Exploratory centered PCA for dimensionality reduction on security modelling of TAM: An e-learning perspective

Software organizations and educational institutions rely heavily upon e-learning technologies nowadays. There is a requirement to know how numerous interventions can influence the recognized determinants of IT design, acceptance and usage. The statistical meta-analysis of several prototypes, particularly the technology acceptance model (TAM) studies have shown that it is a valid and robust model that has been very widely used, but which hypothetically has broader applicability. Though TAM has been considered to be one of the most widely used models in Information Systems and Technology, however, it is imperfect. There have been numerous researches in TAM involving students, professionals and general users. There are no studies till date that have considered into the trait of trust, perceived security, perceived privacy and information quality in e-learning technologies. To address this gap in the literature, the research work tries to draw from the existing research, particularly the work on the determinants of perceived usefulness and perceived ease of use, and to develop a more robust model. The research work aims in calculating the validity of the data using Cronbach's alpha on the data set. Dimensionality reduction of the data is attempted by using Principal Component Analysis (PCA). This method of Dimensionality reduction offers a robust way of factor identification by constructing Rotated Component matrices, and by thus proposing an efficient user-centric design model for software establishments and educational institutions in evolving e-learning solutions. The results of the proposed research would append up literature to the design and implementation phases of software engineering concepts.

[1]  R. Shroff,et al.  Analysis of the technology acceptance model in examining students' behavioural intention to use an e-portfolio system , 2011 .

[2]  Fred D. Davis,et al.  Dead Or Alive? The Development, Trajectory And Future Of Technology Adoption Research , 2007, J. Assoc. Inf. Syst..

[3]  Martin Wetzels,et al.  Technology acceptance : a meta-analytical view on subjective norm and moderation , 2006 .

[4]  S.-S. Liaw,et al.  Understanding user perceptions of World-wide web environments , 2002, J. Comput. Assist. Learn..

[5]  Hock-Hai Teo,et al.  Evaluating information accessibility and community adaptivity features for sustaining virtual learning communities , 2003, Int. J. Hum. Comput. Stud..

[6]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[7]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[8]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[9]  John Lim,et al.  A conceptual framework on the adoption of negotiation support systems , 2003, Inf. Softw. Technol..

[10]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[11]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[12]  Chris W. Clegg,et al.  Explaining intranet use with the technology acceptance model , 2001, J. Inf. Technol..

[13]  Muniruddeen Lallmahamood Journal of Internet Banking and Commerce an Examination of Individual's Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-commerce: Using an Extension of the Technology Acceptance Model , 2022 .

[14]  Albert L. Lederer,et al.  The technology acceptance model and the World Wide Web , 2000, Decis. Support Syst..

[15]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[16]  Muniruddeen Lallmahamood,et al.  An Examination of IndividualâÂÂs Perceived Security andPrivacy of the Internet in Malaysia and the Influence ofThis on Their Intention to Use E-Commerce: Using AnExtension of the Technology Acceptance Model , 2007 .

[17]  Vladimir I. Zuev E-Learning Security Models , 2012 .