Effect of motivation, opportunity and ability on human resources information security management considering the roles of Attitudinal, behavioral and organizational factors

سال انتشار: 1400
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 108

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJE-34-12_009

تاریخ نمایه سازی: 10 اردیبهشت 1401

چکیده مقاله:

English Abstract must be Times New The increasing penetration of mobile devices will lead to better use of it in youth business. Mobile marketing has received less attention in developing countries such as Iran. The purpose of this paper is to investigate the predictors of mobile marketing use by expanding the Unified Theory of Acceptance and Use of Technology (UTAUT۲).The extended model has additional factors including perceived risk, trust, mobility, and personal innovativeness. Data were collected using online surveys and questionnaires from ۳۵۰ students of K. N. Toosi University of Technology. To predict the use of mobile marketing, a novel partial Least Squares - Artificial Neural Networks (PLS-ANN) approach was used. The results show that personal innovativeness is the most effective factor in mobile marketing acceptance. Subsequently, the hedonic motivations, performance expectancy, mobility, social influence, trust, and facilitating conditions play a vital role. Furthermore, the results illustrate that price value, perceived risk, and effort expectancy were not effective.

کلیدواژه ها:

Mobile marketing ، technology acceptance ، Partial Least Squares - Artificial Neural Networks (PLS-ANN) ، Unified Theory of Acceptance and Use Technology (UTAUT)

نویسندگان

L. Bahrami

Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran

N. Safaie

Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran

H. Hamidi

Department of Information Technology, Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Hoffmann R., Napiórkowski J., Protasowicki T. , Jerzy Stanik, “Measurement ...
  • Zare M. R., Aghaie A., Samimi Y., A. Hadad Asl, ...
  • Roberts D. J., An Analysis of employee information security policy ...
  • Jeyanthi N., Shabeeb H., M. Saleem A. Durai, Thandeeswaran R., ...
  • Kwesi Hughes-Lartey, Meng Li, Francis E. Botchey, Zhen, “Human factor, ...
  • Karjalainen M., Siponen M., Sarker S., “Toward a stage theory ...
  • Bagheri Z., Safaie N., Strategic planning of human resources based ...
  • Azjen, I. The theory of Planned Behavior. Organizational Behavior and ...
  • Bagozzi, R. P., & Yi, Y. “Specification, evaluation, and interpretation ...
  • Briz-Ponce, L., Pereira, A., Carvalho, L., Juanes-Méndez, J. A., & ...
  • Carlton M., Levy Y., "Expert assessment of the top platform ...
  • Evans, M. "Evaluating information security core human error causes (IS-CHEC) ...
  • Hamidi, H., Vafaei, A. and Monadjemi, S.A. (۲۰۱۲). Analysis and ...
  • Fornell, C., & Larcker, D. F. Evaluating structural equation models ...
  • Gao, L., "Application of the extended theory of planned behavior ...
  • Gandel, Lloyd’s CEO: Cyber-attacks cost companies ۴۰۰ billion every year, ...
  • Gratian, M., Bandi S., Cukier M., Dykstra J., Ginther A.,"Correlating ...
  • Hair, J. F., Ringle, C. M., & Sarstedt, MPLS-SEM, “Indeed ...
  • Altabash K., Happaa b., "Insider-threat detection using gaussian mixture models ...
  • Ifinedo, P., "Understanding information systems security policy compliance: An integration ...
  • Kuru, Damla, and Sema Bayraktar, "The effect of cyber-risk insurance ...
  • Xu, X., Chen C., Menassa C., "Understanding energy-saving behaviors in ...
  • Malekinezhad, F., Bin H. L. Investigation into University Students Restoration ...
  • Michie S., Stralen, M., West, R., "The behaviour change wheel: ...
  • Nummally, J., Psychometric Theory. McGraw-Hill, Retrieved from. ۱۹۷۸ ...
  • Osterhus, Thomas L., "Pro-social consumer influence strategies: when and how ...
  • Hamidi, H., Vafaei, A., and Monadjemi, A. H., “Algorithm Based ...
  • Hamidi, H., & Mohammadi, K. (۲۰۰۶). Modeling Fault Tolerant and ...
  • Sohrabi Safaab N., Maplea C., Watson T., Von Solms B., ...
  • Schwartz, Shalom H., "Normative explanations of helping behavior: A critique, ...
  • Schmidt, K., "Predicting the consumption of expired food by an ...
  • Shan, J., Jingmei, L., and Zhihua, X., "Estimating ecological damage ...
  • Hamidi, H., Vafaei, A. and Monadjemi, S.A., Analysis and design ...
  • ThØgersen, J., "Understanding of consumer behaviour as a prerequisite for ...
  • Wilson, C., and Melissa R., "Insights from psychology about the ...
  • Wolske, K. S., Paul, C., and Thomas, D., "Explaining interest ...
  • Yazdanmehr, A., and Jingguo W. "Employees' information security policy compliance: ...
  • Zhao, X., Lynch Jr, J. G., & Chen, Q., “Reconsidering ...
  • Torabi, A., Hamidi, H., Safaie, N., “Effect of Sensory Experience ...
  • نمایش کامل مراجع