UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon

QR Code Link :

Type :thesis
Subject :QA76 Computer software
Main Author :Siti Rahayu Abdul Aziz
Title :Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2019
Corporate Name :Universiti Pendidikan Sultan Idris
PDF Guest :Click to view PDF file

Abstract : Universiti Pendidikan Sultan Idris
Tujuan kajian ini untuk mengkaji hubungan antara Sistem Pemantauan Rangkaian Komputer (SPRK) berasaskan Model SPRK-UTAUT dengan penerimaan Guru TMK. Model ini merupakan lanjutan model Unified Theory of Acceptance and Use of Technology (UTAUT) yang menggabungkan beberapa konstruk daripada model UTAUT dan Teori Flow. Kajian kuantitatif ini telah dilaksanakan dengan melibatkan 30 orang guru TMK daripada 11 buah sekolah menengah di Putrajaya, Malaysia. Keputusan daripada ujian korelasi bivariat menunjukkan bahawa wujudnya hubungan yang signifikan antara lima daripada enam pemboleh ubah tidak bersandar iaitu Jangkaan Prestasi (r=0.58, p

References

1Bestari Net. (n.d.). Retrieved from http://www.moe.edu.my/btp

 

57% of Employees Use Work Instant Messaging for Personal Reasons, According to

META Group; Advice to CIOs: At Minimum, Develop an IM Policy Now to

Regulate Use. (2004). Retrieved from

http://www.thefreelibrary.com/57%25+of+Employees+Use+Work+Instant+M

essaging+for+Personal+Reasons,...-a0124492113

 

Abdul Hamid, N. (2011). Development and Validation of Knowledge Society Model

and Indicators in the Malaysian Context. Universiti Kebangsaan Malaysia.

 

Abdullah, C. A., Qistina, N., & Ali, H. (2010). Penggunaan Teknologi Maklumat Dan

Komunikasi (ICT) Dalam Kalangan Guru-Guru Sekolah Kebangsaan.

Penggunaan Teknologi Maklumat Dan Komunikasi (ICT) Dalam Kalangan

Guru-Guru Sekolah Kebangsaan.

 

Abras, C., Maloney-Krichmar, D., & Preece, J. (2004). User-centered design.

Bainbridge, W. Encyclopedia of Human-Computer Interaction. Thousand

Oaks: Sage Publications, 37(4), 445–456.

 

Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use,

and usage of information technology: a replication. MIS Quarterly, 227–247.

 

Ajzen, I. (1985). From Intentions to Actions: A Theory of Planned Behavior. In

Action Control (pp. 11–39). https://doi.org/10.1007/978-3-642-69746-3_2

 

Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and

Human Decision Processes, 50, 179–211.

 

Ajzen, I. (2005). Attitudes, personality, and behavior ((2nd edition). Berkshire, UK:

Open University Press-McGraw Hill Education.

 

Ajzen, I., Fishbein, M., Atomic, I., Agency, E., Federal, T., & Commission, T. (1980).

Theory of Reasoned Action/Theory of Planned Behavior. Social Psychology,

2007, 67–98. Retrieved from http://hsc.usf.edu/~kmbrown/TRA_TPB.htm

 

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015).

Internet of things: A survey on enabling technologies, protocols, and

applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.

 

Al-Qeisi, K., Dennis, C., Alamanos, E., & Jayawardhena, C. (2014). Website design

quality and usage behavior: Unified Theory of Acceptance and Use of

Technology. Journal of Business Research, 67, 2282–2290.

https://doi.org/10.1016/j.jbusres.2014.06.016

 

Alapetite, A., Andersen, H. B., & Hertzum, M. (2009). Acceptance of speech

recognition by physicians: A survey of expectations, experiences, and social

influence. International Journal of Human-Computer Studies, 67(1), 36–49.

 

Ali, R. A., & Arshad, M. R. M. (2016). Perspectives of students’ behavior towards

mobile learning (M-learning) in Egypt: an extension of the UTAUT model.

Engineering, Technology & Applied Science Research, 6(4), 1109–1114.

 

Aripin, N., Mustafa, H., & Hussein, A. (2011). Instant Messaging (IM) used in the

Workplace. Journal of Techno-Social, 3(1).

