Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems

Author(s):  
Sara Jeza Alotaibi ◽  
Mike Wald
Author(s):  
Lu Lin Zhou ◽  
Joseph Owusu-Marfo ◽  
Henry Asante Antwi ◽  
Maxwell Opuni Antwi ◽  
Arielle Doris Tetgoum Kachie ◽  
...  

Abstract Background Hospital electronic information management systems (HEIMS) are widely used in Ghana, and hence its performance must be carefully assessed. Nurses as clinical health personnel are the largest cluster of hospital staff and are the pillar of healthcare delivery. Therefore, they play a crucial role in the adoption and assessment of HEIMSs in Ghana. This report sought to assess the “Social Influence” (SI) and “Facilitating Conditions” (FC) that support Nurses’ Acceptance of HEIMS in Ghana using the “Unified Theory of Acceptance and Use of Technology” (UTAUT) model. Methods This study applied a non-experimental survey design. An electronic platform questionnaire on smartphones was used to collect data on 660 nurses. Statistically, AMOS Structural Equation Modelling (SEM) version 22.0 was employed to examine the research model. Results “Behavioral Intention” (BI) to HEIMS use was significantly predicted by SI and FC (p < 0.001). Notably, both SI and FC had an influence on nurses’ use behavior (UB) with behavioral intention (BI) as the mediator, which explains a total of 42.1% variance in the intention of nurses to use HEIMS. Likewise, UB of HEIMS was also significantly predicted by SI (R2 = 43.2) and BI (R2 = 0.39.6) with both constructs explaining a total of 51.7% of the variance in nurses’ acceptance to use HEIMS. Conclusion Nurses’ adoption of HEIMS in terms of the UB was influenced by SI and BI, whiles SI and FC had the strongest influence on BI (serving as mediator) of UB to adopt and use HEIMS among the nurses in Ghanaian hospitals.


Author(s):  
Andreas Pashalidis ◽  
Chris J. Mitchell

This chapter surveys the approaches for addressing privacy in open identity and access management systems that have been taken by a number of current systems. The chapter begins by listing important privacy requirements and discusses how three systems that are being incrementally deployed in the Internet, namely SAML 2.0, CardSpace, and eID, address these requirements. Subsequently, the findings of recent European research projects in the area of privacy for I&AM systems are discussed. Finally, the approach taken to address the identified privacy requirements by ongoing projects is described at a high level. The overall goal of this chapter is to provide the reader with an overview of the diversity of privacy issues and techniques in the context of I&AM.


Author(s):  
Yousef K. Sanjalawe ◽  
Mohammed Anbar ◽  
Qusay M. Al zoubi

Sign in / Sign up

Export Citation Format

Share Document