Proyecto Tesis (Disertación)

 

USIGN INNOVATION DIFFUSION THEORY AND THE TECHNOLOGY

ACCEPTANCE MODEL TO EVALUATE THE SECURITY OF WIRELESS

MOBILE DEVICES AT A POST-SECONDARY INSTITUTION

 

A Dissertation Presented in Partial Fulfillment Of the Requirements for the Degree Doctor of Philosophy.

 

Capella University

Por

 

Héctor L. Feliciano Torres


February 2017


ABSTRACT    

The purpose of this quantitative, descriptive non experimental study was to investigate the use of wireless mobile network devices at a post-secondary institution using the innovation diffusion theory (IDT) and technology acceptance model (TAM) as background theories. The researcher intended to explore how students and personnel of the institution use these devices and the possible risks such use involves. The use of mobile devices is a disruptive force capable of compromising student and personnel’s sensitive information in an organization. Target population of this study consisted of 34% of students, 37% of faculty, and 29% of administrative personnel. The study was conducted using the instrument Adding Innovation Diffusion Theory to the Technology Acceptance Model: Supporting Employees' Intentions to use E-Learning Systems created by Lee, Hsieh, and Hsu (2011). The variables used in the study were compatibility, complexity, relative advantages, observability, trialability, perceived usefulness, perceived ease-of-use, and behavioral intention. Findings of the study are intended to provide insight when analyzing users’ acceptance and adoption of mobile devices in wireless systems in an educational setting. Results showed that students, faculty, and administrative personnel perceived the use of mobile devices as appropriate for their learning and working styles, enhancing students’ effectiveness in learning and personnel’s jobs. Therefore, institutions of higher education should take measures in securing corporate data, with safety and productivity in mind. With the incorporation of well-supported mobility and security programs, organizations can strike the right balance between security and usability, and leverage the next generation of consumer technology.

(C) 2017

Héctor L. Feliciano-Torres

DERECHOS RESERVADOS


 



Favor de leer estos términos y condiciones cuidadosamente antes de utilizar esta colección. Una vez que usted accede, hojea o utiliza esta colección, significa que está de acuerdo con estos términos y condiciones.  Si usted no está de acuerdo con algunos de los términos y condiciones mencionados a continuación, no acceda, hojee o utilice la colección.  El Centro de Acceso a la Información se reserva los derechos a su exclusiva discreción de modificar, alterar o poner al día, en cualquier momento, estos términos y condiciones.  Al entrar, hojear o utilizar la colección, usted debe estar de acuerdo a limitarse a dichas modificaciones, alteraciones y actualizaciones.

Please read these Terms and Conditions carefully before using this collection.  By accessing, browsing or using this collection, you signify your agreement with these Terms and Conditions.  If you do not agree with any of the below Terms and Conditions, do not access, browse, or use this collection.  The Access Information Center reserves the right, in its sole discretion, to modify, alter or update these Terms and Conditions at any time.  By accessing, browsing, or using the Collection, you agree to be bound by such modifications, alterations and updates.

Limitaciones de Responsabilidades Legal

[Pág. Anterior]