
Kamel Rouibah- 1998: Ph.D., Ecole Supérieure des Affaires (ESA),
- Professor (Full) at College of Business Admnistration, Kuwait University
Kamel Rouibah
- 1998: Ph.D., Ecole Supérieure des Affaires (ESA),
- Professor (Full) at College of Business Admnistration, Kuwait University
About
106
Publications
71,923
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,177
Citations
Introduction
Kamel Rouibah currently works at the Information systems & Operation Management department, College of Business Admnistration, Kuwait University.
Current institution
College of Business Admnistration, Kuwait University
Current position
- Professor (Full)
Publications
Publications (106)
Purpose
This study aims to explore the antecedent factors that directly and indirectly influence electronic word of mouth (eWoM) for social commerce (s-commerce) in two developing countries (e.g. Kuwait and the United Arab Emirates [UAE]) by extending social cognitive theory.
Design/methodology/approach
This study uses a previous robust model (Rou...
The existing big data analytics measures were developed without considering the cultural dimensions of developing countries. This research aims to develop and validate measures for big data Vs and cultural big data analytics and study their impacts on the developing countries’ big data value proposition. Following MacKenzie’s and Shiau and Huang’s...
Most related previous studies have focused on measuring B2C ecommerce success instead of exploring its predictors, and even fewer studies have tested their models across diverse cultures, even though most ecommerce markets involve multiple cultures. Our study extends this line of research by newly identifying and incorporating three predictors of B...
Purpose
Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. The purpose of this study is to investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that in...
Many studies have investigated the burnout model in Western societies but have ignored it in the Arab region. They have also found that the burnout model does not have clear cut dimensions. To fill this gap, the authors applied a modified version of the burnout model to college students in Kuwait to measure their satisfaction with an e-learning sys...
Despite the plethora of studies investigating different impacting factors on intention to re-use (IR) e-government services, they suffer from two limitations. First, initial studies provide mixed results on the effect of risk perception (PR) on IR. Second, although e-commerce studies have considered PR as a complex construct that encompasses severa...
Many studies have focused on the adoption of social commerce (s-commerce) by customers but not by businesses or by microbusinesses. Further, they have investigated this adoption from a researcher's perspective while using quantitative approaches. To fill this gap, the study sheds light on the success of Instagram for microbusinesses (IMB) in an Ara...
The influence of eWoM use for s-commerce in the context of Arab region remains unexplored. To bridge this gap, this study develops a model for eWoM use for s-commerce post adoption. This model link three antecedents-factors (trust towards other people, trust of internet/Instagram, and perceived risks) to eWoM use for s-commerce through the mediatio...
Within the technology acceptance literature, the issue of top management support and commitment has been studied extensively; however, the issue of leadership per se has not been addressed directly. A missing piece of the leadership puzzle as it relates to technology acceptance is an exploration of how top management support gets translated in the...
This research develops a model to investigate the influence of different determinants on student’s Academic Performance (AP) in UAE University (UAEU). The model consists of Big Five personality traits (BigF) and other learning-orientation strategies. The importance of this research to the UAE’s context stems from the fact that determinants of AP va...
Purpose: This study sought to analyze and compare crimes between expatriates and Kuwaitis in term of their frequencies, percentages, types of crimes and the identity of the perpetrators, as well as the extent of the effect of increasing the percentage of expatriates on increasing crime rates
Methodology: This study used an exploratory and statisti...
Many studies have investigated technology adoption in western countries and ignored the Arab region at large. The available Arab studies focused on the technology adoption model (TAM) and its subsequent variations while leaving important factors such as information quality, user involvement, availability of training and top management support on th...
The 21 st century has brought about significant change to both business organizations and educational institutions. One of the more important changes in delivering higher education is the development and growth of technology mediated higher education (online programs), delivered by both non-profit and for-profit college and university programs. The...
This research reports on the adoption of electronic government (EG) in Kuwait. It portrays the evolution path of this initiative since it its inception in 2006 and depicts all the elements leading to the success of this national project. The case study also presents the main features of the Kuwaiti electronic gateway (e.gov.kw) and its mobile appli...
While many studies focused on what is management information system (MIS) major, how it attracts potential students, and describe needed skills, the perceptions of fresh MIS graduates continuous intention to stay working in the field especially in developing countries has not yet been studied empirically. In addition, there seems to be minimal effo...
This chapter investigates the strategic adoption of big data (BD) and analytics (BDA) in organizations. BD represents a large and complex phenomenon which spans different disciplines. BD research is fraught with many challenges. This research develops BD adoption model that could aid organizations in assessing the strategic importance of BD to gain...
The authors would like to note that one of the co-author’s names was displayed incorrectly. Not Serhani Mohamd, but Mohamed Adel Serhani co-authored this article as correctly shown above. © 2018 Springer Science+Business Media, LLC, part of Springer Nature
Research about end-user acceptance of information systems and electronic government has long been a popular topic in information system. Unlike previous studies which focused mainly on e-government based on a quantitative approach in investigating what influences individuals to use and continue using electronic government, this study focuses on mob...
This research investigates the personality characteristics of Information Technology students (CIT) in UAE University (UAEU) and how such features impact their IT learning. To achieve this objective, this research attempts to explain the impact of the Big-5 factors on learning using survey research. Results from 179 respondents suggested that agree...
This research examines the learning preferences of students in UAE University (UAEU). The uniqueness of this research emanates from the fact that no prior research examined this area from the UAE’s perspective. Thus, this research embarks on the fact that student learning strategies vary from one country to another due to many factors. This researc...
This research investigates the large hype surrounding big data (BD) and Analytics (BDA) in both academia and the business world. Initial insights pointed to large and complex amalgamations of different fields, techniques and tools. Above all, BD as a research field and as a business tool found to be under developing and is fraught with many challen...
Mobile Number Portability (MNP) is the process by which a subscriber keeps his mobile phone number if he decides to switch between different mobile service providers (MSP). In this case, customers will not worry to inform their network of friends and family members that their number has changed every time they switch. MNP became effective in Kuwait...
An extensive body of research has tested the DeLone and McLean (2003) information systems success model in many contexts. Surprisingly, few of these studies have applied it to e-commerce. A study by Wang (2008) represents one such initiative, but it is crucial to address several remaining gaps associated with that study. Moreover, no e-commerce suc...
Change creates a sense of uncertainty and lost control, and employees’ resistance and lack of support in addition to lower levels of acceptance represent some of the most cited causes for failures associated with organizational change. Based on the literature review, this study attempts to shed some light on the role of leadership in the system imp...
Although there is a large body of research on trust in e-commerce, a crucial gap is that extant studies have not examined the role of perceived enjoyment on trust in the presence of risk perception in Arab countries. In this paper, an online trust model is presented that exhibits the impact of four external factors (personal innovativeness, propens...
This study used the combined Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB) as the theoretical underpinning to examine the adoption of Internet banking. Five factors (perceived ease of use, perceived usefulness, attitude, subjective norms, and perceived behavioral control) were identified to model their impact on intention t...
Decline of student enrollment in MIS major is still an issue. In order to reverse the trend, this study highlights the drivers toward the management information system (MIS) major in an Arab country based on the Theory of Reasoned Action (TRA) and the Network Externalities Theory. This is the first study that integrates the perceived number of enro...
An extensive body of research has tested the DeLone and McLean (2003) information systems success model in many contexts. Surprisingly, few of these studies have applied it to e-commerce. A study by Wang (2008) represents one such initiative, but it is crucial to address several remaining gaps associated with that study. Moreover, no e-commerce suc...
information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. This version of the referenced work is the post-print version of the article—it is NOT the final published version nor the corrected proofs. If yo...
Selecting a college major represents a major life decision that requires extensive decision-making over a period of time, especially considering the commitment of time and resources. This is a heavy and risky decision which may engage and corrupt and alter the future of undergraduate students. However, undergraduate students commonly articulate kno...
Radio Frequency Identification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation zone of a single reader at the same time. Although RFID is currently a hot topic, many organizations are slow in a...
Day after day, location based social networking (LBSN) services are becoming increasingly more popular and rapidly adopted on a global scale by attracting millions of users. Many of LBSN users have integrated these services into their daily practices. Furthermore, mobile LBSN adoption and use differs greatly across national contexts and the impact...
While the expected benefits and challenges of RFID technology have been well studied in the manufacturing and service sectors at the private organization level, little understanding exists of these two issues when exploring RFID adoption in the agricultural field and at the public organizational level. Previous tracking programs in Kuwait have been...
This study develops a model to assess the consumer acceptance of Camera Mobile Phone (CMP) technology for social interaction. While there has been considerable research on technology adoption in the workplace, far fewer studies have been done to understand the motives of technology acceptance for social use. To fill in this gap, this study develops...
This study aims to explore the different e-payment types that are currently available and are used by the Kuwaiti shoppers for a study sample size 350 (male 121 and female 229). The goals of this study are to identify: The most common and well known e-payment tools among 13, the most wellsatisfied, e-payment tool, the users’ intention to use the e-...
This paper focused on the RFID technology application in Kuwait to control state subsidies for animal breeders. It describes the causes for using RFIDs, previous techniques used to fight against control state subsidies, process of getting state subsidies before and after RFID introduction. The paper also describes the achieved benefits in term of r...
Selecting a college major represents a strategic life decision making over a period of time, especially considering the commitment of time and resources. This is a riskiest decision which has a significant impact on the career and future prospects of undergraduate students. Unlike previous studies which focused on a quantitative approach in underst...
Whistle-blowing has long been an important organizational phenomenon that improves organizations in the long-run. Online whistle-blowing systems are becoming increasingly prevalent channels for reporting organizational abuses. Given that the Sarbanes-Oxley Act and similar financial laws throughout the world require multi-national firms to establish...
This study develops a model to assess the consumer acceptance of Camera Mobile Phone (CMP) technology for social interaction. While there has been considerable research on technology adoption in the workplace, far fewer studies have been done to understand the motives of technology acceptance for social use. To fill in this gap, the authors develop...
Instant Messaging (IM) technology has received extensive focus in the West while there is lack of knowledge of it in the Arab world. This study aims to shed light on factors affecting IM usage and user's satisfaction in an Arab country (Kuwait). To achieve this objective, this study develops a theoretical model that is based on three well known mod...
While the expected benefits and challenges of RFID technology have been well studied in the manufacturing and service sectors at the private organization level, little understanding exists of these two issues when exploring RFID adoption in the agricultural field and at the public organizational level. Previous tracking programs in Kuwait have been...
This study develops a model to assess the consumer acceptance of Camera Mobile Phone (CMP) technology for social interaction. While there has been considerable research on technology adoption in the workplace, far fewer studies have been done to understand the motives of technology acceptance for social use. To fill in this gap, this study develops...
This study is the first empirical research that compares three well known technology adoption models in the in the field of e-banking. It aims to determine the dominant factor(s) which influence the user intention to use Internet banking. Three models (TAM, TPB, and TRA) were used to test the impact of five factors (perceived ease of use, perceived...
Instant messaging (IM) technology has received extensive focus in the West while there is lack of knowledge of it in the Arab world. This study aims to shed light on factors affecting IM usage and user satisfaction in an Arab country (Kuwait). To achieve this objective, this study develops a theoretical model that is based on three well-known model...
This study develops a model to assess the consumer acceptance of Camera Mobile Phone (CMP) technology for social interaction. While there has been considerable research on technology adoption in the workplace, far fewer studies have been done to understand the motives of technology acceptance for social use. To fill in this gap, the authors develop...
With the increased reliance on the Internet, digital piracy is a hot topic that is receiving substantial interest. And while most studies concentrate on understanding piracy in developed countries, few studies have been done in developing countries. In order to fill in this gap, this study reports on an experiment to deter/prevent digital piracy be...
This article studied factors influencing the intention to use Internet stock trading among investors in Malaysia. To achieve this objective, this study selected the decomposed theory of reasoned action as a theoretical basis to explain variation in intention to use. Structured questionnaires were used to collect data from 144 current and potential...
Purpose
The purpose of this paper is to investigate the perceptions of 19 requirement engineering (RE) techniques in Kuwait in term of three criteria “awareness,” “use,” and “perceived value generated over past system development projects.” Also, this paper aims to examine possible relationships between these RE techniques and two information syste...
With the increase use of mobile phone and diffusion into people's everyday life as trusted communication devices, businesses have recently begun exploring their potential as payment devices. While many mobile payments were introduced in different parts of the world, some of them were successful, and others failed to achieve their expected benefits....
Instant messaging (IM) technology has received extensive focus in the West while there is lack of knowledge of it in the Arab world. This study aims to shed light on factors affecting IM usage and user satisfaction in an Arab country (Kuwait). To achieve this objective, this study develops a theoretical model that is based on three well-known model...
Purpose
The purpose of this paper is to investigate the organizational factors and human motivations affecting information systems and information technology (IS/IT) usage and user's satisfaction in an Arabic country.
Design/methodology/approach
The study develops a research model that links three organizational factors (top management support – T...
With the seamless inclusion of camera-mobile phone (CMP) into people's everyday life as trusted devices, businesses have begun exploring their potential as an e-commerce tool. Even without Internet, CMP is a new technology that has been wide spread in Kuwait. In this study, we report on the findings of the application of second technology applicati...
This study aims to investigate factor(s) which influence the user intention to use Internet banking. It compares the explanatory power of three well known technology adoption models (TAM, TPB and TRA). These models were used to test the impact of five factors (perceived ease of use, perceived usefulness, attitude, subjective norms and perceived beh...
Few studies have examined how ٍ systems Development (SD) is practiced in the Arab world. To fill this gap, this study reports on current Requirement Engineering (RE) practices within an Arab country. Based on a sample of 87 companies, this study reports on the known/used/best RE practices within the state of Kuwait. Results of the study provide a b...
Purpose
The purpose of this paper is to study factors that affect adults' acceptance of instant messaging (IM) for social and entertainment purposes in an Arab country
Design/methodology/approach
An expanded version of the Technology Acceptance Model (TAM) was used to test the impact of four factors (subjective norms, perceived ease of use, percei...
Few studies have examined how Information Requirement Determination (IRD) is practiced in the Arab world. To lessen the gap, this empirical study reports on the perception of 19 IRD methods in Kuwait, an Arab country. Based on a sample of 87 software stakeholders, this study reports on the most known, widely used and highly valued IRD methods. Resu...
With the widespread use of mobile phones in the Arab world, companies, including banks, are offering different communication channels for their customers to access their services. Among these channels, this study investigates the level of intention to use SMS for banking transactions. To reach this objective the study compares the explanatory power...
High Internet penetration in regions such as North America, Australia, and Europe, has proven the World Wide Web as an important medium for e-commerce transaction. Despite the soaring adoption statistics for those already developed societies, diffusion rates still remain low for the less developed countries, with e-commerce in its infancy. Emerging...
With the widespread use of mobile phones in the Arab world, companies, including banks, are offering different communication channels for their customers to access their services. Among these channels, this study investigates the level of intention to use SMS for banking transactions. To reach this objective the study compares the explanatory power...
Product data management (PDM) current technology has several pitfalls such as lack of compliance of workflow modules to standards as well as lack of interoperability between these systems. This paper illustrates the extension of the current workflow management system part of the PDM system axalant to support engineering processes management. The ex...
This study compares the explanatory power of six competing IT acceptance models to predict SMS intention to use in Kuwait. These six models are: Theory of reasoned action, theory of panned behavior, technology acceptance model, decomposed theory of planed behavior, Nys-veen's et al. model (Nysveen et al., 2005), and a new model proposed by the auth...
Product definition management (PDM) is a system that supports management of both engineering data and the product development process during the total product life cycle. The formation of a virtual enterprise is becoming a growing trend, and vendors of PDM systems have recently developed a new generation of PDM systems called collaborative product...
Strategic information is currently considered by proactive companies in the West as a real strategic resource, the same as corporate assets and human resources. Scanning information systems created for this purpose have become a real decision support system to cope with information that informs about unexpected events and turbulent changes, called...
The Technology Acceptance Model (TAM) predicts whether users will use technologies based upon causal relationships among beliefs and attitudinal constructs that influence usage behavior. Instant Messaging (IM) is a collaborative technology available for use to virtually all people around the globe. This study applies TAM to assess the acceptance an...
This paper concerns decision’ aspects related to process of product development within a network of companies. Especially, this paper aims to answer two research questions: where to involve suppliers early during engineering process of the main contactor? And how can engineering change management be eased in this setting? These are two ill structur...
