scholarly journals Technology adoption theories in examining the uptake of blockchain technology in the framework of functionalist and interpretive paradigms

2020 ◽  
Vol 51 (11) ◽  
pp. 26-38
Author(s):  
Viktoriia Semenova

The purpose of this paper is to examine the adoption process of emerging technology on the example of blockchain. The theoretical interpretation of blockchain acceptance and its implications are discussed from the positions of technology adoption theories (diffusion of innovation theory, the technology acceptance model, the unified theory of acceptance and use of technology, the technology – organisation – environment framework) as well as sensemaking theory. These theoretical models help understand the perception among end-users (e.g. supply chain practitioners) and facilitate technology diffusion among enterprises. Due to the novelty of the research field, the analysis revealed that current studies were conducted within the functionalist paradigm; however, studies on blockchain implementation can be equally done in the interpretive paradigm. The results indicate a shortage of empirical research investigations and the need for greater theory elaboration to accelerate the adoption process within organisations.

Author(s):  
Mumtaz Abdul Hameed ◽  
Nalin Asanka Gamagedara Arachchilage

Information system (IS) security threats are still a major concern for many organizations. However, most organizations fall short in achieving a successful adoption and implementation of IS security measures. In this chapter, the authors developed a theoretical model for the adoption process of IS security innovations in organizations. The model was derived by combining four theoretical models of innovation adoption, namely diffusion of innovation theory (DOI), the technology acceptance model (TAM), the theory of planned behavior (TPB), and the technology-organisation-environment (TOE) framework. The model depicts IS security innovation adoption in organizations, as two decision proceedings. The adoption process from the initiation stage until the acquisition of innovation is considered as a decision made by organisation while the process of innovation assimilation is assumed as a result of the user acceptance of innovation within the organization.


Author(s):  
Asanka Gunasinghe ◽  
Junainah Abd Hamid ◽  
Ali Khatibi ◽  
SM Ferdous Azam

Aim of this paper is to review technology (IS) acceptance theories and models, recognizing empirical evidence available to support the suitability of each theoretical model in explaining academicians’ acceptance of online learning technology. Understanding the factors influencing system usage is crucial for decision-makers to recognize potential user needs and concerns, which could be addressed during the development phase of a system. Thus, for decades, researchers have been trying to understand why people accept new technologies. As a result, a wide variety of theories and models explaining the concept of technology acceptance. Some prominent theoretical models explaining technology acceptance are, “Theory of Reasoned Action”, “Diffusion of Innovation theory”, “Theory of Planned Behavior”, “Social Cognitive Theory”, “Technology Acceptance Model”, “Model of PC Utilization”, “Motivational Model”, “Unified Theory of Acceptance and Use of Technology”, “UTAUT 2”, “UTAUT 3”. The concept of academic’s acceptance of online learning technology can be explained through several determinants that are operationalized through above information systems models.


2016 ◽  
Vol 26 (5) ◽  
pp. 1072-1092 ◽  
Author(s):  
Antonia Estrella-Ramon ◽  
Manuel Sánchez-Pérez ◽  
Gilbert Swinnen

Purpose The purpose of this paper is to examine the impact of customers’ offline transaction behaviour in the form of loyalty and cross-buying on the adoption of self-service technology innovations by non-business customers in the context of online banking. Design/methodology/approach This study extends the Diffusion of Innovation Theory, as well as the Technology Acceptance Model adapted to describe and model individual customer observed behaviours in the pre-adoption stage of the adoption process. The Log-logistic parametric survival model is applied using panel data for 1,357 randomly selected new customers from a bank. Findings Significant differences arise among customers’ behaviours related to periodicity of interactions with the bank and quantity of products involved in the interactions, as well as convenience and risk of the interactions. The results corroborate that those customers who are more likely to adopt the online banking faster show an offline behavioural pattern more related to higher periodicity of interactions and convenience, rather than a high number of products involved in their interactions, the use of high-risk products or the maintenance of a higher average monthly liabilities. Originality/value While previous research explaining the process of adoption of the online channel has mainly focused on the analysis of customers’ attitudes (i.e. customers’ perceptions) and demographics, in this research an additional explanation is proposed using customers’ offline transaction behaviours. In addition, there is a considerable amount of research about the adoption of new technologies, but there is a scarcity of studies looking specifically at the financial services and banking industry.


