Attitudes Toward Implementing E-Government in Health Insurance Administration

2021 ◽  
Vol 17 (2) ◽  
pp. 1-18
Author(s):  
Qais Mohammad Hammouri ◽  
Emad Ahmed Abu-Shanab ◽  
Nawras M. Nusairat

Health insurance administration (HIA), a governmental institution that provides health insurance services for citizens in Jordan, is investing in an electronic health insurance administration (EHIA) system. This paper aims to explore the main factors influencing users' intention to adopt EHIA in Jordan, where little research focused on such systems. Using a quantitative approach, a sample of 315 citizens was utilized, and an instrument of 30 items was used. Findings revealed that perceived ease of use, perceived usefulness, information technology background, and social influence are major predictors of citizens' intention to use EHIA. In contrast, perceived security and perceived trust are not significant toward the adoption process. Jordanian government should focus on the ease and usefulness of the system to encourage citizens to use EHIA system, where substantial efforts need to be exerted to advance citizens' skills in using e-government applications. In addition, Jordanian authorities should utilize social media effectively to illustrate the significance of EHIA system for citizens.

Author(s):  
Radwan Moh'd Al-Dwairi ◽  
Laith M.K. Al-Shraideh ◽  
Emad A. Abu-Shanab

In response, to little research focused on how Jordanians perceive and respond to m-commerce and the main factors that govern its adoption and use, this article proposes a conceptual model that extends the technology acceptance model (TAM) with important factors related to consumers and companies like perceived trust, perceived security, subjective norms and service quality. The proposed model was validated and then tested utilizing a sample of 200 students. Results indicate that a perceived ease of use, a perceived usefulness and service quality are the major drivers of m-commerce adoption among Jordanian users. In contrast perceived trust, perceived security, and subjective norms are not significant toward the adoption process. A detailed analysis and results follows this article.


Author(s):  
Maria Camila Bermeo Giraldo ◽  
Martha L. Benjumea-Arias ◽  
Alejandro Valencia-Arias ◽  
Iván A. Montoya-Restrepo

The purpose of this paper is to identify the factors that influence the acceptance and use of mobile banking among users in Medellín (Colombia). The factors we propose are built upon on seven constructs (customer service and support, perceived attitude, perceived usefulness, ease of use, perceived trust, intention to use, and perceived security), which were developed based on the Technology Acceptance Model (TAM) and the literature. We collected the data from 220 questionnaires self-administered by mobile banking users in Medellín. Subsequently, we conducted a confirmatory factor analysis to determine the correlation between the set of observed variables and the constructs defined in the proposed acceptance model. We empirically conclude that the use of mobile banking among the population under study is mainly influenced by users’ perceived usefulness, perceived trust, and ease of use. The results show a strong correlation between perceived trust and perceived security and between perceived usefulness and intention to use.  


Author(s):  
Khalid Ali Rababah ◽  
Mohammad Khasawneh ◽  
Bilal Nassar

The aim of this study is to examine the factors affecting students' intention to use cloud computing in the Jordanian universities. To achieve this purpose, a quantitative research approach which is a survey-based was deployed. Around 400 questionnaires were distributed randomly to Information Technology (IT) students at four universities in Jordan and only 236 valid questionnaires were received. Using multiple regression technique, the results revealed that perceived usefulness, perceived ease of use, perceived security, perceived speed of access, and perceived cost of usage were significantly influencing the students' intention to accept and use cloud computing while the Affect was not. Furthermore, the results indicated that the developed model explains 50.4% of the variance in the students' intention to use cloud computing. Practically, the results of this study are considered fruitful for the universities and students to increase the usage of cloud computing in the educational settings.


PLoS ONE ◽  
2021 ◽  
Vol 16 (8) ◽  
pp. e0256570
Author(s):  
Tianyang Huang

The success of unmanned car, an emerging tool of transportation with so many advantages, depends to a large extent on its user acceptability. Potential designers are both the decision makers of driverless car design and the users of driverless cars. This study aims to explore the influencing factors of the potential designers’ intention to use unmanned cars. Based on the theory of Technology Acceptance Model (TAM), this study further expanded the TAM by incorporating perceived trust, perceived enjoyment and self-efficacy, so as to explain and predict potential designers’ intention to use unmanned cars. The questionnaire is determined through theoretical literature, pre-tests, etc., and the Structural Equation Model is used to analyze the data of 202 valid survey samples to investigate the influencing factors of the willingness to use unmanned vehicles. The results show that potential designers’ intention to use unmanned cars is positively affected by perceived trust, perceived enjoyment, perceived usefulness and perceived ease of use, and perceived trust has a positive effect on perceived ease of use, self-efficacy and perceived ease of use also have a positive effect on perceived usefulness. The findings of this study can provide designers and developers of unmanned cars, policy makers and implementers with guidance in the follow-up design, policy formulation and advertising of unmanned cars.


