share their valuable knowledge with them. The paper focus on motivators and demotivators to sharing Knowledge in workplace. Theories and research pertaining to why workers share knowledge are reviewed. While all industry need knowledge and innovation, it is also true that the pace of change and the need to innovate differs from industry to industry. Technology was acknowledged to have a high important role in increasing productivity of knowledge sharing. It plays a critical role in creating, storing and distributing explicit knowledge in an accessible and expeditious manner. KEYWORDS

Knowledge, Sharing knowledge, Intrinsic and Extrinsic Motivators and Demotivators

For More Details:

http://airccse.org/journal/ijmit/papers/3411ijmit06.pdf

http://airccse.org/journal/ijmit/vol3.html


REFERENCES

[1] Ni C. ,Knowlegde Sharing and Knowledge Broker of Organizations: Second International Conference on Future Information Technology and Management Engineering. 978-07695-3880-8/09. 2009 IEEE. [2] Nissen, M.E., ‘‘Knowledge management and global cultures: elucidation through an institutional knowledge-flow perspective’’, Knowledge and Process Management, 2007. Vol. 14 No. 3, pp. 21125. [3] Pfeffer, J., & Sutton, R. I. Knowing "what “to do is not enough: Turning knowledge into action. California Management Review, 1999. 42(1), 83-108. [4] Pfeffer, J., & Sutton, R. I,Knowing "what “to do is not enough: Turning knowledge into action. California Management Review, 1999. 42(1), 83-108. [5] Kerr, J., & Slocum, J. W., Managing corporate culture through reward systems. Academy of Management Executive, 1987. 1(2), 99-108. [6] Matheson, L. R., & Tarjan, R. E. ,Culturally induced information impactedness: A prescription for failure in software ventures. Journal of Management InformationSystems, 1998. 15(2), 23-40. [7] Recardo, R., & Jolly, J., Organizational culture and teams. S.A.M. Advanced Management Journal, 1997. 62(2), 4-8. [8] Zhang, D.J. and Zhao, L. ,Knowledge management in organizations”, Journal of Database Management, 2006. Vol. 17 No. 1, pp. 1-9. [9] Voelpel, S.C., Eckhoff, R.A. and Fo¨rster, J.,“David against Goliath? Group size and bystander effects in virtual knowledge sharing”, Human Relations, 2005.Vol. 61 No. 2, pp. 271-95. [10] Nilakanta, S., Miller, L.L. and Zhu, D.,“Organizational memory management: technological and research issues”, Journal of Database Management, 2006. Vol. 17 No. 1, pp. 85-95. [11] Nonaka, I.,“The knowledge-creating company”, Harvard Business Review, 1991.Vol. 69 No. 6, pp. 96-104. [12] Nonaka, I., & Takeuchi, H. ,A dynamic theory of organizational knowledge creation. Organization Science, 1994. 5(1), 14-37. [13] Nonaka, I., Von Krogh, G. and Voelpel, S.,“Organizational knowledge creation theory: evolutionary paths and future advances”, Organization Studies, 2006. Vol. 27 No. 8, pp. 1179-208. [14] Sa´enz, J., Aramburu, N. and Rivera, O.,“Knowledge sharing and innovation performance; a comparison between high-tech and low-tech companies”, Journal of Intellectual Capital, 2009.Vol. 10 No. 1, pp. 22-36.


A SURVEY ON: CONTENT BASED IMAGE RETRIEVAL SYSTEMS USING CLUSTERING TECHNIQUES FOR LARGE DATA SETS Mrs Monika Jain1 , Dr. S.K.Singh ABSTRACT

Content-based image retrieval (CBIR) is a new but widely adopted method for finding images from vast and unannotated image databases. As the network and development of multimedia technologies are becoming more popular, users are not satisfied with the traditional information retrieval techniques. So nowadays the content based image retrieval (CBIR) are becoming a source of exact and fast retrieval. In recent years, a variety of techniques have been developed to improve the performance of CBIR. Data clustering is an unsupervised method for extraction hidden pattern from huge data sets. With large data sets, there is possibility of high dimensionality. Having both accuracy and efficiency for high dimensional data sets with enormous number of samples is a challenging arena. In this paper the clustering techniques are discussed and analysed. Also, we propose a method HDK that uses more than one clustering technique to improve the performance of CBIR.This method makes use of hierachical and divide and conquer KMeans clustering technique with equivalency and compatible relation concepts to improve the performance of the K-Means for using in high dimensional datasets. It also introduced the feature like color, texture and shape for accurate and effective retrieval system. KEYWORDS

