The Demise of Novell Netware—Did Perceptions Related to Network Administration Play a Role?

In this study the authors examine some possible reasons for Novell Netware's fall from dominance in the 1990s to its near disappearance. The authors examine the role of the external variables security, productivity, and sharing on an administrator's perceptions and intention to use the software within the Technology Acceptance Model (TAM). The results show that difficulty in administration was not responsible for Netware's demise; on the contrary, Netware's environment resulted in a positive intention to use it.

[1]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[2]  Blanca Hernández,et al.  Extending the technology acceptance model to include the IT decision-maker: A study of business management software , 2008 .

[3]  M. Koufaris,et al.  INITIAL PERCEPTIONS OF COMPANY TRUSTWORTHINESS ONLINE: A COMPREHENSIVE MODEL AND EMPIRICAL TEST , 2002 .

[4]  Terry L. Boles,et al.  Share and Share Alike or Winner Take All?: The Influence of Social Value Orientation upon Choice and Recall of Negotiation Heuristics. , 1998, Organizational behavior and human decision processes.

[5]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[6]  Heshan Sun,et al.  An Empirical Study on the Roles of Affective Variables in User Adoption of Search Engines , 2004 .

[7]  Wanda J. Orlikowski,et al.  CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development , 1993, MIS Q..

[8]  Hans van der Heijden,et al.  Factors influencing the usage of websites: the case of a generic portal in The Netherlands , 2003, Inf. Manag..

[9]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[10]  Rossouw von Solms,et al.  Information security awareness: educating your users effectively , 1998, Inf. Manag. Comput. Secur..

[11]  Terry S. Overton,et al.  Estimating Nonresponse Bias in Mail Surveys , 1977 .

[12]  Gordon B. Davis,et al.  Testing the Determinants of Microcomputer Usage via a Structural Equation Model , 1995, J. Manag. Inf. Syst..

[13]  S. Schwartz,et al.  Value priorities and subjective well‐being: direct relations and congruity effects , 2000 .

[14]  Prashant Palvia,et al.  Factors Affecting Mobile Commerce Adoption: A Cross-Cultural Study in China and The United States , 2008, AMCIS.

[15]  Chin-Lung Hsu,et al.  Why do people play on-line games? An extended TAM with social influences and flow experience , 2004, Inf. Manag..

[16]  Solomon E. Asch,et al.  Opinions and Social Pressure , 1955 .

[17]  Matthew K. O. Lee,et al.  Acceptance of Internet-based learning medium: the role of extrinsic and intrinsic motivation , 2005, Inf. Manag..

[18]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[19]  Bassam Hasan,et al.  Delineating the effects of general and system-specific computer self-efficacy beliefs on IS acceptance , 2006, Inf. Manag..

[20]  Anol Bhattacherjee,et al.  Reconceptualizing Organizational Support and its Effect on Information Technology Usage: Evidence from the Health Care Sector , 2008, J. Comput. Inf. Syst..

[21]  Merrill Warkentin,et al.  Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security , 2004, J. Organ. End User Comput..

[22]  Kee-Young Kwahk,et al.  An Empirical Study on the Effect of Attitude Toward Change and Computer Self-Efficacy on ERP Adoption: A Comparison of the Local and Global Packages , 2008, AMCIS.

[23]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[24]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[25]  Scott L. Schneberger,et al.  Theories: For Academics and Practitioners , 2009, Inf. Syst. Manag..

[26]  Diane M. Strong,et al.  Extending the technology acceptance model with task-technology fit constructs , 1999, Inf. Manag..

[27]  Fiona Fui-Hoon Nah,et al.  An Empirical Investigation on End-Users' Acceptance of Enterprise Systems , 2004, Inf. Resour. Manag. J..

[28]  H. Chan,et al.  The Technology Acceptance Model for Competitive Software Products , 2004 .

[29]  J. Hair Multivariate data analysis , 1972 .

[30]  Irwin Brown,et al.  Internet Access in South African Homes: Factors Influencing Consumer Choice , 2008, AMCIS.

[31]  S. M. Arnsten Intrinsic motivation. , 1990, The American journal of occupational therapy : official publication of the American Occupational Therapy Association.

[32]  Wanda J. Orlikowski,et al.  Information Technology and the Structuring of Organizations , 2011 .

[33]  Henri Barki,et al.  Explaining the Role of User Participation in Information System Use , 1994 .

[34]  G. Olson The Nature of Group Work , 1989 .

[35]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[36]  Cynthia M. Jackson,et al.  Toward an Understanding of the Behavioral Intention to Use an Information System , 1997 .

