UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
Tujuan kajian ini untuk mengkaji hubungan antara Sistem Pemantauan Rangkaian
Komputer (SPRK) berasaskan Model SPRK-UTAUT dengan penerimaan Guru TMK.
Model ini merupakan lanjutan model Unified Theory of Acceptance and Use of
Technology (UTAUT) yang menggabungkan beberapa konstruk daripada model
UTAUT dan Teori Flow. Kajian kuantitatif ini telah dilaksanakan dengan melibatkan
30 orang guru TMK daripada 11 buah sekolah menengah di Putrajaya, Malaysia.
Keputusan daripada ujian korelasi bivariat menunjukkan bahawa wujudnya hubungan
yang signifikan antara lima daripada enam pemboleh ubah tidak bersandar iaitu
Jangkaan Prestasi (r=0.58, p |
References |
1Bestari Net. (n.d.). Retrieved from http://www.moe.edu.my/btp
57% of Employees Use Work Instant Messaging for Personal Reasons, According to META Group; Advice to CIOs: At Minimum, Develop an IM Policy Now to Regulate Use. (2004). Retrieved from http://www.thefreelibrary.com/57%25+of+Employees+Use+Work+Instant+M essaging+for+Personal+Reasons,...-a0124492113
Abdul Hamid, N. (2011). Development and Validation of Knowledge Society Model and Indicators in the Malaysian Context. Universiti Kebangsaan Malaysia.
Abdullah, C. A., Qistina, N., & Ali, H. (2010). Penggunaan Teknologi Maklumat Dan Komunikasi (ICT) Dalam Kalangan Guru-Guru Sekolah Kebangsaan. Penggunaan Teknologi Maklumat Dan Komunikasi (ICT) Dalam Kalangan Guru-Guru Sekolah Kebangsaan.
Abras, C., Maloney-Krichmar, D., & Preece, J. (2004). User-centered design. Bainbridge, W. Encyclopedia of Human-Computer Interaction. Thousand Oaks: Sage Publications, 37(4), 445–456.
Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: a replication. MIS Quarterly, 227–247.
Ajzen, I. (1985). From Intentions to Actions: A Theory of Planned Behavior. In Action Control (pp. 11–39). https://doi.org/10.1007/978-3-642-69746-3_2
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
Ajzen, I. (2005). Attitudes, personality, and behavior ((2nd edition). Berkshire, UK: Open University Press-McGraw Hill Education.
Ajzen, I., Fishbein, M., Atomic, I., Agency, E., Federal, T., & Commission, T. (1980). Theory of Reasoned Action/Theory of Planned Behavior. Social Psychology, 2007, 67–98. Retrieved from http://hsc.usf.edu/~kmbrown/TRA_TPB.htm
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
Al-Qeisi, K., Dennis, C., Alamanos, E., & Jayawardhena, C. (2014). Website design quality and usage behavior: Unified Theory of Acceptance and Use of Technology. Journal of Business Research, 67, 2282–2290. https://doi.org/10.1016/j.jbusres.2014.06.016
Alapetite, A., Andersen, H. B., & Hertzum, M. (2009). Acceptance of speech recognition by physicians: A survey of expectations, experiences, and social influence. International Journal of Human-Computer Studies, 67(1), 36–49.
Ali, R. A., & Arshad, M. R. M. (2016). Perspectives of students’ behavior towards mobile learning (M-learning) in Egypt: an extension of the UTAUT model. Engineering, Technology & Applied Science Research, 6(4), 1109–1114.
Aripin, N., Mustafa, H., & Hussein, A. (2011). Instant Messaging (IM) used in the Workplace. Journal of Techno-Social, 3(1).
