American Journal of Information Systems
ISSN (Print): 2374-1953 ISSN (Online): 2374-1988 Website: https://www.sciepub.com/journal/ajis Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
American Journal of Information Systems. 2024, 9(1), 11-18
DOI: 10.12691/ajis-9-1-2
Open AccessArticle

Creating and Verifying Empirical Evidence for Information Technology Acceptance

Aysha Siddiky Pinky1, , Tughlok Talukder2, Saddam Nasir Chowdhury3, Ashrafuzzaman Hera4, Dr. Nure Alam Khan5, Md Omar Faruque6 and Prof. Dr. Mohammed Julfikar Ali6

1MBA in Digital Strategic Marketing Westcliff University, Los Angeles, California. United

2Master of Business Administration in Management Information Systems, International American University, Los Angeles, California. United

3Doctorate of Business Administration (DBA), International American University, Los Angeles, California. United States

4Master of Business Administration in Management Information Systems, International American University, Los Angeles, California. United States

5Head of Department, Department of HRM, Fareast International University. Dhaka, Bangladesh

6Master of Business Administration in Management Information Systems, International American University, Los Angeles, California. United States School of Business & Economics, Presidency University

Pub. Date: October 28, 2024

Cite this paper:
Aysha Siddiky Pinky, Tughlok Talukder, Saddam Nasir Chowdhury, Ashrafuzzaman Hera, Dr. Nure Alam Khan, Md Omar Faruque and Prof. Dr. Mohammed Julfikar Ali. Creating and Verifying Empirical Evidence for Information Technology Acceptance. American Journal of Information Systems. 2024; 9(1):11-18. doi: 10.12691/ajis-9-1-2

Abstract

This paper explores the IT acceptance constructs with an emphasis on extending and testing new IT acceptance constructs that can complement existing models such as the TAM and UTAUT. Historical structures, however, remain inadequate, especially considering the technological innovations and organizational peculiarities of sub-sectors like health, commerce, and civil service. The paper points out those existing models often incorporate end-of-the-pipe technologies that must align with today's IT systems, such as cloud computing, mobile applications, and artificial intelligence. Because IT is gradually expanding its penetration into various sectors of the economy and society, the factors that contribute to acceptance become more specific to the context of the process, which re-examines and improves traditional IT acceptance models. The research proposes advanced constructs to overcome these challenges that consider current technology vulnerabilities. Pioneers have created these constructs to capture the modern technological context and address data privacy, cyber security, and user agency issues. Hence, this research uses empirical evidence to assess the validity of these new constructs with the different industries and technologies. This study uses a deductive research approach to test theories derived from questionnaire data. Based on this, the sample size of the 150 participants is considered sufficient to guarantee the reliability of conclusions and measures' validity. Measurement data is performed using structured questionnaires, emphasizing key factors such as perceived usefulness, perceived ease of use, perceived behavioural control and perceived social pressure. The research works concerning early results show an inefficacy of the traditional models in depicting the present-day advertisement of IT infrastructure. Several newly developed concepts relevant to data privacy and cyber security become crucial antecedents of IT acceptance, contribution, and usage. The validity of these constructs is established by conducting a statistical analysis of the constructed models that can be used to explain behavior in different industry contexts. The study's contributions are twofold: It contributes to theoretical knowledge of IT acceptance by proposing and establishing new variables for consideration, Moreover, it enlightens practitioners of organizations that are seeking to increase the rate of end user adoption of embraced technologies. It focuses on the issues unaddressed by current models and casts light on the modern technological factors influencing IT acceptance in the modern rapidly advancing technological environment.

Keywords:
Information Technology (IT) Acceptance Models Constructs Empirical Validation and User Behavior

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Class, D. (2024). Importance of information technology in today world - Digital Class. Blogs - Digital Class. https:// www.digitalclassworld.com/blog/importance-of-information-technology/#google_vignette.
 
[2]  Taherdoost, H. (2018). A review of technology acceptance and adoption models and theories. Procedia Manufacturing, 22, 960-967.
 
[3]  Bajwa, J., Munir, U., Nori, A., & Williams, B. (2021). Artificial intelligence in healthcare: transforming the practice of medicine. Future Healthcare Journal, 8(2), e188–e194. NCBI.
 
[4]  Marikyan, D., & Papagiannidis, S. (2021). Theory Hub. Open.ncl.ac.uk. https://open.ncl.ac.uk/theories/2/unified-theory-of-acceptance-and-use-of-technology/.
 
[5]  Dhagarra, D., Goswami, M., & Kumar, G. (2020). Impact of Trust and Privacy Concerns on Technology Acceptance in Healthcare: An Indian Perspective. International Journal of Medical Informatics, 141, 104164. https:// www.sciencedirect.com/ science/article/pii/ S1386505620302276#bib0390.
 
