1,115
Views
23
CrossRef citations to date
0
Altmetric
Articles

User acceptance of social learning systems in higher education: an application of the extended Technology Acceptance Model

&

References

  • Adams, A., & Blanford, A. (2003). Security and online learning: To protect or prohibit. In C. Ghaoui (Ed.), Usability evaluation of online learning programs (pp. 331–359). Hershey, PA: Information Science Publishing/IGI Global.10.4018/978-1-59140-105-6
  • Ala-Mutka, K. (2010). Learning in informal online networks and communities. JRC Scientific and Technical Report. Retrieved from http://ipts.jrc.ec.europa.eu/publications/pub.cfm?id=3059
  • Al-Gahtani, S. S. (2011). Modeling the electronic transactions acceptance using an extended technology acceptance model. Applied Computing and Informatics, 9, 47–77. doi:10.1016/j.aci.2009.04.001
  • Aliyu, M., Abdallah, N. A. O., Lasisi, N. A., Diyar, D., & Zeki, A. M. (2010, December). Computer security and ethics awareness among IIUM students: An empirical study. In Proceedings of the International Conference on Information and Communication Technology for the Muslim World (ICT4M) (pp. A52–A56). Jakarta, Indonesia. doi:10.1109/ICT4M.2010.5971884
  • Boujettif, M., & Yongge, W. (2010, November). Constructivist approach to information security awareness in the Middle East. In Proceedings of the International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA) (pp. 192–199). Fukuoka, Japan. doi:10.1109/BWCCA.2010.70
  • Brey, P. (2000). Disclosive computer ethics. Computers and Society, 9, 10–16. doi:10.1145/572260.572264
  • Bull, G., Thompson, A., Searson, M., Garofalo, J., Park, J., Young, C., & Lee, J. (2008). Connecting informal and formal learning experiences in the age of participatory media. Contemporary Issues in Technology and Teacher Education, 8, 100–107.
  • Calluzzo, V. J., & Cante, C. J. (2004). Ethics in ınformation technology and software use. Journal of Business Ethics, 51, 301–312. doi:10.1023/B:BUSI.0000032658.12032.4e
  • Chen, H., Hsu, C., Chang, C., & Huang, Y. (2012, July). Applying the technology acceptance model to evaluate the learning companion recommendation system on Facebook. In Proceedings of the IEEE Fourth International Conference on Technology for Education (pp. 160–163). Hyderabad, India. doi:10.1109/T4E.2012.36
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of ınformation technology. MIS Quarterly, 13, 319–340.10.2307/249008
  • Dinev, T., Jahyun, G., Qing, H., & Kichan, N. (2006, June). User behavior toward preventive technologies – Cultural differences between the United States and South Korea. In Proceedings of the ECIS 2006, Paper 9. Göteborg, Sweden. Retrieved from http://aisel.aisnet.org/ecis2006/9
  • Duggan, A., Hess, B., Morgan, D., Kim, S., & Wilson, K. (2001, August). Measuring students’ attitudes toward educational use of the Internet. Journal of Educational Computing Research, 25, 267–281.
  • Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the AMCIS Paper 339. Colorado, USA. Retrieved from http://aisel.aisnet.org/amcis2007/339
  • Gefen, D., & Straub, D. (2000). The relative importance of perceived ease of use in IS adoption: A study of e-commerce adoption. Journal of the Association for Information Systems, 1, 1–28. Retrieved from http://aisel.aisnet.org/jais/vol1/iss1/8
  • Glass, R., & Wood, W. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15, 1189–1198. doi:10.1007/BF00412817
  • Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., & Brune, R. (2008). Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77, 481–499. doi:10.1007/s10551-007-9361-0
  • Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the Privacy Poster Fair at the Carnegie Mellon University School of Library and Information Science. Retrieved from http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf
  • Guo, S., Wang, M., & Leskovec, J. (2011, June). The role of social networks in online shopping: Information passing, price of trust, and consumer choice. In Proceedings of the EC ‘11, 12th ACM Conference on Electronic Commerce (pp. 157–166). San Jose, CA, USA. doi:10.4018/978-1-59140-105-610.1145/1993574
  • Holotescu, C., & Grosseck, G. (2012, April). An empirical analysis of the educational effects of social media in universities and colleges. In Proceedings of the 8th International Scientific Conference eLearning and Software for Education (Vol. 1, pp. 167–174). Bucharest.
  • Humaidi, N., & Balakrishnan, V. (2012, April). The influence of security awareness and security technology on users’ behavior towards the implementation of health information system: A conceptual framework. In Proceedings of the 2nd International Conference on Management and Artificial Intelligence (IPEDR) (Vol. 35, pp. 1–6). Thailand: IACSIT Press.
  • Lee, D. Y., & Lehto, M. R. (2013). User acceptance of YouTube for procedural learning: An extension of the technology acceptance model. Computers & Education, 61, 193–208. doi:10.1016/j.compedu.2012.10.001
  • Lee, J.-S., Cho, H., Gay, G., Davidson, B., & Ingraffea, A. (2003). Technology acceptance and social networking in distance learning. Educational Technology & Society, 6, 50–61.
  • Lee, Y., Hsieh, Y., & Chen, Y. (2013). An investigation of employees’ use of e-learning systems: Applying the technology acceptance model. Behaviour and Information Technology, 32, 173–189. doi:10.1080/0144929X.2011.577190
  • Moqbel, M. (2012, February/March). Explaining user acceptance of social networking: Employee’s perspective. In: Proceedings of the Southwest Decision Science Institute Forty Third Annual Conference (pp. 110–218). New Orleans, LA.
  • Ramayah, T., & Ignatius, J. (2005). Impact of perceived usefulness, perceived ease of use and perceived enjoyment on intention to shop online. ICFAI Journal of Systems Management (IJSM), 3, 36–51.
  • Redecker, C., Ala-Mutka, K., & Punie, Y. (2010). Learning 2.0 – The impact of social media on learning in Europe: Policy Brief. Luxembourg: JRC Technical Notes.
  • Sie, R. L. L., Pataraia, N., Boursinou, E., Rajagopal, K., Margaryan, A., Falconer, I., … Sloep, P. B. (2013). Goals, motivation for, and outcomes of personal learning through networks: Results of a Tweetstorm. Educational Technology & Society, 16, 59–75.
  • Sykes, T. A., Venkatesh, V., & Gosain, S. (2009). Model of acceptance with peer support: A social network perspective to understand individual-level system use. MIS Quarterly, 33, 371–393.
  • Taherdoost, H., Jalaliyoon, N., Namayandeh, M., Forghani, A., & Zamani, M. (2011, June). Adoption framework expansion based on the computer ethics’ related research models and ethical scenarios analysis. In Proceedings of the 2010 International Conference on Economics, Business and Management, IPEDR (Vol. 2, pp. 219–223). Manila, Philippines: IACS IT Press.
  • Tess, P. A. (2013). The role of social media in higher education classes (real and virtual) – A literature review. Computers in Human Behavior, 29, A60–A68. doi:10.1016/j.chb.2012.12.032

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.