Search results1 – 10 of 27
Software, to be useful to executives, must be flexible, easy‐to‐useand enable executives to digest vast amounts of information in a waythat diminishes their computer…
Software, to be useful to executives, must be flexible, easy‐to‐use and enable executives to digest vast amounts of information in a way that diminishes their computer inhibitions. Describes the characteristics and technical aspects of executive information systems (EISs), a class of software that meets the requirements of executives in all their many and varied roles.
By using a technology acceptance model (TAM) on survey results collected from two member schools of a Vietnamese educational institution, this study aims to uncover the…
By using a technology acceptance model (TAM) on survey results collected from two member schools of a Vietnamese educational institution, this study aims to uncover the key factors that affect students’ acceptance of e-learning during the Covid-19 period.
A bilingual questionnaire in English and Vietnamese was delivered. It was pre-tested on 30 participants before it was finalized. The authors first reviewed the measurement model and made adjustments to the theoretical TAM model. Then the adjusted TAM was used to investigate the relationships of the constructs in the model.
The results of the structural model show that computer self-efficacy (CSE) has a positive impact on perceived ease of use (PEOU). There is also a positive relationship between system interactivity (SI) and PEOU. Surprisingly, the authors documented that PEOU has no significant impact on students’ attitudes (ATT). The results show that SI can moderately affect ATT. Finally, it is noted that the social factor (SF) directly affects the student’s attitudes (ATT).
This study contains three limitations. First, as this study only focuses on undergraduate programs, readers should be careful in applying the findings and/or implications of this study to other education levels such as K-12, vocational training and postgraduate programs. Second, the findings are generated within the context of one type of e-learning, conducted via Google Meet. Therefore, future research is needed to provide further validation and comparison across other forms of e-learning. Finally, to further prevent the common bias problem, future research should use both five-point and seven-point Likert scales for the response options in the survey, as well as use negatively worded items. This will help prevent respondents from providing similar answers to all questions.
This study has both theoretical and practical implications. From a theoretical perspective, the study can provide a solid framework for similar studies. From a practical perspective, this study offers implications for governments and universities in the process of adopting e-learning, given that the Covid-19 pandemic is currently in its second and more dangerous wave.
We have long been obsessed with the dream of creating intelligent machines. This vision can be traced back to Greek civilization, and the notion that mortals somehow can…
We have long been obsessed with the dream of creating intelligent machines. This vision can be traced back to Greek civilization, and the notion that mortals somehow can create machines that think has persisted throughout history. Until this decade these illusions have borne no substance. The birth of the computer in the 1940s did cause a resurgence of the cybernaut idea, but the computer's role was primarily one of number‐crunching and realists soon came to respect the enormous difficulties in crafting machines that could accomplish even the simplest of human tasks.
The purpose of this paper is to identify key risks that are posed to the security of a site and building perimeters in the first and second lines of defense against…
The purpose of this paper is to identify key risks that are posed to the security of a site and building perimeters in the first and second lines of defense against terrorism, and are relevant to facility managers.
A qualitative approach to the literature review was applied. This involved an extensive literature search of existing peer‐reviewed research papers, as well as state and federal reports to mark crucial issues relating to the security of a facility. Strategies to deal with the critical issues pertaining to the security of a facility were reviewed, based on the literature.
The paper identifies major security risks suggested by the literature and lists strategies to address those risks. The paper also proposes recommendations made by the literature; their implementation may provide a higher level of security to key areas located in the first and second lines of building defense.
The site and building perimeter areas that offer great potential for avoiding and deterring terror attacks are often neglected in terms of security planning, which seriously hampers efforts to provide an enhanced level of security to the facility. The paper points out these areas and major security issues related to them, so they can be taken care of by design professionals as well as facility managers.
The paper provides a comprehensive and detailed review of various aspects tied to the security level of critical areas of the building and site perimeters that could be useful to facility managers of critical facilities.