 

Avrahami, D., & Hudson, S. E. (2006). Responsiveness in instant messaging:

predictive models supporting inter-personal communication. Proceedings of

the SIGCHI Conference on Human Factors in Computing Systems. Canada:

ACM. https://doi.org/10.1145/1124772.1124881

 

Bandura, A. (1989). Human Agency in Social Cognitive Theory. The American

Psychologist, 44, 1175–84. https://doi.org/10.1037/0003-066X.44.9.1175

 

Bangor, A., Kortum, P., & Miller, J. (2009). Determining what individual SUS scores

mean: Adding an adjective rating scale. Journal of Usability Studies, 4, 114–

123. https://doi.org/66.39.39.113

 

Bangor, A., Kortum, P., & Miller, J. A. (2008). The system usability scale (SUS): An

empirical evaluation. International Journal of Human-Computer Interaction,

24(6), 574–594.

 

Bangor, A., Kortum, P. T., & Miller, J. T. (2008). An Empirical Evaluation of the

System Usability Scale. International Journal of Human-Computer Interaction,

24(6), 574–594. https://doi.org/10.1080/10447310802205776

 

Barrett, K., & Power, R. (2003). State of the art: Context management. M-Zones

Research Programme, 69–87.

 

Barrett, R., Kandogan, E., Maglio, P. P., Haber, E. M., Takayama, L. A., & Prabaker,

M. (2004). Field studies of computer system administrators: analysis of system

management tools and practices (pp. 388–395). ACM.

 

Barrett, R., Maglio, P. P., Kandogan, E., & Bailey, J. (2004). Usable autonomic

computing systems: the administrator’s perspective. In Autonomic

Computing, 2004. Proceedings. International Conference on (pp. 18–25).

 

Batchelder, R., & Smith, D. (2001). Instant messaging: the sleeping giant. Retrieved

May 30, 2013, from https://www.gartner.com/doc/338943/instant-messagingsleeping-

giant

 

Baumgartner, I., & Green, P. (2008). Adoption of Service Oriented Computing from

the IT Professionals’ Perspective: An e-Government Case Study. In D.

Avison, G. M. Kasper, B. Pernici, I. Ramos, & D. Roode (Eds.), Advances in

Information Systems Research, Education and Practice: IFIP 20th World

Computer Congress, TC 8, Information Systems, September 7-10, 2008,

Milano, Italy (pp. 189–201). Boston, MA: Springer US.

https://doi.org/10.1007/978-0-387-09682-7-9_16

 

Behling, O., & Law, K. S. (2000). Translating questionnaires and other research

instruments: Problems and solutions. Quantitative applications in the social

sciences. https://doi.org/10.4135/9781412986373

 

Bevan, N. (2001). International standards for HCI and usability. International Journal

of Human-Computer Studies, 55, 533--552.

 

Bindu, C. S. (2015). Secure Usable Authentication Using Strong Pass text Passwords.

International Journal of Computer Network and Information Security, 7(3), 57.

 

Birch, A., & Irvine, V. (2009). Preservice teachers’ acceptance of ICT integration in

the classroom: applying the UTAUT model. Educational Media International,

46, 295–315. https://doi.org/10.1080/09523980903387506

 

Black, U. D. (1995). Network management standards: SNMP, CMIP, TMN, MIBs,

and object libraries (2nd edition). McGraw-Hill.

 

Bourgonjon, J., Valcke, M., Soetaert, R., & Schellens, T. (2010). Students’

perceptions about the use of video games in the classroom. Computers &

Education, 54(4), 1145–1156. https://doi.org/10.1016/j.compedu.2009.10.022

 

Brooke, J. (1996). SUS-A quick and dirty usability scale. Usability Evaluation in

Industry, 189, 194.

 

Byrne, B. M. (2001). Structural equation modeling with AMOS.(Eds) Lawrence

Erlbaum associates, publishers. Mahwah, New Jersey, USA.

 

Cai, Y. (2010). Development of an open source network management & monitoring

platform for wireless broadband service provider in rural areas. 2010 IEEE

International Conference on Electro/Information Technology, 1–6.

https://doi.org/10.1109/EIT.2010.5612169

 

Celik, H. (2016). Customer online shopping anxiety within the Unified Theory of

Acceptance and Use Technology (UTAUT) framework. Asia Pacific Journal

of Marketing and Logistics, 28(2), 278–307.

 

Chan, S., Hill, B., & Yardi, S. (2005). Instant Messaging Bots: Accountability and

Peripheral Participation for Textual User Interfaces. In Proceedings of the

2005 International ACM SIGGROUP Conference on Supporting Group Work

(pp. 113–115). New York, NY, USA: ACM.

https://doi.org/10.1145/1099203.1099221

 

Chau, P. Y. K., & Hu, P. J. (2001). Information technology acceptance by individual

professionals: A model comparison approach*. Decision Sciences, 32(4), 699–

719.

