ArticlePDF Available

Abstract and Figures

The purpose of this paper is to examine the role end-user training has on performance expectancy and effort expectancy, two variables associated with technology acceptance. The technology-based elements of the HIPAA security rules among oral surgeons were used for the study. The method of the investigation was a cross-sectional correlational study using a self-reported mailed questionnaire. The survey was created using preexisting scales from the Unified Theory of Acceptance and Use of Technology. Results suggest end-user training is positively correlated with both performance expectancy and effort expectancy.
Content may be subject to copyright.
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
1
The Role Of End-User Training
In Technology Acceptance
Bryan Marshall, Georgia College and State University
Robert Mills, Utah State University
David Olsen, Utah State University
ABSTRACT
The purpose of this paper is to examine the role end-user training has on performance expectancy
and effort expectancy, two variables associated with technology acceptance. The technology-
based elements of the HIPAA security rules among oral surgeons were used for the study. The
method of the investigation was a cross-sectional correlational study using a self-reported mailed
questionnaire. The survey was created using preexisting scales from the Unified Theory of
Acceptance and Use of Technology. Results suggest end-user training is positively correlated
with both performance expectancy and effort expectancy.
Keywords: End-User Training, IS Survey Research, Technology Acceptance, Unified Theory of Acceptance and
Use of Technology, Health Care, HIPAA
INTRODUCTION
dvances in systems, powerful software suites, and data management have increased the amount of
end-user computing required by accountants (16), and presumably other professionals, particularly
in generating and analyzing reports. Emerging areas such as information security and business
intelligence have also increased the need of end-users to adopt new technologies. End-users often receive training in
an effort to make adoption and implementation of new systems possible. Unfortunately, the role of end-user training
and technology acceptance is not well documented.
The purpose of this research is to examine the impact end-user training has on technology acceptance. As
companies continue to rely on end-user training to improve productivity and gain competitive advantage, the impact
of end-user training on the acceptance of new technologies must be examined. Technology acceptance theory has
played a key role in the examination of user behavior toward the acceptance of new technologies. Technology
acceptance theory identifies different models, frameworks, and theories, which have been used to discover the
factors or constructs influencing the acceptance and use of technology. Several research studies have demonstrated
that a variety of factors influence the rate of acceptance of new technologies when new systems are implemented
(5). Prior research also suggests that small organizations encounter unique challenges when attempting to adopt a
new technology (11, 12).
Research studies within the domain of technology acceptance has included end-user training as a
significant contributing factor that influences users’ behavior toward the acceptance of technology (5, 7, 18, 19).
However, the research findings concerning the role, importance, and utility of end-user training are ambiguous. A
better understanding of the determinants of perceived usefulness would enable those responsible for implementing
new systems to design organizational interventions that would increase user acceptance and usage of new systems
(22).
A
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
2
Background On UTAUT
In 2003 Venkatesh, Davis, Davis, and Morris presented a theory which synthesized previous research in
technology acceptance and is known as the Unified Theory of Acceptance and Use of Technology (UTAUT). The
UTAUT model integrated eight of the prominent user behavior models and included the (a) Theory of Reasoned
Action (TRA), (b) Technology Acceptance Model (TAM), (c) Motivational Model (MM), (d) Theory of Planned
Behavior (TPB), (e) Combined TAM and TPB (C-TAM-TPB), (f) Model of PC Utilization (MPCU), (g) Innovation
Diffusion Theory (IDT), and (h) Social Cognitive Theory (SCT).
The UTAUT model included several objectives: (a) to review user acceptance research, (b) to compare the
eight models, (c) to formulate the UTAUT model, and (d) to empirically validate the UTAUT model. Most of the
related UTAUT studies used university students as the participants. In addition, the reviewed studies examined
looking at technologies that were voluntarily adopted (23). Venkatesh et al. found 32 constructs across the eight
models and they also found four “moderating” variables, concluding that few studies have been done that look at
complex “managerial” information technologies.
The UTAUT model has four main independent variables: performance expectancy, effort expectancy,
facilitating conditions, and social influence (see Appendix 1). The first independent variable performance
expectancy is defined as the degree to which an individual believes that using the system will help one to attain
gains in job performance (23). Second, effort expectancy is defined as the “degree of ease associated with the use of
the system” (23). Third, facilitating conditions is defined as the “degree to which an individual believes that an
organizational and technical infrastructure exists to support use of the system” (23). Finally, social influence is
defined as the “degree to which an individual believes that important others believe he or she should use the system”
(23).
There were four main moderating variables also defined in the literature. Of these, experience is defined as
the amount of experience that a person has in a specific domain. Previous research has shown that as experience
increases, effort expectancy will decrease, or in other words, the system will be easier to use (1, 2, 6, 20, 21). The
survey also included three other variables that the UTAUT measure addresses, but the variables were found to be
insignificant: (a) attitude toward the technology, (b) anxiety, and (c) self-efficacy.
End-User Training
Companies increasingly use end-user training to help create a more productive and competitive workforce.
Anne Fisher’s 2005 Fortune article identifies the profession of training & development specialists as one of the 20
fastest-growing professional jobs over the next ten years (8). While constructs such as performance expectancy and
effort expectancy are critical factors in actual implementation behavior of technology acceptance, an equally
important question is how an organization can specifically impact the level of performance expectancy and effort
expectancy. Performance expectancy is related to how useful the system is perceived to be while effort expectancy
is associated with how easy the system is to use (23). End-user training programs are often designed to specifically
address issues of usefulness and ease of use.