[37]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[38]  Susan A. Brown,et al.  Do I really have to? User acceptance of mandated technology , 2002, Eur. J. Inf. Syst..

[39]  Arthur M. Horne,et al.  Treating conduct and oppositional defiant disorders in children , 1990 .

[40]  Alexander Hars,et al.  Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..

[41]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[42]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[43]  Budi Arief,et al.  Computer security impaired by legitimate users , 2004, Comput. Secur..

[44]  Deepak Khazanchi,et al.  From Profiles to Patterns: A New View of Task-Technology Fit , 2008, Inf. Syst. Manag..

[45]  Syracuse University hesun An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines , 2004 .

[46]  Peter A. Todd,et al.  Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..

[47]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[48]  Barbara M. Byrne,et al.  Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[49]  Mun Y. Yi,et al.  Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model , 2003, Int. J. Hum. Comput. Stud..

[50]  Dale Goodhue,et al.  Comment on Benbasat and Barki's "Quo Vadis TAM" article , 2007, J. Assoc. Inf. Syst..

[51]  Younghwa Lee,et al.  The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..

[52]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[53]  Ibrahim M. Al-Jabri,et al.  End User Adoption of ERP Systems: Investigation of Four Beliefs , 2008, AMCIS.

[54]  William J. Caelli Trusted ...or... trustworthy: the search for a new paradigm for computer and network security , 2002, Comput. Secur..

[55]  Omar F. El-Gayar,et al.  EXAMINING STUDENTS' ACCEPTANCE OF TABLET PC USING TAM , 2007 .

[56]  Jessica Santos E‐service quality: a model of virtual service quality dimensions , 2003 .

[57]  C. Ennew,et al.  Importance‐Performance Analysis and the Measurement of Service Quality , 1993 .

[58]  Albert H. Segars,et al.  Re-examining perceived ease of use and usefulness , 1993 .

[59]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[60]  Margaret Tan,et al.  Factors Influencing the Adoption of Internet Banking , 2000, J. Assoc. Inf. Syst..

[61]  Judy Chuan-Chuan Lin,et al.  Towards an understanding of the behavioural intention to use a web site , 2000, Int. J. Inf. Manag..

[62]  Jae-Shin Lee,et al.  Technology Acceptance and Social Networking in Distance Learning , 2003, J. Educ. Technol. Soc..

[63]  Mark Keil,et al.  Usefulness and ease of use: field study evidence regarding task considerations , 1995, Decis. Support Syst..

[64]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[65]  Tino Fenech,et al.  Web retailing adoption: exploring the nature of internet users Web retailing behaviour , 2003 .

[66]  Izak Benbasat,et al.  Quo vadis TAM? , 2007, J. Assoc. Inf. Syst..

[67]  Raafat George Saadé,et al.  Viability of the "Technology Acceptance Model" in Multimedia Learning Environments: A Comparative Study , 2007 .

[68]  Jaejeung Rho,et al.  Extending the TAM for a t-commerce , 2005, Inf. Manag..

[69]  Wei Wang,et al.  ScholarWorks @ Georgia State University , 2022 .

[70]  Steven Furnell,et al.  Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..

[71]  Cheng-Kiang Farn,et al.  Acceptance of electronic tax filing: A study of taxpayer intentions , 2006, Inf. Manag..

[72]  Richard B Gunderman,et al.  The adoption of innovation. , 2008, Radiology.

[73]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Information Manager (The).

[74]  David Gefen,et al.  Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice , 2000 .

[75]  Young-Gul Kim,et al.  Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..

[76]  A. Parasuraman,et al.  Technology Readiness Index (Tri) , 2000 .

[77]  P. Korgaonkar A Multivariate Analysis of Web Usage , 1999 .

[78]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[79]  Jorgen P. Bansler,et al.  Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices , 2000, J. Assoc. Inf. Syst..

[80]  Paul Jen-Hwa Hu,et al.  Information Technology Acceptance by Individual Professionals: A Model Comparison Approach , 2001, Decis. Sci..

[81]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[82]  Timothy Paul Cronan,et al.  On the Repeated Test-Retest Reliability of the End-User Computing Satisfaction Instrument: A Comment* , 1994 .

[83]  Gary F. Templeton,et al.  Securing Personal Information Assets: Testing Antecedents of Behavioral Intentions , 2008, AMCIS.

[84]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[85]  Soon Ang,et al.  The Adoption of TradeNet by the Trading Community: An Empirical Analysis , 1994, ICIS.