Thursday, October 31, 2019

Visual Arts - Scuplture Essay Example | Topics and Well Written Essays - 1500 words

Visual Arts - Scuplture - Essay Example A professional artist ensures that he or she has all the essential materials before commencing into any work of arts. Any person who has ever worked on a newspaper printing station will understand this best. Space is a fundamental factor in sculpture (Slobodkin 118). The same principle applies to sculpture. An artist should also accustom and remind themselves of terms like bottom-heavy and top-heavy. He or she should also be aware if the object in the visual field is correctly and well distributed to easily give a sense of balance. All these fall under composition, that is, the wise use of space and balance in artistic works. The next concept that artists need to know is to move into any position that will distribute the visual information in a wise manner. They may also need to add a background material in order to get everything balancing well (Slobodkin 119). An example is the existence of a pair of slippers beneath every female nude. Another consequence of this is the way with wh ich the shapes of the formed objects line up with each other. They look like a piece of the puzzle. Despite the fact that the object always appear in a 3-dimensional space, much consideration is put on how 3-D visual information manages to impact on a two dimensional plane. Through this, any two dimensional shape can easily interact with a three dimensional form in a perfect manner. Artists sometimes use basic forms of sculpture and ensure that they echo them in various places in the same visual field. Moreover, artists sometimes increase the variations such as a fugue by the Bach. An example of this type of a compositional dance is the great Newberry’s Blithe, in which two-dimensional tapestry behind a woman echoes and reflects the curves on her body. Another important concept of a sculpture is the sweeping forms. Some sculptures look as if they are about to fall or move. Such sculptures make viewers feel as if they will fall or move behind their backs (Slobodkin 120). Such sculptures hold the eyes and make the viewers watch them with a lot of suspicion and probably wait for something to happen. The eyes flow over the cascading limbs and muscles. The key to comprehending this effect is trying to locate the eye-catching points. Such points include feet position, kneecaps alignments, hands location, finger directions, waist and chest axes, limb joint position, hair strands, and the eyes. After the location of these points, they are connected to the sweeping and twisting lane. The intensity of this plane normally varies across figures but it usually grows in a uniform direction of movement. There may be an expansion of twisting lines of contact or intensity, depending on the existing pieces. There is a sequence of events in every sculpture. This sequence exits in time but are sometimes held stationary by the bronze. This movement comes from the viewer’s eye motion, as they tend to follow these striking features. In a very short time, an individual is able to experience subconsciously this sweeping form without the ability to identify and determine the direction consciously. However, taking the eyes and carefully moving them over the piece enables an individual, one is able to watch and see how the sculpture is generated, built up and explodes in denouement, and in a resolution of various interacting forms.

Tuesday, October 29, 2019

Value Objectivity Essay Example for Free

Value Objectivity Essay The philosophies and beliefs of a person are shaped from the day we are born all through maturity amongst our individual, ethnic, and shared encounters. Establishing what is factual from erroneous differs on our individual routine and what we allow to let sway our viewpoints and actions. Ethical decision making while essential, can sometimes be extremely difficult and challenging. This is predominantly spot-on when working with clientele that have unlike beliefs and views. For example: If one leg of a four-legged stool is missing, the stool will not stand correctly. If one leg is shorter than the others, the stool may be awkward to use. The correlation of a four-legged stool can be utilized to help better comprehend the prominence and interdependence of individual, organizational and cultural ethics and how all of these things tend to influence one another. The ethical aspects of counseling are based on a system of rules which have been constructed for a precise group of people or field of work, and were developed for the purpose of setting the standards of conduct and behavior that are to be used by professionals. Ethical connotations hardly ever have an easy answer, and often counselors must seek help from more experienced professionals, but this is not a guarantee that the anticipated result will be accomplished. The first guideline in the ACA’s (2005) Code of Ethics reads â€Å"the primary responsibility of counselors is to respect the dignity and promote the welfare of clients† (Kaplan, 2014). â€Å"Competence is required of practitioners if they are to protect and serve their clients. Although the intents are to not harm clients, sometimes incompetence is a contributing factor in causing harm for practitioners† (Corey, et al, 2014). When therapists are conscious of his/her own individual morals, principals, and unsettled struggles they can successfully discuss their clientele without dropping emphasis on the requirements of the customer, but sometimes this isn’t always the case. â€Å"Standard 2.01(a) requires psychologists to â€Å"provide services, teach, a nd  conduct research with populations and in areas only within the boundaries of their competence, based on their education, training, supervised experience, consultation, study, or professional experience† (Shiles, 2009). Counselors should remain inside their span of training, be mindful of the restrictions of his/her licensed expertise, be present at essential education programs and maintain their learning, use his/her own common sense, and be able to identify when referrals should be made. It should be the disposition of counselors to always value the mixture of their clientele, novices, and study partakers. The ACA Code of Ethics (2005) section A.4.b. Personal Values states, â€Å"Counselors are aware of their own values, attitudes, beliefs, and behaviors and avoid imposing values that are inconsistent with counseling goals† (Kaplan, 2014). â€Å"Standard C.5., states, â€Å"Counselors do not condone or engage in discrimination based on age, culture, disability, ethnicity, race, religion/spirituality, gender, gender identity, sexual orientation, marital status/partnership, language preference, socioeconomic status, or any basis prescribed by law† (Kaplan, 2014). Personal standards, t he main beliefs that describe an individual, develop over time. They are shaped by a mixture of influences as well as ones from family and friends, along with learning and religious establishments. â€Å"When it becomes clear that a client’s counseling needs exceed our competence, we must either develop the competence necessary to effectively treat the client or refer this client to another competent professional† (Corey, et al, 2014). There are going to be many instances when treating clients that the situation is going to be uncomfortable and it may be easier to just refer the clients to someone else. â€Å"The ACA Code of Ethics (ACA, 2005) authorizes counselors to conclude a treatment liaison under these three circumstances: â€Å"When it becomes reasonably apparent that the client no longer needs assistance, is not likely to benefit, or is being harmed by continued counseling† (Kaplan, 2014). Although a counselor may be competent within a certain area of expertise, they still may need to refer a client from time to time to maintain working within the boundaries of the professional role and successfully delivering the services that client’s may need. â€Å"The counselor need not accept or approve of the client’s values. Disagreement with or nonacceptance of the client’s values does not mean that the client is not accepted as a person† (Kaplan, 2014). Instances that referral may be  necessary are as such: the patron has additional needs; the therapist lacks special proficiencies; the client needs a expert; the therapist is acquainted with the client beyond a professional basis; no growth is being formulated; the client is contributing in disorderly activities that could be damaging those around them; the therapist and client aren’t forming a beneficial connection due to personality differences; and the counselor is has taken the client outside of their comfort zone. Before making a referral it’s important to explore what is the difficulty within the situation; what barriers are preventing the professional from working with the client. Purely differing with a client or not having a distinct fondness for the client is not ethical grounds to make a referral. When referral is not an option for a counselor the counselor must take additional steps to ensure that they are not only professionally competent but to also develop skills by working with colleagues that have more experience, especially when seeking new areas within the practice. These skills can be obtained by attending conferences, networking opportunities, reading books and journal articles, etc. The primary goal is for professional counselors to embrace supporting the individual’s worth, self-esteem, potential, and individuality. â€Å"In order to determine our level of competence, we must engage in an ongoing process of self-assessment and self-reflection† (Watson, et al, 2006). In conclusion, values and ethical standards are sometimes challenging to describe although people understands and practices the theory. A therapist’s ethical responsibilities to clientele start during the initial interaction or appointment, not during the beginning meeting; the point that counselors have moral accountabilities to those individuals that request help obligates a specialist to withhold the utmost respect and dignity in order to promote the welfare of the client. There are always going to be differences of opinions and values but the ultimate concern is the welfare of the client. References Corey G., Corey, M. S., Corey, C., Callanan, P. (2014). Issues and ethics in the helping professions (9th ed.). Independence, KY: Brooks/Cole Cengage Learning. ISBN-13: 9781285464671. Kaplan, D.M. (2014). Ethical Implications of a Critical Legal Case for the Counseling Profession: Ward v. Wilbanks. Journal of Counseling and Development, 92(2), 142-146. Shiles, M. (2009). Discriminatory Referrals: Uncovering a Potential Ethical Dilemma Facing Practitioners. Ethics Behavior, 19(2), 142-155. doi:10.1080/10508420902772777 Watson, Z.P., Herlihy, B.R., Pierce, L.A. (2006). Forging the Link Between Multicultural Competence and Ethical Counseling Practice: A Historical Perspective. Counseling Values, 50(2), 99-107.

