PRESENTED BY: Isaac Momanyi Maonga: D61/79546/2012 Anthony Njogu: D61/75282/2012 Bernard Njenga: D61/62047/2013 Brian Tetea: D61/67521/2011 Rose Waeni:

Slides:



Advertisements
Similar presentations
Second Information Technology in Education Study (SITES) A Project of the International Association for the Evaluation of Educational Achievement (IEA)
Advertisements

Copyright © 2004 Sherif Kamel Technology Acceptance Model Sherif Kamel The American University in Cairo.
Technology Acceptance Model (TAM)
PROJECT TOPICS. HOUSEHOLD WASTE RECYCLING INTENTION AMONG UNDERGRADUATES Topic 1.
Success Factors in New Technology Implementation Pat Holahan Kai Wang Howe School of technology Management Stevens Institute of Technology HSATM Roundtable.
Robin L. Donaldson May 5, 2010 Prospectus Defense Florida State University College of Communication and Information.
Seminar Presentation C ase: Social network, social trust and shared goals in organizational knowledge sharing Wong Nga Sim Tao Shiu Him.
National Training Collaborative for Social Marketing Session Seven Behavioral Determinant and Theories.
The Adoption of Continuous Auditing Technology: Exploring its Antecedents through UTAUT George Gonzalez, Pratyush Sharma and Dr Dennis Galletta University.
Chapter 7 Attitudes.
Theory of Reasoned Action/ Planned Behavior and the Integrated Behavioral Model Presentation by Irving Rootman to SFU Class on Principles and Practices.
Normative Belief Jessica Seifert H517 Principles of Health Behavior
12/04/2006 Understanding & Predicting E-commerce Adoption: An Extension of the Theory of Planned Behavior (MIS Quarterly March 2006) Presented by: Yasmine.
Theory of Planned Behaviour and Physical Activity EPHE 348.
Dissertation Defense Conference Call Mark Moran Doctoral Candidate.
0ictQATAR October 13, 2008 Qatar’s ICT Statistical Information Areas Tariq Gulrez.
Why don’t innovation models help with informatics implementations? Rod Ward University of the West of England Medinfo 2010.
淡江大學 資管碩一 林詒慧 資管碩一 陳韋翰 Riemenschneider, C. K., & Hardgrave, B. C. (2001). Explaining software development tool use with the technology.
Acceptance of TEL: Key Success Factors and Reasons of Failure
Je Ho Cheong Myeong-Cheol Park Information and Communications University Mobile Payment Adoption in KOREA: Switching From Credit Card ITS 15th Biennial.
Company LOGO B2C E-commerce Web Site Quality: an Empirical Examination (Cao, et al) Article overview presented by: Karen Bray Emilie Martin Trung (John)
Research Methodology Lecture No :27 (Sample Research Project Using SPSS – Part -A)
Universiti Brunei Darussalam
Theory of Reasoned Action and Theory of Planned Behavior
Introducing the Computer Self-Efficacy to the Expectation-Confirmation Model: In Virtual Learning Environments 授課老師:游佳萍 老師 學 生:吳雅真 學 號:
Chapter 7 Correlational Research Gay, Mills, and Airasian
Behavioral Change Models for Healthcare Workers Objective:  Explore theoretical models that may prove useful for changing hand hygiene behavior among.
Advisor: 謝焸君 教授 Student: 賴千惠
A Conceptual Framework for Online Shopping Behavior: Trust and National Culture Felix B Tan Auckland University of Technology Cathy Urquhart and Sarah.
Predictors of Engagement and Participation in an On-Line Course Miller, M. D., Rainer, R. K. & Coley, J. K. (2003). Predictors of engagement and participation.
By Lalit Pienchai. Objectives of this study Research model Pilot Study Full scale study Recommendation Future work.
Organizational Training Climate and Employees' Perception and Acceptance of Competency-based E-learning at the Workplace Bo Cheng, Minhong Wang Faculty.
The Model of Trust Factors in Paying through the Internet (Dissertation) Franc Bračun, PhD Merkur Day 2004 Friday, 22nd October.
