Nor Adnan Bin Yahaya
University Malaysia of Computer Science & Engineering Selangor, Malaysia

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Acceptance of Information Technology Security Among Universities: A Model Development Study Ahmad Sulhi; Nor Adnan Bin Yahaya; Aang Subiyakto
Journal of Applied Data Sciences Vol 4, No 4: DECEMBER 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i4.142

Abstract

This study aims to investigate the acceptance model of information technology security among religious higher education institutions in Indonesia, especially focusing on lecturers or lecturers. This study adopts the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model with the addition of additional variables, namely security, privacy, and trust. As reflected in various studies of information systems (IS), many IS models are developed by adopting, combining, and adapting previous models. The researcher in this study developed his model based on input-process-output logic as well as processional and causal models of the information systems (IS) success model. The resulting model has a structure with ten variables and 43 indicators. The relationship between variables is explained through 19 influence links. In addition, in the implementation of the study, the authors break down the model into more detailed assessment instrument levels. Although this model development study may have limitations related to the assumptions used and the researcher's understanding, it has the potential to make a theoretical contribution in terms of the proposition of the new model. In addition, it is important to consider transparency in the development of proposed models and data collection instruments presented as practical points for further research in the context of religious higher education institutions in Indonesia.