1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P123 potx

10 73 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 261,9 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 4.12Adoption of Internet Technology by the Banking Industry in Oman: A Study Informed by the Australian Experience Salim Al-Hajri Higher College of Technology, Oman Arthur Tatna

Trang 1

Figure 12 Deployment view of EAS

(a) Deployment view of all subsystems of EAS

(b) Deployment view of the recognition subsystem of EAS

Trang 2

PDLQ¿QGLQJVRIWKLVSURMHFWWKDWFRQFHUQWKHHI-fectiveness of SODI using SOA The three systems

being built for this project were each developed

in similar fashion overall, using similar modeling

strategies and development schedules However,

the main difference between these projects is the

extent that Web services were used

The Role of Web Services

Using Web services for the EAS project was

EHQH¿FLDO EXW OHVV VR WKDQ IRU WKH 6 SURMHFW

With the EAS project, Web services were used

in a fashion similar to traditional middleware,

whereas the 3S project used Web services in new

and interesting ways: Some functions that do not

have to be changed very often are designed as a class library Only functions that may be changed very often and need to be shared are designed as :HE VHUYLFHV 7KH 326 SURMHFW DOVR EHQH¿WHG from the use of Web services

When building the EAS project, Web services were used for virtually all core functionality, on both the input and output side In addition to the standard Windows forms classes and the Web services being used, a small class library was developed that contained a few helper classes Since the main interface for EAS was written in Visual Basic (VB) NET, and some client-side functionality was written in C#, this additional client-side functionality was stored in a class li-brary as a proxy A class lili-brary is just a collection

Figure 13 Deployment of 3S

Trang 3

of classes and interfaces bundled together into a

VLQJOH¿OH7KHXVHRIWKLVOLEUDU\ZDVPDLQO\IRU

communicating with the Web service as a proxy

and reusing existing code built in C# that would

take too much time to convert to VB NET

How-ever, for the most part, EAS was a true wrapper

for various Web service methods

In relation to the EAS project, 3S used around

50% less Web service calls and 75% more

func-tionality stored in class libraries Since the 3S

project was supposed to be used remotely, making

long Web service calls frequently could have a

VLJQL¿FDQWSHUIRUPDQFHLPSDFW,QVWHDGVRPHRI

this prior Web service functionality was moved

into a class library Then, instead of using this

class library on just the client side as in EAS, this

new library was used by both the Web services

and the Windows client Using the class library

in this fashion allowed the two main system

com-ponents to share functionality without the worry

RIYHUVLRQLQJFRQÀLFWVRUWKHQHHGWRPDQXDOO\

copy classes from project to project In a vein

similar to Web services that are useful for sharing

application logic between different systems, class

libraries can also be used similarly For example,

in the EAS project, scheduling components were

built directly into classes in the application In the

3S project, the scheduling components were built

to be more general and were stored in the class

library If developers wanted to build an extension

to EAS that used scheduling, they would have to

copy the scheduling classes and manually rewrite

DQGUHQDPHWKHPWR¿WLQWRWKHQHZSURMHFW%\

including the scheduling functions in a class

li-EUDU\DOO\RXQHHGWRGRLVUHIHUHQFHWKHGOO¿OH

DQGVWDUWGHYHORSLQJ7KLVLVYHU\HI¿FLHQWDQG

a great way to increase productivity while Web

services are being used as the main integration

interfaces

The POS project relied on Web services for

even less than the 3S project Since the POS

system is used heavily for input purposes, it is

unlikely to be used from outside your local area

QHWZRUNOHVVEHQH¿WLVJDLQHGIURPXVLQJ:HE

services However, Web services are still useful for logging in cashiers and authorizing them to use the POS system, and reporting on items sold and cashier activity Without using a Web service,

