Conference PaperPDF Available

MEDIATING EFFECT OF RESISTANCE TO CHANGE BETWEEN TRUSTWORTHINESS AND BEHAVIOURAL INTENTION OF IPV6 ADOPTION IN HIGHER EDUCATION INSTITUTIONS (PILOT STUDY)

Authors:

Abstract

This research paper presents the results of a pilot study as part of a PhD study in technology management which explores the adoption of Internet protocol (IPv6) in a higher education institution (HEIs). This paper presents an application of the extended unified theory of acceptance and use technology (UTAUT-2) model. The model was adapted with a new construct which is trustworthiness. Trustworthiness includes two factors, trust in technology (TiT) and trust in government (TiG). This paper was organized as follows, an introduction to the paper followed by a literature review, then the methodology used, the study instrument, and lastly the research findings. This paper presents the result of our pilot study including the validity and reliability of the questionnaire based on UTAUT-2 constructs. The sample for this pilot study consisted of 30 out of 234 respondents whom approached for the quantitative survey. The Structural Equation Model (SEM) that includes Cronbach's Alpha (CA), Composite Reliability (CR), Average Variance Extracted (AVE) was used to get the results. The result of this analysis confirms that the survey is valid and reliable to adopt UTAUT-2 model extended with (TiT) and (TiG) for exploring the adoption of IPv6 protocol.
MEDIATING EFFECT OF RESISTANCE TO CHANGE BETWEEN
TRUSTWORTHINESS AND BEHAVIOURAL INTENTION OF IPV6
ADOPTION IN HIGHER EDUCATION INSTITUTIONS
(PILOT STUDY)
Issa Alghatrifi 1, Haliyana Khaild *2
1, 2 Azman Hashim International Business School UTM, Universiti Teknologi Malaysia, Jalan
Sultan Yahya Petra, 54100 Kuala Lumpur.
(E-mail: issa1980@graduate.utm.my, *haliyana@utm.my)
ABSTRACT
This research paper presents the results of a pilot study as part of a PhD study in technology management which
explores the adoption of Internet protocol (IPv6) in a higher education institution (HEIs). This paper presents
an application of the extended unified theory of acceptance and use technology (UTAUT-2) model. The model
was adapted with a new construct which is trustworthiness. Trustworthiness includes two factors, trust in
technology (TiT) and trust in government (TiG). This paper was organized as follows, an introduction to the
paper followed by a literature review, then the methodology used, the study instrument, and lastly the research
findings. This paper presents the result of our pilot study including the validity and reliability of the
questionnaire based on UTAUT-2 constructs. The sample for this pilot study consisted of 30 out of 234
respondents whom approached for the quantitative survey. The Structural Equation Model (SEM) that includes
Cronbach’s Alpha (CA), Composite Reliability (CR), Average Variance Extracted (AVE) was used to get the
results. The result of this analysis confirms that the survey is valid and reliable to adopt UTAUT-2 model
extended with (TiT) and (TiG) for exploring the adoption of IPv6 protocol.
Keywords: IPv6, UTAUT-2, CA, CR, AVE
INTRODUCTION
The Internet Protocol Version 6 (IPV6) migration, which started in 1995, has been a
relatively new research field in recent decades as the rate of IPv6 use worldwide has
accelerated in recent years. Sultanate of Oman has taken significant steps to develop the
information communication technology (ICT) infrastructure and policy and regulatory
framework to cope with the migration to IPV6 protocol. Based on Telecommunications
Regulatory Authority of Oman (TRA) report, there are still lots of Omani higher education
institutions (HEI’s) that have not taken any steps towards the adoption of the new protocol
[1]. Therefore, one way of ensuring the actual adoption of IPv6 protocol is to explore and
ascertain the factors that play a major role towards the adoption IPv6 protocol in these
institutions. However, there are no studies that have provided empirical evidence on the
IGCESH2020
Universiti Teknologi Malaysia, Johor Bahru, Malaysia 17 -19 August 2020
factors that affect the adoption of IPv6 protocol within the context of Oman higher education
institutions [1]. The aim of this pilot study is to investigate the validity and reliability of the
research instrument. Based on our preliminary study, this pilot test is to be the start of an in-
depth study in the future. The researchers used the unified theory of acceptance and use of
technology 2 (UTAUT-2) model for evaluating acceptance use and adoption of any new
technology as a baseline. Therefore, to seek associate positive or negative odds to the
successful adoption of IPV6 protocol, the investigation of the factors affecting the decision
made about IPV6 migration is essential. Various models have been developed to understand
the factors that drive end-user either to adopt or resist the technology [2,3]. Each of these
models, either adoption or resistance, collect end-user perspectives at a particular stage of
user exposure to a technology. Existing studies have investigated the behavior intention for
end-user to the technology either adoption or resistance [4]. The key finding for this study,
confirmed the applicability of this model to be adapted and use for investigation of any new
technology adoption. The constructs of the measurement model have no issues in terms of
reliability and construct validity. Moreover, this scholarly work opens the way for other
researchers for further work on this model and to conduct more investigation on the
compatibility of this model with the adoption of any new emerging technologies.