Content Based Image Retrieval , divide and conquer k-means, hierarchical

For More Details:

http://airccse.org/journal/ijmit/papers/3411ijmit03.pdf

http://airccse.org/journal/ijmit/vol3.html


REFERENCES

[1] Rui Xu, Donald Wunsch II, “Survey of Clustering Algorithms”, IEEE Transactions On Neural Networks, Vol. 16, No. 3, May 2005. [2] Ritendra Datta, Dhiraj Joshi, Jia Li, And James Z. Wang, “Image Retrieval: Ideas, Influences, and Trends of the New Age”, ACM Computing Surveys, Vol. 40, No. 2, Article 5, Publication date: April 2008. [3] Tamura et al. “Texture Feautres Corresponding to Visual Perception”- IEEE Trans on system, Man and cyber 8-460-472-1978. [4] Sanjoy Kumar Saha et al. “CBIR Using Perception Based Texture And Colour measures ”CSE Department; CST Department Jadavpur Univ., India; B.E. College, Unit ISI, Kolkata, India - -2003. [5] Canny, J., “A computational approach to edge detection”, IEEE Trans on Pattern Analysis and Machine Intelligence, 8:679-698, 1986. [6] S.Nandagopalan, Dr. B.S. Adiga, and N. Deepak “A Universal Model for Content-Based Image Retrieval” World Academy of Science, Engineering and Technology 46 2008. [7] Mohammed Eisa and Ibrahim Elhenawy and A. E. Elalfi and Hans Burkhardt, “Image Retrieval based on Invariant Features and Histogram Refinement”, ICGST International Journal on Graphics, Vision and Image Processing, March 2006, pp. 7-11. [8] V. Castelli and L. D. Bergman (Eds.), “Image Databases: Search and Retrieval of digital Imagery”, Wiley: New York, 2002. [9 ] B. Everitt, S. Landau, and M. Leese, “Cluster Analysis”, London:Arnold, 2001. [10] A. Jain and R. Dubes, “Algorithms for Clustering Data”, Englewood Cliffs, NJ: Prentice-Hall, 1988. [11] A. Baraldi and E. Alpaydin, “Constructive feedforward ART clustering networks—Part I and II,” IEEE Trans. Neural Netw., vol. 13, no. 3, pp.645–677, May 2002. [12] V. Cherkassky and F. Mulier, “Learning From Data: Concepts, Theory, and Methods”, New York: Wiley, 1998. [13] I. J. Cox, M. L. Miller, T. P. Minka, T. V. Papathomas and P.Yianilos, “The Bayesian Image Retrieval System, PicHunter: Theory, Implementation and Psychophysical Experiments”, IEEE Trans. Image Processing, vol. 9, no. 1, pp. 20-37, 2000. [14] Y. Rui, T. S. Huang, M. Ortega and S. Mehrotra, “Relevance Feedback: A Power Tool for Interactive Content-Based Image Retrieval”, IEEE Trans. Circuits and Video Technology, vol. 8, no. 5, pp. 644- 655, 1998. [15] S. Thilagamani and N. Shanthi , “A Survey on Image Segmentation Through Clustering”, International Journal of Research and Reviews in Information Sciences , Vol. 1, No. 1, March 2011 .


IMPACT OF THE EVOLUTION OF SMART PHONES IN EDUCATION TECHNOLOGY AND ITS APPLICATION IN TECHNICAL AND PROFESSIONAL STUDIES: INDIAN PERSPECTIVE Manoj Kumar Assistant Professor, Department of Computer Science, Maharaja Surajmal Institute, Janakpuri, New Delhi, India ABSTRACT