a rewrite of the EAS recognition system would

be required Since this functionality already ex-LVWVLQD:HEVHUYLFHRQO\PLQRUPRGL¿FDWLRQV QHHGWREHPDGHEHIRUHWKH¿QJHUSULQWLQJ:HE services are ready to be consumed in the POS application Instead of depending on class librar-ies so much, the system interfaced directly with the SQL server being used as the data store by adopting a tightly coupled approach so as not to lose performance This direct interface provided better transactional support then a series of Web services could provide and allowed the interface

to react much more quickly to user input

Lessons Learned

First of all, software developers and integrators can easily transition from object-oriented analysis and design to service-oriented analysis and design since the valuable experiences of the develop-ers in object-oriented architectures and design methodology are naturally streamlined with the service-oriented architecture and design meth-odology supporting loose couplings of software components Both three-layered and multitier architectural patterns have been used to design and deploy object-oriented applications The service-oriented architecture simply enhances the interoperability of some components that may be integrated with other remote components within organizations or across organizations

by allowing standard interfaces and interaction protocols Also, one of the design methods that have been adopted in object-oriented software developments, RUP, can be applied to service-oriented software developments with the revised 4+1 view

Secondly, SODI goes much smoother without having to rewrite the same code you had writ-ten before on previous projects This is possible

Trang 4

because the Web service technology brings a

BIS in which software components can easily be

integrated with others (they are loosely coupled

through Web services) You could just change

your external interface for each situation, and

then convert data into the formats supported by

the system’s Web services

SODI allows developers to separate the

pre-sentation logic from the business logic in

applica-tions A Windows desktop application or a Web

application is located on the platforms of service

consumers The Web services are deployed onto

the Web service platforms of service producers

The presentation tier, a Windows desktop

appli-cation or a Web appliappli-cation, interacts with Web

services that are located at remote Web service

platforms The Web services interact with

vari-ous business objects Also, the Web service can

interact with other Web services that located at

other platforms recursively

Using Web services can explicitly represent the

process view, which describes dynamic features

of a software system If only atomic services are

used (like this project), the services are considered

special classes, that is, interfaces The objects of

the interfaces are deployed onto a tier on which a

Web service engine resides Class and deployment

diagrams are used to show the process view of the

atomic services If several atomic services can be

composed to a composite service, the composite

service can be described in an activity diagram

to show the process view

FUTURE WORK

:HEVHUYLFHVDOORZHGWKHYLVLRQRIÀH[LEOHLQWHU-faces to become reality rather than remain in the

world of fantasy The customization of business

LQIRUPDWLRQV\VWHPVWRUHÀHFWWKHEUDQGRIDEXVL-QHVVZLOOEHRIJUHDWEHQH¿WWRDQ\RQHZKRUXQVD

business Web services hold strong promise in the

future of business and the future of our daily lives

as development on services progresses, taking us one step closer to a totally connected world Future work on improving the SOA architec-ture can progress as soon as new technologies are in place As semantic description languages for services become commonplace, people can start describing the services with meaningful semantic descriptions Once service orchestration languages start becoming feasible to implement, RUFKHVWUDWLRQWRRONLWVFRXOGEHGHYHORSHGVSHFL¿-cally for SODI systems The composition of Web services will bring more explicit process views to the 4+1 view, and the dynamics of the integrated system can be understood in terms of business SURFHVVZRUNÀRZ

REFERENCES

Alonso, G., Casati, F., Kuno, H., & Machiraju,

V (2004) Web services concepts, architectures and applications Springer Verlag.

Association for Retail Technology Standards

(ARTS) (2003) Data model Retrieved from

http://www.nrf-arts.org Booch, G., Rumbaugh, J., & Jacobson, I (1999)

7KHXQL¿HGPRGHOLQJODQJXDJHXVHUJXLGH

Ad-dison Wesley

Connolly, T., & Begg, C (2005) Database systems:

A practical approach to design, implementation, and management (4th ed.) Addison-Wesley

Coulouris, G., Dollimore, J., & Kindberg, T

(2002) Distributed systems: Concepts and design.