Malcolm Knowles’ classic Theory of Andragogy (13) includes four principles related to training adult
learners. These principles include:
1. Adults need to be involved in the planning and evaluation of their instruction.
2. Experience (including mistakes) provides the basis for learning activities.
3. Adults are most interested in learning about topics that have immediate relevance to their job or personal
life.
4. Adult learning is problem-centered rather than content-oriented.
Although Knowles doesn’t specifically use the constructs "perceived usefulness" and "perceived ease of use", there
is clearly a logical connection between principles of andragogy and technology acceptance.
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
3
Because end-user training programs are often problem-centered, individuals receiving training are likely to
find technology systems easier to use. Additionally, programs that implement andragogy principles such as
addressing the immediate relevance to job performance are more likely to increase individuals' perception of the
usefulness of the system than those who did not receive training. The evaluation of e-learning and end-user training
programs often examines both usefulness and ease of use as part of the assessment process. For instance, Cappell
and Hayen (4) specifically include both ease of use and usefulness as specific elements of their learning unit
assessment for evaluating e-learning. Based on past experience, the authors posit end-user training programs will
positively correlate with both performance and effort expectancy.
HYPOTHESES
H1: End-user training will positively correlate with performance expectancy.
Figure 1: Hypothesis 1
H2: End-user training will positively correlate with effort expectancy.
Figure 2: Hypothesis 2
METHOD
This section describes a description of the population, sample selection, power analysis, and details related
to the development and administration of the survey instrument. The HIPAA Security Rule was chosen as the
application of the theory for this study. The HIPAA Security Rule came into effect in March of 2005 and requires
medical practices to secure electronic patient data. The HIPAA Security Rule was chosen because of its importance
to the medical profession, specifically to small medical practices.
Research Population
The American Association of Oral and Maxillofacial Surgeons (AAOMS) is the nonprofit professional
organization serving oral surgeons. According to AAOMS, approximately 90 percent of all oral surgeons belong to
its organization. As a service to its members, AAOMS currently posts the names, city, state, and zipcode of 5,472
oral surgeons on the AAOMS home page (3). Each state was accessed separately in order to gather the population to
be sampled, , and the oral surgeons from each state were copied into an Excel spreadsheet along with a street
address, city, state, zipcode, and phone number.
Power Analysis
A power analysis was completed to estimate the required number of respondents in this study. Power
analysis software was used to determine that 200 participants would be sufficient to run a correlation matrix on the
hypothesized models. Assuming a 20 percent survey return rate, a sample of 1,000 randomly selected medical
practices was chosen to achieve the 200 estimated participants.
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
4
Instrument Development
The HIPAA Security Rule contains 37 different policies and procedures, mandating the use of many
different technologies. Due to the nature of technology acceptance research, application of the theory to multiple
technologies within the same study is not practical (5, 14). For this reason the 37 different policies were broken
down into separate categories of “technical” and “non-technical”, and only technical categories were considered for
this study. The survey was created using preexisting scales from the Unified Theory of Acceptance and Use of
Technology (UTAUT). Rewording the scales in a way to apply the theory to different domains is common practice
in technology acceptance research (5, 15, 1). In this instance, the survey questions were applied to the HIPAA
Security Rule policy on mandatory use of electronic data backup systems in medical practices.
Survey Administration
According to the HIPAA Security Rule, each medical practice must designate a compliance officer to
maintain the medical office records. Each of these compliance officers was contacted and asked to complete the
survey. The office manager or practicing physician was asked to complete the survey if no compliance officer had
been identified.
RESULTS
This section presents the results of the study by providing a description of the respondents, internal
reliability of the measures, and concludes with a presentation of the correlation matrix.
Description Of Respondents
Out of the 1,000 surveys sent out, 208 were received at the time of this analysis. The overall demographics
of the respondents are presented in Appendix 3. With respect to gender of the respondents, 106 (51%) were female
and 94 (45%) were male, with 8 practices not reporting gender (4%). The primary age group of the respondents was
between 41 and 60 (65%). The cover letter which was sent with the survey to the medical practices asked the doctor
to have the HIPAA compliance officer or office manager fill out the short survey. The largest percentage of
respondents (42%) indicated they had received equal to or higher than a doctorate degree. Only 3 percent of the
medical practices reported not using computers in the office. Conversely, 70 percent of the offices reported using
computers for over 10 years. Additionally, 82 percent reported using computers since the year 2000.
The dependent variable “actual implementation behavior” was analyzed using descriptive statistics. The
frequency of usage showed that over 80 percent of all practices backup their patient data at least daily (5 times a
week). Over 92 percent of the practices report backing up their data at least once a week.
Internal Reliability of the Measures
Cronbach’s alpha was used to assess the reliability of the measure used in this study. The coefficient
reported in Cronbach’s alpha usually range from 0 to 1. All of the items were tested to determine the constructs
Cronbach’s alpha. As seen in Table 1, each construct had an alpha over .65. This high reliability was expected
because the questions were based on existing scales (14, 17).
