Adoption of e-Government in Pakistan: Supply Perspective
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 6
Abstract
Electronic Government, also known as e-Government, is a convenient way for citizens to access e- services and to conduct business with the government using the Internet. It saves citizens and the government both time and money. This study examined adoption of e-Government supply side by looking at the UTAUT as a model of technology acceptance. Furthermore, specific variables that were proposed to moderate relationships within the UTAUT were analyzed including locus of control, perceived organizational support, affective and normative commitment, and procedural justice. Data from one sample indicated that in general, the UTAUT model was supported, however, the moderators proved non-significant. Implications are discussed for the technology acceptance process as technologies are implemented within countries and suggestions for future research in this area are discussed. This research sought to demonstrate the robustness of trust-based UTAUT to address e-Government adoption concerns. As a consequence, it was the responsibility of the researcher to select research questions, operational variables, research approaches, and research techniques, within the scope of the study. The research hypotheses formulated in this study were based on the technology acceptance literature covering the original UTAUT model with the inclusion of the trust construct. This quantitative study was conducted with help of Unified Theory of Acceptance and Use of Technology (UTAUT) model.
Authors and Affiliations
Zulfiqar Haider, Chen Shuwen, Dr. Farah Lalani, Dr. Aftab Mangi
Radial basis Function Neural Network for Predicting Flow Bottom Hole Pressure
The ability to monitor the flow bottom hole pressure in pumping oil wells provides important information regarding both reservoir and artificial lift performance. This paper proposes an iterative approach to optimize the...
RFID: The Big Player in the Libraries of the Future
This paper suggest the idea of developing an automatic Radio Frequency Identification (RFID)-based system for library search and to observe the current literature to define whether current technology and developed RFID-b...
An Efficient Algorithm to Automated Discovery of Interesting Positive and Negative Association Rules
Association Rule mining is very efficient technique for finding strong relation between correlated data. The correlation of data gives meaning full extraction process. For the discovering frequent items and the mining of...
Social Computing: The Impact on Cultural Behavior
Social computing continues to become more and more popular and has impacted cultural behavior. While cultural behavior affects the way an individual do social computing, Hofstede’s theory is still prevalent. The results...
Implication of Genetic Algorithm in Cryptography to Enhance Security
In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems ar...