 

Chen, G., & Kotz, D. (2000). A Survey of Context-Aware Mobile Computing

Research. Science (Vol. 3755). https://doi.org/10.1.1.117.4330

 

Chen, H., Finin, T., & Joshi, A. (2003). An ontology for context-aware pervasive

computing environments. The Knowledge Engineering Review, 18(3), 197–

207.

 

Chen, H., Rong, W., Ma, X., Qu, Y., & Xiong, Z. (2017). An Extended Technology

Acceptance Model for Mobile Social Gaming Service Popularity Analysis.

Mobile Information Systems, 2017, 1–12.

https://doi.org/10.1155/2017/3906953

 

Chin, J. P., Diehl, V. a, & Norman, L. K. (1988). Development of an instrument

measuring user satisfaction of the human-computer interface. CHI ’88-

Proceedings of the SIGCHI Conference on Human Factors in Computing

Systems, 213–218. https://doi.org/10.1145/57167.57203

 

Chua, Y. P. (2006). Kaedah dan Statistik Penyelidikan. Malaysia: Mc. Graw Hill Sdn

Bhd.

 

Chua Yan Piaw. (2014). Ujian Regresi, Analisis Faktor dan Analisis SEM.

McGrawHill Education. Retrieved from

http://www.mphonline.com/books/nsearchdetails.aspx?&pcode=97896757719

58

 

Cohen, J. (1988). Statistical power analysis for the behavioral sciences. Statistical

Power Analysis for the Behavioral Sciences. https://doi.org/10.1234/12345678

 

Compeau, D., & Higgins, C. (1995). Computer Self-Efficacy: Development of a

Measure and Initial Test. MIS Quarterly, 19, 189–211.

https://doi.org/10.2307/249688

 

Compeau, D., Higgins, C. A., & Huff, S. (1999). Social Cognitive Theory and

Individual Reactions to Computing Technology: A Longitudinal Study. MIS

Quarterly, 23, 145–158. https://doi.org/10.2307/249749

 

Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User

Acceptance of Information Technology. MIS Quarterly, 13(3), 319–340.

 

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic

motivation to use computers in the workplace1. Journal of Applied Social

Psychology, 22(14), 1111–1132.

 

Day, M., Aggarwal, S., Mohr, G., & Vincent, J. (2000). Instant messaging/presence

protocol requirements (No. RFC 2779).

 

Day, M., Rosenberg, J., & Sugano, H. (2000). A Model for Presence and Instant

Messaging. Request for Comments. IETF. Retrieved from

http://www.ietf.org/rfc/rfc2778.txt

 

Debuse, J. C. W., Lawley, M., & Shibl, R. (2008). Educator’s perceptions of

automated feedback systems. Australasian Journal of Educational Technology,

24(4), 374–386.

 

Deci, E. (1975). L.(1975) Intrinsic motivation. Perspectives in Social Psychology, (1).

 

Deci, E. L., Ryan, R. M., & Miller, K. A. (1988). Intrinsic Motivation and Self-

Determination in Human Behavior. Contemporary Sociology.

https://doi.org/10.2307/2070638

 

Dey, A. K. (2001). Understanding and using context. Personal and Ubiquitous

Computing, 5(1), 4–7.

 

Diekhoff, G. (1992). Statistics for the social and behavioral sciences: Univariate,

bivariate, multivariate. WCB/McGraw-Hill.

 

Digital Asia News. (2015). Malaysian Workers All For the Cloud, Whatsapp Most

Popular IM App. Digital News Asia. Retrieved from https://www.digitalnewsasia.com/mobile-telco/malaysian-workers-all-for-thecloud-

whatsapp-most-popular-im-app

 

Dillon, A., & Morris, M. G. (1996). User acceptance of new information technology:

theories and models. In Annual review of information science and technology.

Medford, NJ: Information Today.

 

Dong, C., & Dulay, N. (2011). Argumentation-based fault diagnosis for home

networks (pp. 37–42). ACM.

 

El-gayar, O. F., & Moran, M. (2006). College Students’ Acceptance of Tablet PCs:

An Application of the UTAUT Model. In 36th Annual Meeting of the

Decision Sciences Institute (DSI) (pp. 2845–2850).

 

Endsley, M. R. (1996). Automation and situation awareness. Automation and Human

Performance: Theory and Applications, 163–181.

