How to cite this paper
Marsofiyati, S., Zain, N., Eryanto, H & Usman, O. (2020). Measuring the level of community desire to use GWJ application in office activities.Management Science Letters , 10(6), 1251-1258.
Refrences
Ahmad, M. I. (2014). Unified theory of acceptance and use of technology (UTAUT): A decade of validation and development. Proceedings of the 4th International Conference on ICT in Our Lives (ISSN 2314–8942).
Arifin, M. Y., Suswandi, P. E., & Adenan, M. (2015). Pengaruh Pengeluaran Pemerintah Sektor Kesehatan, Pengeluaran Pemerintah Sektor Pendidikan dan Pertumbuhan Ekonomi terhadap Indeks Pembangunan Manusia Jawa Timur 2006-2013. Artikel Ilmiah Mahasiswa.
Brown, S.A., Dennis, A.R., & Venkatesh, V. (2016). Predicting collaboration technology use: integrating technology adoption and collaboration research. Journal of Management Information Systems,. 27(2), 9-53.
Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30.
Garone, A., Pynoo, B., Tondeur, J., Cocquyt, C., Vanslambrouck, S., Bruggeman, B., & Struyven, K. (2019). Clustering university teaching staff through UTAUT: Implications for the acceptance of a new learning management system. British Journal of Educational Technology, 50(5), 2466–2483. https://doi.org/10.1111/bjet.12867
Kocaleva, M., Stojanovic, I., & Zdravev, Z. (2014). Research on UTAUT application in higher education institutions. In: ITRO 2014, 27 June 2014. Zrenjanin, Serbia.
Liebenberg, J., Benade, T., & Ellis, S. (2018). Acceptance of ICT: Applicability of the Unified Theory of Acceptance and Use of Technology (UTAUT) to South African Students. The African Journal of Information Systems, 10(3), 1.
Martin, H.S., & Herrero, A. (2012). Influence of the user’s psychological factors on the online purchase intention in rural tourism: integrating innovativeness to the UTAUT framework. Tourism Management, 33(2),. 341-350.
Momani, A. M., & Jamous, M. (2017). The Evolution of Technology Acceptance Theories.
Ozyilmaz, A., Erdogan, B., & Karaeminogullari, A. (2018). Trust in organization as a moderator of the relationship be-tween self‐efficacy and workplace outcomes: A social cognitive theory‐based examination. Journal of Occupational and Organizational Psychology, 91(1), 181-204.
Park, N., Lee, K. M., & Cheong, P. H. (2008). University instructors’ acceptance of electronic courseware: An ap-plication of the technology acceptance model. Journal of Computer-Mediated Communication, 13(1), 163–186.
Pynoo, B., Devolder, P., Tondeur, J., Van Braak, J., Duyck, W., & Duyck, P. (2011). University students’ ac-ceptance of a web-based course management system. In T. Teo (Ed.), Technology acceptance in education. Leiden, The Netherlands: Sense Publishers.
Rahi, S., Ghani, M., Alnaser, F., & Ngah, A. (2018). Investigating the role of unified theory of acceptance and use of technology (UTAUT) in internet banking adoption context. Management Science Letters, 8(3), 173–186.
Skinner, E. A., Kindermann, T. A., Connell, J. P., & Wellborn, J. G. (2009). Engagement as an organizational construct in the dynamics of motivational development (Handbook o; Malwah, ed.). NJ: Erlbaum.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly,. 425–478.
Venkatesh, V., Thong, J.Y.L., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly,. 36(1), 157-178.
West, R. (2008). The psychology of security. Communications of the ACM,. 51(4), 34-40.
Whitman, M. E. (2004). In defense of the realm: understanding the threats to information security. International Journal of Information Management, 24(1), 43–57.
Yayla, A. A. (2011). Controlling insider threats with information security policies. In ECIS. 242.