Avrahami, D., & Hudson, S. E. (2006). Responsiveness in instant messaging: predictive models supporting inter-personal communication. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Canada: ACM. https://doi.org/10.1145/1124772.1124881
Bandura, A. (1989). Human Agency in Social Cognitive Theory. The American Psychologist, 44, 1175–84. https://doi.org/10.1037/0003-066X.44.9.1175
Bangor, A., Kortum, P., & Miller, J. (2009). Determining what individual SUS scores mean: Adding an adjective rating scale. Journal of Usability Studies, 4, 114– 123. https://doi.org/66.39.39.113
Bangor, A., Kortum, P., & Miller, J. A. (2008). The system usability scale (SUS): An empirical evaluation. International Journal of Human-Computer Interaction, 24(6), 574–594.
Bangor, A., Kortum, P. T., & Miller, J. T. (2008). An Empirical Evaluation of the System Usability Scale. International Journal of Human-Computer Interaction, 24(6), 574–594. https://doi.org/10.1080/10447310802205776
Barrett, K., & Power, R. (2003). State of the art: Context management. M-Zones Research Programme, 69–87.
Barrett, R., Kandogan, E., Maglio, P. P., Haber, E. M., Takayama, L. A., & Prabaker, M. (2004). Field studies of computer system administrators: analysis of system management tools and practices (pp. 388–395). ACM.
Barrett, R., Maglio, P. P., Kandogan, E., & Bailey, J. (2004). Usable autonomic computing systems: the administrator’s perspective. In Autonomic Computing, 2004. Proceedings. International Conference on (pp. 18–25).
Batchelder, R., & Smith, D. (2001). Instant messaging: the sleeping giant. Retrieved May 30, 2013, from https://www.gartner.com/doc/338943/instant-messagingsleeping- giant
Baumgartner, I., & Green, P. (2008). Adoption of Service Oriented Computing from the IT Professionals’ Perspective: An e-Government Case Study. In D. Avison, G. M. Kasper, B. Pernici, I. Ramos, & D. Roode (Eds.), Advances in Information Systems Research, Education and Practice: IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (pp. 189–201). Boston, MA: Springer US. https://doi.org/10.1007/978-0-387-09682-7-9_16
Behling, O., & Law, K. S. (2000). Translating questionnaires and other research instruments: Problems and solutions. Quantitative applications in the social sciences. https://doi.org/10.4135/9781412986373
Bevan, N. (2001). International standards for HCI and usability. International Journal of Human-Computer Studies, 55, 533--552.
Bindu, C. S. (2015). Secure Usable Authentication Using Strong Pass text Passwords. International Journal of Computer Network and Information Security, 7(3), 57.
Birch, A., & Irvine, V. (2009). Preservice teachers’ acceptance of ICT integration in the classroom: applying the UTAUT model. Educational Media International, 46, 295–315. https://doi.org/10.1080/09523980903387506
Black, U. D. (1995). Network management standards: SNMP, CMIP, TMN, MIBs, and object libraries (2nd edition). McGraw-Hill.
Bourgonjon, J., Valcke, M., Soetaert, R., & Schellens, T. (2010). Students’ perceptions about the use of video games in the classroom. Computers & Education, 54(4), 1145–1156. https://doi.org/10.1016/j.compedu.2009.10.022
Brooke, J. (1996). SUS-A quick and dirty usability scale. Usability Evaluation in Industry, 189, 194.
Byrne, B. M. (2001). Structural equation modeling with AMOS.(Eds) Lawrence Erlbaum associates, publishers. Mahwah, New Jersey, USA.
Cai, Y. (2010). Development of an open source network management & monitoring platform for wireless broadband service provider in rural areas. 2010 IEEE International Conference on Electro/Information Technology, 1–6. https://doi.org/10.1109/EIT.2010.5612169
Celik, H. (2016). Customer online shopping anxiety within the Unified Theory of Acceptance and Use Technology (UTAUT) framework. Asia Pacific Journal of Marketing and Logistics, 28(2), 278–307.