 

Fogarty, J., Lai, J., & Christensen, J. (2004). Presence versus availability: the design

and evaluation of a context-aware communication client. International Journal

of Human-Computer Studies, 61(3), 299–317.

https://doi.org/10.1016/j.ijhcs.2003.12.016

 

Fornell, C., & Larcker, D. F. (1981). Evaluating Structural Equation Models with

Unobservable Variables and Measurement Error. Journal of Marketing

Research (JMR), 18, 39–50. https://doi.org/10.2307/3151312

 

Gao, Y., Xiao, C., Gao, C., & Chen, H. (2009, April). A novel design of mobile IM

system with network management. In Networks Security, Wireless

Communications and Trusted Computing, 2009. NSWCTC'09. International

Conference on(Vol. 2, pp. 492-495). IEEE.

 

Garrett, R. K., & Danziger, J. N. (2007). IM = Interruption Management? Instant

Messaging and Disruption in the Workplace. Journal of Computer-Mediated

Communication, 13(1), 23–42. https://doi.org/10.1111/j.1083-

6101.2007.00384.x

 

Gay, L. R., Diehl, P. L. (1992). Research Methods for Business and. Management.

Mac Millan Publishing Company, New York.

 

Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reporting

Cronbach’s alpha reliability coefficient for Likert-type scales. Midwest

Research-to-Practice Conference in Adult, Continuing, and Community

Education.

 

Goyal, P., Mikkilineni, R., & Ganti, M. (2009). FCAPS in the Business Services

Fabric Model. In 2009 18th IEEE International Workshops on Enabling

Technologies: Infrastructures for Collaborative Enterprises (pp. 45–51).

https://doi.org/10.1109/WETICE.2009.21

 

Gupta, A. (2006). Network Management: Current Trends and Future Perspectives.

Journal of Network and Systems Management, 14(4), 483–491.

https://doi.org/10.1007/s10922-006-9044-7

 

Ha, Y. U., Jin, J.-H., & Lee, M.-J. (2015). Lets3D: A collaborative 3d editing tool

based on cloud storage. International Journal of Multimedia and Ubiquitous

Engineering, 10(9), 189–198.

 

Ha, Y. U., Jin, J.-H., & Lee, M.-J. (2016). Lets3D-C: A robust collaborative 3d

editing tool utilizing distributed consensus protocol. International Journal of

Applied Engineering Research, 11(2), 1203–1207.

 

Hair, J. F. (2010). Multivariate data analysis. Pearson College Division

 

Hair, J. F., Anderson, R. E., Babin, B. J., & Black, W. C. (2010). Multivariate data

analysis: A global perspective (Vol. 7). Pearson Upper Saddle River, NJ.

 

Handayani, P. W. (2012). Analisis Faktor-Faktor Yang Memengaruhi Penerimaan

Pengguna Dalam Menggunakan Sistem ERP Dengan Studi Kasus PT XYZ.

Jurnal Sistem Informasi, 7(1), 69-75.

 

Haslina Mohd. Azizah Ahmad., A. Z. (2002). Analisis dan reka bentuk sistem UML :

pendekatan berorientasikan objek menggunakan UML. Petaling Jaya: Prentice

Hall.

 

Hildebrand, J., Houri, A., & Saint-Andre, P. (2015). Interworking between the session

initiation protocol (SIP) and the extensible messaging and presence protocol

(XMPP): Instant Messaging.

 

Hornbaek, K. (2006). Current practice in measuring usability: Challenges to usability

studies and research. International Journal of Human-Computer Studies, 64(2),

79--102.

 

Horng, M. F., Hung, M. H., Chen, Y. T., Pan, J. S., & Huang, W. (2010). A new

approach based on XMPP and OSGi technology to home automation on web.

In 2010 International Conference on Computer Information Systems and

Industrial Management Applications, CISIM 2010 (pp. 487–490).

https://doi.org/10.1109/CISIM.2010.5643462

 

Huang, A. H., Hung, S.-Y., & Yen, D. C. (2007). An exploratory investigation of two

internet-based communication modes. Computer Standards & Interfaces,

29(2), 238–243.

 

Huser, V., Narus, S. P., & Rocha, R. A. (2010). Evaluation of a flowchart-based EHR

query system: A case study of RetroGuide. Journal of Biomedical Informatics,

43(1), 41–50. https://doi.org/10.1016/j.jbi.2009.06.001

 

Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology

adoption. Information & Management, 48(1), 1–8.

https://doi.org/10.1016/j.im.2010.09.001

 

ISO, I. (1989). 7498-4: Information Processing Systems Open Systems

Interconnection Basic Reference Model-Part 4: Management Framework.