MAIN RESULTS
Reliability Test
The reliability of the questionnaire is essential because the validity of the questionnaire is
not sufficient to start collecting data if the questionnaire is not reliable [26]. Reliability is to
get the same result every time when a particular instrument is applied to the same target
group, where the measurement scale has no bias or errors[27, 28]. In information system
researches, the Cronbach alpha is a widely practiced method used for the measurement of
the degree of consistency in results and free of the difference caused by random errors [29,
30], it is the assessment of the internal consistency of multiple items to ensure that they
measure only one variable and the relationship with other variables [31, 19]. To ensure the
reliability of the questionnaire items, Cronbach's alpha should be equal to 0.70 or higher
(Cronbach Alpha ≥ 0.70) for confirmatory purposes [30], and the items with low reliability
can be removed [28]. However, to verify the reliability of the questionnaire, the researcher
needed to conducted a pilot test [32,19].To analyses the data collected for the study, the
researcher used the following descriptive statistics data: Cronbach’s Alpha, Composite
Reliability (CR), average variance extracted (AVE).
Table 1 reviews the descriptive statistics data to Cronbach's Alpha, Composite Reliability
and Average Variance Extracted (AVE) from initial data collected. The overall result of
Cronbach Alpha indicates that all items of those factors are reliable and can be used in this
study.
The Cronbach Alpha ranges between (0.707 to 0.963), and it is clear that the habit (HB)
factor has the lowest score of Cronbach's Alpha and the highest Cronbach's Alpha is for
hedonistic motivation (HM) factors. The Performance expectancy (PE) for example, which
is measured by four indicators as shown in table 1, scored (0.902) which is considered very
reliable because it is higher than the minimum reliability at (0.7) and that applies to the rest
of the factors and their indicators.
In addition, as for the consistency reliability, the literature suggests that an internal
consistency reliability can be termed satisfactory when it has a minimum value of 0.7 during
research’s early stage (Pilot Study) and values greater than 0.8 or 0.9 in an advanced stage
of a research and lower reliability when the values score lower than 0.6 [33]. Therefore, in
this study, constructs with values from 0.9, 0.8, 0.7 and above were considered excellent,
good, and acceptable for composite reliability and the Cronbach’ Alpha. In addition, items
in the variables that have values less than 0.5 are not acceptable and should be deleted [34].
According to [32], the evaluation of convergent validity is done using average variance
extracted (AVE).
This AVE must have value of at least 0.5 and that shows that a construct explains greater
part of the variance of its indicators and therefore, reveals adequate convergent validity.
Moreover, based on [32], when the outer loading for any indicator is < 0.40, we need to
delete the indicator. Moreover, when the outer loading is > 0.40 but < 0.70, we need to
analyze the impact of indicator deletion on AVE and composite reliability, if outer loading
is > 0.70, retain the indicator. Figure 1 Shows Average Variance Extracted (AVE) for all
factors.
Table 1: Descriptive statistics data (Cronbach's Alpha, CR, AVE)
Construct
Number of
Indicators
Cronbach's
Alpha
Composite
Reliability
Average Variance
Extracted (AVE)
BI
4
0.88
0.92
0.746
EE
4
0.924
0.946
0.813
FC
4
0.719
0.875
0.779
HB
4
0.707
0.832
0.622
HM
3
0.963
0.976
0.931
PE
4
0.902
0.934
0.783
PV
3
0.862
0.878
0.719
RC
3
0.799
0.886
0.798
SI
3
0.903
0.939
0.836
TA
7
0.928
0.946
0.778
TG
3
0.907
0.942
0.844
TT
5
0.929
0.945
0.777
Figure 1 Show the result for the Average Variance Extracted (AVE)
In short, all the above results shown that we have a high degree for reliability for each
construct, and it remained consistent with what it is supposed to measure. Therefore, the
research instrument of this study is reliable and ready to apply.
CONCLUSION
The reliability test confirmed that the model was set up in the appropriate way, and the
constructs of the measurement model have no issues in terms of reliability and construct
validity. All the obtained values indicated that all factors adjusted by UTAUT-2 model fit,
and in satisfactory degree. However, the result of this pilot study emphasizes the crucial to
expand our theoretical understandingis by using UTAUT-2 model to highlights promising
future research directions in information technology field as example, Internet of thing
(IOT), robots, cloud computing, big data , and artificial intelligence.
Acknowledgment: This research was supported by University of Teknologi Malaysia and
funded by TRC Oman. I thank our colleagues who provided us with insight and expertise
that assisted to complete this research.
REFERENCES
1. Musawi A, Shubair A, Samih S, Abraham V. Analytical Review on the Stakeholders
Perceptions about IPv6 Readiness and Their Implications to the Omani Higher
Education Institutions Al Musawi, Ali, Shubair A., Samih S., Abraham V, Alghatrifi,
Issa. 2018;111.
2. Venkatesh V, Morris M, Davis G, Davis F. User Acceptance Of Information
Technology: Toward A Unified View. MIS Q. 2003;27(3):425478.
3. Kim H. Quarterly to Information Investigating User Resistance Implementation : A
Status Quo Bias Systems Introduction. MIS Q. 2015;33(3):567582.
4. Bhattacherjee A, Lin CP. A unified model of IT continuance: Three complementary
perspectives and crossover effects. Eur J Inf Syst. 2015;24(4):364373.
5. Hair, J., Hult, G. T., Ringle, C., & Sarstedt M (2017). A Primer on Partial Least
Squares Structural Equation Modeling (PLS-SEM). SAGE, Inc.; 2017.
6. Babbie ER. The Basics of Social Research. 2013. 1-527.
7. Louis Cohen LM and KM. Research Methods in Education. 2007. 1638.
8. Cooper DR, Wittenberg PSS. Business Research Methods. TWELFTH ED. 2014. 1
692.
9. Garson GD. Partial Least Squares: Regression & Structural Equation Models. 2016.
132.
10. Hair JF, Sarstedt M, Hopkins L, Kuppelwieser VG. Partial least squares structural
equation modeling (PLS-SEM): An emerging tool in business research. Eur Bus Rev.
2014;26(2):106121.
11. Saunders M, Lewis P, Thornhill A. Research Methods for Business Students FiFth
Edition. 2013. 1-604.
12. Neuman WL. Social Research Methods: Qualitative and Quantitative Approaches.
2014. 1-594.
13. Mohajan HK. Two Criteria for Good Measurements in Research: Validity and
Reliability. Ann Spiru Haret Univ Econ Ser. 2017;17(4):5982.
14. The S, Entomologist F, Mar N, Wright JE, Spates GE, Talley J, et al. Thesis manual.
Environ Entomol [Internet]. 2012;76402(4):463542. Available from:
http://doi.wiley.com/10.1002/
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Reliability and validity are the two most important and fundamental features in the evaluation of any measurement instrument or tool for a good research. The purpose of this research is to discuss the validity and reliability of measurement instruments that are used in research. Validity concerns what an instrument measures, and how well it does so. Reliability concerns the faith that one can have in the data obtained from the use of an instrument, that is, the degree to which any measuring tool controls for random error. An attempt has been taken here to review the reliability and validity, and threat to them in some details.
Article
Full-text available
Purpose: We present partial least squares (PLS) as an evolving approach to structural equation modeling (SEM), highlight its advantages and limitations and provide an overview of recent research on the method across various fields. Design/methodology/approach: In this review article we merge literatures from the marketing, management, and management information systems fields to present the state-of-the art of PLS-SEM research. Furthermore, we meta-analyze recent review studies to shed light on popular reasons for PLS-SEM usage. Findings: PLS-SEM has experienced increasing dissemination in a variety of fields in recent years with non-normal data, small sample sizes and the use of formative indicators being the most prominent reasons for its application. Recent methodological research has extended PLS-SEM’s methodological toolbox to accommodate more complex model structures or handle data inadequacies such as heterogeneity. Research limitations/implications: While research on the PLS-SEM method has gained momentum during the last decade, there are ample research opportunities on subjects such as mediation or multigroup analysis, which warrant further attention. Originality/value: This article provides an introduction to PLS-SEM for researchers that have not yet been exposed to the method. The article is the first to meta-analyze reasons for PLS-SEM usage across the marketing, management, and management information systems fields. Our cross-disciplinary review of recent research on the PLS-SEM method also makes this article useful for researchers interested in advanced concepts.
Book
Full-text available
Hello everyone. The publishers have given me permission to upload chapter four and the contents pages. Unfortunately, I am unable to share any other chapters for copyright reasons. There is however a large amount of material on my YouTube channel marksaundersonresearchmethods. Mark
Article
Full-text available
Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empiri- cally compare the eight models and their exten- sions, (3) formulate a unified model that integrates elements across the eight models, and (4) empiri- cally validate the unified model. The eight models reviewed are the theory of reasoned action, the technology acceptance model, the motivational model, the theory of planned behavior, a model combining the technology acceptance model and the theory of planned behavior, the model of PC utilization, the innovation diffusion theory, and the social cognitive theory. Using data from four organizations over a six-month period with three points of measurement, the eight models ex- plained between 17 percent and 53 percent of the variance in user intentions to use information technology. Next, a unified model, called the Unified Theory of Acceptance and Use of Tech- nology (UTAUT), was formulated, with four core determinants of intention and usage, and up to four moderators of key relationships. UTAUT was then tested using the original data and found to outperform the eight individual models (adjusted
Article
This study presents a unified model of information technology (IT) continuance, by drawing upon three alternative influences that are presumed to shape continuance behavior: reasoned action, experiential response, and habitual response. Using a longitudinal survey of workplace IT continuance among insurance agents at a large insurance company in Taiwan, we demonstrate that the above influences are interdependent, complementary, and have crossover effects. This study advances IT continuance research by theorizing and validating a unifying model that extends prior perspectives and by explaining interrelationships between these perspectives.
Article
User resistance to information systems implementation has been identified as a salient reason for the failure of new systems and hence needs to be understood and managed. While previous research has explored the reasons for user resistance, there are gaps in our understanding of how users evaluate change related to a new information system and decide to resist it. In particular, missing in the explanation of user decision making is the concept of status quo bias, that is, that user resistance can be due to the bias or preference to stay with the current situation. Motivated thus, this study develops a model to explain user resistance prior to a new IS implementation by integrating the technology acceptance and resistance literatures with the status quo bias perspective. The results of testing the model in the context of a new enterprise system implementation indicate the central role of switching costs in increasing user resistance. Further, switching costs also mediate the relationship between other antecedents (colleague opinion and self-efficacy for change) and user resistance. Additionally, perceived value and organizational support for change are found to reduce user resistance. This research advances the theoretical understanding of user acceptance and resistance prior to a new IS implementation and offers organizations suggestions for managing such resistance.
The Basics of Social Research
  • E R Babbie
Babbie ER. The Basics of Social Research. 2013. 1-527.
Methods in Education
  • Louis Cohen
  • K M Research
Louis Cohen LM and KM. Research Methods in Education. 2007. 1-638.