Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Al-Ghaith, Waleed
- Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital
Abstract Views :216 |
PDF Views:156
Authors
Affiliations
1 Department of Information Systems, Shaqra University, Riyadh, SA
1 Department of Information Systems, Shaqra University, Riyadh, SA
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 7, No 4 (2015), Pagination: 105-117Abstract
This study examines the individuals' participation intentions and behaviour on Social Networking Sites (SNSs). For this purpose, the Technology Acceptance Model (TAM) is utilized and extended in this study through the addition of "perceived social capital" construct aiming to increase its explanatory power and predictive ability in this context. Data collected from a survey of 1100 participants and distilled to 657 usable sets has been analysed to assess the predictive power of proposed model via structural equation modelling. The model proposed in this study explains 56% of the variance in "Participation Intentions" and 55% of the variance in "Participation Behaviour". Participation of behavioural intention in the model' explanatory power was the highest amongst the constructs (able to explain 28% of usage behaviour). While, "Attitude" explain around 11% of SNSs usage behaviour. The study findings also show that "Perceived Social Capital" construct has a notable impact on usage behaviour, this impact came indirectly through its direct effect on "Attitude" and "Perceived Usefulness". Participation of "Perceived Social Capital" in the models' explanatory power was the third highest amongst the constructs. "Perceived Social Capital", alone explain around 9% of SNSs usage behaviour.Keywords
Adoption, Perceived Social Capital, Social Networking Sites, Technology Acceptance Model, Usage.- Emerging Applications on Smart Phones: The Role of Privacy Concerns and Its Antecedents on Smart Phones Usage
Abstract Views :157 |
PDF Views:74
Authors
Affiliations
1 Department of Information Systems, Shaqra University, (Imam Muhammad Ibn Saud Islamic University), Riyadh, SA
1 Department of Information Systems, Shaqra University, (Imam Muhammad Ibn Saud Islamic University), Riyadh, SA
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 13, No 2 (2021), Pagination: 43-65Abstract
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the ischolar_main causes of privacy concerns. The study proposed a model identifies the ischolar_main causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.Keywords
Mobile Phone, Information Boundary Theory, Communication Privacy Management Theory, Perceived Privacy Concerns, Theory of Planned Behavior.References
- CISCO. (2020). Cisco Annual Internet Report (2018–2023). Retrieved from CISCO Website https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf.
- Sutanto, J., Palme, E., Chuan-Hoo, T., & Chee Wei, P. (2013). ADDRESSING THE PERSONALIZATION-PRIVACY PARADOX: AN EMPIRICAL ASSESSMENT FROM A FIELD EXPERIMENT ON SMARTPHONE USERS. MIS Quarterly, 37(4), 1141-A5.
- Angwin, J., & Valentino-DeVries, J. (2011, April 22). Apple, Google Collect User Data. The Wall Street Journal, U.S. Edition. Retrieved from http://www.wsj.com/articles/SB10001424052748703983704576277101723453610
- Hutchinson, R. (2011, January 26). 50 Percent of iPhone Apps Can Track User Data. Applie News. Retrieved from http://www.geeky-gadgets.com/50-percent-of-iphone-apps-can-track-user-data-26-01-2011/
- Federal Trade Commission. (2015). Internet of things: Privacy & Security in a Connected World. Preliminary FTC Staff Report. Retrieved from Federal Trade Commission Website: (https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf).
- Banisar, D. (2014, December 8). National Comprehensive Data Protection/Privacy Laws and Bills 2014 Map. Retrieved from SSRN Website: http://ssrn.com/abstract=1951416
- Conger, S., Pratt, J. H. & Loch, K. D. (2013). Personal information privacy and emerging technologies. Info Systems J, 23, 401–417.
- DLA Piper. (2015). DLA Piper's Data Protection Laws of the World Handbook. Retrieved from DLA Piper Website: http://dlapiperdataprotection.com/#handbook/world-map-section
- Arab Social Media Report. (2014). Citizen Engagement and Public Services in the Arab World: The Potential of Social Media. Mohammed bin Rashid School of government, 1(6). Retrieved from Arab Social Media Report Website: http://www.arabsocialmediareport.com/
- Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27-41.