Chan, S., Hill, B., & Yardi, S. (2005). Instant Messaging Bots: Accountability and Peripheral Participation for Textual User Interfaces. In Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work (pp. 113–115). New York, NY, USA: ACM. https://doi.org/10.1145/1099203.1099221
Chau, P. Y. K., & Hu, P. J. (2001). Information technology acceptance by individual professionals: A model comparison approach*. Decision Sciences, 32(4), 699– 719.
Chen, G., & Kotz, D. (2000). A Survey of Context-Aware Mobile Computing Research. Science (Vol. 3755). https://doi.org/10.1.1.117.4330
Chen, H., Finin, T., & Joshi, A. (2003). An ontology for context-aware pervasive computing environments. The Knowledge Engineering Review, 18(3), 197– 207.
Chen, H., Rong, W., Ma, X., Qu, Y., & Xiong, Z. (2017). An Extended Technology Acceptance Model for Mobile Social Gaming Service Popularity Analysis. Mobile Information Systems, 2017, 1–12. https://doi.org/10.1155/2017/3906953
Chin, J. P., Diehl, V. a, & Norman, L. K. (1988). Development of an instrument measuring user satisfaction of the human-computer interface. CHI ’88- Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 213–218. https://doi.org/10.1145/57167.57203
Chua, Y. P. (2006). Kaedah dan Statistik Penyelidikan. Malaysia: Mc. Graw Hill Sdn Bhd.
Chua Yan Piaw. (2014). Ujian Regresi, Analisis Faktor dan Analisis SEM. McGrawHill Education. Retrieved from http://www.mphonline.com/books/nsearchdetails.aspx?&pcode=97896757719 58
Cohen, J. (1988). Statistical power analysis for the behavioral sciences. Statistical Power Analysis for the Behavioral Sciences. https://doi.org/10.1234/12345678
Compeau, D., & Higgins, C. (1995). Computer Self-Efficacy: Development of a Measure and Initial Test. MIS Quarterly, 19, 189–211. https://doi.org/10.2307/249688
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study. MIS Quarterly, 23, 145–158. https://doi.org/10.2307/249749
Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319–340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace1. Journal of Applied Social Psychology, 22(14), 1111–1132.
Day, M., Aggarwal, S., Mohr, G., & Vincent, J. (2000). Instant messaging/presence protocol requirements (No. RFC 2779).
Day, M., Rosenberg, J., & Sugano, H. (2000). A Model for Presence and Instant Messaging. Request for Comments. IETF. Retrieved from http://www.ietf.org/rfc/rfc2778.txt
Debuse, J. C. W., Lawley, M., & Shibl, R. (2008). Educator’s perceptions of automated feedback systems. Australasian Journal of Educational Technology, 24(4), 374–386.
Deci, E. (1975). L.(1975) Intrinsic motivation. Perspectives in Social Psychology, (1).
Deci, E. L., Ryan, R. M., & Miller, K. A. (1988). Intrinsic Motivation and Self- Determination in Human Behavior. Contemporary Sociology. https://doi.org/10.2307/2070638
Dey, A. K. (2001). Understanding and using context. Personal and Ubiquitous Computing, 5(1), 4–7.
Diekhoff, G. (1992). Statistics for the social and behavioral sciences: Univariate, bivariate, multivariate. WCB/McGraw-Hill.
Digital Asia News. (2015). Malaysian Workers All For the Cloud, Whatsapp Most Popular IM App. Digital News Asia. Retrieved from https://www.digitalnewsasia.com/mobile-telco/malaysian-workers-all-for-thecloud- whatsapp-most-popular-im-app
Dillon, A., & Morris, M. G. (1996). User acceptance of new information technology: theories and models. In Annual review of information science and technology. Medford, NJ: Information Today.
Dong, C., & Dulay, N. (2011). Argumentation-based fault diagnosis for home networks (pp. 37–42). ACM.
El-gayar, O. F., & Moran, M. (2006). College Students’ Acceptance of Tablet PCs: An Application of the UTAUT Model. In 36th Annual Meeting of the Decision Sciences Institute (DSI) (pp. 2845–2850).
