Towards a nuanced explanation of technology adoption determinants
This research proposes that the adoption of business technology should be viewed through a new lens. This is parallel with the foundational knowledge of practice that suggests the decision to adopt a new business technology should be treated as a multi-level where the level of importance of each ado...
| Main Authors: | Salim, Siti Aisyah, Mohamad Rasli, Roznim, Abdul Aziz, Nor Azah, Mohd Razali, Fadhlina, Mohammed, Siti Asma |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
American Scientific Publishers
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/57705/ http://irep.iium.edu.my/57705/1/57705_Towards%20a%20Nuanced%20Explanation%20of%20Technology_MYRA.pdf http://irep.iium.edu.my/57705/2/57705_Towards%20a%20Nuanced%20Explanation%20of%20Technology_WOS.pdf |
Similar Items
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019)
by: Salami, Ahmed, et al.
Published: (2019)
Factors affecting instructors' adoption of learning management systems: a theoretical framework
by: Abdallah, Nahel A. O., et al.
Published: (2016)
by: Abdallah, Nahel A. O., et al.
Published: (2016)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)
by: Mohammed, Siti Asma, et al.
Published: (2019)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018)
by: Shaikh, Humaiz, et al.
Published: (2018)
International collaboration in information and communication technology of Malaysian scholars
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children
with autism spectrum disorder (ASD)
by: Khowaja, Kamran, et al.
Published: (2020)
by: Khowaja, Kamran, et al.
Published: (2020)
Resolving ethical dilemma in technology enhanced education through smart mobile devices
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan
by: Soomro, Ali Raza, et al.
Published: (2015)
by: Soomro, Ali Raza, et al.
Published: (2015)
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Influence of travel and tour website on tourist behaviour to determine destination in Malaysia among IIUM students in Pagoh, Johor.
by: Borahan, Nur Saiful Amree, et al.
Published: (2020)
by: Borahan, Nur Saiful Amree, et al.
Published: (2020)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Library online database system for undergraduate students
by: Azlan, Nor Athira, et al.
Published: (2016)
by: Azlan, Nor Athira, et al.
Published: (2016)
The system architecture of E-braille by using the microcontroller and external controller unit
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
Managing flood in the context of education, research and partnership in Malaysia
by: Maidin, Siti Sarah, et al.
Published: (2019)
by: Maidin, Siti Sarah, et al.
Published: (2019)
Governance framework for flood disaster in Malaysia: integration of COBIT and Hyogo principles
by: Maidin, Siti Sarah, et al.
Published: (2019)
by: Maidin, Siti Sarah, et al.
Published: (2019)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Information sharing in governance of flood management in Malaysia: COBIT based framework
by: Maidin, Siti Sarah, et al.
Published: (2014)
by: Maidin, Siti Sarah, et al.
Published: (2014)
Factors influence novice programmers toward test first approach
by: Yahya, Norzariyah, et al.
Published: (2019)
by: Yahya, Norzariyah, et al.
Published: (2019)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014)
by: Badron, Khairayu, et al.
Published: (2014)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Design of an intelligent robotic donationbox a case study
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Critical infrastructure protection of ICT in Muslim world
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Similar Items
-
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018) -
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019) -
Factors affecting instructors' adoption of learning management systems: a theoretical framework
by: Abdallah, Nahel A. O., et al.
Published: (2016) -
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016) -
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)