- Al-ghaith, W. (2015). Understanding Social Network Usage: impact of co-presence, intimacy, and immediacy. International Journal of Advanced Computer Science and Applications (IJACSA), 6(8), 99-111.
- RFID World Canada. (2015). Billion Dollar Mobile Payment Industry Using Secure NFC Technology Projected to Continue Strong Growth. Retrieved from RFID World Canada Website: http://www.rfidworld.ca/billion-dollar-mobile-payment-industry-using-secure-nfc-technology-projected-to-continue-strong-growth/2418
- Giorgia, G., Teunissena, P., Verhagena, S. & Buista, P. (2010). GNSS remote sensing: testing a new multivariate GNSS carrier phase attitude determination method for remote sensing platforms. Advances in Space Research, 46, 118–129.
- Daniel, O. (2007). Security and privacy on the semantic web. In Milan Petkovic and Willem Jonker, editors, Security, Privacy and Trust in Modern Data Management, Data-Centric Systems and Applications. Berlin Heidelberg: Springer.
- Ajzen, I., & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behaviour. Englewood Cliffs, NJ: Prentice-Hall.
- Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision Processes, 50(2), 179-211.
- Pavlou, P. & Fygenson, M. (2006). Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior. MIS Quarterly, 30(1), 115-143.
- Hernandez M., & Mazzon J. (2007). Adoption of internet banking: proposition and implementation of an integrated methodology approach. The International Journal of Bank Marketing, 25(2), 72-88.
- Marler, Janet H., Fisher, Sandra L., & Ke, Weiling. (2009). employee self-service technology acceptance: a comparison of pre-implementation and post-implementation relationships. Personnel Psychology, 62(2), 327-358.
- Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review. IV (5).
- Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57(1), 343–354.
- Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. The Journal of Computer Information Systems, 62–71.
- Koohikamali, M., Gerhart, N. & Mousavizadeh, M. (2015). Location disclosure on LB-SNAs: The role of incentives on sharing behavior. Decision Support Systems, 71(1), 78–87.
- Alghaith, W., Sanzogni, L., & Sandhu, K. (2010). Factors Influencing the Adoption and Usage of Online Services in Saudi Arabia. Electronic Journal of Information Systems in Developing Countries (EJISDC), 40(1), 1-32.
- Petronio, S. (1991). Communication boundary management: a theoretical model of managing disclosure of private information between marital couples. Communication Theory, 311-335.
- Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure (xix,pp. 268). Albany, NY: State University of New York Press.
- Chen, J., Ping, W., Xu, Y., & Tan, B.C.Y. (2009). Am i afraid of my peers? Understanding the antecedents of information privacy concerns in the online social context. In: Proceedings of the Thirtieth International Conference on Information Systems.
- Metzger, M.J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335–361.
- Ji, P. & Lieber, P. S. (2010). Am I safe? Exploring relationships between primary territories and online privacy. Journal of Internet Commerce, 9(1), 3–22.
- Zikmund, W. G. (2003). Business research methods (7th ed.). Cincinnati, OH: Thomson.
- Xu, C., Ryan, S., Prybutok, V., & Wen, C. (2012). It is not for fun: An examination of social network site usage. Information and Management, 49(5), 210–217.
- Taylor, S., & Todd, P.A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
- Moore, C., & Benbasat, I. (2001). Development of an instrument to measure the perception of adopting an information technology innovation. Information Systems Research, 2, 192-222.
- Al-Debei, M., Al-Lozi, E., & Papazafeiropoulou, A. (2013). Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective. Decision Support Systems, 55(1), 43-54.
- Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6(2-3), 181-202.
- Premkumar, G., & Ramamurthy, K. (1995). The role of Interorganizational and organizational factors of the decision mode for adoption of interorganizational systems. Decision Science, 26(3), 303-336.
- Comrey, A.L., & Lee, H.B. (1992). A first course in factor analysis. N.J.: L. Erlbaum Associates.
- Asher, H.B. (1983). Causal modeling. Newbury Park: Sage University Press.
