A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance

MIS Quarterly ◽  
2009 ◽  
Vol 33 (2) ◽  
pp. 419 ◽  
Author(s):  
Wu ◽  
Lederer
Author(s):  
Klarissa T.T. Chang ◽  
John Lim

This study provides an updated meta-analysis on the effects of information technology (IT) in education. Sixty-eight experimental studies conducted on the application of IT in the classrooms were integrated and analyzed. Positive effect sizes were found for learning outcomes, including academic achievement, knowledge retention, task performance, self-reported learning, and self-efficacy. Further analysis revealed the primary effects to be significantly moderated by several factors, categorized under learner and course characteristics. These findings have important implications for both research and practice.


2020 ◽  
Vol 12 (4(J)) ◽  
pp. 13-22
Author(s):  
Ernest Osei ◽  
PETER KWASI OPPONG

Computer education is increasing steadily because it is well-recognized as a major indicator of the successful acceptance of information technology applications in an organization. Despite the advantages associated with computer education, there is a relative scarcity of empirical studies on the potential role of computer education in the behavioural intentions of staff to use information technology applications, particularly in healthcare settings. Thus, this research is aimed to investigate the role of computer education to the behavioural intentions of staff to use information technology applications in the hospitals in Kumasi. Guided by Davis` technology acceptance model, five hypotheses were stated and examined through structural equation modeling. Utilizing stratified sampling, data were gathered via a survey questionnaire from a sample of 154 staff in the hospitals in Kumasi. The research revealed that computer education contributes positively to the behavioural intentions to use via the impact of perceptions of ease of use of technology applications in the hospitals in Kumasi. The research, therefore, recommends that the management should consider computer education in the adoption of technology systems to enhance the staff perceptions of ease of use and hence, their intentions to use to improve health care in the Metropolis.


2010 ◽  
pp. 1368-1375
Author(s):  
Beverley Lloyd-Walker

This article begins by discussing how the role of human resource management has changed in recent years, and the implications of this for human resource departments. Providing employees with the information they require about their employment relationship is then explored by investigating how information technology can improve the quality of this information flow. The role of employee self-service portals is outlined, covering the range of information they currently provide and the future role of employee self-service portals. Acknowledging that employee acceptance is crucial to the success of employee self-service portals, implementation issues are discussed. Technology acceptance by employees is necessary, and the article ends by discussing this important key to successful employee self-service portal implementation.


Author(s):  
Beverley Lloyd-Walker

This article begins by discussing how the role of human resource management has changed in recent years, and the implications of this for human resource departments. Providing employees with the information they require about their employment relationship is then explored by investigating how information technology can improve the quality of this information flow. The role of employee self-service portals is outlined, covering the range of information they currently provide and the future role of employee self-service portals. Acknowledging that employee acceptance is crucial to the success of employee self-service portals, implementation issues are discussed. Technology acceptance by employees is necessary, and the article ends by discussing this important key to successful employee self-service portal implementation.


2015 ◽  
Vol 17 (1) ◽  
pp. 42-50 ◽  
Author(s):  
Seyed Jamaledin Tabibi ◽  
Amir Ashkan Nasiripour ◽  
Reza Baradaran Kazemzadeh ◽  
Parvin Ebrahimi

2016 ◽  
Vol 44 (1) ◽  
pp. 156-160 ◽  
Author(s):  
Raymond Heatherly

Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source.


Sign in / Sign up

Export Citation Format

Share Document