The greatness of any nation depends largely on the system of education that is used to nurture its talent from within. With the digital era taking the spotlight, and the world rapidly reforming into a global village, it is now quintessential that a spirit of healthy competitiveness be inculcated in the budding minds of this country. While trying to remodel and upgrade the education system, a key issue is that of quality of education processes in the country. Needs and expectations of the society are changing very fast and the quality of higher education requires to be sustained at the desired level. The use of internet for educational purposes has increased many folds among Indian youths. Online video lectures and e-books are the emerging trends among learners. The birth of high speed internet access and its availability on recently evolved smart phones has opened several new avenues for learning. The growing popularity of these smart phones among the youth can potentially revolutionize the way we learn. The introduction of 3G technology is already being pinned as the next big thing in the mobile internet revolution. This paper discusses the use of Smart Phones in Education Technology and its application in Technical & Professional studies in India. We intend to put forward some challenges and advices. KEYWORDS

Indian education system, high speed internet on smart phone, video lectures, e-books.

For More Details:

http://airccse.org/journal/ijmit/papers/3311ijmit04.pdf

http://airccse.org/journal/ijmit/vol3.html


REFERENCES

[1] Mahbubur R Syed, Hakikur Rahman, Mohammad S Alam “Technologies and Issues in Distance Education- Bangladesh Perspective” IEEE 2004, pp 72-76 [2] Chitra G Desai, Sahebrao N.Shinde “Web Based Education in India: A Changing Scenario” IEEE 2009 pp 262-265 [3] Kenneth Hoganson “Distance Learning and Converging Mobile Devices” IEEE 2009, pp 1114-1119 [4] Minghong Chen, Gang Li, Zhenhua Feng “Web Based Education Technology and Application In Rural Basic Education” IEEE 2009, pp 281-284 [5] http://gigaom.com/2010/06/10/india-3g-subscribers/ Retrieved on January 19, 2011. [6] http://www.ugc.ac.in [7] http:// www.aicte.ac.in [8] http:// www.aiuweb.org [9] http://www.education.nic.in/uhe/uhe.asp [10] http://www.ugc.ac.in/more/chairman_nehru_lecture.pdf [11] http://www.education.nic.in/IHL/INSTITUTESNATIONALIMPORTANCE.pdf [12] http:// www.vicepresidentofindia.nic.in/content.asp?id=321 [13] http:// www.en.wikipedia.org/wiki/All_India_Council_for_Technical_Education [14] http:// 3361.php

www.updates.highereducationinindia.com/2010/saarc-university-to-start-functioning-

[15] http://www.planningcommission.gov.in/plans/planrel/fiveyr/11th/11_v2/11v2_ch1.pdf [16] http://www.timesofindia.indiatimes.com/india/Top-central-universities-have-34-teachingpostsvacant/articleshow/5895118.cms [17] Report of “The Committee to Advise on Renovation and Rejuvenation of Higher Education” from http://www.education.nic.in/HigherEdu/YPC-Report.pdf . Retrieved on 20 March, 2011. [18] http://www.portal.unesco.org/education/en/ev.phpURL_ID=22329&URL_DO=DO_TOPIC&URL_SEC TION=201.html [19] http:// www.en.wikipedia.org/wiki/Indira_Gandhi_National_Open_University [20] http:// www.unesdoc.unesco.org/images/0012/001284/128463e.pdf [21] http://www.internetworldstats.com/asia/in.htm


[22] http://www.bcg.com/documents/file58645.pdf [23] http://www.iamai.in/Upload/Research/icube_new_curve_lowres_39.pdf [24] Draft Report Of Working Group On Higher Education 11th Five Year Plan from http://www.aicteindia.org/downloads/higher_education_XIplan.pdf. Retrieved on 20 March, 2011. [25] http://www.en.wikipedia.org/wiki/NPTEL [26] http://www.nptel.iitm.ac.in/faq.php [27] http://www.indiaedunews.net/Engineering/IIT_virtual_varsity_project_to_provide_degrees_soon_ 13238/ Retrieved on January 19, 2011. [28] http://www.apple.com/education/itunes-u/whats-on.html [29] http://www.appleinsider.com/articles/10/08/24/apple_announces_itunes_u_downloads_top_300_ million.html Retrieved on January 19, 2011. [30] http://www.youtube.com/education?b=400 [31] http://www.bruincast.ucla.edu/ [32] http://www.ocw.mit.edu/index.htm [33] http://www.oyc.yale.edu/courselist [34] http://www.uc.princeton.edu/main/index.php [35] http://www.youtube.com/user/StanfordUniversity [36] http://www.see.stanford.edu/see/courses.aspx [37] http://www.emergingedtech.com/2010/02/a-dozen-great-free-online-video-lecture-sites [38] http://www.teachertube.com/ [39] http://www.learnerstv.com [40] http://www.lecturefox.com [41] http://www.academicearth.org/ [42] https://www.testeachersonline.com/ [43] http://www.khanacademy.org/ [44] http://www.academicinfo.net/ [45] http://www.freevideolectures.com/