International Standards Organization, Geneva, Switzerland.

 

Jarvinen, J., Marttinen, A., Luoma, M., Peuhkuri, M., & Manner, J. (2017).

Architecture of XMPP proxy for server-to-server connections. In Military

Communications and Information Systems Conference (MilCIS), 2017 (pp. 1–

6). IEEE.

 

Javali, S. B., Gudaganavar, N. V, & Raj, S. M. (2011). Effect of varying sample size

in estimation of coefficients of internal consistency.

 

Jeng, Y.-L., Huang, T.-C., Chen, C.-C., Shu, Y., & Huang, Y.-M. (2015). Developing

a mobile instant messaging system for problem-based learning activity. In

2015 International Conference on Interactive Collaborative Learning (ICL)

(pp. 313–316). IEEE. https://doi.org/10.1109/ICL.2015.7318044

 

Jong, D., & Wang, T. S. (2009, May). Student acceptance of web-based learning

system. In Proceedings of the 2009 International Symposium on Web

Information Systems and Applications (WISA’09) (Vol. 8, pp. 533-536).

People's Republic of China: Nanchang.

 

Juristo, Natalia and Moreno, Ana M and Sanchez-Segura, M.-I. (2007). Analysing the

impact of usability on software design. Journal of Systems and Software,

80(9), 1506–1516. https://doi.org/http://dx.doi.org/10.1016/j.jss.2007.01.006

 

Kebritchi, M. (2010). Factors affecting teachers’ adoption of educational computer

games: A case study. British Journal of Educational Technology, 41(2), 256–

270. https://doi.org/10.1111/j.1467-8535.2008.00921.x

 

Kementerian Pendidikan Malaysia. (2013). Pelan Pembangunan Pendidikan 2013-

2025.

 

Kirakowski, J. (1994). The use of questionnaire methods for usability assessment.

Unpublished Manuscript. Retreived from Http://sumi. Ucc. Ie/sumipapp.

Html.

 

Kirakowski, J. (1996). The software usability measurement inventory: background

and usage. Usability Evaluation in Industry, 169–178.

 

Kortum, P. T., & Bangor, A. (2013). Usability Ratings for Everyday Products

Measured With the System Usability Scale. International Journal of Human-

Computer Interaction, 29, 67–76.

https://doi.org/10.1080/10447318.2012.681221

 

Koufaris, M. (2002). Applying the Technology Acceptance Model and Flow Theory

to Online Consumer Behavior. Information Systems Research, 13(2), 205–

223. https://doi.org/10.1287/isre.13.2.205.83

 

Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research

activities. Educational and psychological measurement, 30(3), 607-610.

 

Leech, N. L., Barrett, K. C., & Morgan, G. A. (2014). SPSS for Intermediate

Statistics: Use and Interpretation. Igarss 2014. https://doi.org/10.1007/s13398-

014-0173-7.2

 

Leedy, P. D., & Ormrod, J. E. (2001). Practical research. Pearson education

international.

 

Li, B., Huang, W., Gao, L., & Li, D. (2005). U.S. Patent Application No. 10/698,675.

 

Li, D., Chau, P., & Lou, H. (2005). Understanding individual adoption of instant

messaging: An empirical investigation. Journal of the Association for

Information Systems, 6(4), 102–129.

 

Li, W. (2010). Virtual knowledge sharing in a cross-cultural context. Journal of

Knowledge Management, 14(1), 38–50.

 

Lin, C.-P., & Anol, B. (2008). Learning online social support: an investigation of

network information technology based on UTAUT. Cyberpsychology and

Behavior, 11, 268–272.

 

Lindgaard, G. (1989). Testing the usability of interactive computer systems. In

Testing the usability of interactive computer systems. Proceedings of

Workshop at HCI Australia (Vol. 89, pp. 1–13).

 

Liu, W., Li, X., & Huang, D. (2011). A survey on context awareness. In Computer

Science and Service System (CSSS), 2011 International Conference on (pp.

144–147). IEEE.