Addison Wesley

Erl, T (2004) Service-oriented architecture: A

¿HOGJXLGHWRLQWHJUDWLQJ;0/DQG:HEVHUYLFHV

Upper Saddle River, NJ: Prentice Hall Professional Technical Reference

IBM (2006a) 5DWLRQDOXQL¿HGSURFHVV 583  Retrieved from http://www-306.ibm.com/soft-ware/awdtools/rup/index.html

Trang 5

IBM (2006b) Web services policy framework

(WS-Policy) Retrieved from http://www-128.

LEPFRPGHYHORSHUZRUNVOLEUDU\VSHFL¿FDWLRQ

ws-polfram/

Jacobson, I., Booch, G., & Rumbaugh J (n.d.)

7KHXQL¿HGVRIWZDUHGHYHORSPHQWSURFHVV

Ad-dison Wesley

Kerner, L (2000) Biometrics and time &

at-tendance Integrated Solutions Retrieved from

http://www.integratedsolutionsmag.com/Ar-ticles/2000_11/001109.htm

Kruchten, P B (1995) The 4+1 view model of

architecture IEEE Software, 12(6), 42-50.

Linthicum, D S (2003a) Next generation

ap-plication integration Addison-Wesley

Linthicum, D.S (2003b) Where enterprise

ap-SOLFDWLRQ LQWHJUDWLRQ ¿WV ZLWK :HE VHUYLFHs

Software Magazine Retrieved from http://www.

softwaremag.com/L.cfm?Doc=2003-April/Web-Services

Object Management Group (OMG) (2007)

Uni-¿HGPRGHOLQJODQJXDJH 80/  Retrieved from

http://www.uml.org/

Organization for the Advancement of Structured

Information Standards (OASIS) (n.d.) Universal

description, discovery and integration (UDDI).

Retrieved from http://www.uddi.org/

Organization for the Advancement of Structured

Information Standards (OASIS) (2006) Web

services security (WS-Security) Retrieved from

http://www.oasis-open.org/committees/tc_cat

php?cat=security

World Wide Web Consortium Extensible Markup Language (W3C XML) Protocol Working Group

(2006) Simple object access protocol (SIAP).

Retrieved from http://www.w3.org/2000/xp/ Group/

World Wide Web Consortium (W3C) Semantic

Web Services Interest Group (2006a) Semantic Web services framework (SWSF) Retrieved from

http://www.w3.org/Submission/2004/07/

World Wide Web Consortium (W3C) Semantic

Web Services Interest Group (2006b) Web on-tology language for services (OWL-S) Retrieved

from http://www.w3.org/Submission/2004/07/ World Wide Web Consortium (W3C) Semantic

Web Services Interest Group (2006c) Web ser-vices modeling ontology (WSMO) Retrieved from

http://www.w3.org/Submission/2005/06/

World Wide Web Consortium (W3C) Semantic

Web Services Interest Group (2006d) Web services semantic (WSDL-S) Retrieved from

http://www.w3.org/Submission/2005/10/

World Wide Web Consortium (W3C) Web

Ser-vices Addressing Working Group (n.d.) Web services addressing (WS-Addressing) Retrieved

from http://www.w3.org/Submission/ws-address-ing/

World Wide Web Consortium (W3C) Web

Ser-vices Description Working Group (2006) Web services description language (WSDL) Retrieved

from http://www.w3.org/2002/ws/desc/

This work was previously published in Enterprise Architecture and Integration: Methods, Implementation and Technologies, edited by W Lam and V Shankararaman, pp 292-305, copyright 2007 by Information Science Reference (an imprint of IGI Global).

