AN ENHANCED TECHNOLOGY ACCEPTANCE MODEL TO MEASURE CUSTOMERS’ WILLINGNESS TO PAY MORE FOR SECURE SOFTWARE DEVELOPMENT

Authors

  • O T AROGUNDADE
  • O MUSTAPHA
  • A M IKOTUN
  • A O ADEJIMI

DOI:

https://doi.org/10.51406/jnset.v15i2.1697

Keywords:

Information system, Security, Technology Acceptance Model (TAM), Self-Efficacy Software development,

Abstract

Securing information system (IS) has become a critical concern within many sectors of business organisations with significant resources being devoted to the control of security threats. Recently, it has been discovered that incorporating security at the time of development is the best option for having a robust system. This study explores factors that motivate IS owner’s willingness to pay extra cost for a secure software development and validates the relationships among the various variables. Enhanced Technology Acceptance Model (TAM) was used to investigate the factors that influences IS owner’s willingness to pay extra cost for secured software development. Out of all the constructs considered, Self-Efficacy (SE) is found to be significant (β= 0.617, P<0.05) which suggests that self-efficacy is useful for investigating willingness to pay for a secure software development. In addition, the strength of the linear association between Self-Efficacy and Behavioural Intention (BI) (R2 =0.354) implies that Self Efficacy has direct moderate impact on Behavioural Intention to pay extra cost for a secure software development.

 

References

Adams, D. A., Nelson, R. R., Todd, P. A. 1992. “Perceived usefulness, ease of use, and usage of information technology: A replication”, MIS Quarterly, 16(2), 227–247.

Agarwal, R., Prasad, J. 2000. A field study of the adoption of software process innovations by information system profession”, Engineering Management, IEEE Transactions, 47(3), 295-308

Agarwal, R., Sambamurthy, V., Stair, R. 2000. Research report: The evolving relationship between general and specific computer self-efficacy - An empirical assessment”, Information Systems Research, 11(4), 418-430.

Al-Qeisi, K. 2009.“Analyzing the use ofUTAUT model in explaining an online behaviour: internet banking adoption”. Unpublished doctoral dissertation.UK, Brunel University. Ph.d, theses.

Arunkumar, S. 2007. A study on attitude and intention towards Internet banking with reference to Malaysian consumers in klang valley region. The International Journal of Applied Management and Technology, 6, 1.

Bagozzi, R.P. 2007. The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift. Journal of the Association for Information Systems. 8(4), 43-254.

Bahaman Abu Samah., HayrolAzril Mohamed Shaffril., Musa Abu Hassan., Jeffrey Lawrence D’Silva. 2011. “Can Technology Acceptance Model be Applied on the Rural Setting: The Case of Village Development and Security Committee in Malaysia”. Journal of Social Sciences 7 (2): 113-119.

Bandura, A. 1986. The explanatory and predictive scope of self-efficacy theory. Journal of Clinical and Social Psychology, 4, 359-373.

Bandura, A. 1982. Self -Efficacy mechanism in Human Agency”, American Psychologist, 37(2), 122-147.

Bandura, A. 1995. “Self-efficacy, impact of self-beliefs on adolescent life paths. R. M. Lerner, A.C. Peterson, & J. Brooks-Gunn (Eds.), Encyclopaedia of adolescence , New York, Garland, Vol. 2, 1991, pp. 995-1000.

Bhattacherjee, A. 2001. “Understanding information systems continuance: An expectation confirmation model”. MIS Quarterly, 25(3), 351-370.

Brown, S., Massey, A., Montoya-Weiss, M., Burkman, J. 2000. Do I really have to? User Acceptance of Mandated Technology. European Journal of Information System. 11, 283 – 295.

Burton-Jones, A., Hubona, G.S. 2006. The Mediation of External Variables in the Technology Acceptance Model”. Information and Management . 43(6), 706 -717.

Chuttur, M.Y. 2009. Overview of the Technology Acceptance Model: Origins, Developments and Future Directions”.Working Papers on Information Systems, Indiana University, USA, Sprouts, 297 – 334.

Comrey, A.L. 1973. “A First Course in Factor Analysis”. Academic Press, NY.

Cook, T.D., Campbell, D.T. 1979. “Quasi-Experimentation: Design and Analysis for Field Settings”, Rand McNally, Chicago, Illinois.

Cronbach, L.J. 1951. “Coefficient Alpha and Internal Structure Tests. Psychometrika, 22(3),

Davis, F.D., Bagozzi, R.P., Warshaw, P.R. 1989. “User acceptance of computer technology: a comparison of two theoretical models”, Management Science, 35(8), 982-1003.

