Aim/Purpose: This paper aims to analyze how artisans in Ghana are incorporating mobile commerce into their everyday business and how perceived usefulness, perceived ease of use, subjective norms, age, gender, expertise, and educational level affected the adoption and usage of m-commerce. Background: This study integrates well-established theoretical models to create a new conceptual model that ensures a comprehensive mobile commerce adoption survey. Methodology: A cross-sectional survey was conducted to measure the constructs and their relations to test the research model. Contribution: The study’s findings confirmed previous results and produced a new conceptual model for mobile commerce adoption and usage. Findings: Except for gender, perceived ease of use, and subjective norms that did not have specific effects on mobile commerce adoption, age, educational level, perceived usefulness, expertise, attitude, and behavioral intention showed significant effects. Recommendations for Practitioners: First of all, mobile commerce service providers should strategically pay critical attention to customer-centered factors that positively affect the adoption of mobile commerce innovations than focusing exclusively on technology-related issues. Mobile service providers can attract more users if they carefully consider promoting elements like perceived usefulness and perceived ease of use which directly or indirectly affect the individuals’ decision to adopt information technology from consumer perspectives. Second, mobile commerce service providers should strategically focus more on younger individuals since, per the research findings, they are more likely to adopt mobile commerce innovations than the older folks in Ghana. Third, service providers should also devise strategies to retain actual users of m-commerce by promoting elements like behavioral intentions and attitude, which according to the research findings, have a higher predictive power on actual usage of m-commerce. Recommendation for Researchers: The conceptual model developed can be employed by researchers worldwide to analyze technology acceptance research. Impact on Society: The study’s findings suggested that mobile commerce adoption could promote a cashless society that is convenient for making buying things quicker and easier. Future Research: The research sample size could be increased, and also the study could all sixteen regions in Ghana or any other country for a broader representation.
A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value chain.
An Information System (IS) offers various benefits in managing transactions between an organization and its customers. Lack of Information system purely oriented to customer satisfaction leads to long waiting lines by customers in service delivery. It will influence negatively on-expected revenue and profit to various establishments in the long term. With recent trends in specific IS applications, expectations are that if waiting lines are not eliminated, perhaps may be reduce drastically in service delivery. Several steps were taken in putting measures in place by expanding facilities, providing timely and periodic maintenance, yet waiting lines are observed in places like; Bank Automated Teller Machine(ATM) (as an extended banking services), Electricity Company pay points, Clinics and Hospitals etc. These reviews seek to focus on Driver and Vehicle Licensing Authority (DVLA) in Ghana since long waiting line is much associated with their service delivery. Using Convenience sampling technique, questionnaires were administered in eliciting data from staff and clients of DVLA. Final data was analyzed using Statistical Package for Social Science (SPSS); with the support of Microsoft Excel 2010 in depicting the results in frequency tables, percentages, charts etc. The trends in the results show evidently that even though Information Systems was used in the services delivery process; there are prevailing waiting lines, which were observed. It was also established that services delivery processes are not electronic at DVLA, resulting in the formation of the longer waiting lines.
The increasing critical dependencies on Internetof-Things (IoT) have raised security concerns; its application on the critical infrastructures (CIs) for power generation has come under massive cyber-attack over the years. Prior research efforts to understand cybersecurity from Cyber Situational Awareness (CSA) perspective fail to critically consider the various Cyber Situational Awareness (CSA) security vulnerabilities from a human behavioural perspective in line with the CI. This study evaluates CSA elements to predict cyber-attacks in the power generation sector. Data for this research article was collected from IPPs using the survey method. The analysis method was employed through Partial Least Squares Structural Equation Modeling (PLS-SEM) to assess the proposed model. The results revealed negative effects on people and cyber-attack, but significant in predicting cyber-attacks. The study also indicated that information handling is significant and positively influences cyber-attack. The study also reveals no mediation effect between the association of People and Attack and Information and Attack. It could result from an effective cyber security control implemented by the IPPs. Finally, the study also shows no sign of network infrastructure cyber-attack predictions. The reasons could be because managers of IPPs had adequate access policies and security measures in place.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.