Collaborative-complex product development is characterized by enormous quantity of engineering data, variety of complex engineering
processes, process uncertainty and disturbances, much iteration due to its iterative nature and multiple levels of data maturity
(Baldwin et al. 1995). Product design therefore does require changes. The ability of comp...
This paper concerns decision’ aspects related to process of product development within a network of companies. Especially, this paper aims to answer two research questions: where to involve suppliers early during engineering process of the main contactor? And how can engineering change management be eased in this setting? These are two ill structur...
This paper presents an interorganizational information system that aims to structure collaboration of engineering activities as well as data sharing across company borders. The paper also describes the approach underlying the system, validates it by designing a system prototype, and tests the system using questionnaire and in-depth interviews in or...
Concurrent engineering (CE) works best when designers share information early during product development. This information can be incomplete or contradictory. Information sharing is even more important when it crosses company borders to include customers and suppliers in the development of complex products. This applied research focuses on CE with...
The formation of virtual enterprise is becoming a growing trend as companies concentrate on their core competence and economic benefits. This paper presents the concept of a Virtual Engineering Community (VEC) to support concurrent product development in a virtual community of partners. Effective implementation of virtual engineering community rais...
La veille strategique est un domaine de recherche relativement recent et pour lequel existe peu de connaissances exploitables pour les entreprises. Les publications sont encore peu frequentes sur la maniere de cibler et traquer les informations de l'environnement. Cet article decrit des elements de reflexion d`une possible aide methodologique pour...
Modem production facilities are created by integrating subsystems supplied by several manufacturers, using many different models when creating their subsystems.
Our research goal is to integrate and manage these diverse sub-models in order to design and improve the facility itself. These applications include Product Data Management (PDM), CAD, mode...
Information Technology has supported distributed team members in concurrent engineering environments for some time. This paper addresses the co-ordination of design work within the concurrent engineering environment. We refer to this as engineering workflow (EWF) . We also address the challenging task of co-ordinating design activity across the sup...
Concurrent engineering (CE) requires designers to share information that can be incomplete or contradictory early during product development (PD). Information share is even more important when it crosses company borders to include customers and suppliers in the development of complex product. This exploratory research focuses on CE during early sup...
Information and communication technologies (ICT) have altered the balance of cost between activities within a firm and activities between firms. Easier co-operation allows companies to focus on their core strengths, while forming relations with other firms to supply the other needed skills to bring a product to market. Design, in one firm or in a c...
This article investigates the strategic behaviors of Kuwaiti executives from 86 companies with regard to environmental scanning characteristics in the form of eight hypotheses. The main results show that Kuwaiti executives have trouble dealing with environmental scanning and weak signal suggested by Ansoff (1975). Results also suggest that executiv...
Business intelligence (BI) is a strategic approach for systematically targeting, tracking, communicating and transforming relevant weak signs1 into actionable information on which strategic decision-making is based. Despite the increasing importance of BI, there is little underlying theoretical work, which directly can guide the interpretation of a...
Although business intelligence is becoming an important research area and the number of companies implementing business intelligence system is increasing, analysis of current practises shows that they are not satisfactory. Difficulties in interpreting weak signals are a major important reason. This leads to inability of companies to anticipate thei...
Concurrent engineering requires designers to share information that can be incomplete or contradictory. Information integrity is even more important when this dynamic network crosses company borders to include customers and suppliers. This paper introduces a new modelling view based upon a parameter approach to maintain data validity and to support...
Interpretating weak signs of business intelligence is an ill-structured problem encountered by many companies' managers. Those managers do not know how to interpret weak signs in order to extract meaning from anticipatory and fragmentary information elements. Surveys and action researches performed by our team confirm this problem and therefore, it...
Environmental scanning and information interpretation provide crucial information on which strategic decision making is based. This paper discuss a new concept termed « Strategic Probe » that allows organisation to be secure from environmental surprise. It deals with a kind of information called «weak signals ». The quality, and therefore the succe...
The Technology Acceptance Model (TAM) predicts whether users will use technologies based upon causal relationships among beliefs and attitudinal constructs that influence usage behavior. Instant Messaging (IM) is a collaborative technology available for use to virtually all people around the globe. This study applies TAM to assess the acceptance an...