Endsley, M. R. (1996). Automation and situation awareness. Automation and Human Performance: Theory and Applications, 163–181.
Fogarty, J., Lai, J., & Christensen, J. (2004). Presence versus availability: the design and evaluation of a context-aware communication client. International Journal of Human-Computer Studies, 61(3), 299–317. https://doi.org/10.1016/j.ijhcs.2003.12.016
Fornell, C., & Larcker, D. F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research (JMR), 18, 39–50. https://doi.org/10.2307/3151312
Gao, Y., Xiao, C., Gao, C., & Chen, H. (2009, April). A novel design of mobile IM system with network management. In Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC'09. International Conference on(Vol. 2, pp. 492-495). IEEE.
Garrett, R. K., & Danziger, J. N. (2007). IM = Interruption Management? Instant Messaging and Disruption in the Workplace. Journal of Computer-Mediated Communication, 13(1), 23–42. https://doi.org/10.1111/j.1083- 6101.2007.00384.x
Gay, L. R., Diehl, P. L. (1992). Research Methods for Business and. Management. Mac Millan Publishing Company, New York.
Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales. Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education.
Goyal, P., Mikkilineni, R., & Ganti, M. (2009). FCAPS in the Business Services Fabric Model. In 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (pp. 45–51). https://doi.org/10.1109/WETICE.2009.21
Gupta, A. (2006). Network Management: Current Trends and Future Perspectives. Journal of Network and Systems Management, 14(4), 483–491. https://doi.org/10.1007/s10922-006-9044-7
Ha, Y. U., Jin, J.-H., & Lee, M.-J. (2015). Lets3D: A collaborative 3d editing tool based on cloud storage. International Journal of Multimedia and Ubiquitous Engineering, 10(9), 189–198.
Ha, Y. U., Jin, J.-H., & Lee, M.-J. (2016). Lets3D-C: A robust collaborative 3d editing tool utilizing distributed consensus protocol. International Journal of Applied Engineering Research, 11(2), 1203–1207.
Hair, J. F. (2010). Multivariate data analysis. Pearson College Division
Hair, J. F., Anderson, R. E., Babin, B. J., & Black, W. C. (2010). Multivariate data analysis: A global perspective (Vol. 7). Pearson Upper Saddle River, NJ.
Handayani, P. W. (2012). Analisis Faktor-Faktor Yang Memengaruhi Penerimaan Pengguna Dalam Menggunakan Sistem ERP Dengan Studi Kasus PT XYZ. Jurnal Sistem Informasi, 7(1), 69-75.
Haslina Mohd. Azizah Ahmad., A. Z. (2002). Analisis dan reka bentuk sistem UML : pendekatan berorientasikan objek menggunakan UML. Petaling Jaya: Prentice Hall.
Hildebrand, J., Houri, A., & Saint-Andre, P. (2015). Interworking between the session initiation protocol (SIP) and the extensible messaging and presence protocol (XMPP): Instant Messaging.
Hornbaek, K. (2006). Current practice in measuring usability: Challenges to usability studies and research. International Journal of Human-Computer Studies, 64(2), 79--102.
Horng, M. F., Hung, M. H., Chen, Y. T., Pan, J. S., & Huang, W. (2010). A new approach based on XMPP and OSGi technology to home automation on web. In 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010 (pp. 487–490). https://doi.org/10.1109/CISIM.2010.5643462
Huang, A. H., Hung, S.-Y., & Yen, D. C. (2007). An exploratory investigation of two internet-based communication modes. Computer Standards & Interfaces, 29(2), 238–243.
Huser, V., Narus, S. P., & Rocha, R. A. (2010). Evaluation of a flowchart-based EHR query system: A case study of RetroGuide. Journal of Biomedical Informatics, 43(1), 41–50. https://doi.org/10.1016/j.jbi.2009.06.001
Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption. Information & Management, 48(1), 1–8. https://doi.org/10.1016/j.im.2010.09.001
ISO, I. (1989). 7498-4: Information Processing Systems Open Systems Interconnection Basic Reference Model-Part 4: Management Framework. International Standards Organization, Geneva, Switzerland.