- Lee, M. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130-141.
- Alsharif, A. (2014). Teaching the customs, traditions and culture of Saudi Arabia through the arts in high school to promote cultural understanding and appreciation (Order No. 1589365). Available from ProQuest Dissertations & Theses Global. (1691800000).
- Alotaibi, M. (2015). Mobile Computing Trends in Saudi Arabia: An Exploratory Study. I.J. Information Technology and Computer Science, 01, 21-32.
- Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the TPB Model with Trust, Peer Influences, Perceived Usefulness and Ease of Use
Abstract Views :36 |
PDF Views:28
Authors
Affiliations
1 Imam Mohammad Ibn Saud Islamic University (IMSIU), SA
1 Imam Mohammad Ibn Saud Islamic University (IMSIU), SA
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 15, No 4 (2023), Pagination: 67-88Abstract
Cloud computing is regarded as the next generation of computing. It is progressively being used as a launching pad for digital innovation and organizational agility. Cloud computing is frequently used by private and public organizations due to its flexibility, collaboration, cost-effectiveness, and scalability. These characteristics make cloud computing indispensable for individuals and businesses such as higher education institutes. Several prior studies covered the technological facets of cloud-based contexts, including cloud security, scalability, and virtualization. However, it is contend that the main barrier to cloud computing isn't technical but cognitive or behavioural, and in particular attitudinal. Thus, this research aims to study higher education’ students’ attitudes and their intention to adopt cloud computing, with a specific concentration on the effect of trust, peer influences, perceived usefulness and ease of use in order to investigate the factors influencing the adoption of cloud computing in higher educational environment in Saudi Arabia. This study presents an extended Decomposed Theory of Planned Behaviour (DTPB) to include trust, peer influences, perceived usefulness and ease of use as a cognition, representing a person’s perception of social influence to perform or not perform a behaviour under consideration. The proposed model was able to explain 62% of the variance in behavioural intention and 65% of students' attitudes towards the adoption of cloud computing in higher educational environment. The study's findings show that the proposed model explained a significant amount of variation in cloud computing adoption. It suggests that the model expansion by incorporating trust, peer influences, perceived usefulness and ease of use factors were valuable explorations. Further, the findings demonstrate that university students' attitudes toward using cloud computing are significantly influenced by perceived ease of use, trust in cloud computing service provider and perceived usefulness, which have the ability to explain their attitude by 22.15%, 21.9% and 20.9% respectively. The result also shows that "subjective norm" alone explains 33.95% of students' "behavioural intentions" towards using cloud computing, followed by their "attitude," which explains around 14.24% of "behavioural intentions," and then university students’ "self-efficacy," with 13.71%.Keywords
Cloud Computing, DTPB, Trust, Technology Acceptance, Peer influences, Perceived usefulness, Perceived ease of use.References
- W. Liu, "Research on cloud computing security problem and strategy," in 2012 2nd international conference on consumer electronics, communications and networks (CECNet), 2012.
- C. C. Chen and M. Nakayama, "Key factors increasing the trust and intention to adopt standard cloud-based applications," International Journal of Information Systems and Change Management, vol. 8, no. 2, pp. 144-159, 2016.
- ResearchAndMarkets, "Global cloud computing in higher education market, by institute type, by application, by ownership, by deployment, by region, estimation & forecast, 2017 - 2027," ResearchAndMarkets, September 2021. [Online]. Available: https://www.researchandmarkets.com/reports/5456925/global-cloud-computing-in-higher-education . [Accessed 3 April 2022].
- C. Rodríguez Monroy, G. C. Almarcha Arias and Y. Núñez Guerrero, "The new cloud computing paradigm: The way to IT seen as a utility," Latin American and Caribbean Journal of Engineering Education, vol. 6, no. 2, pp. 24-31, 2012.
- Y. A. Qasem, S. Asadi, R. Abdullah, Y. Yah, R. Atan, M. A. Al-Sharafi and A. A. Yassin, "A multianalytical approach to predict the determinants of cloud computing adoption in higher education institutions," Applied Sciences, vol. 10, no. 14, p. 4905, 2020.