[46] http:// www.onlinevideolectures.com/ [47] http:// www.freescienceonline.blogspot.com [48] http:// www.aduni.org/courses [49] http://www.openculture.com/freeonlinecourses [50] http://www.juxtconsult.com/Reports/Snapshot-of-Juxt-India-Online-Landscape-2010-Press.ppt [51] http://www.scribd.com/ [52] http://www.freebookspot.co/ [53] http://www.free-ebooks.net/ [54] http://www.ebookdirectory.com/ [55] http:// www.manybooks.net/ [56] http:// www.4ebooks.org/ [57] http://www.globusz.com/ [58] http:// www.freecomputerbooks.com/ [59] http://www.freetechbooks.com/ [60] http://www.onlinecomputerbooks.com/ [61] http://www.suite101.com/content/buy-ebooks-from-the-google-ebookstore-a319890 [62] http://www.ahec.org/research/study_reports/IsL0205/TOC.html [63] http://www.hindustantimes.com/India-now-third-biggest-internet-user/Article1-638366.aspx# Rretrieved on January 21, 2011. [64] http:// www.ondeviceresearch.com/blog [65] http://www.trai.gov.in/WriteReadData/trai/upload/PressReleases/798/prerdiv9feb11.pdf Retrieved on February 15, 2011 [66] http://www.idcindia.com/Press/27dec2010.asp Retrieved on January 15, 2011. [67] http://www.facebook.com/blog.php?post=297879717130 [68] http://www.opera.com/smw/2011/01/ [69] http:// www.education.nic.in/HigherEdu/list-deemeduniv.asp


[70] http:// www.wikieducator.org/images/d/d9/SJ_Nayantara_Padhi.pdf [71] http://www.apple.com/education/apps/ [72] https:// www.market.android.com/apps/EDUCATION/ [73] http://www.symbiansoftware.us/education [74] http://www.getjar.com/mobile-more-education-applications-for-symbian-all/all/?o=popular


CUSTOMERS PERCEPTION OF M-BANKING ADOPTION IN KINGDOM OF BAHRAIN : AN EMPIRICAL ASSESSMENT OF AN EXTENDED TAM MODEL Ali AlSoufi1 and Hayat Ali2 1Department of Information Systems, University of Bahrain, Bahrain 2 Department of Information Systems, University of Bahrain, Bahrain ABSTRACT

Mobile applications have been rapidly changing the way business organizations deliver their services to their customers and how customers can interact with their service providers in order to satisfy their needs. The use of mobile applications increases rapidly, and has been used in many segments including banking segment. This research aims at extending the Technology Adoption Model (TAM) to incorporate the role of factors in influencing customer’s perception towards M-banking adoption. Furthermore, the extended TAM model was evaluated empirically to measure its impact on M-banking adoption in of Bahrain. The model was evaluated using a sample survey of 372 customers. The results reveal that the intention to adopt mobile banking is mainly affected by specific factors which are: Perceived Usefulness and Ease of Use. On the other hand, some factors such as perceived cost and perceived risk did not show any affect on the users' intention to use mobile banking. The result of this research is beneficial for banking service managers to consider the factors that can enforce the Mobile Banking services adoption and increase the take-up of their mobile services.. KEYWORDS