Author(s):  
Judy van Biljon ◽  
Karen Renaud

We report on an investigation into mobile phone adoption by older users. Technology adoption is a process from ignorance to considering it a necessity. Moreover, acceptance is an essential precursor of adoption. Many models consider either acceptance or adoption, but in fact these are interrelated. Furthermore, most theoretical models are based on responses from students or economically active adults. This begs the question: Do existing models incorporate the phases and the factors that lead to mobile phone adoption and acceptance by older adults? We thus studied the needs, uses, and limitations of older users and then gathered information about experiences and opinions of these users. We then mapped the verified acceptance factors against adoption processes in a two-dimensional matrix. This led to the proposal for the novel senior technology acceptance and adoption model (STAM), which incorporates acceptance factors into the adoption process, thereby consolidating the research in both these areas.


Author(s):  
Joerg Koenigstorfer

Today, the majority of the world's population owns mobile devices that allow individuals to access the Internet at any time and at any place. However, owning an Internet-enabling mobile device does not necessarily mean that an individual uses the mobile Internet. This article reviews the state of the art on the theory-guided drivers and barriers of consumer acceptance of the mobile Internet. The author describes models that help explain and predict consumer acceptance, including the Technology Acceptance Model, Motivational models, Perceived Value models, The Unified Theory of Acceptance and Use of Technology, and Diffusion of Innovation theories. The article also presents empirical research that applies and extends these models in the context of mobile Internet usage, and summarizes the most important findings of these empirical studies. Finally, this article also discusses challenges in acceptance research, as well as implications for future research.


2016 ◽  
Vol 54 (7) ◽  
pp. 946-966 ◽  
Author(s):  
Kun Li ◽  
Yanju Li ◽  
Teresa Franklin

This study examined four factors that influence preservice teachers’ intentions to adopt technology in classrooms based on the Theory of Planned Behavior and Technology Acceptance Model. These four factors—technology self-efficacy, attitudes toward technology, perceived ease of use of technology, and perceived barriers of technology adoption—were explored through a multiple regression analysis. The results indicated that technology self-efficacy, attitudes toward technology, and perceived ease of use of technology were significantly predictive of technology adoption intentions when the other predictors were statistically controlled. Perceived barriers of technology adoption was not a significant predictor. Gender analyses were conducted showing no significant difference on all the factors between male and female. Practical and theoretical implications were addressed either to guide practitioners in designing teacher professional development program or assist researchers in their future study.


2021 ◽  
pp. 026666692110099
Author(s):  
Abdo Ali Homaid

This study aims to identify the determinants that influence the acceptance and usage of ICT among microfinance employees in the least-developed countries. It extended the Unified Theory of Acceptance and Use of Technology (UTAUT) model with the inclusion of Innovativeness (IN) from the Diffusion of Innovation (DOI) theory. The quantitative approach was adopted, with a survey questionnaire distributed online to microfinance employees in Yemen, completed by 195 respondents. Both measurement and structural data analyses were employed through Partial Least Square Structural Equation Modelling (PLS-SEM), using Smart PLS software. The results show that the UTAUT variables Performance Expectancy (PE), Effort Expectancy (EE), Facilitating Conditions (FC) and IN were significant predictors of Behavioural Intention (BI) to accept and use ICT by microfinance employees, but not Social Influence (SI). The results also reveal that the most significant factors affecting BI were EE followed by PE, IN and FC respectively; BI was the most significant factor affecting Use Behaviour (UB) of ICT among the tested relationships in the study model. Significantly, the results show that IN was a crucial factor as it significantly affected PE, EE and BI to use ICT. The outcomes of the study will assist decision makers to make appropriate interventions for the effective use of ICT by employees in a flourishing and infant industry like microfinance. Consequently, it will help in eradicating and eliminating poverty, a global issue.