2018 ◽  
Vol 2 (3) ◽  
pp. 57-61
Author(s):  
Phuah Kit Teng ◽  
Bernard Lim Jit Heng ◽  
Siti Intan Nurdiana Wong Abdullah

The emergence of mobile payment providers such as Alipay and WeChat Pay has raised the interest in studying the adoption of mobile payment and assessment on the prediction of consumers’ intention. Due to insufficient research on cross-country comparison, this study aims to identify the differences in mobile payment adoption between China and Malaysia. Perceived usefulness, perceived security, perceived ease of use and attitude from Theory of Acceptance Model and Theory of Reasoned Action were used to analyse the intention to adopt mobile payment. Based on the results, perceived security seems to differ for the two countries while other factors have similar results. This study will definitely offer a fresh perspective to academics and practitioners in terms of exploring the propect of mobile payment in business trasnsactions.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Muhammad Turki Alshurideh ◽  
Barween Al Kurdi ◽  
Ra’ed Masa’deh ◽  
Said A. Salloum

Purpose This paper aims to investigate if perceived security, trust and perceived privacy affect both perceived usefulness and perceived ease of use. Also, the study explores if trust, perceived usefulness and perceived ease of use influence consumers’ intentions to use the e-payment system which is supported by testing the moderation effect of gender on the intention to use such systems in the higher education institutes. Design/methodology/approach In total, 850 participants from United Arab Emirates (UAE) universities have filled an online questionnaire prepared for these aims. The survey instrument is composed of 22 items. The primary data was used to test the study model, proposed constructs and the study hypotheses using the Smart PLS Software. Findings The research confirmed that perceived security, trust and perceived privacy affect both perceived usefulness and perceived ease of use. Also, the study found that trust, perceived usefulness and perceived ease of use have anticipated the significance of consumers’ intention to use e-payment system which is found also moderated by gender. Research outcomes indicated an important contribution towards the acceptance of e-payment systems and the common design of e-commerce systems. Originality/value Research outcomes have indicated an important contribution toward the acceptance of e-payment systems and the common design of e-commerce systems. Additionally, this study helped in increasing the reader’s understanding of various aspects of e-commerce, specifically consumers’ trust and privacy protection which consequently allows the online sellers to formulate appropriate strategies and actions imperative to serve the online purchasers and target the internet users.


Author(s):  
Fatheia Hassan Abdulfattah

The adoption of mobile cloud computing (MCC) in education systems still faces several obstacles due to technical, environmental, psychological, and individual issues. Considering numerous advantages associated with the adoption of MCC, this article evaluates the frequency of using MCC by students at King Abdul-Aziz University (KAU) and investigates the factors that influence student intention to use MCC. A survey approach has been used to include 163 students of KAU through a random sampling. Results showed that the attitude towards MCC, perceived ease of use, perceived usefulness, social influence, accessibility of technology, individual characteristics, perceived privacy, and security are all important determinants of intention to use MCC. Findings contribute towards research and practice by revealing crucial factors that impact student intention to adopt mobile cloud computing in developing countries.


2021 ◽  
Vol 22 (1) ◽  
pp. 104-132
Author(s):  
Santos Marianus ◽  
Syaiful Ali

Research aims: This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's B2C e-commerce websites. Design/Methodology/Approach: Using a purposive sampling approach, this study conducted an online survey of respondents who had done online transactions, such as business-to-customer (B2C) transactions. Research Findings: The study's results showed that perceived security significantly correlated with buyers' intention to use B2C websites. Theoretical contribution/Originality: This study contributes to developing and validating key dimensions of perceived security and their constructs. Mediation effect test results from TAM, which were perceived ease and perceived use, indicated that only the perceived usefulness variable significantly mediated the relationship between perceived security and intention to use B2C e-commerce websites. Perceived use's mediation was not supported. Practitioner/Policy implication: This research empirically supports the perceived security construct as a second-order construct involving confidentiality, availability, non-repudiation, and privacy. Research limitation/Implication: This study used data from Indonesian individuals, which may differ from other countries' characteristics. It may limit the research' finding generalization. Research aims: This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's B2C e-commerce websites.Design/Methodology/Approach: Using a purposive sampling approach, this study conducted an online survey of respondents who had done online transactions, such as business-to-customer (B2C) transactions.Research Findings: The study's results showed that perceived security significantly correlated with buyers' intention to use B2C websites.Theoretical contribution/Originality: This study contributes to developing and validating key dimensions of perceived security and their constructs. Mediation effect test results from TAM, which were perceived ease and perceived use, indicated that only the perceived usefulness variable significantly mediated the relationship between perceived security and intention to use B2C e-commerce websites. Perceived use's mediation was not supported.Practitioner/Policy implication: This research empirically supports the perceived security construct as a second-order construct involving confidentiality, availability, non-repudiation, and privacy.Research limitation/Implication: This study used data from Indonesian individuals, which may differ from other countries' characteristics. It may limit the research' finding generalization.


Sign in / Sign up

Export Citation Format

Share Document