1 Investigating Determinants of Software Developers ’ Intentions to Follow Methodologies 報告者 : 林彥辰 指導 : 王育民教授.
The Role of Workplace Values, Climate, and Technology Perceptions on Technology Use Patricia Holahan Kai Wang.
Testing a Structural Model of Young Driver Willingness to Uptake Phone Application Driver Monitors Presented by Aoife Kervick, PhD Candidate, School of.
電管碩一 R 凌伊亭 Social Media Use In a Mobile Broadband Environment : Examination of Determinants of Twitter and Facebook Use International Journal of.
Chapter 3 ORGANIZATIONAL CULTURE AND ENVIRONMENT: THE CONSTRAINTS
McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter Fourteen Transformational Leadership.
Using A Digital Campus to Support Electronic Learning In Lebanon Presenters: Shumin Chuang Professor: Ming-Puu Chen 2008/6/26 王堯興王堯興 Schaik, P., Barker,
THE INFLUENCE OF DESIGN OF A WEB-BASED EDUCATIONAL TOOL ON SATISFACTION AND LEARNING PERFORMANCE Manuel J. Sánchez-Franco Ángel F. Villarejo-Ramos Begoña.
Dissertation Proposal Title: A study of performance and effort expectancy factors among generational and gender groups to predict enterprise social software.
The strategy of internationalization in universities Authors: Rami M.Ayoubi & Hiba K. Massoud Year: 2007 Volume: 21 No: 4 Published by: international journal.
Chapter 6 Attitudes.
User Acceptance Of Hedonic Information Systems MOIS 433 Presented by: Nehal Rashed.
1 Lesson 4 Attitudes. 2 Lesson Outline   Last class, the self and its presentation  What are attitudes?  Where do attitudes come from  How are they.
Theory of Reasoned Action
Research Methods for Business
Unified Theory of Acceptance and Use of Technology and the VET sector Sarah-Jane Saravani Shar-e-Fest, Hamilton, 11 October, 2013.
Caritas Francis Hsu College General Education PHI1011 Individual and Society Lecture 2: Self 1.
LOGO Mamdouh Abdel Aziz Refaiy Dr. Associate Professor, Business Administration Department, Faculty of Commerce, Ain Shams University, Cairo, Egypt. Evaluating.
Personal Control over Development: Effects on the Perception and Emotional Evaluation of Personal Development in Adulthood.
Its a specific set of linkages among a defined set of persons with the additional property that the characteristics of these linkages as a whole may be.
Click to edit Master subtitle style 3/7/10 LEADING.
The DeLone and McLean Model of Information Systems Success: A Ten-Year Update Nova Novita Ira Geraldina Intan Oviantari.
TECHNOLOGY ACCEPTANCE MODEL
Chapter 6 Attitudes and Intentions Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
The Consumer Audience Part 2: Planning and Strategy Chapter 5.
Groups. After studying this chapter, you should be able to: Define group and differentiate between types of groups. Identify the five stages of group.
Perceived Attributes Predict Course Management System Adopter Status Gayla S. Keesee, Ph.D. ABSTRACT Rogers’s diffusion of innovation theory provided the.
7 Motivation Concepts.
The Students’ Acceptance of Learning Management Systems in Saudi Arabia: A Case Study of King Abdulaziz University Sami Binyamin1,2 , Malcolm Rutter1,
Lecture 10: User Acceptance
DEPARTMENT OF HUMAN AND SOCIAL CIENCES APPLIED LINGUISTICS IN ENGLISH CAREER    “THE INFLUENCE OF TEACHER’S ATTITUDES AND BELIEFS INTO TECHNOLOGY-RELATED.
E-Learning The Role Model Technology
A closer look at the Technology Acceptance Model (TAM)
User Acceptance of Information Technology UTAUT (Vankatesh)
Chapter 7 Attitudes and Attitude Change
Lecture 10: User Acceptance
Main Predictors of Attitudes toward the Use of Moodle for Learning Business Administration Courses in an International University Setting Jhon Bueno, Stanislav.
Presentation transcript:

PRESENTED BY: Isaac Momanyi Maonga: D61/79546/2012 Anthony Njogu: D61/75282/2012 Bernard Njenga: D61/62047/2013 Brian Tetea: D61/67521/2011 Rose Waeni: D61/79063/2012

Davis ( 1986 ) developed the Technology Acceptance Model which deals more specifically with the prediction of the acceptability of an information system. The purpose of this model is to predict the acceptability of a tool and to identify the modifications which must be brought to the system in order to make it acceptable to users. This model suggests that the acceptability of an information system is determined by two main factors:  perceived usefulness  perceived ease of use.

 Perceived usefulness is defined as being the degree to which a person believes that the use of a system will improve his performance.  Perceived ease of use refers to the degree to which a person believes that the use of a system will be effortless.

 Technology Acceptance Model postulates that the use of an information system is determined by the behavioral intention, but on the other hand, that the behavioral intention is determined by the person’s attitude towards the use of the system and also by his perception of its utility.  According to Davis, the attitude of an individual is not the only factor that determines his use of a system, but is also based on the impact which it may have on his performance. E.g. : if an employee does not welcome an information system, the probability that he will use it is high if he perceives that the system will improve his performance at work

Original TAM Proposed by Fred Davis(Davis,1986,p.24.)

The Main finding in this is both perceived usefulness and perceived ease of use were found to have direct influence on behavioral intention, thus eliminating the need for attitude construct.

Final Version of TAM : (Venkatesh & Davis),1996.p.453

Venkatesh and Davis (2000) developed TAM2 by adding social influences (subjective norm, voluntariness, and image) and cognitive instrumental processes (job relevance, output quality, result demonstrability, and perceived ease of use) to predict the adoption of an information technology. Venkatesh and Davis (2000) used the construct of subjective norm to capture social influences. TAM2 suggests that in mandatory contexts, subjective norm has a direct effect on intention through the mechanism of compliance. If an individual perceives that an important social actor has the ability to punish nonbehavior or reward behavior, the social influence of compliance effect will occur (French and Raven, 1959; Kelman, 1958; Warshaw, 1980). In voluntary contexts, social influences can influence intention indirectly through the mechanism of internalization and identification. Internalization refers to the process when an individual incorporates the important referent’s belief into his or her own belief structure (Kelman, 1958; Warshaw, 1980). Identification means that an individual can gain a membership in a social group or achieve a higher status within the group by performing a behavior (Blau,1964; Kelman, 1958; Kiesler and Kiesler, 1969; Pfeffer, 1982). TAM2 theorizes that there are four cognitive instrumental determinants of perceived usefulness: job relevance, output quality, result demonstrability, and perceived ease of use. TAM2 retains perceived ease of use from TAM as a direct determinant of perceived usefulness.

 Subjective norm: Person's perception that most people who are important to him think he should or should not perform the behavior in question.  Image: The degree to which use of an innovation is perceived to enhance one's status in one's social system.  Job relevance: Individual's perception regarding the degree to which the target system is relevant to his or her job.  Output quality: The degree to which an individual believes that the system performs his or her job tasks well.  Result demonstrability: Tangibility of the results of using the innovation.  Voluntariness: The extent to which potential adopters perceive the adoption decision to be non-mandatory.

 The UTAUT aims to explain user intentions to use an IS and subsequent usage behavior. The theory holds that four key constructs (performance expectancy, effort expectancy, social influence, and facilitating conditions) are direct determinants of usage intention and behaviour (Venkatesh et. al., 2003).

 Performance Expectancy is the degree to which the user expects the system will help him or her to attain gains in job performance.  Effort Expectancy: the degree of ease associated with the use of the system.  Social Influence: the degree to which an individual perceives that important others believe that he or she should use the new system.  Facilitating Conditions: Ventakesh et al(2003) find that the influence of facilitating conditions on usage is moderated by age and experience of the individual. Its defined as the degree to which an individual believes that an organizational and technical infrastructure exists to support use of the system.

 The theory of Planned behaviour assumes that individuals are rational decision makers. Individuals assess perceived behaviour control using a method similar to the expectancy-value model. For each in a set of control beliefs, individuals multiply the belief’s strength by perceived power of the control factor.  The concept was proposed by Icek Ajzen to improve on the predictive power of the theory of reasoned action by including perceived behavioural control. It is one of the most predictive persuasion theories. It has been applied to studies of the relations among beliefs, attitudes, behavioral intentions and behaviors in various fields such as advertising, public relations, advertising campaigns and healthcare.  The theory states that attitude toward behavior, subjective norms, and perceived behavioral control, together shape an individual's behavioral intentions and behaviors.

SUMMARY OF EVALUATION From: J Biomed Inform. Author manuscript; available in PMC 2011 February 1.Published in final edited form as: J Biomed Inform February; 43(1): 159. Published online 2009 July 15. doi: /j.jbi

Interpretivism  Technology acceptance mode uses interpretivism paradigm. The model explains how users come to accept and use technology and the impact of external factors on internal beliefs, attitudes and intentions.

