Network Path Analysis for developing an enhanced TAM model: A user-centric e-learning perspective

Abstract The substantial use of Internet technologies for training and learning purposes of organisations has created a need to comprehend how various user-centric involvements can impact the recognized determinants of Information Technology design, acceptance and usage. This paper focuses at building a user centric framework for e-learning technologies, incorporating the constructs of security, privacy and trust with the proposal of a Network Path Analysis (NPA) algorithm. The existing Technology Acceptance Models (TAM) models are concerned with general e-commerce and retailing solutions alone. An enhanced version of the TAM model for the user-centric framework design of e-learning solutions is developed in this paper. An NPA algorithm focussing on the confirmatory data analysis of the dataset is developed to generate network models among the variables in e-learning solutions. User centric attributes, like Perceived Usefulness, Perceived Ease of Use, Perceived Trust, Perceived Security, Perceived Privacy, Information Quality, Behavioral Intention to Use the System and Actual System Use are measured and analysed to create the enhanced model.

[1]  Alexander Serenko,et al.  Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users , 2011, MIS Q..

[2]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[3]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[4]  Annelies Raes,et al.  Mobile Learning in Secondary Education: Teachers' and Students' Perceptions And Acceptance Of Tablet Computers , 2014, Int. J. Mob. Blended Learn..

[5]  Stefan Rüping,et al.  On Integrating Data Mining into Business Processes , 2010, BIS.

[6]  Meng Chang Chen,et al.  Extending the TAM model to explore the factors that affect Intention to Use an Online Learning Community , 2010, Comput. Educ..

[7]  Richard P. Bagozzi,et al.  The Role of Signaling Identity in the Adoption of Personal Technologies , 2014, J. Assoc. Inf. Syst..

[8]  Viswanath Venkatesh,et al.  Technology Acceptance Model And The Unified Theory Of Acceptance And Use Of Technology , 2015 .

[9]  Glenn Gamst,et al.  Applied Multivariate Research: Design and Interpretation , 2005 .

[10]  John W. Creswell,et al.  Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2010 .

[11]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[12]  John R. Rossiter,et al.  How to use C-OAR-SE to design optimal standard measures , 2016 .

[13]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[14]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[15]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[16]  Nelson Oly Ndubisi,et al.  Consumer attitudes, system's characteristics and internet banking adoption in Malaysia , 2006 .

[17]  Kai H. Lim,et al.  Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms , 2014, MIS Q..

[18]  Hamed Taherdoost,et al.  Development of an adoption model to assess user acceptance of e-service technology: E-Service Technology Acceptance Model , 2018, Behav. Inf. Technol..