Jarvinen, J., Marttinen, A., Luoma, M., Peuhkuri, M., & Manner, J. (2017). Architecture of XMPP proxy for server-to-server connections. In Military Communications and Information Systems Conference (MilCIS), 2017 (pp. 1– 6). IEEE.
Javali, S. B., Gudaganavar, N. V, & Raj, S. M. (2011). Effect of varying sample size in estimation of coefficients of internal consistency.
Jeng, Y.-L., Huang, T.-C., Chen, C.-C., Shu, Y., & Huang, Y.-M. (2015). Developing a mobile instant messaging system for problem-based learning activity. In 2015 International Conference on Interactive Collaborative Learning (ICL) (pp. 313–316). IEEE. https://doi.org/10.1109/ICL.2015.7318044
Jong, D., & Wang, T. S. (2009, May). Student acceptance of web-based learning system. In Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09) (Vol. 8, pp. 533-536). People's Republic of China: Nanchang.
Juristo, Natalia and Moreno, Ana M and Sanchez-Segura, M.-I. (2007). Analysing the impact of usability on software design. Journal of Systems and Software, 80(9), 1506–1516. https://doi.org/http://dx.doi.org/10.1016/j.jss.2007.01.006
Kebritchi, M. (2010). Factors affecting teachers’ adoption of educational computer games: A case study. British Journal of Educational Technology, 41(2), 256– 270. https://doi.org/10.1111/j.1467-8535.2008.00921.x
Kementerian Pendidikan Malaysia. (2013). Pelan Pembangunan Pendidikan 2013- 2025.
Kirakowski, J. (1994). The use of questionnaire methods for usability assessment. Unpublished Manuscript. Retreived from Http://sumi. Ucc. Ie/sumipapp. Html.
Kirakowski, J. (1996). The software usability measurement inventory: background and usage. Usability Evaluation in Industry, 169–178.
Kortum, P. T., & Bangor, A. (2013). Usability Ratings for Everyday Products Measured With the System Usability Scale. International Journal of Human- Computer Interaction, 29, 67–76. https://doi.org/10.1080/10447318.2012.681221
Koufaris, M. (2002). Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior. Information Systems Research, 13(2), 205– 223. https://doi.org/10.1287/isre.13.2.205.83
Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and psychological measurement, 30(3), 607-610.
Leech, N. L., Barrett, K. C., & Morgan, G. A. (2014). SPSS for Intermediate Statistics: Use and Interpretation. Igarss 2014. https://doi.org/10.1007/s13398- 014-0173-7.2
Leedy, P. D., & Ormrod, J. E. (2001). Practical research. Pearson education international.
Li, B., Huang, W., Gao, L., & Li, D. (2005). U.S. Patent Application No. 10/698,675.
Li, D., Chau, P., & Lou, H. (2005). Understanding individual adoption of instant messaging: An empirical investigation. Journal of the Association for Information Systems, 6(4), 102–129.
Li, W. (2010). Virtual knowledge sharing in a cross-cultural context. Journal of Knowledge Management, 14(1), 38–50.
Lin, C.-P., & Anol, B. (2008). Learning online social support: an investigation of network information technology based on UTAUT. Cyberpsychology and Behavior, 11, 268–272.
Lindgaard, G. (1989). Testing the usability of interactive computer systems. In Testing the usability of interactive computer systems. Proceedings of Workshop at HCI Australia (Vol. 89, pp. 1–13).
Liu, W., Li, X., & Huang, D. (2011). A survey on context awareness. In Computer Science and Service System (CSSS), 2011 International Conference on (pp. 144–147). IEEE.