 TAM has been used to explain and predict the use of a system and Technology.  The future research direction is defined as follows:  First, keep going with the extension of Technology Acceptance Model.  Second, use the extension model of technology acceptance to assess the state-of-the-art technologies contexts including mobile service, cloud computing applications, ubiquitous computing applications and so on.

 TAM has proven to be a useful theoretical model in helping to understand and explain user behavior in the information system implementation.  It has been tested in many empirical researches and the tools used with the model have proven to be of quality and to yield statistically reliable results.

 Mobile Money transfer – M-Pesa services success story in Kenya  M-pesa is a mobile-phone based money transfer and micro-financing service for Safaricom and Vodacom, the largest mobile network operators in Kenya and Tanzania. Currently the most developed mobile payment system in the world, M-Pesa allows users with a national ID card or passport to deposit, withdraw, and transfer money easily with a mobile device

 Mobile Money transfer – M-Pesa services success story in Kenya  M-pesa is a mobile-phone based money transfer and micro-financing service for Safaricom and Vodacom, the largest mobile network operators in Kenya and Tanzania. Currently the most developed mobile payment system in the world, M-Pesa allows users with a national ID card or passport to deposit, withdraw, and transfer money easily with a mobile device

M-pesa has been widely accepted in Kenya and other countries are trying to adopt a similar model of money transfer. The success behind M-pesa technology has been due to:  Trust – users were comfortable with the reliability of the system.  Network effect – The value of the customer of a payment system depends on the number of people connected to and actively using the network.  Simultaneous increase in the number of M-pesa dealers and customers.  Strong Safaricom brand.

 Mobile Banking  E-Banking  E-learning portal – UON  Agency Banking

 Journal of Business Research 59 (2006) 999–1007- Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived access barriers and demographics: Research found that age, education, income and race are associated differentially with beliefs about the Internet, and that these beliefs influence a consumer's attitude toward and use of the Internet. The research extended TAM in two ways. First, it included perceived access barriers among the key beliefs about a technology that influence its use. Second, it added four key demographic constructs as external variables to the TAM (i.e., age, education, income and race). The model suggests that the TAM's belief variables are differentially relevant to consumers with different demographic profiles and serve to mediate the relationships between demographic variables and attitude toward the Internet.

 Park, S. Y. (2009). An Analysis of the Technology Acceptance Model in Understanding University Students' Behavioral Intention to Use e- Learning. Educational Technology & Society, 12 (3), 150–162. The general structural model, which included e-learning self efficacy, subjective norm, system accessibility, perceived usefulness, perceived ease of use, attitude, and behavioral intention to use e- learning, was developed based on the technology acceptance model (TAM). The result proved TAM to be a good theoretical tool to understand users’ acceptance of e-learning.  This study proposed an integrated theoretical framework of university students’ e-learning acceptance and intention to use based mainly on the technology acceptance model (TAM). The objectives of the study were to analyze the relationship of university students’ intention to use e-learning with selected constructs such as their attitude, perceived usefulness, perceived ease of use, self-efficacy of e-learning, subjective norm and system accessibility, and to develop a general linear structural model of e-learning acceptance of university students that would provide a school manager or an educator with implications for better implementing e-learning.

 International Journal of Accounting Information Systems 10 (2009) 214–228. Information technology acceptance in the internal audit profession: Impact of technology features and complexity.(HyoJeong Kim, Michael Mannino, Robert J. Nieschwietz Business School, University of Colorado Denver, Denver, CO 80202, United States) The research used TAM for technology acceptance among Internal Auditors and tested the model using a sample of internal auditors provided by the Institute of Internal Auditors (IIA). System usage, perceived usefulness, and perceived ease of use were tested with technology features and complexity. Through the comparison of TAM variables, it was found that technology features were accepted by internal auditors in different ways. The basic features such as database queries, ratio analysis, and audit sampling were more accepted by internal auditors while the advanced features such as digital analysis, regression/ ANOVA, and classification are less accepted by internal auditors. As feature complexity increases, perceived ease of use decreased so that system usage decreased. Through the path analysis between TAM variables, the results indicated that path magnitudes were significantly changed by technology features and complexity. Perceived usefulness had more influence on feature acceptance when basic features were used, and perceived ease of use had more impact on feature acceptance when advanced features were used.