Table 1: Cronbach’s Alpha Reliability Test
Construct
Number of Items
Cronbach's Alpha
Training and Resources
3
0.913
Performance Expectancy
2
0.697
Effort Expectancy
2
0.929
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
5
Correlation Matrix
A correlation matrix is a table of the different constructs and how they correlate with each other (16). Table
2 presents the descriptive statistics for each variable, including mean and standard deviation, and the correlation
between the variables with the significance level. The significance of each correlation was evaluated at the two-
tailed test level. The results of the correlation matrix in Table 2 revealed that the UTAUT factors (training,
performance, and effort) were all strongly correlated.
Table 2: Correlation Matrix
Training correlated with performance (.789) and effort (.840), all of which were significant at the .01 level.
Performance correlated with effort (.776) significant at the .01 level. In this study the two dependent variables
(usage and how many times) were significantly correlated (.618) at the .01 level. To further support previous
research (23), each of the constructs from the UTAUT model (training, performance, and effort) were significantly
correlated with the actual implementation behavior (usage) at the .01 level.
DISCUSSION
The purpose of this research was to examine the impact of end-user training on technology acceptance
theory to determine how to improve the implementation and adoption of technologies mandated by the federal
government. Two hypotheses (Appendix 2) were tested and supported in this study using a correlation matrix.
Training was positively correlated with both performance expectancy and effort expectancy. End-user training
appears to be an important and understudied factor in technology acceptance. End-user training programs could be
specifically designed to improve performance expectancy and effort expectancy to aid in the acceptance of new
technologies in organizations.
SUGGESTIONS FOR FUTURE RESEARCH
Future research is needed in several areas related to this research. First, additional research should be
conducted to determine the mediating and moderating effects among elements such as end-user training and
technology acceptance factors. In addition, we believe that specific research to determine which training models,
components, and principles have the greatest impact on performance expectancy and effort expectancy will be
valuable.
Additional research is also necessary to examine specific instructional design prescriptions used for
creating end-user training programs have the greatest impact on technology acceptance. With the growing
complexities of computer applications and the increasing diversity of end users, the importance of researching the
impact of specific end-user training designs on technology acceptance is critical (10). Further, individual
characteristics of the trainees also impact the role of end-user training programs and warrants further investigation.
Prior research suggests anxieties related to communication and computing have a direct influence on an individual’s
interaction with technology tools used in an e-Learning environment (9, 24). More research is necessary to
Variables
Training
Performance
Expectancy
Effort
Expectancy
Usage (Yes/No)
Usage (Number
of Times)
Standard Deviation
1.130
1.160
1.160
0.240
2.150
Mean
4.270
4.150
4.270
0.940
5.080
Usage
(Number Times)
1.000
Usage (Yes/No)
1.000
0.618*
Effort
1.000
0.541*
0.305*
Performance
1.000
0.776*
0.569*
0.361*
Training
1.000
0.769*
0.840*
0.567*
0.372*
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
6
determine what impact these individual characteristics have on end-user training, and ultimately on technology
acceptance.
Taking advantage of end-user training programs to assist in the adoption of technology appears to be a
valuable, but understudied research area. By better understanding the impact training has on technology acceptance,
organizations will be better prepared to design programs specifically geared toward improving both performance
expectancy and effort expectancy, and ultimately improving the organizations acceptance of technology.
REFERENCES
1. Agarwal, R., and Prasad, J. The Role of Innovation Characteristics and Perceived Voluntariness in the
Acceptance of Information Technologies, Decision Sciences, (28:3), 1997, pp. 557-582.
2. Agarwal, R., and Prasad, J. A Conceptual and Operational Definition of Personal Innovativeness in the
Domain of Information Technology, Information Systems Research, (9:2), 1998, pp. 204-215.
3. American Association of Oral Maxillofacial Surgeons (AAOMS). About AAOMS, Online, retrieved on
4/1/2005 from http://www.aaoms.org/aboutus.cfm.
4. Cappel, J. J. and Hayen, R. L. Evaluating E-Learning: A Case Study, Journal of Computer Information
Systems, (44:4), 2004, pp. 49-56.
5. Davis, F. D. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information
Technology, MIS Quarterly, (13:3), 1989, pp. 319-340.
6. Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. User Acceptance of Computer Technology: A
Comparison of Two Theoretical Models, Management Science, (35:8), 1989, pp. 982-1003.
7. Davis, S. A. Training End Users: An Experimental Investigation of Roles of the Computer Interface and
Training Methods, MIS Quarterly, (17:1), 1993, pp. 61-85.
8. Fisher, A. Hot Careers for the Next 10 Years, Fortune, March 21, 2005, pp 131.
9. Fuller, R. M, Vician, C., and Brown, S. A. E-Learning and Individual Characteristics: The Role of
Computer Anxiety and Communication Apprehension, Journal of Computer Information Systems, (46:4),
2006, pp. 103-115.
10. Hasan, B. and Ali, J. M. H. An Empirical Examination of a Model of Computer Learning Performance,
Journal of Computer Information Systems, (44:4), 2004, pp. 2733.
11. Lee, J. Discriminant Analysis of Technology Adoption Behavior: A Case of Internet Technologies in
Small Businesses, Journal of Computer Information Systems, (44:4), 2004, pp. 57-66.