Author(s):  
Yakubu Ajiji Makeri

Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations. Is profoundly crucial for any organization to preserve Information System (IS) Security and computer resources, hardware, software, and networks, etc.The Information System (IS)assets against malicious attacks such as unauthorized access and improper use. This research, we developed a theoretical model for the adoption process of IS Security innovations in organizations, are numerous measures available that provides protection for organization IS assets, including (hardware, software, networks, etc.) and antivirus, firewall, filters, Intrusion Detection System (IDS), encryption tools, authorization mechanisms, authentication systems, and proxy devices. The model is to derive by the four combining theoretical models of innovation adoption, namely, the Theory of Planned Behaviour (TPB, Diffusion of Innovation theory (DOI), the Technology Acceptance Model (TAM),) and the Technology-Organisation-Environment (TOE) framework. The Computer security education needs to consider as a means of to combat against threats Arachchilage and Arachchilage et al., 2016).  (Arachchilage and Love, 2013; While the process of innovation assimilation is as a result of the user acceptance of innovation within the organization. This model depicts security innovation adoption in organizations, as a two decision proceeding for any organization. The stage until its acquisition of innovation and adoption process from the initiation is considered as a decision made any organization. The The model also introduces several factors that influence the different stages of information Security and the innovation adoption process Adoption of IS security measures by the individuals and organizations


2022 ◽  
Vol 6 (1) ◽  
pp. 1-30
Author(s):  
Abdullah Al Hussain ◽  
Md. Akhtaruzzaman Emon ◽  
Toufiq Ahmed Tanna ◽  
Rasel Iqbal Emon ◽  
Md. Mehedi Hassan Onik

The spirit of “blockchain technology” is a distributed database in which saved data is transparent, accountable, public, immutable, and traceable. This base-level disruptive technology can boost the security and privacy-related efficiency of various domains. As Bangladesh is currently aiming for sustainable development, blockchain technology adoption by the local researchers is growing robustly. However, in Bangladesh, the blockchain Technology Acceptance Model (TAM) is not yet well structured which is also limiting the perspective of local developers and researchers. Therefore, sectors like governance, healthcare, security, privacy, farming, information authentication, cryptocurrencies, internet architecture, data, and so on are unable to utilize the full potential of this technology. In this research, the authors conduct an in-depth review of such types of blockchain technology-related research articles that have been published recently and are also solely focused on Bangladesh. From 5 publishers (IEEE Xplore, ACM, ScienceDirect, Taylor & Francis, and SpringerLink) this study analyses 70 articles published during the year 2016-2020. The study results find the top 13 sectors where Bangladeshi researchers are currently focusing on. Those studies identify that the rigid policy by the government, scarcity of expert researchers, and lack of resources are the main reasons why Bangladesh is still struggling to accommodate blockchain extensively. In addition, published papers are mostly based on theoretical concepts without an appropriate implementation. Finally, this study will be a great resource to the developers, entrepreneurs, and technology enthusiasts to determine the strategic plan for adopting blockchain technology in Bangladesh or even to any other developing country.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Amit Kumar Bhardwaj ◽  
Arunesh Garg ◽  
Yuvraj Gajpal

In recent times, organizations are increasingly adopting blockchain technology in their supply chains due to various advantages such as cost optimization, effective and verified record-keeping, transparency, and route tracking. This paper aims to examine the factors influencing the intention of small and medium enterprises (SMEs) in India to adopt blockchain technology in their supply chains. A questionnaire-based survey was used to collect data from 216 SMEs in the northern states of India. The study has considered an integrated technology adoption framework consisting of the Technology Acceptance Model (TAM), Diffusion of Innovation (DOI), and Technology-Organization-Environment (TOE). Using this integrated TAM-TOE-DOI framework, the study has proposed eleven hypotheses related to factors of blockchain technology adoption. Confirmatory factor analysis (CFA) and structural equation modeling (SEM) have been used to test the hypotheses. The results show that relative advantage, technology compatibility, technology readiness, top management support, perceived usefulness, and vendor support have a positive influence on the intention of Indian SMEs to adopt blockchain technology in their supply chains. The complexity of technology and cost concerns act as inhibitors to the technology adoption by SMEs. Furthermore, the three factors, namely, security concerns, perceived ease of use, and regulatory support, do not influence the intention to adopt the technology. The study contributes to filling a significant gap in the academic literature since only a few studies have endeavored to ascertain the technology adoption factors by supply chains of SMEs in a developing country like India. The study has also proposed a novel integrated technology adoption framework that can be employed by future studies. The findings are expected to enable SMEs to understand important factors to be considered for adopting blockchain technology in their supply chains. Furthermore, the study may benefit the blockchain technology developers and suppliers as they can offer customized solutions based on the findings.


Sign in / Sign up

Export Citation Format

Share Document