Trang 6

Chapter 4.12

Adoption of Internet Technology by the Banking

Industry in Oman:

A Study Informed by the Australian Experience

Salim Al-Hajri

Higher College of Technology, Oman

Arthur Tatnall

Victoria University, Australia

ABSTRACT

The banking industry in Oman is of major

im-portance to Oman’s economy, yet Omani banks

continue to conduct most of their transactions

using traditional methods A strong banking

LQGXVWU\VLJQL¿FDQWO\VXSSRUWVHFRQRPLFGHYHO-RSPHQWWKURXJKHI¿FLHQW¿QDQFLDOVHUYLFHVDQG

their role in trying to achieve the objectives

out-lined by the Sultan of Oman will depend heavily

on the industry’s capabilities Omni banks will

need to introduce change at both procedural and

informational levels that includes moving from

traditional distribution channel banking to

elec-tronic channel banking This paper addresses the

question: What are the enablers and the inhibitors

of Internet technology adoption in the Omani banking industry compared with those in the Australian banking industry? The paper does not attempt a direct comparison of the banking industries in these two very different countries, but rather presents a discussion of Internet tech-nology adoption in Oman, informed by the more mature Australian experience

INTRODUCTION

In developed countries such as Australia, Internet technologies have been embraced by the

Trang 7

bank-ing industry and, for several years, banks have

pursued strategies to encourage their clients to

engage in Internet banking In an article relating

to online banking portals, Ayadi (2007) notes the

diversity of competitive, technical, and strategic

challenges faced by banks on the Internet In

GHYHORSLQJFRXQWULHV¿QDQFLDOLQVWLWXWLRQVKDYH

been less inclined to adopt Internet technology

DQGWKHUHE\FDSLWDOL]HRQWKHEHQH¿WVRIVLPSOLF-ity, convenience, and usefulness claimed to be

associated with its implementation Oman is an

example of a developing country committed to

economic growth but with a banking industry that

is yet to embrace Internet technology

Traditionally, Oman has been heavily reliant

on oil as its main income source Fluctuations in

world oil prices, however, can leave the country

exposed to commodity price risk and during the

1990s Oman began to diversify its income sources

His Majesty, the Sultan of Oman, summarized his

vision for Oman’s economy as follows:

The government has made major efforts in

recent years to achieve comprehensive

develop-PHQWLQDOO¿HOGV1RZWKDWLWKDVVXFFHHGHGZLWK

the help of God, in moving the country from a

traditional economy to a modern developed one,

our future plan will be based on the balanced

management of income and expenditure and

the preservation of that balance so that Oman’s

present high prestige in the economic sphere, will

be preserved Therefore, the duty of the private

sector in playing an active role in the development

of economic process and in the achievement of

national goals by taking appropriate initiatives, as

is the case in all developed countries, is of great

importance (Qaboos bin Said’s speech, June 2,

1995, reported in Oman Ministry of

Develop-ment, 1996)

Since the development of the Omani banking

industry in 1948, all banks have relied heavily

on traditional distribution channels for banking

services However, in 1997, the Oman

telecommu-nication company, Omantel, introduced Internet

services to home and business users According to

the statistics provided by Omantel (2002) in their annual report, the number of Internet technology users had reached 12,348 in 1998, 1 year after of its introduction By 2002 Omantel reported that the number of Internet users had reached 48,000, making up around 2% of the general population Indeed, Internet technology infrastructure has grown steadily over the years but has only had

a moderate effect on the Omani economy The Omani banking industry has been very slow and cautious in moving from traditional distribution channel banking services to electronic distribution channel banking services (Al-Hajri, 2005) Paradoxically, the growing number of users of Internet technology in the Omani economy has not yet motivated the Omani banking industry to adopt Internet technology the way the Australian banking industry has done The Market Intelli-gence Strategy Centre (MISC, 2002) reported that

in 2002 there were six million Internet banking users in the Australian banking industry, reinforc-ing the observation that Internet technology is far more developed in the Australia than in Oman Other analysts (Wright & Ralston, 2002) expect Internet technology to grow substantially in the Australian banking industry, which means that the Omani banks will be left lagging further behind global competitive markets