12. Lee, J. and Runge, J. Adoption of Information Technology in Small Business: Testing Drivers of Adoption
for Entrepreneurs, Journal of Computer Information Systems, (42:1), 2001, pp. 44-57.
13. Knowles, M. The Adult Learner: A Neglected Species (3rd Ed.), Gulf Publishing, Houston, TX, 1984.
14. Ma, Q., and Liu, L. The Technology Acceptance Model: A Meta-Analysis of Empirical Findings, Journal
of Organizational and End User Computing, (16:1), 2004, pp. 59-72.
15. Morris, M. G., and Dillon, A. The Influence of User Perceptions on Software Utilization: Application and
Evaluation of A Theoretical Model of Technology Acceptance, IEEE Software, (14:4), 1997, pp. 58-75.
16. Paquette, L. R. Problem Based Learning In the AIS Course, The Review of Business Information Systems,
(7:2), 2003, pp 59-72.
17. Pedhazur, E. J., and Schmelkin, L. P. Measurement, Design, and Analysis: An Integrated Approach,
Lawrence Erlbaum Associates, Hillsdale, New Jersey, 1991.
18. Riemenschneider, C. K. and McKinney, V. R. Assessing Belief Differences in Small Business Adopters
and Non-Adopters of Web-Based E-Commerce, Journal of Computer Information Systems, (42:2), 2001,
pp. 101-108.
19. Riemenschneider, C. K. and Hardgrave, B. C. Explaining Software Development Tool Use with the
Technology Acceptance Model, Journal of Computer Information Systems, (41:4), 2001, pp. 1-8.
20. Thompson, R. L., Higgins, C. A., and Howell, J. M. Personal Computing: Toward A Conceptual Model of
Utilization, MIS Quarterly, (15:1), 1991, pp. 131.
21. Thompson, R. L., Higgins, C. A., and Howell, J. M. Influence of Experience on Personal Computer
Utilization: Testing A Conceptual Model, Journal of Management Information Systems, (11:1), 1994, pp.
167-187.
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
7
22. Venkatesh, V. Creating an Effective Training Environment for Enhancing Telework, Int. J. Human-
Computer Studies, (52), 2000, pp. 991-1005.
23. Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. User Acceptance of Information Technology:
Toward A Unified View, MIS Quarterly, (27:3), 2003, pp. 425-478.
24. Vician, C, and Davis, L. R. Investigating Computer Anxiety and Communication Apprehension as
Performance Antecedents in a Computing-Intensive Learning Environment. Journal of Computer
Information Systems, (43:2), 2002-2003, 51-57.
APPENDICES
Appendix 1: Unified Theory of Acceptance and Use of Technology.
Appendix 2: Hypothesis description.
Hypothesis #
Description
Results
H1
End-User Training will positively correlate with Performance expectancy.
Supported
H2
End-User Training will positively correlate with Effort expectancy.
Supported
Review of Business Information Systems Second Quarter 2008 Volume 12, Number 2
8
Appendix 3: Description Of Respondents.
Characteristics
Frequency
Percent (%)
Gender
Male
94
45.19
Female
106
50.96
Unknown
8
3.85
Age
Under 24
2
0.96
25-30
11
5.29
31-35
13
6.25
36-40
23
11.06
41-45
39
18.75
46-50
35
16.83
51-55
30
14.42
56-60
32
15.38
61-65
8
3.85
Over 66
2
0.96
Unknown
13
6.25
Education
High School
28
13.46
Associates Degree
32
15.38
Bachelor Degree
26
12.50
Master Degree
14
6.73
Doctorate Degree
87
41.83
Unknown
21
10.10
Computer Experience
Under 1 Year
7
3.37
1-5 Years
25
12.02
6-10 Years
60
28.85
11-15 Years
73
35.10
Over 15 Years
38
18.27
Unknown
5
2.40

Supplementary resources (2)

... The critical literature search revealed that there is no contribution that deals with training scenarios, evaluation methods, or guidelines specifically for learning the usage of immersive systems in an industrial context. However, there is a demand for research (see [7,[15][16][17][18][19]) on how immersive assistance systems can be introduced to user groups effectively and efficiently in order to avoid negative effects. Indeed, there is a lack of applicable design guidelines and recommendations regarding training scenarios for specialised, professional use. ...
... It is, therefore, important to strengthen the deter nants of these two basic conditions when training new technologies in order to ensure t they are well accepted by users. For the intention to use, we refer to the UTAUT accepta model [7] and its four determinants for the intention to use: performance expectation, fort expectation, Cohen's influence, and facilitating conditions. According to the definit of ISO9241 [34], the usability of a technology is the perceived effectiveness, efficiency, a satisfaction with which users achieve their goal, where effectiveness refers to accuracy a completeness. ...
... It is, therefore, important to strengthen the determinants of these two basic conditions when training new technologies in order to ensure that they are well accepted by users. For the intention to use, we refer to the UTAUT acceptance model [7] and its four determinants for the intention to use: performance expectation, effort expectation, Cohen's influence, and facilitating conditions. According to the definition of ISO9241 [34], the usability of a technology is the perceived effectiveness, efficiency, and satisfaction with which users achieve their goal, where effectiveness refers to accuracy and completeness. ...
