You are on page 1of 13

I.

INTRODUCTION
A. Research Background
Technology is playing a vital role
in almost every field of the world. As a
primary needs technology adopted in
most of organization. Higher education
become a part of adopting technology
itself. Based on the needs, higher
education can be able to choose the
technology to help their activity. With
technology, higher education can
further improve their performance and
minimize an error, reduce storage
space, etc
The technology of student
attendance system is used to support the
teacher for checking his/her students
attendance in modern way (Alia et al,
2013). Bowen et al. (2005) found that
the majority of students they studied
(75%) felt that the university should
monitor attendance as it gave them a
feeling that the university cared about
their success. 90% of the students
stated that the university should
intervene if they feel that attendance
was unsatisfactory, more reason for
attendance to be monitored in order to
improve students performances. The
reason for this is due to students being
unaware of who to contact with
academic problems (Bowen et al., 2005,
p. 382).
Universitas Jenderal Soedirman
has been adopted fingerprint since
2013. The presence of new technology
always elicits a response from the user.
The response can be either of positive
and negative. Basically the response to
use information systems emerge based
on the concept of intention of user
behavior. Based on Davis et al. (1989)
research found that the users
technology will have an interest in
using technology (behavioral intention)

if they feel that information technology


is helpful and easy to use.
Concannon et al (2005) in Aladwan et al. (2013) stated that the
increasing demand of integrating ICT
into the educational process due to the
change of student demography places
higher education institutions under
pressure to utilize information and
communication
technologies
at
universities. Additionally, universities
through effective implementation of
fingerprint system could attract and
engage larger numbers of students.
Lecturer, staff members, and
student already used a fingerprint
system. The most user of fingerprint is
student. Student become the main
element that most feel impact of the
adoption of fingerprint itself. The
implementation of fingerprint in
Faculty of Economics and Business
Universitas Jenderal Soedirman is
underlying the reason to conduct this
reaserch about Student Acceptance of
Fingerprint
System
(Study
in
Economic and Business Faculty
Universitas Jenderal Soedirman)
B. Problem Formulation
1. Whether there is any positive
effect
of
Performance
Expectancy
on
Behavior
Intention to Use Fingerprint?
2. Whether there is any positive
effect of Effort Expectancy on
Behavior Intention to Use
Fingerprint?
3. Whether there is any positive
effect of Social Influence on
Behavior Intention to Use
Fingerprint?
4. Whether there is any positive
effect of Facilitation Condition
on Behavior Intention to Use
Fingerprint?
1

C. Research Objective
1. General Purposes
The general objective of this
research is to evaluate the
adoption of fingerprint system
implementation in Economic and
Business Faculty Universitas
Jenderal Soedirman and strategy
to improve the utilization of
fingerprint system.
2. Specific Purposes
a. To analyze the effect of
Performance Expectancy on
Behavior Intention to Use.
b. To analyze the effect of
Effort Expectancy on
Behavior Intention to Use.
c. To analyze the effect of
Social Influence on Behavior
Intention to Use.
d. To analyze the effect of
Facilitation Condition on
Behavior Intention to Use.
D. Research Benefit
1. Theoretical Benefit
The Results of this study
expected to be useful in
confirming
research
in
Technology Acceptance Model in
fingerprint system can be used as
a reference material in fingerprint
as attendance tool.
2. Practical Benefit
This research can give the
adding information to the
Information Systems division,
who is seeking to improve the
effectiveness
of
fingerprint
system in order to provide better
process system itself. And this is
can be the reference for the
Universitas Jenderal Soedirman
to implementing the fingerprint

as attendances tool for whole of


faculty.
II. LITERATURE REVIEWAND
RESEARCH MODEL FORMULATION
Technology create to help and
make an easier for human activity.
According to Prayitno in Ilyas
(2001), technology is entire idea of
peripheral, method, technique of
material object used during and
certain place and also to fulfill
human
being
requirement.
Information
technology
is
significantly
changing
the
development
environment.
Information system refers to the
system provides an information for
management in decision making and
carrying out the organization
operational, where the system is the
combination of people, information
technology and procedures that are
organized (Arifin, et al, 2015).
People,
organizations
and
governments moved towards theuse
of Information Technology (Taiwo
and Downe, 2013).
In order to implement continues
improvement, Universitas Jenderal
Soedirman carefully to choose and
decide technology that will be
implement in the university. First
time it adopted in international
program Economic and Business
Faculty year 2014 replace the
manual way. In next year, regular
program also adopted fingerprint and
used for every student in Economic
and Business Faculty. Fingerprint
already play role as an attendances
system.
A. Hypothesis Development
This study aimed to analyze
and evaluate the effect of dimensions
2

