M-Government: Measuring the Factors that influence Mobile Government Services Acceptance among Bahraini Youth
Journal Title: INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY - Year 2014, Vol 9, Issue 1
Abstract
In recent years, the advancement of Information and Communication Technologies (ICTs) and particularly the rapid changes in mobile technologies have led to the development of new applications. Many governments worldwide have started moving towards Mobile Government (M-Government) as M-government can be a powerful component of the e-government that could facilitate more and better services to the citizens. For a better application of these services, it is important to investigate the factors that influence the intention to use M-government services. Therefore, this study is to investigate the factors that influence the intention to use M-Government services among Bahraini Youth. The theoretical model that was developed by [1] was employed for this purpose. The model is tested through a survey administered to Bahraini Youth. Results suggested Perceived Trust in Technology, Perceived Service Quality, and Perceived Compatibility affect Youth's intention to use M-services. The results also revealed that Ease of Use and Usefulness are antecedents to attitude toward using M-services. This research provides mobile service providers in Kingdom of Bahrain with a practical and communicable checklist of contextual and conditional factors, which are seamlessly integrated, and cover the end users (Youth) perspectives which should be considered as the cornerstone for any M-Government project.
Authors and Affiliations
Hayat Ali, Reem Sahwan, Zainab Shamsaldeen, Nafeesa Rajulla
RBAC+: Protecting Web Databases With Access Control Mechanism
With the wide adoption of Internet, security of web database is a key issue. In web-based applications, due to the use of n-tier architecture, the database server has no knowledge of the web application user and hence al...
A Strengthening Asean Cyber Cooperation in Countering Cyber Terrorist Groups Activities on the Internet by Implementing the Six-Ware Cyber Security Framework
Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their t...
Cognitive Internet of Things-Oriented Multi-Domain Cooperation Dynamic Incentive Mechanism based on Reputation
As a new ubiquitous network, Internet of Things (IoT, for short) is widely used in various fields, which has a huge network, diverse sensor nodes, multifarious communication protocol. The resource management in IoT is di...
INVESTIGATING MOBILE TRAFFIC VIOLATION TICKETING SERVICE IN EGYPT: THE PROVIDER AND USER PERSPECTIVES
The advances in information and communication technology are affecting many aspects of the economy in developed and developing nations. The Internet and the World Wide Web innovations are increasingly promising to provid...
CULTURAL CREATIVE AR GAME AND SIDE EFFECTS EVALUATION
In cultural creative industry, mobile games are one of the most increasing markets. Pokemon Go, as an Augmented reality (AR) in mobile games, may lead to both video game and physical activity, but it also inevitably trig...