Article
Full-text available
Emerging assistance systems are designed to enable operators to perform tasks better, faster, and with a lower workload. However, in line with the productivity paradox, the full potential of automation and digitalisation is not being realised. One reason for this is insufficient training. In this study, the statistically significant differences among three different training scenarios on performance, acceptance, workload, and technostress during the execution of immersive measurement tasks are demonstrated. A between-subjects design was applied and analysed using ANOVAs involving 52 participants (with a statistical overall power of 0.92). The ANOVAs were related to three levels of the independent variable: quality training, manipulated as minimal, personal, and optimised training. The results show that the quality of training significantly influences immersive assistance systems. Hence, this article deduces tangible design guidelines for training, with consideration of the system-level hardware, operational system, and immersive application. Surprisingly, an appropriate mix of training approaches, rather than detailed, personalised training, appears to be more effective than e-learning or ‘getting started’ tools for immersive systems. In contrast to most studies in the related work, our article is not about learning with AR applications but about training scenarios for the use of immersive systems.
... UT is an external variable that affected technology acceptance (Marshall et al., 2008). It is hypothesized that UT will affect the intention to re-use the ELS, but this will be mediated by PE. ...
... End-users have received training in the use of new technology to make adoption and implementation possible. After having been trained, end-users tend to find the adoption of the new technology useful (Marshall et al., 2008). According to research conducted on the American surgeons' use of new technology, user-training is positively correlated with both performance expectancy and effort expectancy (Marshall et al., 2008). ...
... After having been trained, end-users tend to find the adoption of the new technology useful (Marshall et al., 2008). According to research conducted on the American surgeons' use of new technology, user-training is positively correlated with both performance expectancy and effort expectancy (Marshall et al., 2008). This study showed that end-user training was an important and understudied factor in technology acceptance and can be useful to new technology users. ...
... The previous section explained how the training and resources, performance expectancy, effort expectancy, and social influence are hypothesized to influence intention to use the collaboration technology. Additionally, training and resources is hypothesized to moderate performance expectancy, effort expectancy, (Marshall, Mills, & Olsen, 2008) and social influence. Therefore, based on the findings above, it is hypothesized: ...
... The survey questions were created using preexisting scales from the unified theory of acceptance and use of technology (UTAUT) (Venkatesh et al., 2003), the predicting collaboration technology use model (Brown, Dennis, & Venkatesh, 2010), and the model of virtual teamwork training (Chen et al., 2008). Scales were reworded to apply to this study's research domain virtual collaboration, as is common practice in technology acceptance research (Davis, 1989;Morris & Dillon, 1997;Marshall et al., 2008). A pilot study was conducted to assess reliability. ...
... For instance, an individual is willing to accept the M-government service if there is a favourable set of FC such as training, tutorial or vendor support on the m-government services. Besides, Marshall, Mills and Olsen (2008) also found that with sufficient supports, users will be able to perceive the said technology as useful and easy to use/practical. However, limited studies have focused on the association of FC with the PE and EE. ...
... These results therefore support the importance of technical support in m-government services whereby it creates favourable preference among citizens towards the implementation of m-government. When there is sufficient technical support, the citizens will have trust towards the m-government services for they are useful and easy to use (Marshall, Mills, & Olsen, 2008;Venkatest, Chan, & Thong, 2012). Thus, this study shall contribute to the significant association between FC to PE as well as EE which are neglected by the majority of past studies. ...
Book
Full-text available
This book is an edited book that has been reviewed through a double-blind peer-review process. Each book chapter was reviewed by at least two different reviewers who are experts in their field. The chapters in the book have been edited and this publication has emerged as a result. The book consists of 7 chapters. Book chapter authors are reputable scientists from different countries of the world. The first chapter is a critical review and a case study in e-Business, with special attention to the digital currencies resource and its possibilities. It is an example of technovation for the improvement of personnel income and motivation, as a good practice of CSR 3.0. The study explains how it works this win-win practice, with a real example of a Spanish company. The second chapter attempts to incorporate the Unified Theory of Acceptance and Use of Technology (UTAUT) model with perceived risk theory (security risk and privacy risk) to explore its impact towards the intention to use m-government services. Age, gender and education level were also adopted as moderator variables to provide an in-depth understanding of citizens’ preference in m-government services. Partial Least Square (PLS) Structural Equation Modelling method was conducted. The third chapter aims to assess the level of gender inclusivity in the municipal e-procurement processes in the City of Johannesburg as a case study. It uses a Gender and Development (GAD) approach. Among the questions raised in the chapter are whether gender mainstreaming is considered in the municipal procurement processes; and if there are any initiatives in place to capacitate men and women to ensure their participation in the e-procurement processes. The fourth chapter examines the impediments that derail the intensive uptake of eLearning programmes in a particular higher education institution. The study adopted an inductive research paradigm that followed a qualitative research strategy. Data were collected by means of one-on-one in-depth interviews from selected faculty members at a nominated institution of higher learning. The fifth chapter investigated the role of Knowledge Management Systems (KMS) in enhancing the export performance of firms operating within the manufacturing sector in Zimbabwe. The study used a quantitative approach in which a survey questionnaire was distributed to 555 managers drawn from 185 manufacturing firms based in Harare. Data analyses involved the use of descriptive statistics, Spearman correlations and regression analysis. In the sixth chapter, a survey was undertaken on 131 small and medium-sized enterprises (SMEs) from Pelagonija region in order to determine the current level of SME digitalization within the region. It is aimed to compare with European Union (EU) average and to make conclusions on the impact of the SME digitalization to region gross domestic product (GDP) growth as well as revenues collection. The last chapter's purpose was to develop a measuring and modelling framework/instrument of Internet banking service quality (IBSQ) for the South African banking sector. Snowball and convenience sampling, both non-probability techniques were used to recruit participants for the study. A total of 310 Internet banking customer responses were utilised in the analysis.