related to UTAUT (performance


expectancy, effort expectancy, social
influence, and facilitation condition)
on behavior intention and use
behavior based on Ventakesh et.al
(2003)
model
on
fingerprint
implementation.
1. The effect of Performance
Expectancy on Behavior
Intention to use
Research conducted
by Taiwo and Downe
(2013)
and
Kamal
Ghalandari (2012) state that
Performance Expectancy
has a significance positive
effect
to
Behavior
Intention. This outcome
also
consistent
with
Ventakesh et.al (2003).
Based
on
explanation
above, the hypotheses
developed in this study are:
H1: Performance
Expectancy has a
positive effect to
Behavioral Intention to
Use Fingerprint system
2. The effect of Effort
Expectancy and Behavioral
Intention
Nassaoura
(2013)
conducted research for
higher education in Saudi
Arabia. Good perception
and
university
policy
supporting were two major
factors that lead to success
m-Learning system.
Akbar
(2013)
conducted research about
students acceptance and
use
of
technologies
introduced
in
their
academic environments is
an important factor in

determining the success of


these technologies. The
result showed that effort
expectancy
had
a
significant influence on
behavioral intention in
technology
acceptance.
Therefore the hypotheses
developed in this study are:
H2: Effort Expectancy has
a positive effect to
Behavioral Intention
to Use Fingerprint
system
3. The effect of Social Influence on
Behavioral Intention
Triandis (1980) in Tjhai
(2003) state that Sosial Influence
has positive relationship with
Intention to use information
system. This showed that
individual will raise the behavior
intention of information system if
gain a support from surrounding
environment.
According to Yeow et.al.,
(2012) social influence exerted
significant positive effects on the
intention to use MyKad as the
Identity Card. Although most
Malaysians have changed from
their paper based IC to MyKad
IC, they have reservations about
its usage because they are
unaware of MyKads security
features and its benefits, there is
a lack of facilitating conditions
and social support, and they fear
the costs resulting from lost and
damaged cards. Therefore the
hypotheses developed in this
study are:
H3: Sosial Influence has a
positive effect to Behavioral
Intention to use Fingerprint
system
3

4. The effect of Facilitation


Condition
on
behavioral
Intention
According to Alkhasawneh
and Alanazy (2015) conducted
research to determine the major
factors contributing towards
academic staffs intention to
adopt ICT at Al Jouf University.
The result reported that there was
a positive correlation between
Facilitating
Condition
and
Behavioral Intention.
Liu et.al., (2015), from the
results, observed that when
applying
synchronous
collaboration in peer translation,
facilitating conditions is of most
importance, followed by social
influence.
Therefore
the
hypotheses developed in this
study are:
H4: Facilitation Condition has a
positive effect to Behavioral
Intention to Use Fingerprint
system

1. Type of research
This
study
has
aim
to
acknowledging the readers about
fingerprint which use in FEB
Universitas Jenderal Soedirman in
terms of user acceptance and
evaluation. This study is quantitative
approach and survey research. Survey
research is a method of using a
questionnaire as a data collection
instrument.
2. Research Subject
This research subject in this study is
the student acceptance of fingerprint
technology based on UTAUT model
(Vantekesh et al, 2003) conducted in
Faculty of Economic and Business
Universitas Jenderal Soedirman, 2016.

