Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Unified theory of acceptance and use of technology

Journals

  • IJIEC (726)
  • MSL (2637)
  • DSL (649)
  • CCL (495)
  • USCM (1092)
  • ESM (404)
  • AC (557)
  • JPM (247)
  • IJDS (912)
  • JFS (91)
  • HE (21)
  • SCI (0)

Keywords

Jordan(161)
Supply chain management(160)
Vietnam(148)
Customer satisfaction(120)
Performance(113)
Supply chain(108)
Service quality(98)
Tehran Stock Exchange(94)
Competitive advantage(93)
SMEs(86)
optimization(84)
Financial performance(83)
Trust(81)
Job satisfaction(79)
Social media(78)
Factor analysis(78)
TOPSIS(78)
Knowledge Management(77)
Genetic Algorithm(76)
Sustainability(76)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(59)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Dmaithan Almajali(35)
Barween Al Kurdi(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Ahmad Makui(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Sautma Ronni Basana(27)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2162)
Indonesia(1276)
Jordan(783)
India(779)
Vietnam(500)
Saudi Arabia(438)
Malaysia(438)
United Arab Emirates(220)
China(181)
Thailand(151)
United States(109)
Turkey(102)
Ukraine(99)
Egypt(95)
Canada(89)
Pakistan(84)
Peru(83)
United Kingdom(77)
Nigeria(77)
Morocco(73)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Factors affecting cybersecurity awareness: A qualitative study in Saudi Arabia Pages 751-762 Right click to download the paper Download PDF

Authors: Tariq Saleh, Raed Kanaan, Rania Alzubaidi, Ghassan Ghazi Kanaan, Marko Nino

DOI: 10.5267/j.uscm.2024.12.005

Keywords: Cybersecurity awareness, Information security, Unified theory of acceptance and use of technology, Technology acceptance model, Thematic analysis, Protection motivation theory

Abstract:
The objective of this research was to gain a deeper comprehension of how individuals perceive and respond to cybersecurity and how various internal and external factors influence these behaviors and attitudes. Conducted at ABC organization in Saudi Arabia, the study employed the qualitative methodology. Two online focus groups were employed featuring open-ended questions. The data were subsequently analyzed thematically using inductive and deductive coding techniques. Several theories were used as theoretical lenses to analyze the data. After the collected data had been analyzed, three main themes emerged: (a) perceived safeguards and threats, (b) personal and professional experience in information security, and (c) necessity of education and raising awareness. Additionally, two sub-themes were revealed: (a) costs and benefits and (b) necessity of safeguard measures and attaining trust. The study’s identified themes and sub-themes offer a thorough comprehension of the demographic, social, cultural, and internalized factors influencing cybersecurity-related behavior. The identified themes could potentially be applicable to other settings. Future qualitative research could further explore the transferability of these findings by conducting similar studies in different organizational, cultural, and linguistic contexts. It is also recommended for future quantitative research to delve deeper than surface-level data and consider underlying meaning, factors, connections, or relationships that may skew the results. It is crucial to delve into hidden meanings, not just accept data at face value.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: USCM | Year: 2025 | Volume: 13 | Issue: 4 | Views: 895 | Reviews: 0

 
2.

Determinants of smart government continuous use: A two-staged structural equation modeling-artificial neural network approach Pages 351-368 Right click to download the paper Download PDF

Authors: Nuseiba Altarawneh, Omar Hujran

DOI: 10.5267/j.ijdns.2025.9.014

Keywords: Smart government, e-government, Post-adoption, Unified theory of acceptance and use of technology, Expectation confirmation model, United Arab Emirates

Abstract:
This study aimed to develop and empirically validate an integrated model for continuous smart government service usage. This model integrates constructs from the unified theory of acceptance and use of the technology framework with the expectation-confirmation model, along with an additional construct: trust. Structural equation modeling (SEM) was used to analyze data collected via online questionnaires from 369 people who utilized smart government services in the United Arab Emirates. Next, an artificial neural networks model was used to rank the relative influence of the significant predictors identified through SEM analysis. The findings reveal that, among the significant predictors affecting the continuous use of smart government services, facilitating conditions, satisfaction, and perceived usefulness had the most substantial impact. Furthermore, this study highlights the direct influence of perceived usefulness, confirmation, facilitating conditions, effort expectancy, social influence, and public trust on citizen satisfaction.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 1 | Views: 7 | Reviews: 0

 
3.

Identifying factors affecting acceptance of new technology in the industry using hybrid model of UTAUT and FUZZY DEMATEL Pages 2383-2392 Right click to download the paper Download PDF

Authors: Mojtaba Javidnia, Somaye Nasiri, Jamshid kiani far

DOI: 10.5267/j.msl.2012.08.003

Keywords: Electro-Slag Remelting (ESR), FUZZY DEMATEL(UTAUT), Unified Theory of Acceptance and Use of Technology

Abstract:
Today and in highly competitive and fast-paced arena of the world, industrial companies focus on achieving technological superiority through the effective use of world modern-day technologies in the production and operation process associated with all their available resources. With using this procedure, these industrial companies try to achieve long-term and sustainable competitive advantages. On the other hand, applying world modern technologies does not solely guarantee success of these companies, rather, preparing preliminary grounds associated with the acceptance of technology will be decisive in this field. This article deals with clarifying factors affecting the adoption of new technologies and showing relationship of these factors together. For this purpose, Unified Theory of Acceptance and Use of Technology (UTAUT) Model has been used to study factors affecting the adoption of new technologies. In the same direction, relationship between constituent components of this model has been studied with regard to the acceptance of new technology of Electro-Slag Remelting (ESR) in Esfarayen Steel Industry Complex using FUZZY DEMATEL Technique.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: MSL | Year: 2012 | Volume: 2 | Issue: 7 | Views: 3211 | Reviews: 0

 

® 2010-2025 GrowingScience.Com