Sunday, October 27, 2019

Social Work Evidence Based Practice Strengths and Weaknesses

Social Work Evidence Based Practice Strengths and Weaknesses Critically analyse the strengths and weaknesses of using an evidence based approach to a specific area of social work practice, referring to recent research findings in this area. Specific area: Older adults and mental health Outlined below is an analysis of the strengths and weaknesses of using an evidence based approach to a specific area of social work practice, referring to recent findings with regards to older people and mental health in particular. Social work practice is split into various areas in order, to effectively assist with the problems of different individuals as well as social groups such as older adults with, or affected by mental health conditions and problems such as depression and dementia. Older adults with mental health conditions do and have benefited from well-focused social work practices. The use of the evidence based approach alone or alongside other factors has the capacity to shape social work practices designed to help and protect older adults with mental health conditions. Of course to maintain relevance as well as professional effectiveness social work practices should reflect the needs of the people being cared for not to mention altering to better practices as empirically demonstrated by the most recent research findings.[1] As mentioned below evidence based approaches to assisting older people with mental health conditions or issues have led to suggested methods to improve the social work practices that form the basis of the services provided for those vulnerable people that need to use them being made.[2] Social workers that are tasked with assisting older people with, or affected by mental health problems ideally should use the social work practices that have been proven to assist vulnerable older people the most. Therefore evidence-based approaches can help social workers determine the best working practices to actually use. To begin with it can be reasonably argued that using an evidence-based approach to the specific social work practices offers social workers working with older people linked with mental health issues strengths. The need for reliable and accurate research into older people and mental health for social work practices is undoubtedly becoming more important as the British population in common with many Western societies is ageing as people are generally living for longer. [3] Past and recent medical research has frequently shown that there is a strong connection between an ageing population taken as a whole and mental health issues becoming more common for older people. An ageing population raises issues and concerns for the National Health Service (NHS), and the Department for Work and Pensions (DWP), which includes the Pension Service as much as it does for social work practices.[4] Limited parts of medical research points to some mental health issues or conditions in older people as being preventable, and even in certain circumstances reversible. Social work practices ideally should be altered if it is possible to assist older people that can recover from temporary or reversible mental health problems to do so. However some mental health conditions and problems affecting older people such as vascular and senile dementia cannot be prevented and reversed, though medication can delay their full onset. In such circumstances NHS or private sector health care services not to mention social work practices have to be adjusted to cope with a higher demand for their use. When possible social work practices should be altered in order to prevent, tackle, or reverse the mental health conditions and that could possibly restore older people to full health. Social work practices should also help older people whose mental health conditions cannot be reversed.[5] When older adults are affected by mental health conditions whether upon a short – term basis or upon a long – term basis then social work practices arguably needs to be adaptable as well as practical enough to assist those older adults more effectively. Older adults with mental health  conditions may previously have been active normal people used to doing everything for them that suddenly find things much more difficult once their condition or illness becomes well established. Ongoing medical research is slowly finding new treatments that can in the right circumstances help older adults with mental health conditions and illnesses remain as healthy as possible for as long as possible. The basic assumption here is that when older adults with mental health conditions stay healthier for a longer period of time they could therefore be less reliant upon their carers, the NHS, social security benefits, as well as the social serves provided to them by social workers.[6] The reversing or the delaying of the worst or most debilitating of mental health conditions in older adults can help those people to lead normal and independent lives for as long as possible. Older adults that are able to resist or overcome the worst consequences of their mental health conditions will be more likely to retain their self-dignity as well as their independence. It is the leading of independent lives by the older adults affected to varying degrees by mental health conditions that can potentially receive the most beneficial assistance from their social workers as well as all relevant medical staff. Social work practice that enables older adults to remain in their homes and were possible within their own families gives such vulnerable people a sense of stability as well as helping to keep them in familiar surroundings. The strengths of using evidence based approach to guide and shape social work practices towards older adults with mental health conditions are therefore in many respects straightforward to understand. As in the majority of social work fields or areas, social workers make use of an evidence-based approach to increase the effectiveness of the social work services that they actually provide to the people who require their assistance the most. Using an evidence-based approach provides data or research that provided it is gathered efficiently and interpreted accurately provides information to social workers to point out the most effective social work practices. Using an evidence based approach has the strength of allowing the social workers who form social work practices to alter those practices to help larger numbers of older adults with mental health conditions to receive the social work services that should benefit them the most. It should also follow on logically that using an evidence-based approach would allow the resources and also the social services by the social work providers to be used most effectively. Older adults with mental health conditions can influence the type of social work provided to them by highlighting the best as well as the less effective social work practices.[7] At the end of the day social work practices are only there to help the most vulnerable older adults amongst other social groups and isolated individuals even though these social work practices might not always be popular with social workers themselves. The strength as well as the point of using the evidence-based approach is therefore that the best interests of the most vulnerable older adults with mental health conditions should always is taken into account.[8] Indeed the best interests of the most vulnerable older people as revealed via the use of the evidence-based approach are incorporated into both completely new as well as revised social work practices. In theory, and also to a very large extent in practice the use of the evidence based approach is that it has the strength of providing social workers with information and indications about, which older adults that need help due to their mental health conditions and issues.[9] The evidence based approach means social workers know where to concentrate help as well as guidance as to what kind of social work service would be most useful for these older adults.[10] There are actually as well as potentially sources of weakness when using the evidence based approach in forming and subsequently amending when necessary social work practices in relation to older adults with mental health conditions or issues. The evidence based approach to providing information with regard to older adults with mental health conditions is only useful in many respects when combined with other information or procedures that form the basis of social work practices.[11] To begin with social workers might have to make decisions with regard to the help or social services that individual older adults with mental health conditions or problems and whether or not to offer them help before the evidence based approach has provided enough information about these specific older adults.[12] It can and indeed does take time for the evidence based approach to be gathered and evaluated before it is strong enough to alter or perhaps even entirely replace all the relevant social work practices. Social workers need to have social work practices set in place all of the time in order for them to be always able to offer vulnerable older adults their help and advice with regard to mental health conditions. When or if existing social work practices are deemed to be highly effective in helping as well as protecting older adults with mental health conditions there would have to be convincing evidence. Without wide ranging proof that the findings and suggestions from the ev idence-based approach could offer profound improvements to the social work services they need not take place. It could improve the social services available for older adults that need or could eventually need to use them in the future.[13] One of the weaknesses of using the evidence based approach to assist in the formation and the subsequent shape of social work practices for older adults with mental health conditions is that such an approach does not take other factors or organisations into account.[14] An over reliance upon the use of the evidence based approach to drawing up social work practices to assist older adults with mental health conditions is that a narrowly focused concentration on such an approach could lead to an underestimation of other actors.[15] Social workers could underestimate the importance of other private sector and public sector bodies, groups, and organisations that offer services to older adults. Other private sector and also public sector bodies, groups, and organisations offer services to older adults with mental health problems either because the government tasks them with doing so, or because they can make money from doing so.[16] In reality this weakness of using the evidence based approach when drawing up social work practices is not really a problem. This weakness is not a profound or serious problem because social work departments are used to working with private sector as well as public sector bodies, companies, groups, and organisations when they set out to deliver social services to the general public taken as a whole.[17] Providing the appropriate services for older adults with mental health conditions really is an example of public services being delivered by a whole host of private sector as well as public services groups, organisations, and agencies.[18] Alongside social work departments, the DWP, the NHS, private sector care homes, local authorities, as well as charities for older adults and people with mental conditions provide services.[19] The weaknesses of using the evidence based approach for developing social work practices for assisting older adults is that the evidence might not be as complete as would be helpful to social workers. Research into the affects and consequences of mental health issues or problems for older adults has arguably proved insufficient until recently given the ageing populations within the majority of Western societies.[20] Older adults with dementia or similar mental health conditions frequently need a great deal of care and support as do their carers, and also their families in order to cope with the consequences of severe mental illnesses. Sometimes it is the spouses, the children, or indeed other relatives of the older adults with the more pronounced mental health conditions who can be most adversely affected by the worst consequences of their loved ones’ illness.[21] There are weaknesses that the evidence based approach towards setting social work practices for older adults with mental health conditions relating to the limited scope of that approach. Research into older adults with mental health problems and conditions has not always examined the ill affects that such conditions have upon the carers and the relatives of the people with the illnesses or health complaints. [22] On a practical level social work practices can be as much about supporting tired or distressed close relatives and carers as it is about assisting the older adults afflicted with or by poor and worsening mental health conditions.[23] When mental health conditions, issues, or problems adversely affect older adults then it can strain their relationships with their close relatives, especially their spouses or children, which in turn causes stress to all of them. Strained relationships between older adults with mental health conditions and the close relatives caring for them can lead to those older adults moving into care homes and hospitals rather than been cared for at home. Helping older adults with mental health conditions get better can have the benefit of allowing some of them to continue working or indeed to start working again.[24] To conclude it has been argued that the use of the evidence based approach to draw up and shape social work practices in relation to older adults with mental health conditions can offer strengths as well as weaknesses to social workers. The evidence based approach to drawing up or shaping social work practices for older adults with mental health conditions offers the strengths of providing social workers with relevant information and data to draw effective policies. The information and data from the evidence based approach research allows social work departments to increase the effectiveness of their social work practices towards older adults with mental health problems. The main weaknesses of using the evidence based approach towards forming and amending social work practices is that it can cause a delay in relevant information being used by social workers, and that it can underestimate the part that other organisations play in providing services to older adults. Bibliography Audit Commission / Better Government for Older People – Older People, independence and well-being: The challenge for public services, Public Sector Briefing Bowers H, Eastman M, Harris J, Macadam A (2005) Moving out of the Shadows – A report on mental health and wellbeing in later life, Health Care Development Ltd, London Brooke L and Taylor P, Older workers and employment: managing age relations, Ageing society 25, 2005, 415-429, Cambridge University Press Department of Health, A Sure Start to later life, Ending inequalities for older people, January 2006 Estes, C.L. Biggs, S. and Phillipson, C. (2003), Social Theory, Social Policy and Ageing A critical introduction, Open University Press, Maidenhead Maria Evandrou and Karen Glaser, Combining work and family life: the pension penalty of care, Ageing and Society 23, 2003, 583-601, Cambridge University Press House of Commons Committee of Public Accounts, Improving Public Service for Older People, Twenty- Ninth Report of Session 2003-04 (May 2004) Riseborough M Jenkins C (April 2004), Now you see me†¦now you don’t How are older citizens being included in regeneration? Age Concern, London Vincent, J., Phillipson, C. Downs M., (eds) (2006) The Futures of Old Age, Sage 1 Footnotes [1] Vincent et al, 2006 [2] Brooke and Taylor, 2005 [3] Vincent et al, 2006 [4] Brooke and Taylor, 2005 [5] Vincent et al, 2006 [6] Brooke and Taylor, 2005 [7] Evandrou Glaser, 2003 [8] Brooke and Taylor, 2005 [9] House of Commons Committee of Public Accounts, May 2004 p. 10 [10] Vincent et al, 2006 [11] Department of Health, 2006 [12] Audit Commission / Better Government for Older People, p.2 [13] Riseborough Jenkins, April 2004 p. 6 [14] Evandrou Glaser, 2003 [15] Department of Health, 2006 [16] Brooke and Taylor, 2005 [17] Riseborough Jenkins, April 2004 p. 6 [18] Audit Commission / Better Government for Older People, p.2 [19] Vincent et al, 2006 [20] Riseborough Jenkins, April 2004 p. 6 [21] Brooke and Taylor, 2005 [22] Riseborough Jenkins, April 2004 p. 6 [23] House of Commons Committee of Public Accounts, May 2004 p. 10 [24] Department of Health, 2006