... To build a workforce that is flexible and adaptable requires an understanding of which factors are hindering the acceptance process when new technology is introduced, then strategically working to overcome weaknesses through training (Bell et al., 2017). After using the UTAUT model and determining which variables assessed show the greatest correlation to BI and UB, training models can be suggested to specifically address each weakness (Arpaci, & Basol, 2020;Knowles et al., 2020;Marshall et al., 2008). A variety of learning models, mentoring and training methods, and change management processes can be implemented to help mitigate employee attitudes of resistance for the long-term benefit of the organization (Bell et al., 2017). ...
... The principles of andragogy can be adapted to many adult learning situations and has successfully been applied to UTAUT studies in the past, thus Knowles' training model is a viable choice for aligning training with technology acceptance needs identified through a UTAUT study (Arpaci, & Basol, 2020;Knowles et al., 2020;Marshall et al., 2008). Although Knowles does not use the same terminology for constructs as Venkatesh et al., the correlation between concepts can be identified (Venkatesh et al., 2003;Williams et al., 2008). ...
Thesis
Full-text available
During the COVID-19 pandemic manufacturing companies found that to remain competitive increased automation and technological advancement was of increasing importance. Many organizations faced a lack of employees who had the necessary skills to be receptive to the needs of an increasingly automated work environment, leading to a gap between current staff and talent abilities. Instead of hiring new workers and adding time and financial expense, training current workers to have increased acceptance towards changing technology can be a viable option, if training can be strategized to address the needs of a specific workplace. This mixed methods study uses a modified unified theory of acceptance and use of technology (UTAUT) survey to quantitatively establish a baseline for technology acceptance and usage among a group of manufacturing workers in the United States, correlated to qualitative interviews with some staff to determine which training methods were found to be most effective. Overall attitudes towards new technology usage and behavioral intent were found to be positive at this facility. Through multiple regression analysis it was discovered that current usage behavior of new technology at the facility was most influenced by facilitating conditions and social influence, whereas behavioral intent was most influenced by effort expectancy and social influence. Recommendations for future training methods to specifically address areas of weakness are suggested through correlating UTAUT variables to principles found in the adult learning theory of andragogy, extrinsic and intrinsic motivators, and both synchronous and asynchronous training methods.
... Kesiapan pengguna memainkan peran krusial dalam meningkatkan adopsi terhadap teknologi baru. Dengan pelatihan yang memadai, pengguna dapat mengurangi kesalahan, meningkatkan efisiensi, dan memanfaatkan sepenuhnya fitur-fitur dari paltform atau sistem informasi baru yang diterapkan[10].Gambar 9. Uji Coba Platform Digital Gambar 10. Sosialisasi, Pelatihan, dan Pendampingan Gambar 11. ...
Article
Full-text available
Kegiatan Pengabdian kepada Masyarakat (PkM) dilaksanakan di Desa Wisata Sidajaya, Kabupaten Subang, Jawa Barat, yang memiliki potensi pariwisata di bidang pertanian dan warisan budaya. Namun, pengelolaan pariwisata di desa ini masih konvensional dan belum mengintegrasikan teknologi informasi, sehingga kurang menarik perhatian wisatawan. Untuk itu, Jurusan Teknologi Informasi dan Komputer Politeknik Negeri Subang mengembangkan sistem informasi “Smart Agro-Heritage Tourism” untuk membantu promosi dan manajemen pariwisata. Pelaksanaan PkM dilakukan melalui tujuh tahapan: analisis situasi, identifikasi masalah, perencanaan solusi, pendekatan sosial, pengembangan dan implementasi platform, pelatihan dan pendampingan, serta monitoring dan evaluasi. Produk yang dihasilkan berupa platform digital dengan fitur e-ticket, pembayaran online, event, dan laporan, yang dikembangkan dengan metode waterfall. Pengujian fungsional menggunakan metode blackbox menunjukkan hasil 100% valid. Pelatihan dilakukan untuk meningkatkan pemahaman masyarakat dan pengurus desa dalam menggunakan platform tersebut. Hasil analisis data kuesioner menunjukkan skor rata-rata 4.6 (skala 5) pada tiga indikator utama: efektivitas pelatihan, pemantauan penggunaan platform, dan adopsi platform digital. Hasil ini menunjukkan keberhasilan PkM di Desa Sidajaya dalam meningkatkan pemanfaatan teknologi untuk pengelolaan pariwisata.
... Moreover, research suggests that training positively influences individuals' understanding and awareness of a particular system. through training, employees accumulate knowledge about the system's features, capabilities, and functionalities, thereby enhancing their ability to utilize it effectively in their daily tasks (Marshall et al., 2008). ...