[6]  Jalo, H., & Pirkkalainen, H. (2024). Effect of user resistance on the organizational adoption of extended reality technologies: A mixed methods study. International Journal of Information Management, 75, 102731.
 
[7]  Dwivedi, Y. K., Ismagilova, E., Hughes, D. L., & Carlson, J. (2021). Setting the Future of Digital and Social Media Marketing research: Perspectives and Research Propositions. International Journal of Information Management, 59(1), 1–37. Sciencedirect.
 
[8]  Phichitchaisopa, N., & Naenna, T. (2013). Factors affecting the adoption of healthcare information technology. EXCLI Journal, 12, 413-436. https:// www.ncbi.nlm.nih.gov/ pmc/ articles/ PMC4566918/.
 
[9]  Alsyouf, A., Lutfi, A., Alsubahi, N., Alhazmi, F. N., Al-Mugheed, K., Anshasi, R. J., Alharbi, N. I., & Albugami, M. (2023). The Use of a Technology Acceptance Model (TAM) to Predict Patients’ Usage of a Personal Health Record System: The Role of Security, Privacy, and Usability. International Journal of Environmental Research and Public Health, 20(2), 1347. ,https:// www.ncbi.nlm.nih.gov/ pmc/articles/PMC9859518/.
 
[10]  Abbad, M. M. M. (2021). Using the UTAUT model to understand students’ usage of e-learning systems in developing countries. Education and Information Technologies, 26.
 
[11]  Okazaki, S., Eisend, M., Plangger, K., Ruyter, K. de, & Grewal, D. (2020). Understanding the Strategic Consequences of Customer Privacy Concerns: A Meta-Analytic Review. Journal of Retailing, 96(4).
 
[12]  Burr, C., Taddeo, M., & Floridi, L. (2020). The ethics of digital well-being: A thematic review. Science and Engineering Ethics, 26.
 
[13]  Kim, Y. J., Choi, J. H., & Fotso, G. M. N. (2024). Medical professionals’ adoption of AI-based medical devices: UTAUT model with trust mediation. Journal of Open Innovation: Technology, Market, and Complexity, 10(1), 100220.
 
[14]  Ammenwerth, E. (2019). Technology Acceptance Models in Health Informatics: TAM and UTAUT. Studies in Health Technology and Informatics, 263, 64-71.
 
[15]  Camilleri, M. A. (2024). Factors affecting performance expectancy and intentions to use ChatGPT: Using SmartPLS to advance an information technology acceptance framework. Technological Forecasting and Social Change, 201, 123247.
 
[16]  Gesk, T. S., & Leyer, M. (2022). Artificial intelligence in public services: When and why citizens accept its usage. Government Information Quarterly, 39(3), 101704.
 
[17]  Rivadeneira, J. E., Sá Silva, J., Colomo-Palacios, R., Rodrigues, A., & Boavida, F. (2023). User-centric privacy preserving models for a new era of the Internet of Things. Journal of Network and Computer Applications, 217, 103695.
 
[18]  Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability, 15(18), 13369.
 
[19]  Chen, Y., Khalid Khan, S., Shiwakoti, N., Stasinopoulos, P., & Aghabayk, K. (2023). Analysis of Australian public acceptance of fully automated vehicles by extending technology acceptance model. Case Studies on Transport Policy, 14, 101072.
 
[20]  Yan, F., Li, N., Iliyasu, A. M., Salama, A. S., & Hirota, K. (2023). Insights into security and privacy issues in smart healthcare systems based on medical images. Journal of Information Security and Applications, 78, 103621–103621.
 
[21]  Yeo, L. H., & Banfield, J. (2022). Human factors in electronic health records cybersecurity breach: An exploratory analysis. Perspectives in Health Information Management, 19(Spring). https:// www.ncbi.nlm.nih.gov/ pmc/ articles/PMC9123525/.
 
[22]  Shojaei, P., Gjorgievska, E. V., & Chow, Y.-W. (2024). Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review. Computers, 13(2), 41.
 
[23]  Yeng, P., Szekeres, A., Yang, B., & Snekkenes, E. A. (2019). A Framework for Healthcare Professionals’ Information Security Practice Analysis: Psycho-Socio-Cultural Context (Preprint). JMIR Human Factors.
 
[24]  Raza Nowrozy, Ahmed, K., Wang, H., & McIntosh, T. (2023). Towards a Universal Privacy Model for Electronic Health Record Systems: An Ontology and Machine Learning Approach. MDPI, 10(3), 60-60.