 

Lu, Y., Zhou, T., & Wang, B. (2009). Exploring Chinese users’ acceptance of instant

messaging using the theory of planned behavior, the technology acceptance

model, and the flow theory. Computers in Human Behavior, 25(1), 29–39.

https://doi.org/10.1016/j.chb.2008.06.002

 

Mahmoud, M., Aly, S. G., Sabry, A., & Hamza, M. (2009). A Jabber Based

Framework for Building Communication Capable Java Mobile Applications.

International Journal of Information Technology, 15(1).

 

Maslin, M., & Ramlah, H. (2008). User acceptance of information technology:

Understanding theories and models. Selangor: Venton Publishing (M) Sdn.

Bhd.

 

McClo&kcy, D. (2003). Evaluating electronic commerce acceptance with the

technology acceptance model. Information Technology and Organizations:

Trends, Issues, Challenges and Solutions, 1, 413.

 

McCombs, J. (2012). A Path Analysis of the Behavioral Intention of Secondary

Teachers to Integrate Technology. In P. Resta (Ed.), Proceedings of Society

for Information Technology & Teacher Education International Conference

2012 (pp. 3392–3399). Austin, Texas, USA: AACE.

 

Ming, T. S., Azman, H., Nambiar, R., Wah, L. K., Keong, Y. C., & Bidmeshki, L.

(2009). Teachers’ views of their involvement in an online community of

practice project. CALL-EJ Online, 11(1).

 

Moon, J.-W., & Kim, Y.-G. (2001). Extending the TAM for a World-Wide-Web

context. Information & Management, 38(4), 217–230.

 

Moran, M., Hawkes, M., & El Gayar, O. (2010). Tablet Personal Computer

Integration in Higher Education: Applying the Unified Theory of Acceptance

and Use Technology Model to Understand Supporting Factors. Journal of

Educational Computing Research, 42(1), 79–101.

https://doi.org/10.2190/EC.42.1.d

 

Nardi, B. A., Whittaker, S., & Bradner, E. (2000). Interaction and Outeraction: Instant

Messaging in Action. In Proceedings of the 2000 ACM Conference on

Computer Supported Cooperative Work (pp. 79–88). New York, NY, USA:

ACM. https://doi.org/10.1145/358916.358975

 

Nazareth, D. L., & Choi, J. (2014). A System Dynamics Model for Information

Security Management. Information & Management, 52(1), 123–134.

https://doi.org/10.1016/j.im.2014.10.009

 

Nielsen, J. (1994). Usability engineering. Access Online via Elsevier.

 

Nielsen, J. (1994). Usability inspection methods. In Conference Companion on

Human Factors in Computing Systems (pp. 413–414). New York, NY, USA:

ACM. https://doi.org/10.1145/259963.260531

 

Nielsen, J. (2003). Usability 101: Introduction to usability.

 

Nugroho, Hargyo Tri and Wicaksono, B. A. (2013). Utilizing Instant Messaging for

Real-Time Notification and Information Retrieval of Snort Intrusion Detection

System. ISICO 2013.

 

Osborne, J. W., & Overbay, A. (2004). The power of outliers (and why researchers

should always check for them). Practical Assessment, Research & Evaluation,

9(6), 1–12.

 

Ou, C. X. J., Davison, R. M., Zhong, X., & Liang, Y. (2010). Empowering employees

through instant messaging. Information Technology & People, 23(2), 193–

211. https://doi.org/10.1108/09593841011052165

 

Oye, N. D., Rabin, Z. A., & Iahad, N. A. (2011). A Model of ICT Acceptance and

Use for Teachers in Higher Education Institutions. International Journal of

Computer Science & Communication Networks, 1(1).

 

Pallant, J. (2013). SPSS survival manual. McGraw-Hill Education (UK).

 

Park, K. S., & Hwan Lim, C. (1999). A structured methodology for comparative

evaluation of user interface designs using usability criteria and measures.

International Journal of Industrial Ergonomics, 23(5), 379–389.

 

Pavlou, G. (2007). On the evolution of management approaches, frameworks and

protocols: a historical perspective. Journal of Network and Systems

Management, 15(4), 425-445.

 

Pembestarian Sekolah. (2012). Retrieved May 12, 2013, from

http://pembestarian.wordpress.com/

 

Perttunen, M., & Riekki, J. (2004). Inferring presence in a context-aware instant

messaging system. Intelligence in Communication Systems, 160–174.

 

Rajalahti, T., & Kvalheim, O. M. (2011). Multivariate data analysis in pharmaceutics:

A tutorial review. International Journal of Pharmaceutics. Pearson College

Division. https://doi.org/10.1016/j.ijpharm.2011.02.019

 

Raman, L. (1998). OSI systems and network management. Communications

Magazine, IEEE, 36.