Article
Full-text available
Information systems have greatly enhanced companies’ capabilities to record, track, and measure performance. This study examines the factors influencing employees’ use of accounting information systems (AISs) in Sudan’s top five oil companies and investigates how these systems impact both financial and non-financial performance. Furthermore, it evaluates the effects of top management support, trust, training, technical support, and perceived ease of use on AIS usage, as well as its subsequent impact on company performance. Surveys of 215 employees collected data, and a structural equation model tested the hypotheses. The data supports three hypotheses concerning AIS usage factors. Notably, the study demonstrates that AIS usage significantly enhances both financial and non-financial performance. This article is notable for directly addressing the practical application of AISs and their impact on organisational financial and non-financial performance, highlighting the significant value of AIS implementation in the oil industry. The conclusion summarises the key findings and offers recommendations for future research in this area.
... This model has been employed in several research across a range of fields, such as organizational learning systems [20], [21] mobile banking implementations [22], [23], and 3G mobile communication [24], [25]. In health care systems, UTAUT is also used as a framework for training [26]. In relation to the UTAUT, its global and complete approach serves as justification for choosing this model for this investigation. ...
Article
Full-text available
Waste disposal continues to increase globally, causing environmental issues to worsen. Indonesia, with its rapidly growing cities, also struggles to manage all this waste. Numerous mobile applications were released to recycle waste more effectively. However, The rate of mobile recycling application adoption is still low. We contend that lack of awareness and knowledge on recycling is the main cause of low adoption from people, that makes them deny the need for recycling and individual responsibility. Hence, the purpose of this study is to find out if sociopreneur awareness implementation, workshop, on recycling application influence the adoption of recycling applications. TPB and UTAUT model is used to attest the acceptance of workshop on recycling application. Quantitative approach is employed in this study, using a questionnaire of 139 respondents. The structural model is calculated using Smart PLS tools, and the results are validation data. According to the results, the user's intention to use recycling applications with a workshop feature is positively and significantly impacted by four variables (T-Values ≥ 1.96), which are Functional Expectancy, Attemption, Support System, and Perceived Control. While, Society Influence have negative effects (T-Values 1.96) on the user's intention to use recycling applications with a workshop feature.
... Studies such as that of Marshall, Mills, and Olsen (2008) find that appropriately delivered end-user training leads to improved technology acceptance, highlighting the potential ROI when it comes to employee affect. Alshehhi (2016) further underscores the importance of investing in quality training for employee affect, as it leads to less turnover due to unhappy employees. ...
Conference Paper
Full-text available
Much research surrounding eLearning focuses on comparing the effectiveness of technology-mediated education to that of traditional teaching methods; however, few studies exist exploring the holistic return on investment (ROI) of online learning programs. While some research examines potential cost-and time-savings, among other major investments and returns, no research encompasses all aspects of an eLearning implementation. This review of the literature about eLearning in universities and the corporate sector identifies six key considerations for decision makers when determining how best to leverage eLearning. These include the financial ROI; the return on time investment; the affective ROI for all stakeholders involved; the effectiveness of programs; the potential for indirect returns, such as larger community improvement; and stakeholder weight factors. As evidenced by the literature, each of these factors individually can determine the success or failure of an eLearning integration plan. However, considering all elements can provide a more thorough representation of an eLearning implementation's risks and rewards. Through the synthesis of these major components as they are each outlined in the literature, this paper proposes a foundational model through which key decision makers in organizations can determine how eLearning adoption best fits in their institutions.
Article
Introduction Nigeria recently used electronic surveillance tools for epidemic diseases, one such tool is the Surveillance Outbreak Response Management and Analysis System (SORMAS); no readily available study has assessed the use of SORMAS in Nigeria. The title of this study is the usability of SORMAS for coronavirus disease among epidemiological officers in Delta State; it explored the ease of use, the effectiveness of SORMAS, its applicability, and the challenges with its use. Materials and Methods This descriptive qualitative study involved disease surveillance and notification officers (DSNOs) and their assistants DSNOs in the year 2022; 25 of them were interviewed using two audio tape recorders after consent was obtained. Ethical clearance was obtained from the appropriate body. Thematic content analysis, with the help of Analysis of Qualitative Data software, was used to analyze data. Results The findings showed that SORMAS was difficult to use for 100% of the respondents, particularly at the initial time, and subsequent use was relatively easy. About 100% of users found SORMAS to be effective for coronavirus disease 2019 surveillance and claimed it could be applied to other health diseases. About 100% of the respondents had challenges which included network problems, unavailability of adequate airtime, low technological know-how, software glitch, and hardware issues, among others. Conclusion This study helped to outline the factors affecting SORMAS use, demonstrated that SORMAS was relatively easy to use after repeated training, was deemed effective by all respondents; applied to other health diseases, and its use was affected by several challenges.
Article
Full-text available
This paper first introduces the reader to problem based learning and builds a case for implement-ing it in accounting. A problem suitable for introducing this approach in the AIS course is then presented. Two possible solutions to the problem are then presented using the MS Office Desktop. The first solution involves the use of dynamic data exchange (DDE) between Word and Excel and the second solution utilizes the reporting capabilities of Access. This is a very modest attempt at introducing this instructional approach in that it is introduced as part of a course rather than a redesign of a complete course or curriculum.