Mobile banking, online banking, Customer perception, Extended TAM

For More Details:

http://airccse.org/journal/ijmit/papers/6114ijmit01.pdf

http://airccse.org/journal/ijmit/vol6.html


REFERENCES

[1] T. Laukkanen, “Internet vs. mobile banking: comparing customer value perceptions,” Business Process Management Journal, Vol. 13, No. 6, 2007, pp. 788-797. [2] A. S.Yang “Exploring adoption difficulties in mobile banking services,” Canadian Journal of Administrative Sciences, Vol. 26, No. 2, 2009, pp. 136-149 [3] S.Y. Chian " Factors Affecting Individuals to Adopt Mobile Banking: Empirical Evidence from the UTAUT Model", Journal of Electronic Commerce Research, Vol. 13, No. 2, 2012, pp. 104-121. [4] J. Sripalawat, M. Thongmak, and A. Ngramyarn, “M-banking in metropolitan Bangkok and a comparison with other countries,” The Journal of Computer Information Systems, Vol. 51, No. 3, 2011, pp. 67-76. [5] E. Scornavacca, and H. Hoehle, “ Mobile banking in Germany: A strategic perspective,” International Journal of Electronic Finance, Vol. 1, No. 3, 2007, pp. 304-320 [6] H. Riquelme, and R. E. Rios, “The moderating effect of gender in the adoption of mobile banking,” International Journal of Bank Marketing, Vol. 28, No. 5, 2010, pp. 328-341. [7] M. Suoranta, and M. Mattila, “Mobile banking and consumer behavior: New insights into the diffusion pattern,” Journal of Financial Services Marketing, Vol. 8, No. 4, 2004, pp. 354-366 . [8] T. Laukkanen, and M. Pasanen, “Mobile banking innovators and early adopters: How they differ from other online users?" Journal of Financial Services Marketing, Vol. 13, No. 2, 2008, pp. 86-94 [9] J. Puschel, J. A. Mazzon, and J. M. C. Hernandez, “Mobile banking: Proposition of an integrated adoption intention framework,” International Journal of Bank Marketing, Vol. 28, No. 5, 2010, pp. 389409 [10] H. Hoehle &, S. Huff, "Electronic banking channels and task-channel fit". Paper presented at the Thirtieth International Conference on Information Systems, 2009. [11] M.A. Fishbein I. Ajzen,"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research". Reading, MA: Addison-Wesley, 1975. [12] F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology". MIS Quarterly., vol. 13, no. 3, 1989, pp. 318–339. [13] P. Legris, J. Ingham, & P. Collerette, "Why do people use information technology? A critical review of the technology acceptance model". Information & Management., vol. 40, no. 3, 2003, pp. 191– 204. [14] V. Venkatesh & F.D. Davis, "A theoretical extension of the technology acceptance model: four longitudinal field studies". Management Science, vol. 46, no. 2, 2000, pp. 186–204. [15] P. Luarn,, & H.H. Lin, "Toward an understanding of the behavioural intention to use mobile banking". Computer in Human Behaviour, vol.21, no. 6, 2004, pp. 340-348.


[16] T. El-Kiki &.E. Lawrence (2007). Mobile User Satisfaction and Usage Analysis Model of mGovernment Services [online] Available at: http://www.m4life.org/proceedings/2006/PDF/11_ElKiki.pdf. [17] Y, Shi (2009). Factors influencing the use of mobile banking: The case of SMS based mobile banking [online] available at: http://aut.researchgateway.ac.nz/bitstream/handle/10292/666/YuS.pdf?sequence=4 [18] D. Hale & R. Thakur, “Self-service technologies and Generation Y: are they beyond the personal touch”. International Journal of Electronic Marketing and Retailing, vol. 1, no. 2, 2006, pp. [19] Access Bank Contact Center (2010), what is access mobile [online]. Available at: http://www.accessbankplc.com/Pages/Page.aspx?Value=51&ln=Gy7UlI4cSJE94Wa2qudbFQ%3D% 3D. [20] AOEMA.“E-Government from a User’s Perspective” (No. telwg29/BFSG/14). Hong Kong, China: Asia-Pacific Economic Cooperation (APEC), 2004 [21] B. W. Schay, M. E. Beach, J. A. Caldwell & C. LaPolice, “Using Standardized Outcome Measures in the Federal Government”. Human Resource Management, vol.41, no.3, 2002, pp.355-368 [22] F. Wefering, S. Rupprecht, G. Wegeler, & A. Grimm, “Community Empowerment Network Through Universal Regional integration for the 21st Century “, Evaluation Report D3.3, 2002 [23] R. C. Mayer, J. H. Davis, & D. Schoorman, “An Integration Model of Organizational Trust”. Academy of Management Review, vol.20, no.3, 1995, pp.709-734. [24] NECCC. “Enterprise Electronic Government: E2Gov. Presented at the National Electronic Commerce Coordinating Council Symposium, Las Vegas, Nevada, 2001. [25] P. Luarn, & H.H. Lin, “ Toward an understanding of the behavioural intention to use mobile banking”. Computer in Human Behaviour, 2004, vol. 21, no.6, pp.340-348. [26] A. Bandura, Self-Efficacy: The exercise of control. New York: Freeman, 1997 [27] F. Pajares & D. Schunk, (2001). Self-beliefs and school success: Self-efficacy, self-concept, and school achievement. In R. Riding & S. Rayner (Eds.), Perception (pp. 239-266). London: Ablex Publishing.[online] Available at: http://www.des.emory.edu/mfp/PajaresSchunk2001.html [28] W.T. Rupp & A. D. Smith, “Mobile commerce: new revenue machine or black hole?”. Business Horizons, vol. 45, no. 4,2002, pp. 26-29 [29] S, M. Featherman, “Predicting e-services adoption: a perceived risk facets perspective”. presented at 8th Americas Conference on Information Systems, Dallas, 9-11 August 2002 [30] P.A. Pavlou, (2001) Integrating trust in electronic commerce with the technology acceptance model: model development and validation, in: Proceedings of the Seventh Americas Conference on Information Systems, 2001, pp. 816–822.