 

Ramayah, T. (2010). The role of voluntariness in distance education students’ usage

of a course website. TOJET, 9(3), 96–105.

 

Rogers, E. M. (1983). Diffusion of innovations. An integrated approach to

communication theory and research (Vol. 3). Simon and Schuster.

https://doi.org/10.1525/aa.1963.65.5.02a00230

 

Rondan-Cataluña, F. J., Arenas-Gaitán, J., & Ramírez-Correa, P. E. (2015). A

comparison of the different versions of popular technology acceptance

models: A non-linear perspective. Kybernetes, 44(5), 788–805.

 

Royce, W. W. (1970). Managing the development of large software systems. In

proceedings of IEEE WESCON (Vol. 26). Los Angeles.

 

Ryan, N. S., Pascoe, J., & Morse, D. R. (1998). Enhanced reality fieldwork: the

context-aware archaeological assistant. In Computer applications in

archaeology. Tempus Reparatum.

 

Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: Classic

definitions and new directions. Contemporary Educational Psychology, 25(1),

54–67.

 

Saiful afzan baru, Lazim Abdullah, Ali, A., & Yusoff, H. (2014). Pemodelan

Penerimaan Pelajar Terhadap Persekitaran Pembelajaran Maya ( Vle ). Journal

of Business and Social Development Volume 2 Number 2, September 2014:

36-47, 2(2), 36–47.

 

Saint-Andre, P. (2004). Extensible Messaging and Presence Protocol (XMPP): Core.

Security. IETF. Retrieved from http://www.ietf.org/rfc/rfc3920.txt

 

Saint-Andre, P. (2005). Streaming xml with jabber/xmpp. Internet Computing, IEEE,

(October), 82–89.

 

Saint-Andre, P. (2011). Extensible messaging and presence protocol (XMPP): Instant

messaging and presence. Retrieved from

http://xml2rfc.tools.ietf.org/html/rfc6121

 

Santoso, H. B., Fadhilah, S., Nurrohmah, I., & Goodridge, W. H. (2016). The

usability and user experience evaluation of web-based online self-monitoring

tool: Case study human-computer interaction course. In User Science and

Engineering (i-USEr), 2016 4th International Conference on (pp. 122–127).

IEEE.

 

Sauro, J. (2011). Measuring Usability With The System Usability Scale (SUS).

 

Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. In

Mobile Computing Systems and Applications, 1994. WMCSA 1994. First

Workshop on (pp. 85–90). IEEE.

 

Schilit, B. N., & Theimer, M. M. (1994). Disseminating active map information to

mobile hosts. Network, IEEE, 8(5), 22–32.

 

Schmidt, A., Beigl, M., & Gellersen, H.-W. (1999). There is more to context than

location. Computers & Graphics, 23(6), 893–901.

https://doi.org/http://dx.doi.org/10.1016/S0097-8493(99)00120-X

 

Shackel, B. (1991). Usability-context, framework, definition, design and evaluation.

Human Factors for Informatics Usability, 21–37.

 

SKMM. (2008). Household use of the Internet survey 2008. Retrieved January.

Retrieved from

http://www.skmm.gov.my/skmmgovmy/files/attachments/HUIS08_02.pdf

 

Sloman, M. (1994). Network and distributed systems management. Addison-Wesley

Longman Publishing Co., Inc.

 

Suki, N. M., & Ramayah, T. (2010). User acceptance of the e-government services in

Malaysia: structural equation modelling approach. Interdisciplinary Journal of

Information, Knowledge, and Management, 5, 395–413.

 

Sundaravej, T. (2010). Empirical validation of unified theory of acceptance and use of

technology model. Journal of Global Information Technology Management,

13(1), 5–27.

 

T. Ramayah ; Lee Sze Lin. (2005). kesan persepsi kebergunaan, kesenangan

mengguna dan keseronokan mengguna terhadap penggunaan emel. Jurnal

Kemanusiaan, 5, 23–36.

 

Tabachnick, B. G., & Fidell, L. S. (1996). Analysis of covariance. Using Multivariate

Statistics, 8(1), 321–374.

 

Tabachnick, B. G., & Fidell, L. S. (2007). Experimental designs using ANOVA.

Thomson/Brooks/Cole.

 

Tan, L., & Wang, N. (2010). Future internet: The internet of things. In Advanced

Computer Theory and Engineering (ICACTE), 2010 3rd International

Conference on (Vol. 5, pp. V5-376). IEEE.

 

Taylor, S., & Todd, P. A. (1995). Understanding Information Technology Usage: A

Test of Competing Models. Information Systems Research.

https://doi.org/10.1287/isre.6.2.144

 

Tech Daily. (2011). Malaysian No 1 in Social Networking. TechDaily.

 

Teo, T. (2011). Factors influencing teachers’ intention to use technology: Model

development and test. Computers & Education, 57(4), 2432–2440.

https://doi.org/10.1016/j.compedu.2011.06.008

 

Teo, T. (2011). Technology acceptance research in education. In Technology

acceptance in education (pp. 1–5). Springer.

 

Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing:

toward a conceptual model of utilization. MIS Quarterly, 125–143.

 

Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience on

personal computer utilization: testing a conceptual model. Journal of

Management Information Systems, 11(1), 167–187.

 

Triandis, H. C. (1979). Values, attitudes, and interpersonal behavior. In Nebraska

symposium on motivation. University of Nebraska Press.

 

Tullis, T. S., & Stetson, J. N. (2004). A comparison of questionnaires for assessing

website usability. In Journal of Global Information Technology Management.

 

Van Schaik, P. (2009). Unified Theory of Acceptance and use for Websites used by

Students in Higher Education. Journal of Educational Computing Research,

40(2), 229–257. https://doi.org/10.2190/EC.40.2.e

 

Vaziri, D. D., Aal, K., Ogonowski, C., Von Rekowski, T., Kroll, M., Marston, H. R.,

Wieching, R. (2016). Exploring user experience and technology acceptance

for a fall prevention system: results from a randomized clinical trial and a

living lab. European Review of Aging and Physical Activity, 13(1), 6.

 

Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating Control,

Intrinsic Motivation, and Emotion into the Technology Acceptance Model.

Information Systems Research, 11(4), 342–365.

https://doi.org/10.1287/isre.11.4.342.11872

 

Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology

Acceptance Model: Four Longitudinal Field Studies. Management Science.

https://doi.org/10.1287/mnsc.46.2.186.11926

 

Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for

directions? Gender, social influence, and their role in technology acceptance

and usage behavior. MIS Quarterly, 115–139.

 

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance

of Information Technology: Toward a Unified View. MIS Quarterly, 27, 425–

478. https://doi.org/10.2307/30036540

 

Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of

information technology: Extending the unified theory of acceptance and use of

technology. MIS Quarterly, 36(1), 157–178.

 

Vliet, H. Van. (2007). Software Engineering: Principles and Practice. Requirements

Engineering. https://doi.org/10.1016/0950-5849(94)90015-9

 

Walczak, D., Wrzos, M., Radziuk, a., Lewandowski, B., & Mazurek, C. (2012).

Machine-to-Machine communication and data processing approach in Future

Internet applications. 2012 8th International Symposium on Communication

Systems, Networks & Digital Signal Processing (CSNDSP), 1–5.

https://doi.org/10.1109/CSNDSP.2012.6292779

 

Wang, W., Hsieh, J. P.A., & Song, B. (2012). Understanding User Satisfaction With

Instant Messaging: An Empirical Survey Study. International Journal of

Human

Computer Interaction, 28, 153–162.

https://doi.org/10.1080/10447318.2011.568893

 

Wenzel, Matthias and Meinel, C. (2016). Full-body WebRTC video conferencing in a

web-based real-time collaboration system. In Computer Supported

Cooperative Work in Design (CSCWD), 2016 IEEE 20th International

Conference on (pp. 334--339).

 

Wright, B. D., & Stone, M. H. (1979). Best Test Design. Rasch Measurement

 

Wu, Y.-L., Tao, Y.-H., & Yang, P.-C. (2008). The use of unified theory of acceptance

and use of technology to confer the behavioral model of 3G mobile

telecommunication users. Journal of Statistics and Management Systems,

11(5), 919–949.

 

Ya’acob, A., Nor, N., & Azman, H. (2005). Implementation of the Malaysian Smart

School: An investigation of teaching-learning practices and teacher-student

readiness. Internet Journal of E-Language Learning & Teaching.

 

Zhang, P., Li, N., & Sun, H. (2006). Affective quality and cognitive absorption:

Extending technology acceptance research. Proceedings of the Annual Hawaii

International Conference on System Sciences, 8(C), 1–10.

https://doi.org/10.1109/HICSS.2006.39

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.