3. Population and Sample


a. Population
Population is the sum of all
objects (individual units) to be
investigated (Sekaran, 2006).
B. Research Framework
Population in this research is all
The research model is as follow:
of students from Faculty of
Economics
and
Business,
Performance Expectancy
Universitas Jenderal Soedirman.
b. Sample
Because this study was based
on
criteria
established
Effort Expectancy
researchers, this study used
purposive sampling method
Behavioral Intention to Use
(Suliyanto, 2006: 125). In this
study defined criteria are as
Social Influence
follows:
a. Enrolled as an active
student in Economic and
Facilitation Condition
business Faculty Jenderal
Soedirman University
b. Student D3 and S1 intake
III. RESEARCH METHOD AND DATA
2013 until 2015 (in this
ANALYSIS TECHNIQUE
case, researcher spread
4

out 40 questionnaires in
each lift).
4. Types and source of data
The primary data of this
study obtained directly from
respondents to through the
questionnaire are conducting
with the students that will doing
by author, ask about evaluation
of implement the fingerprint. The
secondary data of this study
comes
from
reports
or
implementations from previous
research, internet, and from
reports of institutions that publish
information, data which relevant
with object.

Universitas Jenderal Soedirman.


Technique collection data in this
research using two way, the first with
randomly way. second, spread
questioner with a broadcast message
through social media such as LINE,
BBM and Whatsapp difficulty in
filling, it can be explained by the
researcher. To measure the variable
examined
it
takes
scale
measurements.
The
scale
of
measurement is used as a reference
standard to determine the length of
the interval so that it will generate
quantitative data.

5. Data Collection Method


Questionnaires
will
be
distributed to the users that
authorized
in
fingerprint
of
Economics and Business Faculty,
Operational and Conceptual Definition
Table 1. Conceptual and Operational Definitions

1
2
3
4
Strongly
Disagree Neutral Agree
Disagree

5
Strongly
Agree

Variable
Performance
Expectancy

Conceptual definition
Venkatesh, et al. (2003)
defined
performance
expectancy as the
degree to which an
individual believes that
using the system will
help him/her to attain
gains
in
job
performance
Venkatesh, et al. (2003)
defined
effort
expectancy
as the
degree
of
ease
associated with the use
of the system.

Operational
definition
Performance
Expectancy is the
student believe that
using the fingerprint
will
help
their
attendance absence

Indicator
1. Usefulness of use
2. Productivity
improvement
3. Easy handling of work
4. Usefulness of proof
(Ventakesh et.al., 2003)
and (Oye, N. D. et.,
(2012)

Effort expectancy is 1. Easy of adaptation


how much students 2. Easy perception of
usage
effort is required to
3.
Convenient application
use an information
to work
system
4. Easy to learn
(Ventakesh, et.,al. 2003)
Social
Venkatesh, et al. (2003) The degree to which 1. Intention
to
Influence
defined
Social student is affected
recommended
influence as the degree by others to use the 2. Senior management
3. Popular generality
to which an individual fingerprint
(Ventakesh, et.al., 2003)
perceives that important
others believe he or she
should use the new
system.
Facilitating
Venkatesh, et al. (2003) The degree to which 1. Resource
necessary
Conditions
defined
Facilitating the student believes
availibility
conditions as the degree that
an 2. Knowledge necessary
to which an individual organizational and 3. Assistance to handling
system
believes
that
an technical
organizational
and infrastructure exists (Ventakesh, et.,al. 2003)
technical infrastructure to support the use of
exists to support use of fingerprint system
the system
Behavioral
Ventakesh et, al. (2003) Behavioral intention 1. Intention to use
Intention
to defined
behavioral to use is influenced 2. Plan to use
of
use
Use
intention to use a new by students attitude 3. Prediction
system
system is influenced by and
perceived
users attitude and usefulness
during (Ventakesh, et.,al. 2003)
perceived usefulness of use the fingerprint
the system
Effort
Expectancy

Data
Analysis

Technique
Procedures and Data Analysis
1. Validity Test
6

Validity test is conductedto


describe the ability of an
instrument to measure what
measured. The validity test for
this
research
usingPearson
Product
Moment
method.
Validity testing of each question
item is done by calculate pearson
between the scores of items with
a total score. The formula for
Pearson Product Moment method
i.e as follow, (Sugiyono, 2009):
2
2
n Y (Y ) }