In every country the banking industry is im-portant, as a strong banking industry can have a VLJQL¿FDQWDIIHFWLQVXSSRUWLQJHFRQRPLFGHYHO-RSPHQW WKURXJK HI¿FLHQW ¿QDQFLDO VHUYLFHV ,Q Oman the role of the banking industry in trying

to achieve the objectives outlined by the Sultan depends heavily on the industry’s capabilities and banks need to introduce change, both at the procedural level and at the informational level This change includes moving from traditional distribution channel banking to electronic dis-tribution channel banking Given the prevalence

of Internet technology adoption by the banking industry in developed countries, reasons for the lack of such innovation in developing countries such as Oman are of considerable importance

Trang 8

There are, of course, huge cultural differences

between Oman and Australia and a direct

compari-son of the two is not the intent of this article The

backgrounds, economics, societies, and indeed the

very way of life in the two countries are all very

different Australian banks have already largely

adopted Internet technologies while Omani banks

are just beginning to do so The goal of this article

is to discuss adoption of Internet technology in

the banking industry in Oman, with reference

to the Australian experience in order to identify

possible ways forward This article will thus

ad-dress the question of determining inhibitors and

enablers to the adoption of Internet technology

in the banking industry in Oman, and inform the

Oman experience by the more mature Australian

experience

TECHNOLOGY ADOPTION AND

DEVELOPING COUNTRIES

Internet technology has played a major role in

economic development in developed countries

(Ghosh, 1998; Kalakota & Whinston, 1997;

Rais-inghani, 2000), but less so in developing countries

and economies A good deal has been written about

adoption of new technologies and techniques in

agriculture in developing countries (e.g., Lee,

2005; Michelsen & Hartwich, 2004; Paarlberg,

2003), but not so much has been recently written

on adoption of other technologies

Montealegre (1999) describes a study of

Inter-net adoption in four Latin American countries in

which he notes a gradual but progressive course

of institutional adoption actions including

knowl-edge building, subsidy, knowlknowl-edge deployment,

innovation directive, and standard setting

Bas-ant, Commander, Harrison and Menezes-Filho

(2006) report on the determinants of information

and communication technology (ICT) adoption

and its impact on performance on

manufactur-LQJ¿UPVLQ%UD]LODQG,QGLD7KH\VXJJHVWWKDW

ZKLOH%UD]LOLDQ¿UPVRQDYHUDJHXVH,&7PRUH

intensively than their Indian counterparts, in both countries ICT intensity is strongly related to size, ownership structure, share of administrative workers, and education Rajapakse and Seddon (2007) explore the adoption of ERP software in Asia using Hofstede’s dimensions of national cultures and conclude that contrasting dimensions

of the cultural practices embedded in ERP soft-ware are a barrier to adoption Molla and Licker (2005) report that their studies of e-commerce LQGHYHORSLQJFRXQWULHVHPSKDVL]HWKHLQÀXHQFH

of contextual impediments including economic, WHFKQRORJLFDOOHJDODQG¿QDQFLDOLQIUDVWUXFWXUH

as major determinants of adoption Talukdar, Sudhir and Ainslie (2006) investigate new product diffusion across products and countries, and note that diffusion is much slower in developing than developed countries

THEORETICAL FRAMEWORK

,WKDVEHHQVXJJHVWHGWKDW³«H[SODLQLQJKXPDQ EHKDYLRULQDOOLWVFRPSOH[LW\LVDGLI¿FXOWWDVN´ (Ajzen, 1991) Further, to this we will argue that the main complexity in understanding Internet technology adoption behavior, or that lack of it, within the context of the banking industry in Oman (a non-adopter) and Australia (an adopter) is that this involves people such as bank managers and customers, and people behave in different ways In deriving a framework for this study, four existing research frameworks were considered: the theory

of reasoned action (TRA), the theory of planned behavior (TPB), the technology acceptance model (TAM), and diffusion of innovations

The Theory of Reasoned Action (TRA)

Fishbein and Ajzen (1975) originally developed the theory of reasoned action in 1975, before ODWHUFRPSUHKHQVLYHO\UH¿QLQJLWZLWKHPSLULFDO evidence to support its validity and reliability

Trang 9

(Ajzen & Fishbein, 1980) In developing their

theory, they integrated various studies on

at-titude from social psychology with the aim of

developing an integrated conceptual framework

to predict and explain an individual’s behavior

in a general situational setting In sum, their

study focused on three major determinants of

an individual’s behavior: behavioral intention,

attitude, and subjective norm They illustrated

their model using these three major variables in a

hierarchical sequence to facilitate understanding

In summary they postulated that:

1 An individual’s behavioral intention is the

immediate determinant of behavior

2 His/her attitude and subjective norm are

mediated through behavioral intention

3 His/her behavioral and normative beliefs are

mediated through attitude and subjective

norm respectively

In predicting and explaining behavior, TRA

KDVEHHQDSSOLHGLQYDULRXV¿HOGVLQFOXGLQJFRQ-sumer behavior (Engel, Blackwell, & Miniard,

1995; Taylor & Todd, 1997; Thomson, Haziris,

& Alekos, 1994), moral behavior (Vallerand,

Pelletier, Deshaies, Cuerrier, & Mongeau,

1992), ethical/unethical behavior (Chang, 1998;

Gibson & Frakes, 1997; Loch & Conger, 1996),

environmental behavior (Goldenhar & Connell,

1993), coupon usage behavior (Bagozzi, Davis, &

Warshaw, 1992; Shimp & Kavas, 1984), fast food

consumption behavior (Bagozzi, Wong, Abe, &

Bergami, 2000), adoption of strategic

informa-tion systems (IS) behavior (Mykytyn & Harison,

1993), system investment decision behavior (Clark

& Soliman, 1999), information technology (IT)

adoption behavior (Karahanna, Straub, &

Cher-veny, 1999), and Internet use behavior (Bobbitt

& Dabholkar, 2001)

Although TRA has gained wide acceptance in

the behavioral sciences and the IS literature due

to its well integrated paradigm, the likelihood

WKDWDSHUVRQZLOODFWXDOO\SHUIRUPWKHVSHFL¿F

behavior described has been questioned by many researchers (e.g., Warshaw & Davis, 1985; Davis, Bagozzi, & Warshaw, 1989) For example, in a situation where there is a gap between behavioral intention and actual behavior, some studies have found a low correlation between behavioral these %RQ¿HOG+DUUHOO %HQQHWW 

The Theory of Planned Behavior (TPB)

After identifying problems with TRA, Ajzen  FDPHXSZLWKDPRGL¿FDWLRQWKH theory of planned behavior (TPB) His main criticisms of TRA were that it was designed to predict and ex-plain behavior, or actions, based on the assumption that the behavior was under a person’s volitional control He argues, however, that some behavior that is not under a person’s volitional control might be problematic due to the differences in individuals’ abilities and in external forces This PD\KDYHDQLQÀXHQFHRQDFWXDOSHUIRUPDQFHRI the behavior and, therefore, consideration should

be given to the concept of behavioral control to overcome these volitional control problems To achieve this, Ajzen extended the theory of rea-soned action by adding another construct called

perceived behavioral control, which refers to an

LQGLYLGXDO¶V SHUFHSWLRQ RI WKH ³« SUHVHQFH RU absence of requisite resources and opportunities” (Ajzen & Madden, 1986) required to perform the VSHFL¿FEHKDYLRU

Like the theory of reasoned action, the theory

of planned behavior assumes that behavioral intention is a function of two determinants: the individual’s attitude towards the behavior and the subjective norm within the social environment Ajzen (1991) argues, however, that the inclusion

of perceived behavioral control is important, and provided two rationales for this: it is expected that perceived behavioral control will increase the likelihood of success in performing the behavior, and it is expected that it will provide a measure of actual control Its validity as a measure to predict

Trang 10

the likelihood of achieving the target behavior

will depend on the individual’s capability (e.g.,

having the requisite opportunities and resources)

