scholarly journals UTAUT Theory based User Acceptance Model of the Internet Financial and Empirical Study

Author(s):  
Yan Lu ◽  
Bing Hu
Author(s):  
Dong-Her Shih ◽  
Yuh-Wen Chiu ◽  
She-I Chang ◽  
David C. Yen

RFID ticketing systems constitute a particular type of pervasive information systems providing spectators of sports events with a transparent mechanism to validate and renew tickets. This study seeks to investigate the factors that influence user acceptance of RFID ticketing systems. The theoretical background of the study was drawn from the technology acceptance model (TAM) and the innovation diffusion theory (IDT), and enhanced with factors related to privacy and switching cost features. The research model was tested with data gathered through a lab experiment (N=71). The participants perceived the system as useful and easy to use, and expressed the willingness to adopt it should it become commercially available. Moreover, the results of ANOVA tests suggest that the age and education of users influence their perception towards the usefulness of the system and its subsequent use.


2019 ◽  
Vol 162 ◽  
pp. 940-945
Author(s):  
Qi Xianjun ◽  
Chen Minghong ◽  
Lu Xiaoli

Heliyon ◽  
2018 ◽  
Vol 4 (12) ◽  
pp. e01048 ◽  
Author(s):  
Putu Wuri Handayani ◽  
Ibad Rahadian Saladdin ◽  
Ave Adriana Pinem ◽  
Fatimah Azzahro ◽  
Achmad Nizar Hidayanto ◽  
...  

i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


2014 ◽  
Vol 4 (7) ◽  
pp. 1369-1374 ◽  
Author(s):  
Hessam Zandhessami ◽  
Parisa Geranmayeh

Sign in / Sign up

Export Citation Format

Share Document