- B. Alexander, Social networking in higher education. The Tower and the Cloud, EDUCAUSE, 2008, pp. 197-201..
- R. N. Katz, The gathering cloud: Is this the end of the middle. The tower and the cloud: Higher education in the age of cloud computing, EDUCAUSE, 2008, pp. 2-42..
- Z. Asadi, M. Abdekhoda and H. Nadrian, "Cloud computing services adoption among higher education faculties: development of a standardized questionnaire," Education and Information Technologies, vol. 25, no. 1, pp. 175-191, 2020.
- N. Sultan, "Cloud computing for education: A new dawn?.," International Journal of Information Management, vol. 30, no. 2, pp. 109-116, 2010.
- S. Ashtari and A. Eydgahi, "Student perceptions of cloud applications effectiveness in higher education," Journal of computational science, vol. 23, pp. 173-180, 2017.
- I. Arpaci, "Antecedents and consequences of cloud computing adoption in education to achieve knowledge management," Computers in Human Behavior, vol. 70, pp. 382-390, 2017.
- R. Estriegana, J. A. Medina-Merodio and R. Barchino, "Student acceptance of virtual laboratory and practical work: An extension of the technology acceptance model," Computers & Education, vol. 135, pp. 1-14, 2019.
- J. A. González-Martínez, M. L. Bote-Lorenzo, E. Gómez-Sánchez and R. Cano-Parra, "Cloud computing and education: A state-of-the-art survey," Computers & Education, vol. 80, pp. 132-151, 2015.
- G. Militaru, A. A. Purcărea, O. D. Negoiţă and A. Niculescu, "Examining cloud computing adoption intention in higher education: exploratory study," in Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, 2016.
- A. Sharma and U. K. Singh, "Modelling of Smart Risk Assessment Approach for Cloud Computing Environment using AI & supervised machine learning algorithms," Global Transitions Proceedings, pp. 1-358, 3 June 2022.
- S. A. Sheik and A. P. Muniyandi, "Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review," Cyber Security and Applications, vol. 1, p. 100002, 2023.
- S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and A. Ghalsasi, "Cloud computing—The business perspective," Decision support systems, vol. 51, no. 1, pp. 176-189, 2011.
- A. Khayer, M. S. Talukder, Y. Bao and M. Hossain, "Cloud computing adoption and its impact on SMEs’ performance for cloud supported operations: A dual-stage analytical approach," Technology in Society, vol. 60, p. 101225, 2020.
- O. Ali, A. Shrestha, M. Ghasemaghaei and G. Beydoun, "Assessment of complexity in cloud computing adoption: A case study of local governments in Australia," Information Systems Frontiers, vol. 24, no. 2, pp. 595-617, 2022.
- P. Mell and T. Grance, The NIST definition of cloud computing. U.S. Department of Commerce, MD, USA: National Institute of Standards and Technology: Gaithersburg, 2011.
- M. A. Mohamed Hashim, I. Tlemsani and R. Matthews, "Higher education strategy in digital transformation.," Education and Information Technologies, pp. 1-25, 2021.
- G. Thorsteinsson, T. Page and A. Niculescu, "Using virtual reality for developing design communication," Studies in Informatics and Control, vol. 19, no. 1, pp. 93-106, 2010.
- F. P. Tulinayo, P. Ssentume and R. Najjuma, "Digital technologies in resource constrained higher institutions of learning: a study on students’ acceptance and usability," International Journal of Educational Technology in Higher Education, vol. 15, no. 1, pp. 1-19, 2018.
- A. El Mhouti, M. Erradi and A. Nasseh, "Using cloud computing services in e-learning process: Benefits and challenges," Education and Information Technologies, vol. 23, pp. 893-909, 2018.
- R. Thavi, R. Jhaveri, V. Narwane, B. Gardas and N. Jafari Navimipour, "Role of cloud computing technology in the education sector," Journal of Engineering, Design and Technology, 2021.
- P. Y. Thomas, "Cloud computing: A potential paradigm for practising the scholarship of teaching and learning," The Electronic Library, vol. 29, no. 2, pp. 214-224, 2011.
- K. Bagley, "Checkpoints, cloud and collaboration (C3): A learning framework to improve learning outcomes for international students in computer science," Journal of Computing Sciences in Colleges, vol. 33, no. 6, p. 22–28, 2018.
- B. G. Batista, C. G. Ferreira, D. M. Segura , D. M. Leite Filho and M. M. Peixoto, "A QoS-driven approach for cloud computing addressing attributes of performance and security," Future Generation Computer Systems, vol. 68, p. 260–274, 2016.
- M. Sharma, R. Gupta and P. Acharya, "Analysing the adoption of cloud computing service: A systematic literature review," Global Knowledge, Memory and Communication, vol. 70, no. 1/2, pp. 114-153, 2020.
- A. Chiniah, A. E. Mungur and K. Naidoo Permal, "Evaluation of cloud computing adoption using a hybrid TAM/TOE model," in Information Systems Design and Intelligent Applications, Singapore, 2019.
- A. N. Tashkandi and I. M. Al-Jabri, "Cloud computing adoption by higher education institutions in Saudi Arabia: an exploratory study," Cluster Computing, vol. 18, pp. 1527-1537, 2015.
- Y. A. Qasem, R. Abdullah, Y. Yah, R. Atan, M. A. Al-Sharafi and M. Al-Emran, "Towards the development of a comprehensive theoretical model for examining the cloud computing adoption at the organizational level," Recent Advances in Intelligent Systems and Smart Applications, pp. 63- 74, 2021.
- S. Taylor and P. A. Todd, "Understanding information technology usage: A test of competing models," Information systems research, vol. 6, no. 2, pp. 144-176, 1995.
- M. Hernandez and J. Mazzon, "Adoption of internet banking: proposition and implementation of an integrated methodology approach," The International Journal of Bank Marketing, vol. 25, no. 2, pp. 72-88, 2007.
- Y. C. Ku, R. Chen and H. Zhang, "Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan," Information & Management, vol. 50, no. 7, pp. 571-581, 2013.
- Z. Belkhamza and S. Wafa, "The Effect of Perceived Risk on the Intention to Use E-commerce: The Case of Algeria," Journal of Internet Banking and Commerce, vol. 14, no. 1, pp. 1-10, 2009.
- J. Lansing and A. Sunyaev, "Trust in cloud computing: Conceptual typology and trust-building antecedents," ACM sigmis database: The database for advances in Information Systems, vol. 47, no. 2, pp. 58-96, 2016.
- J. Opara-Martins, R. Sahandi and F. Tian, "Critical review of vendor lock-in and its impact on adoption of cloud computing," in International Conference on Information Society (i-Society 2014), IEEE, 2014.
- E. Udoh, "Technology acceptance model applied to the adoption of grid and cloud technology," International Journal of Grid and High Performance Computing (IJGHPC), vol. 4, no. 1, pp. 1-20, 2012.
- F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989.
- M. Igbaria, S. J. Schiffman and T. J. Wieckowski, "The respective roles of perceived usefulness and perceived fun in the acceptance of microcomputer technology," Behaviour & information technology, vol. 13, no. 6, pp. 349-361, 1994.
- F. Abdullah and R. Ward, "Developing a General Extended Technology Acceptance Model for ELearning (GETAMEL) by analysing commonly used external factors," Computers in human behavior, vol. 56, pp. 238-256, 2016.
- A. Granić and N. Marangunić, "Technology acceptance model in educational context: A systematic literature review," British Journal of Educational Technology, vol. 50, no. 5, pp. 2572-2593, 2019.
- F. D. Davis, R. P. Bagozzi and P. R. Warshaw, "User acceptance of computer technology: A comparison of two theoretical models," Management Science, vol. 35, no. 8, pp. 982-1003, 1989.
- I. Ajzen and M. Fishbein, Understanding Attitudes and Predicting Social Behaviour, Englewood Cliffs, NJ: Prentice-Hall, 1980.
- I. Ajzen, "The theory of planned behaviour," Organizational Behaviour and Human Decision Processes, vol. 50, no. 2, pp. 179-211, 1991.
- M. Deutsch and H. Gerard, "Deutsch, M., & Gerard, H. (1995). A study of normative and informational social influences upon individual judgment," Journal of Abnormal and Social Psychology, vol. 51, pp. 624-36, 1995.
- Y. C. Lee, "An empirical investigation into factors influencing the adoption of an e-learning system," Online Information Review, vol. 30, no. 5, pp. 517-541, 2006.
- E. J. Kim, J. J. Kim and S. H. Han, "Understanding student acceptance of online learning systems in higher education: Application of social psychology theories with consideration of user innovativeness," Sustainability, vol. 13, no. 2, p. 896, 2021.
- W. L. Shiau and P. Y. Chau, "Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach," Information & Management, vol. 53, no. 3, pp. 355-365, 2016.
- D. R. Compeau and C. A. Higgins, "Computer self-efficacy: development of a measure and initial test," MIS Quarterly, vol. 19, no. 2, pp. 189-211, 1995.
- A. Bandura, "Self-efficacy: toward a unifying theory of behavioural change," Psychol Rev, vol. 84, no. 2, pp. 191-215, 1997.
- D. R. Compeau and S. Huff, "Social cognitive theory and individual reactions to computing technology: a longitudinal study," MIS Quarterly, vol. 23, no. 2, pp. 145-158, 1999.
- T. Hill, N. D. Smith and M. F. Mann, "Role of efficacy expectations in predicting the decision to use advanced technologies: the case of computers," Journal of Applied Psychology, vol. 72, no. 2, p. 307– 313, 1997.
- M. Hsu and C. Chiu, "Internet self-efficacy and electronic service acceptance," Decision Support Systems, vol. 38, no. 3, pp. 369-381, 2004.
- Igbaria and M. J. Iivari, "The effects of self-efficacy on computer usage," Omega, vol. 23, no. 6, p. 587–605, 1995.
- C. Huang, "Gender differences in academic self-efficacy: A meta-analysis," European journal of psychology of education, vol. 28, pp. 1-35, 2013.
- T. Muthuprasad, S. Aiswarya, K. S. Aditya and G. K. Jha, "Students’ perception and preference for online education in India during COVID-19 pandemic," Social sciences & humanities open, vol. 3, no. 1, p. 100101, 2021.
- E. Bell, A. Bryman and B. Harley, Business research methods, Oxford university press, 2022.
- G. A. Marcoulides and C. Saunders, "Editor's comments: PLS: a silver bullet?," MIS quarterly, pp. iii-ix, 2006.
- K. K. K. Wong, "Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS," Marketing Bulletin, vol. 24, no. 1, pp. 1-32, 2013.
- W. Al-Ghaith, "Understanding social network usage: impact of co-presence, intimacy, and immediacy," International Journal of Advanced Computer Science and Applications, vol. 6, no. 8, pp. 99-111, 2015.
- G. C. Moore and I. Benbasat, "Development of an instrument to measure the perceptions of adopting an information technology innovation," Information systems research, vol. 2, no. 3, pp. 192-222, 1991.
- W. Al-Ghaith, "Applying and extending the Technology Acceptance Model to understand Social Networking Sites (SNS) Usage: Toward proposing a comprehensive model," in Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on Social Informatics 2016, Data Science 2016 (pp. 1-8), ACM, 2016.
- W. Al-Ghaith, "Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage," International Journal of Computer Science & Information Technology (IJCSIT), vol. 13, 2021.
- J. Ejdys, "Building technology trust in ICT application at a university," International Journal of Emerging Markets, 2018.
- G. Premkumar and K. Ramamurthy, "The role of Interorganizational and organizational factors of the decision mode for adoption of interorganizational systems," Decision Science, vol. 26, no. 3, pp. 303-336, 1995.
- A. L. Comrey and H. B. Lee, A first course in factor analysis, N.J.:L.: Erlbaum Associates, 1992.
- Z. Ali, B. Gongbing and A. Mehreen, "Understanding and predicting academic performance through cloud computing adoption: A perspective of technology acceptance model," Journal of Computers in Education, vol. 5, pp. 297-327, 2018.