Friday, October 25, 2019

Essay --

Dr. Seuss was one of the influential well known children's author. His books are still read to children today. My personal favorite book of his is "Horton Hears a Who!". His real name is Theodor Seuss Geisel. He was born on March 2, 1904. Was an a American writer, poet, and cartoonist. He was most widely known for his children's books written and illustrated as Dr. Seuss. He had used the pen name Dr. Theophrastus Seuss in college and later used Theo LeSieg and Rosetta Stone. Geisel Published 46 children's books, often characterized by imaginative characters, rhyme, and frequent use of anapestic meter. His most-celebrated books include the bestselling Green Eggs and Ham, The Cat in the Hat, The Lorax, One Fish Two Fish Red Fish Blue Fish, Horton Hatches the Egg, Horton Hears a Who!, and How the Grinch Stole Christmas!. His works have spawned numerous adaptions including 11 television specials, four features films, a Broadway musical and four television series. He won the Lewis Carroll Shelf Award in 1958 for Horton Hatches the Egg and again in 1961 for And to think That I Saw It on mulberry street. Geisel also worked as an illustrator for advertising campaigns, most notably for Flit and Standard Oil, and as a political cartoonist for PM, a New York City newspaper. During World War II, he worked in an animation department of the United States Army, where he wrote Design for Death, a film that later won the 1947 Academy Award for Documentary Feature. He was a perfectionist in his work and would sometimes spend up to a year on a book. It was not uncommon for him to throw out 95% of his material until he settled on a theme for his book. For a writer he was usual in that he preferred to be paid only after he finished his work rathe... ...heir original appearances. In May 1954, Life magazine published a report on illiteracy among school children, witch concluded children were not learning because their books were boring. Accordingly, William Ellsworth Spaulding, director of the education division at Houghton Mifflin, who later became its chairman, compiled a list of 348 words he left were important for first graders to recognize and ask Geisel to cut the list to 250 words and write a book using only those words. Spaulding challenged Geisel to make a children book that they cannot put down. Nine months later, Geisel, using 236 of the words given to him, completed The Cat in the Hat. It retained the drawing style, verse rhythms, and all of the imaginative power of Geisel's earlier works, but because if its simplified vocabulary it could be read by beginner readers. The Cat in the Hat

Thursday, October 24, 2019

Labor Relations Essay

1. Define the term â€Å"collective bargaining† and list and describe four issues that are mandatory components of a collective bargaining agreement. Collective bargaining can be defined as the process of involving representatives from both employers and employees to come to terms and conditions of employment that both parties agree. These agreements are written into legally binding contacts good for one to five years. (Budd, 2009, p. 229) Four issues that are mandatory components of collective bargaining agreement are compensation, personnel policies, employer rights and responsibilities. Compensation would include wages, benefits, vacations, holidays, and profit sharing. Personnel policies refer to layoffs, promotions, and transfer policies. Employer’s rights and responsibilities include but not limited to seniority rights, job standards, management right, just cause, safety standards, and discipline and discharge, (Budd, 2009, p. 13) Employer rights and responsibilit ies is a component of collective bargaining is illustrated in an article by Aaron Kuriloff. According to this article the NFL position is that the; NFL Players Association isn’t bargaining in good faith, using delays to run out the clock on talks before disbanding the union and suing the league under antitrust law for colluding to restrict pay (Kuriloff, 2011 ) The National Football League has asked the National Labor Relations Board (NLRB) for clarifications in using antitrust laws to block a lockout and clarifying if the National Football League Players Association is a certified labor union. The National Football League position is that the National Football League Players Association is using delaying tactics and they are threatening a work stoppage. The next a component of collective bargaining I found in an article by Howard Beck of the New York Times deals with compensation. The National Basketball Association is also facing a collective bargaining agreement (CBA) Mr. Becks states, that the Owners are proposing a fundamental overhaul of the N.B.A.’s eco nomic system, including a hard salary cap, shorter contracts and a 38 percent reduction in player salaries (about $800 million (Beck, 2011) The owners want to reduce salaries because 17 out of the 30 franchise teams are losing money at a sum of $300 million a year. While the National Basketball Player’s Association disputes the league’s figures; because Attendance is up, the league is on pace for its highest viewership of all other professional sports. To conclude these  collective bargaining agreements of both the NFL and the NBA can be categorized as being distributive bargaining. Both parties are going either win or lose some concessions to remain a viable and profitable organization. 2. List and discuss three U.S. laws that support collective bargaining, and three examples of employer unfair labor practices. The three laws that support collective bargaining between employers and labor unions are the National Labor Relations Act (NLRA) of 1935, the Labor-Management Relations Act of 1947, and Labor-Management Reporting and Disclosure Act of 1959. The National Labor Relations Act (NLRA) of 1935, which is also known as the Wagner Act, made it legal to form unions and engage in collective bargaining. The Wagner Act created a labor environment to equalize the bargaining power between the employer and employees as stated by this text the policy of the United States to eliminate the causes of certain substantial obstructions to the free flow of commerce and to mitigate and eliminate these obstructions when they have occurred by encouraging the practice and procedure of collective bargaining (National Labor Relations Board) The main purpose of the Wagner Act was to encourage collective bargaining in the private sector by protecting workers’ rights to join and form labor unions (Budd, 2009 , p. 119) Furthermore, this act also gave more expansive powers to the federal government with the regulating of labor relations; and it banned employers from punishing workers for using their collective bargaining rights. Americans did have the right to join unions and strike, prior to the enactment of this law. Previously, employers had been free to spy on, to question, to discipline, to discharge, to terminate, and to blacklist employees for either joining unions or striking. According to the website Infoplease.com the Taft-Hartley Act amended much of the National Labor Relations (Wagner) Act of 1935, the federal law regulating labor relations of enterprises engaged in interstate commerce, and it nullified parts of the Federal Anti-Injunction (Norris-LaGuardia) Act of 1932. The act established control of labor disputes on a new basis by enlarging the National Labor Relations Board and providing that the union or the employer must, before terminating a collective-bargaining agreement, serve notice on the other party and on a government mediation service. The government was empowered to obtain an 80-day injunction against any strike  that it deemed a peril to national health or safety. (Taft-Hartley Labor Act, 2011) The Labor-Management Relations Act provided the government far more oversight over union activities, including the right of the U.S. president to stop a strike if it was deemed dangerous to national health. The act also stripped unions of their power in several ways, including forbidding unions from contributing to political campaigns and only allowing unions to organize after a majority vote by employees. Although President Truman vetoed the act, it passed easily over his veto, and this act remains the heart of U.S. labor law. The Labor-Man agement Reporting and Disclosure Act of 1959. Also called the Landrum-Griffin Act, this law amended the Taft-Hartley Act to protect the rights of union members within their union and imposed new reporting requirements and codes of conduct on unions and employers. This was act created in response to the surge of corruption from various labor union officials who used violence as a way to quail the union opposition from employers and employees. Another process of the Labor-Management Reporting and Disclosure Act of 1959 was to stop labor unions from be infiltrated by communist. Furthermore, former members of the Communist party and former convicts were prevented from holding a union office for a period of five years after resigning their Communist party membership or being released from prison. (infoplease.com, 2011) Three examples of unfair labor practices include; firing a union supporter or someone trying to form a union, Failing to bargain in good faith, threatening to employees with job loss or demotion or physical harm if they support a union and preventing employees from talking about a union or wearing union buttons when it doesn’t interfere with their work duties or customers. The National Labor Relations Board which is an independent federal agency devoted to conducting representation elections and adjudicating unfair labor practices (Budd, 2009 , p. 124) I want to discuss a news article written by Chris Si eroty, who writes for the Las Vegas Review-Journal. Mr. Sieroty details in his article about the labor unrest being experienced in Las Vegas Nevada concerning the allege discrimination against employees based on their national origin. The protesters also urged Station Casinos to support the union’s efforts to establish a new standard when it comes to alleged discrimination against employees based on national origin. (Sieroty, 2011) Therefore, the labor union, the Culinary Local 226  is attempting to unionize nearly 13,000 workers at the 18 hotel-casinos operated by Station Casinos in Southern Nevada. Station Casinos has been charged with using threats, intimidation, surveillance, bribery, discrimination and other illegal activities against employees engaged in lawfully protected union activities. The National Labor Relations Board alleges that for approximately seven months Station Casinos has used this illegal tactic to divide and conquer in union busting strategy by not supporting an anti-discrimination policy. The article I want to discuss is an article by Steven Greenhouse. Mr. Greenhouse writes for the New York Times and his article was about the illegally firing an employee after she criticized her supervisor on her Facebook page. The action falls under unfair labor practices of firing a union supporter or someone trying to form a union. The National Labor