Yildiz, E. (2018). A Case Study on Relationships Between Psychological Capital, Personality and Organizational Commitment. International Journal of Business Administration, 9(2), 99. https://doi.org/10.5430/ijba.v9n2p99
Zhou, T., Lu, Y., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior,. 26(4), 760-767.
Arifin, M. Y., Suswandi, P. E., & Adenan, M. (2015). Pengaruh Pengeluaran Pemerintah Sektor Kesehatan, Pengeluaran Pemerintah Sektor Pendidikan dan Pertumbuhan Ekonomi terhadap Indeks Pembangunan Manusia Jawa Timur 2006-2013. Artikel Ilmiah Mahasiswa.
Brown, S.A., Dennis, A.R., & Venkatesh, V. (2016). Predicting collaboration technology use: integrating technology adoption and collaboration research. Journal of Management Information Systems,. 27(2), 9-53.
Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30.
Garone, A., Pynoo, B., Tondeur, J., Cocquyt, C., Vanslambrouck, S., Bruggeman, B., & Struyven, K. (2019). Clustering university teaching staff through UTAUT: Implications for the acceptance of a new learning management system. British Journal of Educational Technology, 50(5), 2466–2483. https://doi.org/10.1111/bjet.12867
Kocaleva, M., Stojanovic, I., & Zdravev, Z. (2014). Research on UTAUT application in higher education institutions. In: ITRO 2014, 27 June 2014. Zrenjanin, Serbia.
Liebenberg, J., Benade, T., & Ellis, S. (2018). Acceptance of ICT: Applicability of the Unified Theory of Acceptance and Use of Technology (UTAUT) to South African Students. The African Journal of Information Systems, 10(3), 1.
Martin, H.S., & Herrero, A. (2012). Influence of the user’s psychological factors on the online purchase intention in rural tourism: integrating innovativeness to the UTAUT framework. Tourism Management, 33(2),. 341-350.
Momani, A. M., & Jamous, M. (2017). The Evolution of Technology Acceptance Theories.
Ozyilmaz, A., Erdogan, B., & Karaeminogullari, A. (2018). Trust in organization as a moderator of the relationship be-tween self‐efficacy and workplace outcomes: A social cognitive theory‐based examination. Journal of Occupational and Organizational Psychology, 91(1), 181-204.
Park, N., Lee, K. M., & Cheong, P. H. (2008). University instructors’ acceptance of electronic courseware: An ap-plication of the technology acceptance model. Journal of Computer-Mediated Communication, 13(1), 163–186.
Pynoo, B., Devolder, P., Tondeur, J., Van Braak, J., Duyck, W., & Duyck, P. (2011). University students’ ac-ceptance of a web-based course management system. In T. Teo (Ed.), Technology acceptance in education. Leiden, The Netherlands: Sense Publishers.
Rahi, S., Ghani, M., Alnaser, F., & Ngah, A. (2018). Investigating the role of unified theory of acceptance and use of technology (UTAUT) in internet banking adoption context. Management Science Letters, 8(3), 173–186.
Skinner, E. A., Kindermann, T. A., Connell, J. P., & Wellborn, J. G. (2009). Engagement as an organizational construct in the dynamics of motivational development (Handbook o; Malwah, ed.). NJ: Erlbaum.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly,. 425–478.
Venkatesh, V., Thong, J.Y.L., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly,. 36(1), 157-178.
West, R. (2008). The psychology of security. Communications of the ACM,. 51(4), 34-40.
Whitman, M. E. (2004). In defense of the realm: understanding the threats to information security. International Journal of Information Management, 24(1), 43–57.
Yayla, A. A. (2011). Controlling insider threats with information security policies. In ECIS. 242.
Yildiz, E. (2018). A Case Study on Relationships Between Psychological Capital, Personality and Organizational Commitment. International Journal of Business Administration, 9(2), 99. https://doi.org/10.5430/ijba.v9n2p99
Zhou, T., Lu, Y., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior,. 26(4), 760-767.