Article
As e-leaming proliferates in the business and academic communities, there is an ongoing need to evaluate its effectiveness. This paper investigates the experiences and perceptions of students who completed self-paced, independent study online courses as a project within a traditional, instructorled graduate course. This project was conducted over two semesters utilizing both technical and non-technical learning units. While the project produced some positive outcomes, participants' reactions provide important insight about the challenges, limitations, and benefits of e-learning. Among the intriguing findings is that technical e-leaming units were evaluated less favorably by users than non-technical units. The results raise implications for online teaming unit design and future e-leaming research.
Article
This study reports on how small retailers are adopting IT for their entrepreneurial venture. Three antecedents are posited to influence the information technology adoption in small business environments: (1) the owner's perception of the relative advantage of using information technology, (2) social expectations of information technology use, and (3) the owner's innovativeness in managing their own business. Seventy-one small business owners participated in the study. Our results suggest that among these three key drivers of adoption, the firm's innovativeness is the strongest determinant for adopting traditional information systems. However, in adopting Internet related technologies, the owner's positive perception of the relative advantage of using information technology plays the most critical role. Social expectation does not seem to directly influence the adoption level in either case, but exhibits indirect influence on perceived relative advantage and in turn on the level of Internet adoption. A structural equation model is presented with interpretations based on the strategic management literature, followed by a discussion on implications of these findings.
Article
The growing sophistication of computer applications and the increasing diversity of end users have heightened the importance of and need for end user computer training. Therefore, understanding factors that influence learning performance in computer training continues to be an important issue for information systems research, education, and practice. This paper presents and empirically tests a model of learning performance in computer training. The model assesses the direct influence of computer self-efficacy, computer attitudes, and computer experience and the patterns of relationships among these variabies in which they influence learning performance. The results indicate that computer self-efficacy and computer experience had direct and positive effects on learning performance. However, computer attitudes had indirect effect on learning performance through their direct effect on computer self-efficacy. Additionally, computer attitudes and computer experience had positive effects on computer self-efficacy. The results offer practical implications for selecting and preparing individuals for training and designing computer training content.
Article
The adoption of information technology represents a problem of magnitude to small business entrepreneurs. Comparing to larger corporations with abundant resources, small business owners are facing different challenges. Thus, the technology adoption behavior seems to be different for them. This study reports on antecedent drivers of Internet technologies' adoption in small businesses. A behavioral model was developed based on prior research on innovation adoption in small businesses. The model posits relationships of the relative advantage of using IT, compatibility, ease of use, computer self-efficacy, financial slacks of the firm, innovativeness of the firm, image of IT, and competitive pressure against adoption of four different Internet technologies - email, business homepage, e-sales and e-procurement. The results confirm the strong association of computer self-efficacy, compatibility, image, financial slack and relative advantage with Internet technology adoption. Different patterns of adoption behavior across different technologies were revealed. Theoretical and practical implications are discussed.
Article
Research has examined the role of technology in instruction and corporate training for over three decades. Advances in communication and computing technologies, coupled with the wide availability of the Internet, have spurred additional interest in technology-mediated and distance education programs. Yet, it is important to realize that technology can both enhance and hinder education. In this paper, we report the results of a field study conducted to understand how a particular set of individual characteristics, anxiety associated with computers and apprehension of oral and written communications, can lead to anxiety of using computers to communicate (anxiety associated with the use of email) and how this resulting anxiety might influence learning in a technology-mediated environment. Our results indicate that these anxieties are significant, influential factors in an individual's e-Learning experience. Anxiety with computers and apprehension of oral communication, with email familiarity explained 68% of the variance in the resulting anxiety associated with the use of email. This email anxiety and computer familiarity accounted for 22% of the variance in email use. Email use and age accounted for 11% of the variance in learner performance. These results highlight the relevance of individual-level anxiety characteristics and their importance in evaluating e-Learning programs. Implications for practice and directions for future research are discussed.
Article
This study analyzes the differences in the beliefs of small business executives regarding the adoption of web-based e-commerce. Based on the Theory of Planned Behavior, behavioral, normative and control beliefs were compared of small business executives who had already adopted web-based e-commerce and those who had not yet adopted web-based e-commerce. There was a statistically significant difference between the two groups regarding the behavioral beliefs of enhancing the distribution of information, improving information accessibility, improving communication and increasing the speed with which the company gets things done. There was also a difference in the two groups regarding security, cost and training issues related to web-based e-commerce. Finally, there was a difference in the normative beliefs of the two groups. The adopters were influenced more by their social referent groups than were the non-adopters.
Article
The influence of prior experience on personal computer utilization was examined through an extension of a conceptual model developed and tested previously. Respondents were classified on the basis of their self-reported skill level and length of time having used personal computers. Three competing ways of modeling the influence of experience were tested: (1) a direct influence, (2) an indirect influence through six distinct attitude and belief components, and (3) a moderating influence on the relations between the attitude/belief components and utilization. The results suggested that experience influenced utilization directly, that indirect influences were present but less pronounced, and that the moderating influence of experience on the relations between five of six antecedent constructs and utilization was generally quite strong. For researchers, the implications are that prior experience with an information technology (IT) is an important factor to include when developing, testing, or applying models of IT adoption and use. For practitioners, the results highlight the importance of emphasizing applicability of the information technology to the current job and professional development early in the adoption process, with more emphasis on future benefits as experience is gained.