Relations Board steps in to clarify the statute that a worker could not be fired because they criticize their employer under the National Labor Relations Act. The National Labor Relations Board states a example of it clarifying statement, That act gives workers a federally protected right to form unions, and it prohibits employers from punishing workers — whether union or nonunion — for discussing working conditions or unionization. The labor board said the company’s Facebook rule was overly broad and improperly limited employees’ rights to discuss working conditions among themselves. In summary if we are g uaranteed freedom of speech, should always trump business’ restrictive policies on speech (Greenhouse, 2010) 3. Describe the process of establishing and decertifying a collective bargaining unit in the workplace. Initiating an Organizing Drive The first step in establishing a union in the workplace is to begin by initiating an organizing drive. There are three possible initiators of an organizing a drive: one or more employees, a union, or an employer (Budd, 2009 , p. 188) Then you must first find out if your co-workers want to form a union by gauging their interest by quietly talking to a few trusted co-workers who you think may be interested in improving the workplace. Create a representative group of co-workers, usually called an Organizing Committee to make sure your efforts to form a union succeed. The Organizing Committee educates fellow workers about the benefits of unionizing and your rights under the law. The Organizing Committee should consist of people from  every department in your workplace and should be representative of all races, genders, and ethnicities. The committee then should gather an employee list, as well as information about your employer.† (How To Organize A Labor Union At Your Workplace, 2010) Building and Documenting Support The second step in establishing a union in the workplace is to begin building and documenting support. You must document a minimum of 30% of your fellow employees who have to shown interest in forming a union at your workplace. This next step is most likely accomplished by the signing of Authorization Cards or simply A Cards by the employee. By virtue of your signature, the A Card signifies that you desire for the union to represent you for the purpose of collective bargaining. However if you garner more than 50% of the workplace showing interest in being represented by a union you may request that the employer recognize your union. Subsequently if the employer refuses to voluntary recognize the labor union, there are alternates to be recognized by the employer available. Alternates to Voluntary Recognition The third step in establishing a union in the workplace is to begin using alternates to voluntary recognition. After the majority of the employees have decided to join the union, your employer will either recognize the union or refuse to recognize it. The alternative for a union to recognize by an employer is by launching a recognition strike. A recognition strike is a strike used by employees to make an employer recognize their labor union. This strike cannot last more than thirty days without the risk of being replaced. The Landrum Griffin Act created alternative to strike for union to be recognized by filing a petition with the National Labor Relations Board (NLRB), to hold elections to certify the labor union. The board will then decide who is eligible to vote and they will schedule the election. File Election Petition The next step can be either third or fourth step in establishing a union in the workplace, this step is done by filing a petition with the National Labor Relations Board (NLRB), to hold election. You must request the National Labor Relations Board (NLRB), which is an impartial government  agency, to hold a secret ballot election. Once it is determined that the bargaining unit is appropriate and that no supervisors or management are included, a date will be set by the NLRB for the election, usually 5 to 7 weeks out. Hold National Labor Relations Board Elections The next step can be either fourth or fifth step in establishing a union in the workplace, this final step is done by workers in favor of the union. The pro-union worker will have to campaign to keep pro-union workers and take steps to win over any workers who are against the union. If the union wins the election, by law the employer must recognize and bargain with the union. The National Labor Relations Board is responsible for setting up polling places, usually on the employer’s property. The National Labor Relations Board is also responsible and supervising the election. By casting a paper ballot into a ballot box is the usual median that employees vote. At the end of the voting period the polls are closed and the ballots are counted right on the spot. The union must win the majority of the votes to be declared the winner. The opposite of a certification election is a decertification election. This type of election is used to determine whether a majority of unionized employ ees no longer wish to be represented by their union (Budd, 2009 , p. 192) To request such an election, at least 30 percent of the employees must file a decertification petition asserting that the currently certified union no longer represents the employees in the bargaining unit before it can be considered by the National Labor Relations Board (NLRB). To decertify a union, the union representation must have been effect for more than a year and the decertification petition has to be filed during a timeframe of 60 to 90 days before the expiration on the union contract, although healthcare workers are afforded addition time for decertification and that window is 90 to 120 days prior to the expiration of their union contracts. According to Ohio Hospital Association’s information on the decertification process it is regarded as ‘The general rule for unions with a negotiated contract in place is that a decertification petition can only be filed 60 to 90 days prior to the expiration of the contract (or every three years, whichever comes first). For health care employees, this window is 90 to 120 days prior to the expiration of the contract (Ohio Hospital Association) The National Labor Relations Board require that all  decertification is free from managerial influences , and that all signatures on the petition were collect ed during non-work time and off the worksite. After the National Labor Relations Board verifies the signatures on the decertification petition, a decertification election is scheduled in approximately 60 days. The union will be decertified if a majority of the members vote against being represented by the union as it bargaining unit. In an article by Aaron Kuriloff he quotes the NFL’s position that the NFLPA is using decertification as a tactic to get a better labor contract. The NFL said the union’s threat to decertify is a ploy and an unlawful subversion of the collective bargaining process, there being no evidence whatsoever of any (let alone widespread) dissatisfaction with the union by its members (Kuriloff, 2011 ) Free agency was created when the union was decertified after the 1987 strike. The NFL owners just want the NFLPA to bargain in good faith and the NFLPA also want the same with more revenue sharing. 4. Describe the process of administering a collective bargaining agreement (CBA) to include the role and function of an arbitrator. What are the issues, and how are they handled? Through the process of collective bargaining, employers and unions negotiate terms and conditions of employment and put these terms in a written contract, also called collective bargaining agreements. (Budd, 2009 , p. 229) During the process of administering a collective bargaining agreement the employer and union are obligated to meet at reasonable times to negotiate in good faith about mandatory bargaining items. Mandatory bargaining items are wages, hours, vacation time, insurance, safety practices and the terms and conditions of employment. According to the National Labor Relations Act if either party to refuses to bargain collectively with each other, it is considered an unfair labor practice, however parties are not forced to reach an agreement or make any allowances. The collective bargaining process comprises of five core steps: Prepare: This phase involves composition of a negotiation team. The negotiation team should consist of representatives of both the parties with adequate knowledge and skills for negotiation. In this phase both the employer’s representatives and the union examine their own situation in order to develop the issues that they believe will be most important. The first thing to be done is to determine whether there is actually any reason  to negotiate at all. A correct understanding of the main issues to be covered and intimate knowledge of operations, working conditions, production norms and other relevant conditions is required. Discuss: Here, the parties decide the ground rules that will guide the negotiations. A process well begun is half done and this is no less true in case of collective bargaining. An environment of mutual trust and understanding is also created so that the collective bargaining agreement would be reached. Propose: This phase involves the initial opening statements and the possible options that exist to resolve them. In a word, this phase could be described as ‘brainstorming’. The exchange of messages takes place and opinion of both the parties is sought. Bargain: negotiations are easy if a problem solving attitude is adopted. This stage comprises the time when ‘what ifs’ and ‘supposals’ are set forth and the drafting of agreements take place. Settlement: Once the parties are through with the bargaining process, a consensual agreement is reached upon wherein both the parties agree to a common decision regarding the problem or the issue. This stage is described as consisting of effective joint implementation of the agreement through shared visions, strategic planning and negotiated change. (Collective Bargaining Process, 2007) According to the website Industrial Relations Home Collective Bargaining Process the collective bargaining process comprise s of five core steps; in which are Prepare, Discuss, Propose, Bargain, and Settlement. The first process of preparing is getting your team together; the second step is discussing the grievances, common concerns and goals; the third step is proposing the methods on how to solve grievances, common concerns and goals; the fourth step is bargaining to reach an agreement that all parties can abide by; the final step is making a settlement on the terms of the contract. WORK CITED Budd, J. W. ( 2009 ). Labor Relations: Striking a Balance. New York: McGraw-Hill. MLBPA. (2014). History of the major league baseball players association. Retrieved from http://mlb.mlb.com/pa/info/history.jsp Kuriloff, A. (2011). NFL Files Unfair-Labor Practices Complaint Against Union in Contract Talks. Retrieved February 19, 2011, from Bloomberg: http://www.bloomberg.com/news/2011-02-14/nfl-files-unfair-labor-practice-char

Tuesday, October 22, 2019

Smartphone Usage Among Students

CHAPTER 1: INTRODUCTION 1. Introduction: Smartphone Usage Mobile phones nowadays are addressed as smartphone as they offer more advanced connectivity and computing ability than a normal cell phone. The term smartphone refers to a programmable mobile phone that offers advanced capabilities and features that help individuals in their daily work and personal life (Euromonitor, 2010). Smartphone basically is the combination of both cell phone and a PDA. 70% of the world’s population own at least one mobile phone. In a telephone survey, 83% of respondents said that they owned a cell phone and 35% of the 2,277 U. S. dults said that they owned a smartphone. Literately, a smartphone is a handheld computer, as it is powerful enough to deliver various functionalities comparable to a computer. The release of dual-core processors smartphone recently has further reaffirmed this assertion. A research on 5013 US adult smartphone Internet users at the end of 2010 reveal the types of smartphon e users. i. General Smartphone Usage: Cell phones have been a must have item in daily lives. With the invention of smartphones, owing a cell phone is no longer for calling; it has become a trend and is a substitute for computers, telephone and PDA. 1% uses smartphone to browse the Internet, 77% search, 68% use an application and 48% watch videos on their smartphone. ii. Action-Oriented Searchers: Smartphones is used to find wide variety of information and to navigate the mobile internet. Search engine websites are the most visited websites with 77% of US smartphone users citing this. iii. Local Information Seekers: Smartphone is convenient because it users can easily access to information through internet and software provided. 95% of US smartphone users have looked for local information. iv.Purchase-driven Shoppers: Smartphones has been relatively useful for women because it provides shopping tools, from comparing prices, finding more product information to locating a retailer. 74% of US smartphone shoppers make a purchase, whether online, in-store, or on their phones. v. Reaching Mobile Consumers: Businesses never miss the opportunity to advertise their products. With smartphones, consumers are exposed cross-media and a majority of them notice mobile ads which lead to taking action on it. 82% notice mobile ads with half of take action, 35% visiting a website and 49% making a purchase.Figure 1. 1 Smartphone Penetrations across Global Markets Source: http://www. asymco. com/2011/12/13/global-smartphone-penetration-below-10/ (2011) Smartphones have penetrated many countries since its first launching. The number of users started to expand massively in 2010. Figure 1. 1 depicts Singapore to be the country with the most smartphone penetration in year 2011. 2. Smartphone usage in Malaysia With the popularity and functions offered in the phone, smartphones have seen an increase in terms of demand (Park and Chen, 2007). It is reported that in year 2010, 85% of Malays ians own mobile phones.Number of smartphones sold doubles within 12 months. In 2010, mobile phone industry in Malaysia started to boom. The overall value of the industry increased by 30 per cent compared to the year before. The main contributor to the good performance of the industry was the sales of smartphones. The number of units sold went two-fold growth of 208 per cent. Figure 1. 2 Smartphone and Internet Usage in Asia Source: http://www. malaysianwireless. com/2010/05/nsn-talks-about-lte-mobile-broadband/ Figure1. 2 shows that Malaysia is the fifth country in Asia with growing percentage of smartphone and internet usage.With mobile broadband becoming more widely available and affordable, it’s not surprising that a growing number of Malaysians are accessing the Internet via smartphones. Massive competition on mobile broadband industry causes the price of subscription become lower. This is an advantage to middle income people especially to students as they now have the ab ility to own a smartphone and utilise it with mobile internet. More than half of Malaysian consumers (55%) are using laptops and netbooks while eleven per cent said they are using smartphones which is a nine point gain from 2009.Almost two in ten (19%) Malaysians aged 20-24 access the Internet via their mobile phones. Figure 1. 3: Mobile and Smartphone Sales in Malaysia Source: http://marketresearchbulletin. com/? p=3636 The data from the Figure 1. 3 shows that the number of smartphones sold doubles from 2009 to 2010. Since the beginning of 2010, value sales of smartphones have been consistently increasing every month and occupied 72 per cent of the overall pie by December. Overall, close to two in five (38 per cent) mobile phone sets sold last year were smartphones.In Malaysia, it was found that smartphone sales totalled 172. 4 million units in year 2009, with a 23. 8 per cent increase from 2008 (Sidhu, 2010). This increment in sales was partly contributed by university students (J acob and Isaac, 2008). 3. Research Problem Mobile phones have been more and more versatile and with smartphones, it makes communication convenient between and among individuals, especially students. Communication and life makes easy as smartphones provides Internet capability and functionalities that are similar to computers.Students nowadays are prone to using Social networking services (SNS) to spread information. With smartphones, students can instantly share ideas, activities, news, and interests anytime and anywhere. The problem therefore is to understand whether attitudes will affect the intention towards using smartphone among students. Attitude is a feeling, beliefs or opinion towards something. Positive attitude can result in beneficial usage of smartphones by students such as to use it as a medium of learning.On the others hand, negative attitude such as to abuse the use of smartphone will develop negative effects to the users such as incompetent and unable to meet deadlin es and reduces the productivity which will affect the user overall daily routine. The next question that we want to research is on whether perceived behavioural control can influence the intention to use smartphones. Perceived behavioural control is an individual’s perceived ease or difficulty of performing the particular behaviour.It is linked to control beliefs, which refers to beliefs about the presence of factors that may facilitate the behaviour. 4. Research Objectives Research objectives are the objective that we intend to achieve after identifying research problems. There are some of research objectives that are highlighted in this research. One of our main objectives of this research is to understand the determinants of attitude among students in using smartphones. We are going to find out the relationship of the key determinants such compatibility, perceived usefulness and perceived ease of use in influencing the attitude.Secondly, the purpose of this research is to understand the factors that will influence the intention of students to use smartphones. Lastly, this study will also seek to understand the role of attitude on intension. 5. Research Questions In seeking to achieve the above objectives, this study attempts to answer the following research questions: 1) What are the key determinants of intention? 2) Does attitude moderate the relationship between perceived usefulness, perceived ease of use, compatibility, observability, trialability, self-efficacy and intention? ) Does perceived usefulness, perceived ease of use, compatibility, observability, trialability, self-efficacy influence intention to use? 6. Significance of Study The study is carried out to help us understand the key determinants of intention to use smartphones among students, using attitude as the moderator to the relationship. It helps us to have clearer picture on how the determinants will affect the intention of using smartphones among students by looking at the indepen dent variables that are directly and indirectly affecting the dependent variable (actual use).Understanding the determinants for intention to use will raise awareness regarding usefulness of smartphones to students and will create higher level of acceptance to smartphone in the future. This study will help to give insight on the grey areas of smartphones and enable us to understand better the social and psychological factors that may affect the intention to use smartphone among students. The results from this study can be used by mobile phone manufacturers to improve the functions and elements in smartphone which will attract new users especially students and continue to bring extra benefits to the present users.In addition, this result can be used as a benchmark for smartphone manufacturers to be creative and innovative in developing new ideas that could help users especially students in learning process. Therefore, understanding the key factors that will increase the intention to use smartphone will result in better suitability in functions to students. 7. Definition of Key Terms Perceived Usefulness – defined as the degree to which a person believes that using a particular system would enhance his or her job performance. Davis, 1989) Perceived Ease of Use – defined as the degree to which a person believes that using a particular system would be free of effort. (Davis, 1989) Compatibility – defined as the degree to which using an innovation is perceived as consistent with the existing sociocultural values and beliefs, past and present experiences, and needs of potential adopters. (Rogers, 1983) Observability – defined as the degree to which the results of an innovation are visible to others. (Rogers, 2003) Trialability – defined as the degree to which an innovation may be experimented with on a limited basis. Rogers, 2003) Self-Efficacy – The judgments an individual makes about his or her capability to mobilize the m otivation, cognitive resources and course of action needed to orchestrate future performance on a specific task. (Martocchio and Dulebohn, 1994) Attitude – A psychological tendency that is expressed by evaluating a particular entity with some degree of favour or disfavour† (Chaiken, 1993) Intention – the extent to which an individual intends to perform a specificbehavior. (Davis et al. ,1989). 8. Organization of the Report This research proposal is organized into five chapters.Chapter 1 gives the background of the study. The purposes and research objectives have been put forth to guide the direction of the study. Chapter 2 reviews related literatures by previous researchers. Based on these literatures the theoretical framework and hypotheses are developed. Chapter 3 discusses the research methodology used in this research. Chapter 4 presents the result of the statistical analysis. Chapter 5 summarizes research findings, implications of the findings and limitation of the study. The concluding chapter also provides some suggestions for further studies. CHAPTER 2 LITERATURE REVIEW 2. Introduction This chapter focuses on discussing the theories, the expansion of the theories to the present theoretical framework used in this research and the justification for the present model. 2. 2 Overview of the literature Various literatures from scholars in Malaysia and abroad were reviewed on the subject Theory Acceptance Model (TAM) and Innovation-Diffusion Theory (IDT). Among numerous perspectives that can be used to examine user acceptance and usage behavior of new technologies, TAM might be the most popular one. This model is derived from Fishbein & Ajzen’s (1975) Theory of Reasoned Action.Davis (1986) developed TAM specifically for explaining and predicting user acceptance of computer technology. The goal of TAM is â€Å"to provide an explanation of the determinants of computer acceptance that is in general, capable of explaining user behavior across a broad range of end-user computing technologies and user populations, while at the same time being both parsimonious and theoretically justified†. The Technology Acceptance Model posits the determinants of user acceptance that may be able to explain a user’s behavior in regard to a general user’s computing technologies.The TAM claims that users evaluate the system based on the system’s ease of use (PEOU) and perceived usefulness (PU). If the system is easy to use and useful, a user would have a positive attitude toward the system (AT), which in turn causes a user’s actual intention to use (BI). Then, the intention creates a user’s decision to use the system. A previous study conducted by Park and Chen indicated that behavioral intention to use a smartphone was largely influenced by perceived usefulness and attitude toward using a smartphone.They further postulated that perceived usefulness and perceived ease of use positively determi ne attitudes toward using a smartphone. Kwon & Zmud (1987) suggest that when discussing IDT-related subjects’ factors such as task, individual, organization, and environment as additional explanatory factors should be introduced. Task includes structure of the task, jurisdiction, and uncertainty. Individual factors include aspects such as education, age, experience, and personal specialties.Organizational factors include the support of higher-level management, the organizational structure, the involvedness of the users, and the quality of the product. Environmental factors include pressure from competitors, customer satisfaction, and marketing strategies. The context of smartphone adoption contains both individual factors and organizational diffusion. Previous innovation diffusion studies have suggested that innovation attributes affect an individual’s attitude of the innovation prior to adoption and may consequently influence the speed of adoptions.This study employed these attributes in building the theoretical basis for behavioral characteristics. These beliefs include, compatibility, trialability, self- efficacy and observability. 2. 3. Theory Acceptance Model (TAM) The TAM probably is the most popular theory explaining user acceptance and behavior related to new technologies. Davis (1989) developed the TAM and investigated the determinants of user acceptance that may explain a user’s behavior in regard to the user’s general attitude toward the use of computing technologies.According to the TAM, users evaluate the system based on the perceived ease of use and perceived usefulness of the system. If the system is perceived as easy to use and useful, a user would have a positive attitude toward the system, which in turn leads to the user’s intention to use the system. Then, the intention results in the user’s actual decision to use the system. We are using the Technology Acceptance Model to test the perceived usefulne ss and perceived ease of use about the intention to use smart phones among students.The Technology Acceptance Model (TAM) has become a well-established robust model for predicting user acceptance (Davis, 1989; Davis, Bagozzi, & Warsaw, 1989). TAM is one of the most influential extensions of Ajzen and Fishbein's (1975) theory of reasoned action and specifies two key constructs that influence users' attitudes, intentions, and behaviors related to technology adoption and use (Lippert & Forman, 2005). The parsimony of TAM combined with its predictive power makes it easy to apply to different situations. However, while parsimony is TAM’s strength, it is also the model’s key limitation.TAM is predictive but its generality does not provide sufficient understanding from the standpoint of providing system designers with information necessary to create user acceptance for new systems (Mathieson,1991). TAM provides researchers with â€Å"valid, reliable, and easy to administer s cales for the key constructs† (Venkatesh et al. , 2007, p. 268). Due to the reliability of these measurement scales, questions for the survey instrument in this study were adapted from this information. Venkatesh et al. noted the repeatability and validity of TAM.TAM was confirmed to be generalizable over time in various research papers worldwide, testing numerous technologies, diverse settings, and different populations. Predicted validity was also confirmed by a number of research studies investigating intention, self-reported use, and actual use. Ramayah (2006a) and (Venkatesh, 2000) have added depth to TAM model by understanding the determinants of perceived ease of use in their study. The study by (Venkatesh, 2000) explained up to 60% of the variance in system specific perceived ease of use.The study by (Ramayah, 2006a) on determinants of perceived ease of use of e-Library also explained up 65% of the total variance. These studies have some of the highest explanatory powe r among TAM research conducted in recent years. The TAM is a specific model developed to explain and predict user’s smartphone usage behavior. Derived from the TAM, it predicts user acceptance based on the influence of two use beliefs: Perceived Usefulness (PU) and Perceived Ease of Use (PEU). 2. 3. 1 Limitation of Theory Acceptance Model (TAM)TAM may be criticized, however, for the lack of sufficient explanation about cognitive processes culminating in a user’s acceptance of new technology. TAM still shares the basic premises and components outlined in Ajzen and Fishbein’s Theory of Reasoned Action (Ajzen and Fishbein, 1980), but by excluding the attitude construct from the TRA model, TAM discounts the role of attitude in explaining technology acceptance behavior. Venkatesh and his colleagues dropped the construct of attitude from the technology acceptance model (Venkatesh and Davis, 1996; Venkatesh and Davis, 2000; Venkatesh et al. 2003), arguing that the role of attitude in explaining behavioral intention or actual adoption behavior is very limited and is at best a partial mediator in the relationship between salient beliefs and the adoption behavior or intention. We contend that this argument is made without serious theoretical consideration and restricts the search for a comprehensive understanding of technology acceptance. 2. 4 Innovation Diffusion Theory (IDT) The IDT describes the process of technology acceptance by five characteristics of the technology influencing the consumer's attitude leading to adopting or refusing the technology (Rogers, 1995).The main difference appears to be TAM's focus on a specific technology whereas IDT recognize the importance of establishing a technology's likelihood to be adopted in relation to comparable existing technologies (Park & Gretzel, 2006). Diffusion of Innovation Theory (DIT or DOI) (Roger 1995) is a well-known conceptual framework to study new products’ diffusion and adoption. The original diffusion model provided a probabilistic approach based on the hazard function, which determines the likelihood that an agent who has remained a non-adopter of an innovative product will become an adopter in the next temporal unit.Rogers [1983] explained the process of innovation diffusion as one which is dictated by uncertainty reduction behaviour amongst potential adopters during the introduction of technological innovations. Even though innovations typically offer its adopters novel ways of tackling day-to-day problems, the uncertainty as to whether the new ways will be superior to existing ones presents a considerable obstacle to the adoption process. To counter this uncertainty, potential adopters are motivated to seek additional information, particularly from their workplace peers [Brancheau & Wetherbe, 1990].In diffusion research theory (Rogers, 1995), diffusion is classified into five stages: innovators, early adopters, the early majority, the late majority, and lag gards, with 2. 5%, 13. 5%, 34%, 34%, and 16% of the population respectively. These barriers are closely connected to all kinds of access-related issues, i. e. access to the physical device needed to use a new mobile service, i. e. the smartphone, or access to money to pay for the hardware to use the service, or to pay for the service itself.Innovation Diffusion Theory (IDT) consists of six major components: innovation characteristics, individual user characteristics, adopter distribution over time, diffusion networks, innovativeness and adopter categories, and the individual adoption process [Tornatsky & Klein, 1982; Rogers, 1983; Brancheau & Wetherbe, 1990; Moore & Benbasat, 1991; Taylor & Todd, 1995(b)]. According to IDT, the rate of technology diffusion is affected by an innovation’s relative advantage, compatibility, trialability, observability and complexity.Research suggests that all but the last factors have a positive influence on diffusion (Sonnenwald, Maglaughlin an d Whitton 2004; Ferle, Edwards and Mizuno 2002). Rogers (1995) defines relative advantage as ‘the degree to which an innovation is seen as being superior to its predecessor’. The IDT posits an array of innovation characteristics that may impact a user’s perception of the innovation preceding adoption of the innovation. As a result, these characteristics presumably affect the speed of innovations being embraced. These attributes further provide a theoretically-based set of socio-behavioral beliefs.Thus, we adopted IDT because of the innovative nature of smartphone devices. Innovation may be defined as a new use of an idea, practice, or object by the unit of adoption. This definition of innovation can be applied to new technology adoptions among students. Rogers defined innovation as a new use of an idea, a practice, or an object by the unit of adoption. The smartphone was introduced in 2000. Thus, we view smartphone devices as recent innovations and employ Rogersà ¢â‚¬â„¢s DOI theory in our study. Researchers have used the theory to better understand whether an individual or an organization will adopt new innovations. 2. Theoretical Framework Theoretical frameworks in quantitative research help to â€Å"provide a conceptual guide for choosing the concepts to be investigated, for suggesting research questions, and for framing the research findings† (Corbin & Strauss, 2008, p. 39). Figure 2. 5. 1 Theoretical Framework 6. Independent Variable 2. 6. 1 Perceived Usefulness In Technology Acceptance Model, behavior intention is influenced by both perceived usefulness and attitude. This relationship has been examined and supported by many prior studies (Adams et al. , 1992; Davis et al. , 1989; Hu et al. , 1999; Venkatesh and Davis, 1996, 2000).Perceived usefulness refers to the degree to which a person believes that using a particular system would enhance his or her job performance, (Davis, 1989). Many earlier studies have shown that perceive d usefulness was the major determinant of attitude towards system use (Langford and Reeves, 1998; Venkatesh and Davis, 1996). Empirical studies have shown that perceived usefulness has a strongly impact on usage than ease of use. Perceived usefulness are existing in the studies of technology to shown that perceived usefulness directly and significantly influences behavioral intention to use smartphone (Chen and Ching, 2002; Chen et al. 2002; Heijden et al. , 2003; Guriting and Ndubisi, 2006; Khalifa and Shen, 2008; Liao et al. , 2007; Lin and Wang, 2005; Luarn and Lin, 2005; Wei et al. , 2009; Lai and Yang, 2009). However, Davis et al. (1989) to suggest that perceived usefulness may impact on behavioral intention to use the technology-based system. H1: Perceived usefulness is positive related to intention to use. H2: Perceived usefulness is positive related to attitude. 2. Perceived Ease of Use Perceived ease of use refers to the extent to which an individual perceived that using a system is easy or effortless (Davis, 1989).Earlier studies revealed that if an individual perceives a system to be easy to use, he/she is more likely to perceive the system to be useful also (Morris and Dillion, 1997). In addition, if an individual perceives the system to be easy to use, the individual is more likely to use the system, especially among novice users. In a test of selling, when consumers perceive that making a purchase from a virtual store is easy to understand and do, they usually continue interacting with that site (Barkhi and Wallace, 2007). However, by the prior literature by Davis et al. 1989) proposed that perceived ease of use is predicts attitude towards the channel, and also an antecedent of perceived usefulness. Technology acceptance model (TAM) (Davis et al. , 1989; Mathieson, 1991; Davis and Venkatesh, 1996; Gefen and Straub, 2000; Al-Gahtani, 2001) determined by perceived usefulness (PU) and perceived ease of use (PEOU) relating to the attitude toward use that relates to intention and finally to behavior but there is no direct related with actual use. H3: Perceived ease of use is positive related to intention to use H4: Perceived ease of use is positive related to attitude. 2. 6. 3 CompatibilityCompatibility (Park and Gretzel, 2006) is the degree to which in an innovation is perceived as being consistent with the existing values, needs, and past experiences of potential adopters. Compatibility (Gavin J. Putzer, 2010) has a positive effect on the rate of adoption. When a user recognizes that an innovation is compatible with a system, the more the innovation will be adopted. Compatibility (Rogers,1995) refers to ‘the degree to which an innovation is seen to be compatible with existing values, beliefs, experiences and needs of adopters’. In a conjoint analysis directed at the adoption of mobile games, Kleijnen et al. 2004) found that perceived risk, which are often used in extensions of Rogers’ concepts (Ortt, 1998) of complexity, and are also referred to as relative ease of use and compatibility, are important factors in the intention to use of mobile services(eg Smartphone) . According to Kleijnen et al. (2004), this implies that mobile systems (eg Smartphone) have to be reliable and data-transmission has to be secure, while the systems have to be easy to navigate and fit into the daily routine of users. H5: Compatibility is positive related to intention to use H6: Compatibility is positive related to attitude . 6. 4 Observability Observability (Park and Gretzel, 2006)is the degree to which the results of an innovation is observable to others. Observability (Yangil Park,2010) has a positive effect on adoption. When a user has an opportunity to observe an innovation, the innovation is more likely to be adopted. Observability(Rogers,1995) is the ‘degree to which the results of an innovation are visible’. An innovation factor from the Kwon and Zmud model known as trialability was r emoved from our model to reduce possible confusion with another innovation factor known as observability.The final pair of characteristics, results demonstrability and visibility, are derived from Rogers’ observability characteristic. Result demonstrability is defined as the tangibility of the results of adopting an innovation, and visibility as the degree to which prospective users see an innovation as being visible in the adoption context [Moore & Benbasat, 1991; Agarwal & Prasad, 1997]. H7: Observability is positive related to intention to use H8: Observability is positive related to attitude 2. 6. 5 Trialability Trialability (Park and Gretzel , 2006) is the degree to which an innovation may be experimented with before an adoption.Trialability (C Huang,2010) existence negative relationship with the attitude of use. Trialability (Rogers,1995) is the ‘degree to which an idea can be experimented with on a limited basis’. If a person can try out the technology bef ore deciding to accept Smartphone, the person will develop a stronger attitudinal belief about the technology, either in a positive or in a negative way depending on the quality of the new technology (Karahanna et al. , 1999; Venkatesh & Brown, 2001; Xia & Lee, 2000; Choi et al. , 2002). Therefore, if a user as an opportunity for trial usage before enroll with Smartphone; the person will have positive attitudinal belief and intention to use Smartphone. H9: Trialability is positive related to intention to use H10: Trialability is positive related to attitude 2. 6. 6 Self Efficacy Self-efficacy (SE) refers to individuals’ belief in their ability to perform a specific task in a given situation or context (Bandura, 1977). Bandura (1977) states that efficacy expectations—the belief that one can perform an activity in question—are the major antecedent of activity choice and effort. Jengchung Chen, 2010) is recognized to be a more important than the others. Efficacy re fers to the belief that an individual has the ability to perform a particular behavior. Compared with competing models, TAM is believed to be more accurate and parsimonious when it is used to predict technology adoption. However, the parsimony of TAM often results in the model being less informative in understanding usage behavior. Due to this limitation, researchers have attempted to extend the TAM framework by encompassing various constructs such as gender, culture, trust, experience, social influence, and self-efficacy.Among those constructs, self-efficacy is recognized to be a more important than the others. Efficacy refers to the belief that an individual has the ability to perform a particular behavior. Self-efficacy has been documented in numerous studies to be an important determinant of PEOU. In the context of web technologies, Agrawal et al (2000) found a positive effect of self-efficacy on both PU and PEOU. Similarly, Ma & Liu (2005) found that self-efficacy positively in fluences PU, PEOU, and the intention to use smartphone. H11: Self Efficacy is positive related to intention to use. . 7 Mediating Variable 2. 7. 1 Attitude According to Antonides et al. , (1998), â€Å"Attitude is the individual predisposition to evaluate an object or an aspect of the world in a favorable or unfavorable manner. † In Fishbein & Ajzen’s (1975) formulation, attitudes influence behaviour through behavioural intentions. Past studies indicate that the link between attitude toward the object and behaviour is not always clear. In some cases, attitudes have a direct effect on behaviours (Bagozzi & Warshaw 1992) but no effect in Bagozzi (1992).Both PU and PEU are posited as having significant impact on a user’s attitude (AT) toward using smartphones. (Yong-Wee Sek 2010) Based on an analysis of four different types of mobile services, Nysveen et al. (2005b) conclude that, in all four cases, people’s intention to use mobile services as well as their attitude toward the actual use, is affected significantly by the direct motivational influence of enjoyment. Moore & Benbasat [1991:196] reminds us, however, that these definitions are, in fact, â€Å"based on perceptions of the innovation itself and not on the perceptions of actually using the system†.As Fishbein & Ajzen [1980] concur, attitudes towards an object and attitudes regarding a particular behaviour relating to that object can frequently differ. Attitude towards behaviour can be described as an individual’s subjective forecast of how positive or negative he / she will feel when performing the target behaviour, whereas subjective norm can be viewed as an individual’s perception of the social pressure on him / her to perform the target behaviour [Fishbein & Ajzen, 1975; Ajzen & Fishbein, 1980].Furthermore, according to the expectancy value model of attitude [Fishbein & Ajzen, 1975], an individual’s attitude towards performing the target behaviour is itself determined by his / her beliefs regarding the consequences of performing the target behaviour, as well as the evaluation of these consequences. Attitude is explained as a function of the combined effect of behavioural beliefs and outcomes evaluations [Mathieson, 1991]. The behavioural beliefs relate to the favourable utilitarian, hedonic and social outcomes that can result from performing the behaviour [Venkatesh & Brown, 2001]. Davis et al. 1989) indicated that the key purpose of TAM is to provide a basis to trace the impact of external factors on internal beliefs, attitudes and intentions. Many IT researchers have since used TAM as a basis to explore and identify other determinants and relationships specific to a particular IT usage in different contexts (Venkatesh et al. , 2003). Hence, since the intention of smart phone among students is very closely tied attitude, this theory should be directly applied to the adoption of this innovation. (Check-Yee Law 2010) H12: Att itude is positive related to intention to use 2. 8 Dependent Variable 2. 8. 1 Intention to useIntentions are different form attitudes where attitudes are summary evaluations, intentions represent the person’s motivation in the sense of his or her conscious plan to exert effort to carry out a behavior (Eagly & Chaiken 1993). Behavioural Intentions (BI) to use is jointly determined by a person’s attitude toward using the system and its perceived usefulness (Shahril Bin Parumo 2010). Behavioural intention is a measure of the strength of one’s intention to perform a specified behaviour (Fishbein and Ajzen, 1975). It is correlated with the usage (Davis et al. , 1989) and is a predictor for usage (Szajna, 1996).Purchase intentions are personal action tendencies relating to the product (Bagozzi et al. 1979). Intentions are different from attitudes where attitudes are summary evaluations, intentions represent the person’s motivation in the sense of his or her con scious plan to exert effort to carry out a behavior (Eagly & Chaiken 1993). At times, intention is also difficult to measure. For instance, Bagozzi, Baumgartner & Yi (1989) commented that when an individual is unclear about his or her intention in regards to some action, there is strong tendency for him to react based on their past actions.Here, the individual is likely to report his or her habit rather than intention when responding to the intention (Warsaw & Davis, 1985). Despite issues, purchase intention is an important construct in consumer behavior (Kotler & Armstrong, 2003). A previous study conducted by Park and Chen indicated that behavioral intention to use a smartphone was largely influenced by perceived usefulness and attitude toward using a smartphone. The Theory Acceptance Model is the most popular intention-based theories and models that have emerged from this school of thought [Chau & Hu, 2002].CHAPTER 3: METHODOLOGY 3. 1 Introduction The purpose of chapter 3, method ology is to explain the process or the steps taken to answer the research problems. The process may be expanded to include a philosophically coherent collection of theories, concepts or ideas as they relate to a particular discipline of inquiry in this research. Discussion in this chapter will consists of the research model, variables and measurement, population, sample and sampling techniques, data collection technique and techniques of analysis. 3. 2 Research Model 3. . 1 Type of Study This is correlational study. This study was conducted among students in Universiti Sains Malaysia who are personally using smartphones. Hypotheses testing was undertaken to explain the variance in the dependent variables to predict the relationship. We will begin by discussing the relationship that certain events might have to one another whether there is a positive correlation or negative correlation or no correlation. 3. 2. 2 Nature of Study This study was conducted under the non-contrived setting (natural environment).The variables are neither controlled nor manipulated. This is a cross sectional study where data were collected within 2 weeks. Data is only collected from willing students from Universiti Sains Malaysia. 3. 2. 3 Unit of Analysis The unit of analysis is individual who are students using smartphones in USM. 3. 2. 4 Research Site The research sites for this study are individuals who study in USM, Penang. 3. 3 Population, Sample Size and Sampling Technique The population consists of individuals who are students of Universiti Sains Malaysia (main campus) that uses smartphone.The general rule for the of analysis independent variable, sample size must be five-to-one ratio (5:1) of the independent variable, which means that number of respondent must be at least 30. However, based on Hair et al. (1988) he proposed that the acceptable ratio is ten-to-one (10:1) of the independent variable, which means in a research must have minimum 60 respondents. The sampling techniq ue used is non-probability sampling method. Non-probability sampling method is used because only little attempt is made to generate a representative sample.Besides, there is no need to generalize compared to probability sampling and feasibility. Moreover, when there come to limited objectives, non-probability will be a good choice. Judgment method has been chosen as the sampling technique for this study because there is a need to find out whether people that we approach have access to social networking sites before filling up the questionnaire. This ensures credibility of this research. The list of smartphone users among students in Penang cannot be obtained therefore probability sampling could not be done. . 4 Scale and Measurement The questionnaire was divided into 10 sections. Section 1 to 8 is measured using interval scale of measurement. The other two sections, personal profile and internet experience is measured by using nominal and ordinal scale. For section 1 to 8, the respo ndents were asked to read and respond to all questions according to their level of agreement or disagreement using the 5 point scale. The ratings are as below: 1 Strongly Disagree 2 Disagree 3 Neutral 4 Agree 5 Strongly AgreeAll instruments were adopted from various literatures and were modified for the purpose of understanding people’s reflection when they use smartphones. 3. 4. 1 Independent Variable The independent variable is defined as the presumed cause of some changes in the dependent variable (Robbins, 1998). 3. 4. 1. 1 Perceived Usefulness Perceived usefulness of the individuals was measured on six items using 5-point scale ranging from â€Å"strongly disagree† (1) to â€Å"strongly agree† (7). Items were derived from Park & Chen (2007). Example of question is â€Å"Using the smartphone would enable me to accomplish tasks more quickly†. 3. . 1. 2 Perceived Ease of Use Six items using 5-point scale was used to measure perceived ease of use of the individuals ranging from â€Å"strongly disagree† (1) to â€Å"strongly agree† (7). Items were derived from Park & Chen (2007). Example of question is â€Å"I would find it easy to get the smartphone to do what I want it to do†. 3. 4. 1. 3 Compatibility This measure was derived from Park & Chen (2007) and a total of 3 items was measure using 5-point scale ranging from â€Å"strongly disagree† (1) to â€Å"strongly agree† (7). Example of question is â€Å"Using the smartphone will be compatible with all aspects of my studies†. 3. 4. 1. Observability Observability of the individuals was measured on six items using 5-point scale ranging from â€Å"strongly disagree† (1) to â€Å"strongly agree† (7). Items were derived from Park & Chen (2007). Example of question is â€Å"It is easy for me to observe others using the smartphone in my university†. 3. 4. 1. 5 Trial ability This measure was derived from Park & Chen (2007) and a total of four items was measure using 5-point scale ranging from â€Å"strongly disagree† (1) to â€Å"strongly agree† (7). Example of question is â€Å"Before deciding on whether or not to adopt the smartphone, I would need to use it on a trial basis†. . 4. 1. 6 Self-Efficacy Self-efficacy of the individuals was measured on ten items using 5-point scale ranging from â€Å"strongly disagree† (1) to â€Å"strongly agree† (7). Items were derived from Park & Chen (2007). Example of question is â€Å"I could complete a task using the smartphone if I had seen someone else using it before trying it myself†. 3. 4. 2 Dependent Variable Dependent variables are variable that is measured, predicted, or monitored and are expected to be affected by the manipulation of the independent variable. The dependent variable for this study is the intention to use smartphones. 3. 4. . 1 Intention to Use Smartphones Intention to use smartphones was measured by ite ms adopted and validate by Park & Chen (2007). It has a total of four items measuring the intention of users to use smartphones. Example of item is â€Å"Assuming I have the smartphone, I intend to use it†. 3. 4. 3 Moderating Variable Moderating variable is a second independent variable, believed to have a significant contributory or contingent effect on the originally stated IV-DV relationship. The moderating variable for this study is attitudes towards using smartphones. 3. 4. 3. 1 Attitudes towards Using SmartphonesFour items using 5-point scale was used to measure perceived ease of use of the individuals ranging from â€Å"strongly disagree† (1) to â€Å"strongly agree† (7). Items were derived from Park & Chen (2007). Example of question is â€Å"Using the smartphone is would be a pleasant experience†. 3. 5 Questionnaire Design One hundred and twenty five respondents from Universiti Sains Malaysia voluntarily responded and completed the questionnaire. The questionnaire has 10 sections with 55 questions to measure the relationship of those factors and the intention to use smartphones as well as some demography questions.Table 3. 1 depicts that all instruments used in this study had a corresponding Cronbach alpha ;. 693 Table 3. 1 Questionnaire Source and Validity |Variable |Construct |Items |Cronbach | Author | |Independent |Perceived Usefulness |6 |;. 779 |Park & Chen (2007) | | |Self-Efficacy |10 |;. 85 |Park & Chen (2007) | | |Perceived Ease of Use |6 |;. 764 |Park & Chen (2007) | | |Trialability |4 |;. 748 |Park & Chen (2007) | | |Observability |2 |;. 693 |Park & Chen (2007) | | |Compatibility |3 |;. 99 |Park & Chen (2007) | |Dependent |Intention to Use Smartphones |4 |;. 765 |Park & Chen (2007) | |Moderating |Attitude towards Using Smartphones |4 |;. 795 |Park & Chen (2007) | 3. 6 Data Collection Technique Data for this study was collected through structured questionnaires. The questionnaires were distributed to students in USM, Penang. 3. 7 Statistical Data Analysis The data gathered through questionnaire was subsequently coded and analyzed sing the computerized SPSS (Statistical Software Package for Social Science) software version 16. They were summarized using appropriate descriptive and inferential statistics. 3. 7. 1 Goodness and Correctness of Data Entry Establishing the goodness of data lends credibility to all subsequent analyses and findings (Sekaran, 2003). The main objective is to provide an introductory idea of how good the scales were by checking the central tendency and distribution of the responses. In order to prevent data entry error, data will be checked by running descriptive statistics for minimum, maximum, and count.The mean, range, standard deviation and variance in the data will give a good idea of how the respondents have reacted to items in the questionnaire (Sekaran, 2003). Nevertheless, the missing value does not exhibit whether the data had been entered correctly. This is d ue to the large amount of variables that need to be keyed in. 3. 7. 2 Factor Analysis The principle concern of factor analysis is the resolution of a set of variables linearly in terms of (usually) a small number of factors. This resolution can be accomplished by the analysis of the correlation among the variables.A satisfactory will yield factors which concern essential information if the original set of variables (Harry H. Harman, 1976). When a researcher has a set of variables and suspects that these variables are interrelated in a complex fashion, then factor analysis can be used to untangle the linear relationships into their separate patterns (Zikmund, 2003). 3. 7. 3 Validity and Reliability Validity becomes an issue whenever we ask: How can we access a concept that we have? Validity test is the degree to which the test actually measures what it claims to measure (Gregory, 1992).Reliability test is the degree to which tests is free from error in measuring and therefore yield c onsistent results. It is th extent which respondent can provide almost similar answer to the same or approximately the same question the same way each time. Test validity is requisite to test reliability. If a test is not valid, then reliability is moot. Validity test plays an essential role in order to test the goodness of measurement. Validity ensures the ability of a scale to measure the intended concept (Sekaran 2003).However, reliability also very important because reliability deals with the accuracy and precision of a measurement procedure which is the respondent can answer the same or approximately the same questions the same way each time. In short, reliability is the â€Å"consistency† or â€Å"repeatability† of measurement. In order to assure that the variables are measured correctly and make sure that the respondent was understood the lucidness, wordings, interpretation and appropriateness of the questions, the content validity of the questionnaire was estab lished through literature review.Cronbach’s coefficient alpha is the commonly used measure for internal consistency reliability. Cronbach's alpha assesses the reliability of a rating summarizing a group of test or survey answers which measure some underlying factor. Cronbach’s alpha value that larger than . 70 or . 80 regard as the benchmark for acceptable reliability values (Nunnally and Bernstein, 1994). 3. 7. 4 Descriptive Analysis The analysis aims to provide an overview of the respondents and an insight into their behavioural patterns. Descriptive analysis was not used to analyze gender, race, education and income level.For this data, the frequencies and percentage was used for computation. 3. 7. 5Regression Analysis Regression analysis is used as a statistical tool for the investigation of relationships between variables (Norman R. Draper, Harry Smith, 1998). Multiple regressions are a statistical technique that allows us to predict someone’s score on one variable on the basic of their scores on several other variables. Below are the assumptions of regression analysis. a. Normality assumption Regression assumes that variables have normal distribution. It used to determine whether a random variable is normally distributed.If the histogram appears to at least resemble a bell shape curve, it was assumed that the normality requirement has been met. A bell shape curve will have almost zero mean and value of one for standard deviation. b. Linearity assumption Standard multiple regression can only accurately estimate the relationship between dependant and independent variables if the relationship are linear in nature. Linearity illustrates a relationship between variables that can be described by a straight line passing through the data cloud. c. Homoscedasticity assumptionHomoscedasciticity means that the variance of errors is the same across all level of the IV. When the variance of errors differs at different values of the IV, heterosced asticity is indicated. This assumption means that the variance around the regression line is the same for all values of the predictor variable. d. Independence of Error Term Independence of Error Term means the predicted value is independent of other predicted values. Durbin-Watson statistics was used to validate the independence of error term assumption. Value of Durbin-Watson should fall between 1. 50 and 2. 0, which implies no auto-correlation problem. e. Multicollinearity Multicollinearity is the condition when two or more of the independent variables are highly correlated which will result in an overestimation of the standard deviation of the regression coefficients as an indicator of the relative importance of independent variable. Tolerance above 0. 1, Variance Inflation Factor (VIF) value below 10 and condition index below 30 signifies no major multicollinearity problem. f. Outliers In statistics, an outlier is an observation that is numerically distant from the rest of the data.Case wise diagnostics was run to identify any outlier in the sample. Any cases that fell above the standard deviation value of 2. 50 would be dropped. CHAPTER 4 ANALYSIS AND RESULT 4. 1 Introduction This chapter represents the result of the study from the statistical analysis conducted on the collected data and hypotheses testing. In the first part of this chapter the presentation would be on the characteristics of respondent profiles. The goodness of measured is determined by analyzing frequency analysis, descriptive analysis and reliability analysis on the measurement.The final part of this chapter would be focused on hypotheses testing, correlation testing and linear regressions. 4. 2 Samples and Profiles 4. 2. 1 Frequency Analysis Table 4. 2. 1: Personal Profile of Respondents |Demographics |Frequency |Percentage | |Gender | | | | Male |43 |34. | | Female |82 |65. 6 | | Missing |0 |0 | |Ethnicity | | | | Malay |46 |36. 8 | | Chinese |65 |52. | | Indian |5 |4. 0 | | Others |9 |7. 2 | | Missing |0 |0 | |Nationality | | | | Malaysian |86 |68. | | Others |39 |31. 2 | | Missing |0 |0 | |Year | | | | First Year |31 |24. 8 | | Second Year |66 |52. | | Third Year |21 |16. 8 | | Fourth Year and Above |7 |5. 6 | | Missing |0 |0 | |Program | | | | Bachelor's degree (undergraduate) |123 |98. | | Masters |2 |1. 6 | | Missing |0 |0 | |Status | | | | Part Time |17 |13. 6 | | Full Time |108 |86. | | Missing |0 |0 | |Faculty | | | | Management |95 |76. 0 | | Computer |6 |4. 8 | | Technology |4 |3. | | HBP |11 |8. 8 | | Communication |3 |2. 4 | | Chemistry |2 |1. 6 | | Humanities |1 |0. 8 | | Missing |3 |2. | |Live | | | | In Campus |100 |80. 0 | | Outside Campus |25 |20 | | Missing |0 |0 | A total of 125 responses were obtained from 125 questionnaires.According to table 4. 2. 1, the respondents comprised 43 males (34. 4%) and 82 females (65. 6%). 46 (36. 8%) of the 125 respondents were Malay, 5(4. 0%) Indian, 65 (52. 0%) Chinese and other races comprised of 9 (7 . 2%). 86 (68. 8%) of the respondents were Malaysians whereas 39 (31. 2%) of them are from other countries. Among the respondents, 31 (24. 8%) of them were First Year students, 66 (52. 8%) of them were Second Year students, 21 (16. 8%) of them were Third Year students and 7 (5. 6%) of them were students form Fourth Year and Above. Besides that, 123 (98. %) of the respondents were undergraduate whereas 2 (1. 6%) of them were master students. 17 (13. 6%) of the respondents were part time students whereas 108 (86. 4%) of them were full time students. In addition, 95 (76. 0%) of the respondents were students from School of Management, 6 (4. 8%) of them were students from School of Computer,4 (3. 2%) of them were from School of Technology, 11 (8. 8%) of them were from School of HBP, 3 (2. 4%) of them were students were students from School of Communication, 2 (1. 6%) of them were students from School of Chemistry, 1 (0. %) of them were students from School of Humanities and 2 (2. 4%) of the data were missing. 100 (80%) of respondents were live in campus whereas 25 (20%) of them were live at outside campus. Table 4. 2. 1. a Internet Experience of Respondents |Demographics |Frequency |Percentage | |Access | | | | Yes |117 |93. | | No |8 |6. 4 | | Missing |0 |0 | | | | | |Where | | | | Home |83 |66. | | Place of employment |13 |10. 4 | | School/ academic institution |21 |16. 8 | | Cybercafe |3 |2. 4 | | Others |5 |4. | | Missing |0 |0 | |Browser | | | | Internet Explorer |40 |32. 0 | | Mozilla Firefox |30 |24. | | Others |32 |25. 6 | | More than one browser |23 |18. 4 | | Missing |0 |0 | |Time | | | | Almost never |2 |1. | | From 0. 5 hours to 1 hour |5 |4. 0 | | 1-2 hours |17 |13. 6 | | 2-3 hours |31 |24. 8 | | More than 3 hours |70 |56. | | Missing |0 |0 | |Often | | | | Less than once a month |1 |0. 8 | | Once a month |1 |0. 8 | | A few times a week |13 |10. | | About once a day |30 |24. 0 | | Several times a day |80 |64. 0 | | Missing |0 |0 | According to table 4. 2. 1. a, 117 (93. 6%) of the respondents have internet access at home while 8 (6. 4%) of them do not have internet access at home. Other than that, 83 (66. %) of the respondents were primarily access internet from home, 13 (10. 4%) of them were primarily access internet from place of employment, 21 (16. 8%) of them were primarily access internet from school or academic institution, 3 (2. 4%) of them were primarily access internet from cybercafe and 5 (4%) of them were primarily access internet from other places. Internet Explorer was the most popular web browser used by respondents which recorded 40 (32%) of respondents following by 32(25. 6%) of them were using others web browser, and 30 (24%) of them were using Mozilla Firefox. 23 (18. %) of the respondents were using more than one browser. On an average day, 70 (56%) of the respondents were spend more than 3 hours on the internet, 31 (24. 8%) of them were spent 2-3 hours on the internet, 17 (13. 6%) of them were spent 1-2 hou rs on the internet, 5 (4/0%) of them were spent from 0. 5 hours to 1 hour on the internet and only 2 (1. 6%) of them almost never spending their time on the internet. On average, 80 (64%) of the respondents were using internet for several times a day, 30 (24%) of them were using internet for about once a day, 13 (10. 4%) of them were using internet for a few times a week, 1 (0. %) of them was using internet for once a month and another 1 (0. 8%) of them was using internet for less than once a month. 4. 3 Descriptive Analysis The summary of the descriptive statistic of the variables is given in table below. Table 4. 3. 1 Overall Descriptive Statistics of the Study Variables |Variables |Mean |Standard Deviation | |Perceived Usefulness | 3. 4707 |0. 56403 | |Self-Efficacy |3. 216 |0. 44948 | |Perceived Ease of Use |3. 6587 |0. 51145 | |Trialability |3. 5720 |0. 66510 | |Observability |3. 6280 |