Lu, Y., Zhou, T., & Wang, B. (2009). Exploring Chinese users’ acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory. Computers in Human Behavior, 25(1), 29–39. https://doi.org/10.1016/j.chb.2008.06.002
Mahmoud, M., Aly, S. G., Sabry, A., & Hamza, M. (2009). A Jabber Based Framework for Building Communication Capable Java Mobile Applications. International Journal of Information Technology, 15(1).
Maslin, M., & Ramlah, H. (2008). User acceptance of information technology: Understanding theories and models. Selangor: Venton Publishing (M) Sdn. Bhd.
McClo&kcy, D. (2003). Evaluating electronic commerce acceptance with the technology acceptance model. Information Technology and Organizations: Trends, Issues, Challenges and Solutions, 1, 413.
McCombs, J. (2012). A Path Analysis of the Behavioral Intention of Secondary Teachers to Integrate Technology. In P. Resta (Ed.), Proceedings of Society for Information Technology & Teacher Education International Conference 2012 (pp. 3392–3399). Austin, Texas, USA: AACE.
Ming, T. S., Azman, H., Nambiar, R., Wah, L. K., Keong, Y. C., & Bidmeshki, L. (2009). Teachers’ views of their involvement in an online community of practice project. CALL-EJ Online, 11(1).
Moon, J.-W., & Kim, Y.-G. (2001). Extending the TAM for a World-Wide-Web context. Information & Management, 38(4), 217–230.
Moran, M., Hawkes, M., & El Gayar, O. (2010). Tablet Personal Computer Integration in Higher Education: Applying the Unified Theory of Acceptance and Use Technology Model to Understand Supporting Factors. Journal of Educational Computing Research, 42(1), 79–101. https://doi.org/10.2190/EC.42.1.d
Nardi, B. A., Whittaker, S., & Bradner, E. (2000). Interaction and Outeraction: Instant Messaging in Action. In Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work (pp. 79–88). New York, NY, USA: ACM. https://doi.org/10.1145/358916.358975
Nazareth, D. L., & Choi, J. (2014). A System Dynamics Model for Information Security Management. Information & Management, 52(1), 123–134. https://doi.org/10.1016/j.im.2014.10.009
Nielsen, J. (1994). Usability engineering. Access Online via Elsevier.
Nielsen, J. (1994). Usability inspection methods. In Conference Companion on Human Factors in Computing Systems (pp. 413–414). New York, NY, USA: ACM. https://doi.org/10.1145/259963.260531
Nielsen, J. (2003). Usability 101: Introduction to usability.
Nugroho, Hargyo Tri and Wicaksono, B. A. (2013). Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System. ISICO 2013.
Osborne, J. W., & Overbay, A. (2004). The power of outliers (and why researchers should always check for them). Practical Assessment, Research & Evaluation, 9(6), 1–12.
Ou, C. X. J., Davison, R. M., Zhong, X., & Liang, Y. (2010). Empowering employees through instant messaging. Information Technology & People, 23(2), 193– 211. https://doi.org/10.1108/09593841011052165
Oye, N. D., Rabin, Z. A., & Iahad, N. A. (2011). A Model of ICT Acceptance and Use for Teachers in Higher Education Institutions. International Journal of Computer Science & Communication Networks, 1(1).
Pallant, J. (2013). SPSS survival manual. McGraw-Hill Education (UK).
Park, K. S., & Hwan Lim, C. (1999). A structured methodology for comparative evaluation of user interface designs using usability criteria and measures. International Journal of Industrial Ergonomics, 23(5), 379–389.
Pavlou, G. (2007). On the evolution of management approaches, frameworks and protocols: a historical perspective. Journal of Network and Systems Management, 15(4), 425-445.
Pembestarian Sekolah. (2012). Retrieved May 12, 2013, from http://pembestarian.wordpress.com/
Perttunen, M., & Riekki, J. (2004). Inferring presence in a context-aware instant messaging system. Intelligence in Communication Systems, 160–174.