Davis, F. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”. MIS Quarterly, 13(3), 319-340.

Fishbein, M.A., Ajzen, I. 1975. “Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research”, Addison-Wesley, Reading, MA.

Gallivan, M.J., Shen, Y. 2005. “Examining User-Technology Interaction: Toward a Sociotechnical Theory for Understanding User Adjustment to Mobile Technologies” Eleventh Americas Conference on Information Systems, Omaha.

Glynn Fergal 2016. “Secure Software Development Practices”; Veracode publication on The State of Software Security, Vol. 7,

Griffin, A., Viehland, D. 2010. “Perceived Risk and Risk Relievers Associated with Online Shopping”, ACIS Proceedings, Paper 31.

Hyeun-Suk Rhee, Cheongtag Kim, Young u. Ryu. 2009. Self-efficacy in Information Security: Its influence on end users’ information security practice behaviour”, Computer and Security, Elsevier Ltd, 28(8), 816-826.

Lee, Y., Kozar, K.A., Larsen, K.R.T. 2003. “The Technology Acceptance Model, Past, Present and Future”, Communication of the AIS, 12(50), 752 – 780.

Legris, P, Ingham, J, Collerette, P. 2003. “Why do people use information technology? A critical review of the technology acceptance model”, Information & Management,40 (3), pp. 191–204.

Livari, J. 1996. Why are CASE tools not used? Communication of the ACM , 9(10), 94 – 103

Livari, J., Igbara, M. 1995. The effect of Self-efficacy on Computer Usage. Omega Int’l Journal of Management Science, 23(6), 587 – 605.

Mathieson, K. 1991. Predicting user intentions: Comparing the technology acceptance model with the theory of planned behaviour. Information Systems Research, 2(3), 173-191.

McGraw, G. 2004. Managing Software Security Risks”, IEEE Security & Privacy. 2 (2) Mar-Apr, 80-83.

Nunnally, J. C. 1978. Psychometric Theory. McGraw-Hill, New York.

Ozer, E., Bandura, A. 1990.” Mechanisms governing empowerment effects: A self-efficacy analysis”, Journal of Personality and Social Psychology 58, 472-486.

Petersen R.C., Doody R, Kurz A, Mohs R.C, Morris J.C, Rabins P.V, 2001. “Current concepts in mild cognitive impairment. Arch Neurol 58, 1985-1992.

Sanayei, Ali; Shahin, Arash; Salimian, Hamideh. 2013. “Analyzing Factors Influencing Virtual Bank Acceptance as New Generation of e-Banking with a Case Study on e-Citizens”. New Marketing Research Journal; Autumn, Vol. 3 Issue 3.

Subramanian, G. H. 1994. ” A replication of perceived usefulness and perceived ease of use measurement”, Decision Sciences, 25(5/6), 863–873.

Szajna, B. 1994. Software evaluation and choice: predictive evaluation of the Technology Acceptance Instrument”, MIS Quarterly, 18 (3), 319–324.

Starjkovic, A.D., Luthans, F. (1998). Self- Efficacy and work related performance: A meta analysis. Psychological Bulletin”, 124(2), 240-261.

Starjkovic, A.D., Luthans, F. (1998). Social Cognitive Theory and Self-Efficacy : Going beyond traditional motivational and behavioural approaches. Organisation Dynamics, 26(4), 62–74.

Stewart, James.“CISSP Certified Information System Security Professional Study Guide Sixth Edition” Canada: John Wiley & Sons, Inc. Pp. 275-319. ISBN 978-1-118-31417- 3.

Syed Rizwan Ahmed (2007). “Secure Software Development – Identification of Security Activities and Their Integration in Software Development Lifecyle”, Master Thesis, Blekinge Tekniska, Hogskola- Sweden, March 2007.

Taylor, S., Todd, P.A. 1995a. “Understanding information technology usage: a test of competing models”, Information Systems Research, 6(2), 144-176.

Taylor, S., Todd, P.A. 1995b. “Assessing IT Usage, The role of Prior Experience”, MIS Quarterly, 19(4), 561-570.

Venkatesh, V., Davis, F. D., 2000. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field”, Management Science, 46(2), 86-204.

Viehland, Dennis, Zhao, Fei 2010. The Future of Personal Area Networks in a Ubiquitous Computing World. In: IJAPUC, 2 (2), 30-44.

Downloads

Published

2017-11-22

Issue

Section

Articles