نتایج جستجو برای: perceived ease of use

تعداد نتایج: 21228065  

Journal: :Informing Science: The International Journal of an Emerging Transdiscipline 2008

Journal: :International Journal of Health Sciences (IJHS) 2022

The goal of this study is to investigate and explain the impact trust in moderating influence perceived utility ease use on LinkAja users' choice digital wallets. Purposive sampling a non-probability approach used determine sample. A total 112 participants participated as users. SEM-PLS method was examine data. According findings study, usefulness has positive significant effect decision use, t...

2014
Eta Wahab Alina Shamsuddin

This study was conducted to examine the nature of relationship between the perceived usefulness and perceived ease of use towards intention to use Decision Support Systems (DSS) using samples from employees in one manufacturing company in Malaysia. A total set of 60 sets of questionnaire were sent to the organization and 50 usable questionnaire representing a response rate of 83 percentage were...

Journal: :Jurnal Informatika Ekonomi Bisnis 2023

LAZISMU is one of the zakat institutions that manages donations from all over Indonesia and implements through digital payments. This study aims to examine how Emotional marketing Perceived ease use affect Donation intention Digital payment at LAZISMU. uses a quantitative method with data collection using Likert scale primary respondents collected by distributing questionnaires via google form....

Journal: :Technology and health care : official journal of the European Society for Engineering and Medicine 2015
Yi-Horng Lai Fen-Fen Huang Hsieh-Hua Yang

Mobile apps provide diverse services and various convenient functions. This study applied the modified technology acceptance model (MTAM) in information systems research to the use of the mobile hospital registration system in Taiwan. The MTAM posits that perceived ease of use and perceived usefulness of technology influence users' attitudes toward using technology. Research studies using MTAM ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2006
Fei-Fei Cheng Jack C. S. Wu Yu-Wen Huang David C. Yen

This paper reported the results of a survey study and provided evidences of empirically testing technology acceptance model (TAM) in understanding the determinants of users’ intention to use wireless technology at work. Questionnaires were distributed to users whose company is initiating the adoption of wireless devices in accomplishing their works. The results indicated that technology accepta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید