The Web of System Performance: Extending the TAM Model

Information technology can substantially enhance a wide variety of work performances, but such gains are lost if people cannot use the applications. Hence the Technology Acceptance Model (TAM) model successfully made usability a key application quality requirement, alongside functionality. However the field of quality systems requirements includes factors distinct from usability. The Web of System Performance (WOSP) model extends the TAM approach, adding requirements like security, connectivity, flexibility, extendibility, privacy, and reliability as possible factors. This paper reports a conjoint analysis of the contribution of these factors in a proposed corporate software purchase of browser. It finds security, privacy, usability, functionality, reliability and connectivity are the main factors users would consider in such a software purchase.

[1]  Mark Fischetti,et al.  Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .

[2]  Olivia R. Liu Sheng,et al.  Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..

[3]  Leslie P. Willcocks,et al.  Measuring organizational IS effectiveness: an overview and update of senior management perspectives , 2002, DATB.

[4]  Steven L. Alter A General, Yet Useful Theory of Information Systems , 1999, Commun. Assoc. Inf. Syst..

[5]  John Mylopoulos,et al.  Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.

[6]  Ian Sommerville,et al.  Software Engineering (7th Edition) , 2004 .

[7]  William A. Wulf,et al.  A practical approach to security assessment , 1998, NSPW '97.

[8]  Julio Cesar Sampaio do Prado Leite,et al.  Non-functional requirements: from elicitation to modelling languages , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.

[9]  Richard Hackworth,et al.  OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.

[10]  John M. Boone,et al.  INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .

[11]  Sirkka L. Jarvenpaa,et al.  Information technology alignment or “fit” in highly turbulent environments: the concept of flexibility , 1994, SIGCPR '94.

[12]  David Wright,et al.  Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..

[13]  Erik Brynjolfsson,et al.  The productivity paradox of information technology , 1993, CACM.

[14]  Brian Whitworth,et al.  The WOSP Model: Balanced Information System Design and Evaluation , 2003, Commun. Assoc. Inf. Syst..

[15]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[16]  Richard J. Cleary,et al.  Statistical Methods for Engineers , 1999 .

[17]  Louis Raymond,et al.  Development of a measure to assess the quality of user-developed applications , 1997, DATB.

[18]  Rolph E. Anderson,et al.  Multivariate Data Analysis with Readings , 1979 .

[19]  Brian Whitworth,et al.  Spam and the social-technical gap , 2004, Computer.

[20]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[21]  Edward Tenner,et al.  Why Things Bite Back , 1997 .

[22]  Melinda A. Miller,et al.  Statistical Methods for Engineers , 1984, Technometrics.

[23]  William E. McCarthy,et al.  Agility---: the key to survival of the fittest in the software market , 2003, CACM.

[24]  Erland Jonsson,et al.  An integrated framework for security and dependability , 1998, NSPW '98.

[25]  H. Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992, Dependable Computing and Fault-Tolerant Systems.

[26]  Rolph E. Anderson,et al.  Multivariate data analysis (4th ed.): with readings , 1995 .

[27]  Hermann Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992 .

[28]  A. Tversky,et al.  Judgment under Uncertainty , 1982 .

[29]  Bill McCarty,et al.  Java Distributed Objects , 1998 .

[30]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[31]  Akhilesh Bajaj,et al.  A Study of Senior Information Systems Managers' Decision Models in Adopting New Computing Architectures , 2000, J. Assoc. Inf. Syst..