Rajalahti, T., & Kvalheim, O. M. (2011). Multivariate data analysis in pharmaceutics: A tutorial review. International Journal of Pharmaceutics. Pearson College Division. https://doi.org/10.1016/j.ijpharm.2011.02.019
Raman, L. (1998). OSI systems and network management. Communications Magazine, IEEE, 36.
Ramayah, T. (2010). The role of voluntariness in distance education students’ usage of a course website. TOJET, 9(3), 96–105.
Rogers, E. M. (1983). Diffusion of innovations. An integrated approach to communication theory and research (Vol. 3). Simon and Schuster. https://doi.org/10.1525/aa.1963.65.5.02a00230
Rondan-Cataluña, F. J., Arenas-Gaitán, J., & Ramírez-Correa, P. E. (2015). A comparison of the different versions of popular technology acceptance models: A non-linear perspective. Kybernetes, 44(5), 788–805.
Royce, W. W. (1970). Managing the development of large software systems. In proceedings of IEEE WESCON (Vol. 26). Los Angeles.
Ryan, N. S., Pascoe, J., & Morse, D. R. (1998). Enhanced reality fieldwork: the context-aware archaeological assistant. In Computer applications in archaeology. Tempus Reparatum.
Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.
Saiful afzan baru, Lazim Abdullah, Ali, A., & Yusoff, H. (2014). Pemodelan Penerimaan Pelajar Terhadap Persekitaran Pembelajaran Maya ( Vle ). Journal of Business and Social Development Volume 2 Number 2, September 2014: 36-47, 2(2), 36–47.
Saint-Andre, P. (2004). Extensible Messaging and Presence Protocol (XMPP): Core. Security. IETF. Retrieved from http://www.ietf.org/rfc/rfc3920.txt
Saint-Andre, P. (2005). Streaming xml with jabber/xmpp. Internet Computing, IEEE, (October), 82–89.
Saint-Andre, P. (2011). Extensible messaging and presence protocol (XMPP): Instant messaging and presence. Retrieved from http://xml2rfc.tools.ietf.org/html/rfc6121
Santoso, H. B., Fadhilah, S., Nurrohmah, I., & Goodridge, W. H. (2016). The usability and user experience evaluation of web-based online self-monitoring tool: Case study human-computer interaction course. In User Science and Engineering (i-USEr), 2016 4th International Conference on (pp. 122–127). IEEE.
Sauro, J. (2011). Measuring Usability With The System Usability Scale (SUS).
Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. In Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on (pp. 85–90). IEEE.
Schilit, B. N., & Theimer, M. M. (1994). Disseminating active map information to mobile hosts. Network, IEEE, 8(5), 22–32.
Schmidt, A., Beigl, M., & Gellersen, H.-W. (1999). There is more to context than location. Computers & Graphics, 23(6), 893–901. https://doi.org/http://dx.doi.org/10.1016/S0097-8493(99)00120-X
Shackel, B. (1991). Usability-context, framework, definition, design and evaluation. Human Factors for Informatics Usability, 21–37.
SKMM. (2008). Household use of the Internet survey 2008. Retrieved January. Retrieved from http://www.skmm.gov.my/skmmgovmy/files/attachments/HUIS08_02.pdf
Sloman, M. (1994). Network and distributed systems management. Addison-Wesley Longman Publishing Co., Inc.
Suki, N. M., & Ramayah, T. (2010). User acceptance of the e-government services in Malaysia: structural equation modelling approach. Interdisciplinary Journal of Information, Knowledge, and Management, 5, 395–413.
Sundaravej, T. (2010). Empirical validation of unified theory of acceptance and use of technology model. Journal of Global Information Technology Management, 13(1), 5–27.
T. Ramayah ; Lee Sze Lin. (2005). kesan persepsi kebergunaan, kesenangan mengguna dan keseronokan mengguna terhadap penggunaan emel. Jurnal Kemanusiaan, 5, 23–36.
Tabachnick, B. G., & Fidell, L. S. (1996). Analysis of covariance. Using Multivariate Statistics, 8(1), 321–374.
Tabachnick, B. G., & Fidell, L. S. (2007). Experimental designs using ANOVA. Thomson/Brooks/Cole.
Tan, L., & Wang, N. (2010). Future internet: The internet of things. In Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on (Vol. 5, pp. V5-376). IEEE.
Taylor, S., & Todd, P. A. (1995). Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research. https://doi.org/10.1287/isre.6.2.144
Tech Daily. (2011). Malaysian No 1 in Social Networking. TechDaily.
Teo, T. (2011). Factors influencing teachers’ intention to use technology: Model development and test. Computers & Education, 57(4), 2432–2440. https://doi.org/10.1016/j.compedu.2011.06.008
Teo, T. (2011). Technology acceptance research in education. In Technology acceptance in education (pp. 1–5). Springer.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS Quarterly, 125–143.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience on personal computer utilization: testing a conceptual model. Journal of Management Information Systems, 11(1), 167–187.
Triandis, H. C. (1979). Values, attitudes, and interpersonal behavior. In Nebraska symposium on motivation. University of Nebraska Press.
Tullis, T. S., & Stetson, J. N. (2004). A comparison of questionnaires for assessing website usability. In Journal of Global Information Technology Management.
Van Schaik, P. (2009). Unified Theory of Acceptance and use for Websites used by Students in Higher Education. Journal of Educational Computing Research, 40(2), 229–257. https://doi.org/10.2190/EC.40.2.e
Vaziri, D. D., Aal, K., Ogonowski, C., Von Rekowski, T., Kroll, M., Marston, H. R., Wieching, R. (2016). Exploring user experience and technology acceptance for a fall prevention system: results from a randomized clinical trial and a living lab. European Review of Aging and Physical Activity, 13(1), 6.
Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model. Information Systems Research, 11(4), 342–365. https://doi.org/10.1287/isre.11.4.342.11872
Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science. https://doi.org/10.1287/mnsc.46.2.186.11926
Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 115–139.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27, 425– 478. https://doi.org/10.2307/30036540
Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.
Vliet, H. Van. (2007). Software Engineering: Principles and Practice. Requirements Engineering. https://doi.org/10.1016/0950-5849(94)90015-9
Walczak, D., Wrzos, M., Radziuk, a., Lewandowski, B., & Mazurek, C. (2012). Machine-to-Machine communication and data processing approach in Future Internet applications. 2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), 1–5. https://doi.org/10.1109/CSNDSP.2012.6292779
Wang, W., Hsieh, J. P.A., & Song, B. (2012). Understanding User Satisfaction With Instant Messaging: An Empirical Survey Study. International Journal of Human Computer Interaction, 28, 153–162. https://doi.org/10.1080/10447318.2011.568893
Wenzel, Matthias and Meinel, C. (2016). Full-body WebRTC video conferencing in a web-based real-time collaboration system. In Computer Supported Cooperative Work in Design (CSCWD), 2016 IEEE 20th International Conference on (pp. 334--339).
Wright, B. D., & Stone, M. H. (1979). Best Test Design. Rasch Measurement
Wu, Y.-L., Tao, Y.-H., & Yang, P.-C. (2008). The use of unified theory of acceptance and use of technology to confer the behavioral model of 3G mobile telecommunication users. Journal of Statistics and Management Systems, 11(5), 919–949.
Ya’acob, A., Nor, N., & Azman, H. (2005). Implementation of the Malaysian Smart School: An investigation of teaching-learning practices and teacher-student readiness. Internet Journal of E-Language Learning & Teaching.
Zhang, P., Li, N., & Sun, H. (2006). Affective quality and cognitive absorption: Extending technology acceptance research. Proceedings of the Annual Hawaii International Conference on System Sciences, 8(C), 1–10. https://doi.org/10.1109/HICSS.2006.39
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |