Search Results

You are looking at 1 - 10 of 12 items for :

  • "technology acceptance model" x
  • Refine by Access: All Content x
Clear All

the most common Technology Acceptance Models (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT) frameworks extended by the factors of trust ( Hsu et al. 2015 ; Lin – Wu 2015 ; AlAwadhi 2019 ) and e-government-specific adaptation of

Open access

. Mathieson , K. Peacock , E. Chin , W. W. 2001 Extending the technology acceptance model: The influence of perceived user resources Data Base for Advances

Restricted access

] Wallace L. G. , Sheetz S. D. The adoption of software measures: A technology acceptance model (TAM) perspective , Information & Management , Vol. 51 , No. 2 , 2014 , pp. 249 – 259

Restricted access

. , & Sang , Y. ( 2013 ). Exploring Koreans’ smartphone usage: An integrated model of the technology acceptance model and uses and gratifications theory . Computers in Human Behavior, 29 ( 6 ), 2512 – 2518 . doi: 10.1016/j.chb.2013.06.002 10

Open access

—especially, professionals—may perceive that mtpe will yield texts of poorer quality than rut ( Yamada 2015 ). Rossi (2019) tested an adapted Technology Acceptance Model with a questionnaire and claimed that MT output quality was not related to professional translators

Restricted access

case of perceived problems has significantly increased.” Altogether, these narratives suggest that in line with the findings of classical technology acceptance models, the perceived usefulness of the newly deployed digital solutions shapes users

Restricted access

1989 ). Some example models include the Technology Acceptance Model (TAM) (Davis 1989 ) and the Information System Success Model (Delone and McLean 2003 ). For example, Swar ( 2011 ) presents a conceptual model of the Information System

Restricted access

modeling . In Handbook of psychology . New York, NY : Wiley . Venkatesh , V , Davis , FD 2000 A theoretical extension of the technology acceptance model: Four longitudinal field studies . Management

Restricted access

Cronbach-alfa: vele vagy nélküle?

Cronbach’s alfa: with or without it?

Magyar Pszichológiai Szemle
Authors:
Judit T. Kárász
,
Olivér Nagybányai Nagy
,
Krisztián Széll
, and
Szabolcs Takács

). Bölcsész Konzorcium . Napitupulu , D ., Kadar , J. A ., & Jati , R. K . ( 2017 ). Validity Testing of Technology Acceptance Model Based on Factor Analysis Approach . Indonesian Journal of Electrical Engineering and Computer Science , 5 ( 3 ), 697

Open access

. In the cluster of psychological research using IT in learning, there are 24 authors classified into three categories: user behavior and acceptance (eleven authors), social cognition and self-efficacy (six authors), and technology acceptance model (TAM

Restricted access