Extending the utaut model to examine security hesitation of mobile money in Somalia
Mobile money (MM) is an integral part of the financial system in Somalia. MM services are widely accepted and adopted by different segments of the population. Despite the growth and popularity of mobile money services in Somalia, the limited use of mobile money services other than mobile money trans...
| Main Author: | Jama, Ayub Suleiman |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/96377/1/AyubSuleimanJamaMSC2021.pdf.pdf |
Similar Items
Extending the technology acceptance model with knowledge management factors to examine the acceptance of mobile learning
by: Al-Emran, Mostafa Nadhir Hassan
Published: (2019)
by: Al-Emran, Mostafa Nadhir Hassan
Published: (2019)
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
by: Low, Wei Shang
Published: (2019)
by: Low, Wei Shang
Published: (2019)
The Role Of Intelligence In E-Learning Usage: An Extension Of Utaut Model
by: Panjaitan, Erwin Setiawan
Published: (2019)
by: Panjaitan, Erwin Setiawan
Published: (2019)
E-government service security model Nusajaya ICT Centre
by: Jama, Jama Mohamed
Published: (2011)
by: Jama, Jama Mohamed
Published: (2011)
Educational and training model of security awareness on mobile devices for students
by: Din, Dzairol Adzriem
Published: (2012)
by: Din, Dzairol Adzriem
Published: (2012)
Secure-Spin with hashing to support mobility and security in wireless sensor network
by: Amri, Mohammad Hossein
Published: (2013)
by: Amri, Mohammad Hossein
Published: (2013)
Prediction Of User Behavior Intention Towards Robo-Advisor Applications In Fintech Using The Utaut Model
by: Cheong, Suk Fun
Published: (2023)
by: Cheong, Suk Fun
Published: (2023)
Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
by: Naraei, Parisa
Published: (2013)
by: Naraei, Parisa
Published: (2013)
Secure policies for the distributed virtual machines in mobile cloud computing
by: Annane, Boubakeur
Published: (2020)
by: Annane, Boubakeur
Published: (2020)
The relationship of trust and security in developing customer word-of-mouth and loyalty in mobile banking
by: Javabdeh, Tahmineh
Published: (2014)
by: Javabdeh, Tahmineh
Published: (2014)
Information security compliance assessment using information security maturity model
by: Zadeh, HassanHossein
Published: (2014)
by: Zadeh, HassanHossein
Published: (2014)
Modeling and simulation to extend fibre optic communication signal transmission using micro ring resonator
by: Nikoukar, Ali
Published: (2014)
by: Nikoukar, Ali
Published: (2014)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Seamsar: Seamless And Secure Handover Model For Mobile IPTV Using MIPV6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Requirement Model Of Mobile Examination Result For Student CAS In UUM
by: Brebish, Nabil AB. A.
Published: (2008)
by: Brebish, Nabil AB. A.
Published: (2008)
MP3 audio steganography technique using extended least significant bit
by: Mohammed Atoum, Mohammed Salem
Published: (2014)
by: Mohammed Atoum, Mohammed Salem
Published: (2014)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Control priorization model for improving information security risk assessment
by: Al-Safwani, Nadher Mohammed Ahmed
Published: (2014)
by: Al-Safwani, Nadher Mohammed Ahmed
Published: (2014)
Flexible mobile payment model
by: Abdullahi Jahdi, Mohammad Reza
Published: (2011)
by: Abdullahi Jahdi, Mohammad Reza
Published: (2011)
Partial examination assignment approaches for solving examination timetabling problems
by: Mandal, Ashis Kumar
Published: (2016)
by: Mandal, Ashis Kumar
Published: (2016)
Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
by: Siti Rahayu Abdul Aziz
Published: (2019)
by: Siti Rahayu Abdul Aziz
Published: (2019)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
by: Sarwar, Muhammad Imran
Published: (2008)
by: Sarwar, Muhammad Imran
Published: (2008)
An enhancement of toe model by investigating the influential factors of cloud adoption security objectives
by: Bhuiyan, Md. Yeahia
Published: (2018)
by: Bhuiyan, Md. Yeahia
Published: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Rabia
by: Saud Alharbi, Talal Nasser
Published: (2018)
by: Saud Alharbi, Talal Nasser
Published: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Arabia
by: Alharbi, Talal Nasser Saud
Published: (2018)
by: Alharbi, Talal Nasser Saud
Published: (2018)
A process based approach software certification model for agile and secure environment
by: Mohamed, Shafinah Farvin Packeer
Published: (2015)
by: Mohamed, Shafinah Farvin Packeer
Published: (2015)
Information security awareness framework for enhancing security privacy among twitter users
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
An analysis of fuzzy clustering algortihms for suggestion of supervisor and examiner of thesis title
by: Suhaimi, Azrina
Published: (2005)
by: Suhaimi, Azrina
Published: (2005)
Usability evaluation model for mobile e-book applications
by: Matraf, Munya Saleh Saeed Ba
Published: (2017)
by: Matraf, Munya Saleh Saeed Ba
Published: (2017)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
by: Md. Zain, Zamhariah
Published: (2018)
by: Md. Zain, Zamhariah
Published: (2018)
Integrating security services into active network
by: Mandala, Satria
Published: (2005)
by: Mandala, Satria
Published: (2005)
Enhancing information security awareness and computer ethics for non-information technology company using integrated model
by: Zainudin, Mohd. Eyzuan
Published: (2010)
by: Zainudin, Mohd. Eyzuan
Published: (2010)
Enhanced information systems continuance model for mobile wellness applications
by: Yusof, Ahmad Fadhil
Published: (2015)
by: Yusof, Ahmad Fadhil
Published: (2015)
Repurchase intention model for mobile shopping application users in Malaysia
by: Osmani, Mohammad
Published: (2022)
by: Osmani, Mohammad
Published: (2022)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
An analysis on security awareness of social networks users
by: Darvishi, Mahdi
Published: (2013)
by: Darvishi, Mahdi
Published: (2013)
Development of metamodel for information security risk management
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
A network security management approach for WLAN
by: Janbeglou , Maziar
Published: (2010)
by: Janbeglou , Maziar
Published: (2010)
Awareness and acceptance analysis of information security policy
by: Muda, Mohd. Zuki
Published: (2010)
by: Muda, Mohd. Zuki
Published: (2010)
Similar Items
-
Extending the technology acceptance model with knowledge management factors to examine the acceptance of mobile learning
by: Al-Emran, Mostafa Nadhir Hassan
Published: (2019) -
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
by: Low, Wei Shang
Published: (2019) -
The Role Of Intelligence In E-Learning Usage: An Extension Of Utaut Model
by: Panjaitan, Erwin Setiawan
Published: (2019) -
E-government service security model Nusajaya ICT Centre
by: Jama, Jama Mohamed
Published: (2011) -
Educational and training model of security awareness on mobile devices for students
by: Din, Dzairol Adzriem
Published: (2012)