WRH[HUFLVHFRQWURORYHUWKHVSHFL¿FEHKDYLRU7KLV

means that a person who believes that they have

the resources and opportunities expects fewer

SUREOHPVLQSHUIRUPLQJWKHVSHFL¿FEHKDYLRUDQG

hence perceives that they have complete control

RYHUWKHVSHFL¿FEHKDYLRU

Ajzen (1991) reviewed several studies

employ-ing TPB and found support for it, more evidence

also being found in various situational settings

These studies include: task performance (Locke,

Fredrick, Lee, & Bobko, 1984), attending class

and weight loss (Shifter & Ajzen, 1985),

obtain-ing grades (Ajzen & Madden, 1986), investment

decisions (East, 1993), consumer behavior (Sparks

& Shepherd, 1992), dishonest behavior (Beck &

Ajzen, 1991), ethical behavior (Kurland, 1995;

Randall & Gibson, 1991), leisure activities (Ajzen

& Driver, 1992), executives’ adoption of IT in

small business (Harrison, Mykytyn, &

Riemen-schneider, 1997), adoption of virtual banking

(Liao, Shao, Wang, & Chen, 1999), learning to

use the Internet (Klobas & Clyde, 2000), and

Internet purchases (George, 2002) However,

/LDR HW DO   GLG QRW ¿QG VXSSRUW IRU WKH

theory of planned behavior and research studies

by Randall and Gibson (1991), Beck and Aizen

(1991) and Kurland (1995) found only weak

sup-port These studies thus show rather mixed and

confusing results

Technology Acceptance Model (TAM)

The technology acceptance model (TAM) is a

WKHRUHWLFDO PRGHO WKDW HYDOXDWHV ³« WKH HIIHFW

of system characteristics on user acceptance of

computer-based information systems” (Davis,

1986) In a similar fashion to the theory of

rea-soned action, TAM assumes that a computer user

is generally quite rational and uses information in

a systematic manner to decide whether to use, or

not to use this technology in the workplace The main goal of TAM was:

… to provide an explanation of the determinants

of computer acceptance that is general, and ca-pable of explaining user behavior across a broad range of end-user computing technologies and user populations, while at the same time being ERWK SDUVLPRQLRXV DQG WKHRUHWLFDOO\ MXVWL¿HG

(Davis et al., 1989)

,QDWWHPSWLQJWRIXO¿OOWKLVDLP'DYLV¶   conceptual framework proposed that a user’s mo-tivational factors are related to actual technology usage and hence, act as a bridge between technol-ogy design (e.g., system features and capabilities) and actual technology usage This means that information obtained from the prediction of actual usage at the early stage will guide designers and implementers to enhance the chance of imple-menting technology successfully or even avoid the risk of failure In the conceptual framework Davis (1986) assumes that stimulus variables (e.g., system features and capabilities) trigger organism factors (e.g., user motivation to use the technology) and in turn, users respond by actu-DOO\XVLQJWKHWHFKQRORJ\'DYLVLGHQWL¿HGWKUHH major determinants of technology acceptance (or adoption) suggested by previous research stud-ies that relate to cognition and effectiveness He began with the theory of reasoned action (Ajzen

& Fishbein, 1980; Fishbein & Ajzen, 1975) and adapted this as a basis for causal links between

perceived usefulness, perceived ease of use, at-titude toward using technology, and behavioral intention to explain technology adoption.

%HQH¿WVFODLPHGIRUWKHXVHRI7$0DUHWZR-fold: (1) it provides IS designers with information about how and where to modify design to enhance

IS acceptance and (2) it provides IS implementers with information about how and where to manage

IS implementation

... directive, and standard setting

Bas-ant, Commander, Harrison and Menezes-Filho

(2006) report on the determinants of information

and communication technology (ICT) adoption

and. .. and

Internet purchases (George, 2002) However,

/LDR HW DO   GLG QRW ¿QG VXSSRUW IRU WKH

theory of planned behavior and research studies

by Randall and. ..

by Randall and Gibson (1991), Beck and Aizen

(1991) and Kurland (1995) found only weak

sup-port These studies thus show rather mixed and

confusing results

Technology

Ngày đăng: 07/07/2014, 10:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN