Extending the utaut model to examine security hesitation of mobile money in Somalia
Mobile money (MM) is an integral part of the financial system in Somalia. MM services are widely accepted and adopted by different segments of the population. Despite the growth and popularity of mobile money services in Somalia, the limited use of mobile money services other than mobile money trans...
| Auteur principal: | Jama, Ayub Suleiman |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2021
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/96377/1/AyubSuleimanJamaMSC2021.pdf.pdf |
Documents similaires
Extending the technology acceptance model with knowledge management factors to examine the acceptance of mobile learning
par: Al-Emran, Mostafa Nadhir Hassan
Publié: (2019)
par: Al-Emran, Mostafa Nadhir Hassan
Publié: (2019)
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
par: Low, Wei Shang
Publié: (2019)
par: Low, Wei Shang
Publié: (2019)
The Role Of Intelligence In E-Learning Usage: An Extension Of Utaut Model
par: Panjaitan, Erwin Setiawan
Publié: (2019)
par: Panjaitan, Erwin Setiawan
Publié: (2019)
E-government service security model Nusajaya ICT Centre
par: Jama, Jama Mohamed
Publié: (2011)
par: Jama, Jama Mohamed
Publié: (2011)
Educational and training model of security awareness on mobile devices for students
par: Din, Dzairol Adzriem
Publié: (2012)
par: Din, Dzairol Adzriem
Publié: (2012)
Secure-Spin with hashing to support mobility and security in wireless sensor network
par: Amri, Mohammad Hossein
Publié: (2013)
par: Amri, Mohammad Hossein
Publié: (2013)
Prediction Of User Behavior Intention Towards Robo-Advisor Applications In Fintech Using The Utaut Model
par: Cheong, Suk Fun
Publié: (2023)
par: Cheong, Suk Fun
Publié: (2023)
Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
par: Naraei, Parisa
Publié: (2013)
par: Naraei, Parisa
Publié: (2013)
Secure policies for the distributed virtual machines in mobile cloud computing
par: Annane, Boubakeur
Publié: (2020)
par: Annane, Boubakeur
Publié: (2020)
The relationship of trust and security in developing customer word-of-mouth and loyalty in mobile banking
par: Javabdeh, Tahmineh
Publié: (2014)
par: Javabdeh, Tahmineh
Publié: (2014)
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014)
par: Zadeh, HassanHossein
Publié: (2014)
Modeling and simulation to extend fibre optic communication signal transmission using micro ring resonator
par: Nikoukar, Ali
Publié: (2014)
par: Nikoukar, Ali
Publié: (2014)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
par: Cornelis, Armanda Caesario
Publié: (2011)
par: Cornelis, Armanda Caesario
Publié: (2011)
Seamsar: Seamless And Secure Handover Model For Mobile IPTV Using MIPV6
par: Cornelis, Armanda Caesario
Publié: (2011)
par: Cornelis, Armanda Caesario
Publié: (2011)
Requirement Model Of Mobile Examination Result For Student CAS In UUM
par: Brebish, Nabil AB. A.
Publié: (2008)
par: Brebish, Nabil AB. A.
Publié: (2008)
MP3 audio steganography technique using extended least significant bit
par: Mohammed Atoum, Mohammed Salem
Publié: (2014)
par: Mohammed Atoum, Mohammed Salem
Publié: (2014)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
par: Akhyari, Nasir
Publié: (2019)
par: Akhyari, Nasir
Publié: (2019)
Control priorization model for improving information security risk assessment
par: Al-Safwani, Nadher Mohammed Ahmed
Publié: (2014)
par: Al-Safwani, Nadher Mohammed Ahmed
Publié: (2014)
Flexible mobile payment model
par: Abdullahi Jahdi, Mohammad Reza
Publié: (2011)
par: Abdullahi Jahdi, Mohammad Reza
Publié: (2011)
Partial examination assignment approaches for solving examination timetabling problems
par: Mandal, Ashis Kumar
Publié: (2016)
par: Mandal, Ashis Kumar
Publié: (2016)
Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
par: Siti Rahayu Abdul Aziz
Publié: (2019)
par: Siti Rahayu Abdul Aziz
Publié: (2019)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
par: Sarwar, Muhammad Imran
Publié: (2008)
par: Sarwar, Muhammad Imran
Publié: (2008)
An enhancement of toe model by investigating the influential factors of cloud adoption security objectives
par: Bhuiyan, Md. Yeahia
Publié: (2018)
par: Bhuiyan, Md. Yeahia
Publié: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Rabia
par: Saud Alharbi, Talal Nasser
Publié: (2018)
par: Saud Alharbi, Talal Nasser
Publié: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Arabia
par: Alharbi, Talal Nasser Saud
Publié: (2018)
par: Alharbi, Talal Nasser Saud
Publié: (2018)
A process based approach software certification model for agile and secure environment
par: Mohamed, Shafinah Farvin Packeer
Publié: (2015)
par: Mohamed, Shafinah Farvin Packeer
Publié: (2015)
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
An enhanced next generation security operation center framework for information system security management
par: Yau, Ti Dun
Publié: (2023)
par: Yau, Ti Dun
Publié: (2023)
An analysis of fuzzy clustering algortihms for suggestion of supervisor and examiner of thesis title
par: Suhaimi, Azrina
Publié: (2005)
par: Suhaimi, Azrina
Publié: (2005)
Usability evaluation model for mobile e-book applications
par: Matraf, Munya Saleh Saeed Ba
Publié: (2017)
par: Matraf, Munya Saleh Saeed Ba
Publié: (2017)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
par: Md. Zain, Zamhariah
Publié: (2018)
par: Md. Zain, Zamhariah
Publié: (2018)
Integrating security services into active network
par: Mandala, Satria
Publié: (2005)
par: Mandala, Satria
Publié: (2005)
Enhancing information security awareness and computer ethics for non-information technology company using integrated model
par: Zainudin, Mohd. Eyzuan
Publié: (2010)
par: Zainudin, Mohd. Eyzuan
Publié: (2010)
Enhanced information systems continuance model for mobile wellness applications
par: Yusof, Ahmad Fadhil
Publié: (2015)
par: Yusof, Ahmad Fadhil
Publié: (2015)
Repurchase intention model for mobile shopping application users in Malaysia
par: Osmani, Mohammad
Publié: (2022)
par: Osmani, Mohammad
Publié: (2022)
Information security curriculum framework at undergraduate level
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
An analysis on security awareness of social networks users
par: Darvishi, Mahdi
Publié: (2013)
par: Darvishi, Mahdi
Publié: (2013)
Development of metamodel for information security risk management
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
A network security management approach for WLAN
par: Janbeglou , Maziar
Publié: (2010)
par: Janbeglou , Maziar
Publié: (2010)
Awareness and acceptance analysis of information security policy
par: Muda, Mohd. Zuki
Publié: (2010)
par: Muda, Mohd. Zuki
Publié: (2010)
Documents similaires
-
Extending the technology acceptance model with knowledge management factors to examine the acceptance of mobile learning
par: Al-Emran, Mostafa Nadhir Hassan
Publié: (2019) -
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
par: Low, Wei Shang
Publié: (2019) -
The Role Of Intelligence In E-Learning Usage: An Extension Of Utaut Model
par: Panjaitan, Erwin Setiawan
Publié: (2019) -
E-government service security model Nusajaya ICT Centre
par: Jama, Jama Mohamed
Publié: (2011) -
Educational and training model of security awareness on mobile devices for students
par: Din, Dzairol Adzriem
Publié: (2012)