EXTENDING UTAUT TO EXPLAIN SOCIAL MEDIA ADOPTION BY MICROBUSINESSES Debashish Mandal and Robert J McQueen Department of Management Systems, University of Waikato, New Zealand., ABSTRACT

This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.. KEYWORDS

UTAUT, social media, action research, microbusiness

For More Details:

http://airccse.org/journal/ijmit/papers/4412ijmit01.pdf

http://airccse.org/journal/ijmit/vol4.html


REFERENCES

[1] I. Lee, “Overview of Emerging Web 2.0-Based Business Models and Web 2.0 Applications in Businesses,” International Journal of E-Business Research, vol. 7, no. 4, pp. 1–16, Jan. 2011. [2] W. G. Mangold and D. J. Faulds, “Social media: The new hybrid element of the promotion mix,” Business Horizons, vol. 52, no. 4, pp. 357–365, Jul. 2009. [3] M. Sepp, V. Liljander, and J. Gummerus, “Private bloggers’ motivations to produce content – a gratifications theory perspective,” Journal of Marketing Management, vol. 27, no. 13–14, pp. 1479– 1503, Dec. 2011. [4] P. R. Berthon, L. F. Pitt, K. Plangger, and D. Shapiro, “Marketing meets Web 2.0, social media, and creative consumers: Implications for international marketing strategy,” Business Horizons, vol. 55, no. 3, pp. 261–271, May 2012. [5] B. D. Weinberg and E. Pehlivan, “Social spending: Managing the social media mix,” Business Horizons, vol. 54, no. 3, pp. 275–282, May 2011. [6] Y. K. Dwivedi, N. Mustafee, L. D. Carter, and M. D. Williams, “A Bibliometric Comparision of the Usage of Two Theories of IS/IT Acceptance (TAM and UTAUT),” in AMCIS 2010 Proceedings. Paper 183, 2010. [7] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User acceptance of information technology: toward a unified view,” MIS Quarterly, vol. 27, no. 3, pp. 425–478, 2003. [8] A. S. Lee, “Electronic mail as a medium for rich communication: An empirical investigation using hermeneutic interpretation,” MIS quarterly, vol. 18, no. 2, pp. 143–157, 1994. [9] M. D. Williams, Y. K. Dwivedi, B. Lal, and A. Schwarz, “Contemporary trends and issues in IT adoption and diffusion research,” Journal of Information Technology, vol. 24, no. 1, pp. 1–10, Jan. 2009. [10] O. Günther, H. Krasnova, D. Riehle, and V. Schondienst, “Modeling Microblogging Adoption in the Enterprise,” in Americas Conference on Information Systems, 2009, pp. 1–10. [11] P. Meyer and J. Dibbern, “An exploratory study about microblogging acceptance at work an exploratory study about microblogging acceptance at work,” in AMCIS 2010 Proceedings of the sixteenth Americas conference on information systems, Lima, Peru, August 12-15, 2010 Paper 449, 2010. [12] V. Schoendienst, H. Krasnova, O. Guenther, and D. Riehle, “Micro-Blogging Adoption in the Enterprise: An Empirical Analysis,” in 10th International Conference on Wirtschaftsinformatik, 2011, no. February. [13] Y. K. Dwivedi, N. Rana, H. Chen, and M. Williams, “A Meta-analysis of the Unified Theory of Acceptance and Use of Technology (UTAUT),” vol. 366, M. Nüttgens, A. Gadatsch, K. Kautz, I. Schirmer, and N. Blinn, Eds. Springer Boston, 2011, pp. 155–170.


[14] N. D. Oye, N. A.Iahad, and N. Ab.Rahim, “The history of UTAUT model and its impact on ICT acceptance and usage by academicians,” Education and Information Technologies, Feb. 2012. [15] V. Venkatesh, J. Thong, and X. Xu, “Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology,” MIS Quarterly, vol. 36, no. 1, pp. 157–178, 2012. [16] S. Devaraj, R. F. Easley, and J. M. Crant, “Research Note--How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use,” Information Systems Research, vol. 19, no. 1, pp. 93–105, Mar. 2008. [17] V. Venkatesh, S. A. Brown, L. M. Maruping, and H. Bala, “Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioural expectation,” MIS Quarterly, vol. 32, no. 3, pp. 483–502, 2008. [18] B. H. Sheppard, J. Hartwick, and P. R. Warshaw, “The Theory of Reasoned Past Action : MetaAnalysis of with Modifications for Recommendations and,” Journal of Consumer Research, vol. 15, no. 3, pp. 325–343, 1988. [19] R. P. Bagozzi, “The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift .,” Journal of the Association for Information Systems, vol. 8, no. 4, pp. 244–254 Article 12, 2007. [20] J. DiMicco, D. R. Millen, W. Geyer, C. Dugan, B. Brownholtz, and M. Muller, “Motivations for social networking at work,” in Proceedings of the ACM 2008 conference on Computer supported cooperative work - CSCW ’08, 2008, p. 711. [21] S. Barnes and M. Böhringer, “Modeling use continuance behavior in microblogging services : the case of twitter,” Journal of Computer Information Systems, vol. 51, no. 4, pp. 1–10, 2011. [22] E. Turban, N. Bolloju, and T.-P. Liang, “Enterprise Social Networking: Opportunities, Adoption, and Risk Mitigation,” Journal of Organizational Computing and Electronic Commerce, vol. 21, no. 3, pp. 202–220, Jul. 2011. [23] X. Li, M. D. Troutt, A. Brandyberry, and T. Wang, “Decision Factors for the Adoption and Continued Use of Online Direct Sales Channels among SMEs,” Journal of the Association for Information Systems, vol. 12, no. 1, pp. 1–31, 2011. [24] C. T. Street and D. B. Meister, “Small business growth and internal transparency: The role of information systems,” MIS Quarterly, vol. 28, no. 3, pp. 473–506, 2004. [25] R. D Macredie and K. Mijinyawa, “A theory-grounded framework of Open Source Software adoption in SMEs,” European Journal of Information Systems, vol. 20, no. 2, pp. 237–250, Feb. 2011. [26] S. Qureshil, M. Kamal, and P. Wolcott, “Information Technology Interventions for Growth and Competitiveness in Micro-Enterprises,” International Journal of E-Business Research, vol. 5, no. 1, pp. 117–140, Jan. 2009. [27] D. DeLuca, M. J. Gallivan, and N. Kock, “Furthering information systems action research: a postpositivist synthesis of four dialectics,” Journal of the Association for Information Systems, vol. 9, no. 2, pp. 48–72, 2008.


[28] I. Benbasat, D. K. Goldstein, and M. Mead, “The Case Research Strategy in Studies of Information Systems,” MIS Quarterly, vol. 11, no. 3, pp. 369–386, 1987. [29] R. Baskerville, “Grounded action research: a method for understanding IT in practice,” Accounting, Management and Information Technologies, vol. 9, no. 1, pp. 1–23, Jan. 1999.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.