2
{ n X ( X )2 } {

n XY ( X )(Y )
r xy =

Description :
r xy
= Items correlation
coefficient with a total of
question
n = Number of respondents
X = Score questions
Y = Total score of questions
With level of significant
95%, so:
If r result > r tabel , then the
point is valid questionnaires.
r result r tabel , then the
If
point is not valid questionnaires.
2. Reliability Test
Reliability testing aims to
determine the extent to which a
measuring instrument is reliable
or unreliable. Reliability test is
done using coefficient of Alpha
from Cronbach as follows
(Arikunto, 2006):
2
k
r=
1 b2
k 1 t

Description:
r = reliability variable
k = Many point questions
2b = total variance grain
2t = total variance
With level significant 90%,
so:
If

r result >

r tabel , then the

questionnaire is reliable grain


If r result > r tabel , then the
questionnaire
reliable

items

are

not

3. Classic Assumption Test


a. Normality
Normality means that
the distribution of the test is
normally distributed with 0
mean, using 1 standard
deviation and asymmetric
bell shaped curve. To test the
assumption of normality,
Kolmogorov
Smirnov
measures and tests are
applied (Suliyanto, 2011).
Testing criteria:
If significant Asymptotic
value > 0.1, the data is
normally
If significant Asymptotic
value 0.1,the data is not
distributed normally.
b. Multicollinearity
Multicollinearity
test
aims to test whether the
regression model is formed of
high or perfect correlation
exists
between
the
independent variables or not.
Multicollinearity can be seen
from the tolerance values and
variance inflation factor
(VIF). Tolerance measured
variable
independent
7

varabillity chosen is not


explained. So a low tolerance
value equal to the value of
high VIF
1
VIF=
TOL

Regression model that used in this


research can be demonstrate as
follow:
Y 1=b 1 X 1 +b 2 X 2+ b3 X 3+ b4 +

Description:
VIF = Variance Inflation
Factor
2
TOL = Tolerance ( 1- R j )
Outoff value commonly
used to indicate the presence
of multicollinearity is the
Tolerance value > 0.10 or
VIF values <10 (Ghozali,
2006).
c. Heteroscesdascitity
Heteroscesdaticity aims
to test whether the model
regression residual variance
is
different
from
one
observation
to
another
observation. According to
Suliyanto (2011) detect any
heteroscedasticity
with
Glejser test. If the value of
the probability (p-value) >
value alpha (0.05), then the
model certainly have not
heteroscedasticity symptoms.
4. Mathematic
Model
and
Hypothesis Testing
The analysis technique that used
in this research is multiple
regression, to determine the effect
of
Performance
Expectancy,
Effort
Expectancy,
Social
Influence,
and
Facilitation
Condition to Behavioral Intention
and Use Behavior of fingerprint
System

1.

Description :
Y1 : Behavioral Intention
X1 : Performance Expectancy
X2 : Effort Expectancy
X3 : Social Influence
X4 : Facilitating Conditions
b : Coefficient Regression
: error
Assessing Goodness of Fit a
model
Value of Ftest
Value of Ftest used to test
the accuracy of the model
(goodness of fit), Ftest is often
refer to as simultaneous tests,
which is used to test whether
free variables used in the
model can explain. The
dependent variables value
changes or not. To conclude
whether the model falls into
the category of good of fit or
not, we must compare the
value of ftest with degrees of
Ftable . Ftest measure using the
formulate:
R2 /(k 1)
F=
(1R2 )/(nk )
Description:
F = Ftest
R2 = Coefficients
of determination
k
= Number of
variable
n
= Sample
With degree of freedom
(df) = (k-1);(n-k), and = 0.1
(90%), so:
a. If Fstatistic Ftable df: (k1),
(n-k),
then
8

regression model can


be stated bad or not
fit. This means that all
independent variables
are not a significant
sexplanatory on the
dependent variable.
b. If Fstatistic > Ftable df: (k1),
(n-k),
then
regression model can
be stated good or fit
(good of fit). This
means
that
all
independent variables
together
constitute
significant
explanatory on the
dependent variable.
2. Value of ttest
Value ttest is used to
test whether the variables
influences the dependent
variable significant effect
if its tstatistic greater than
ttable value. ttest measure
using
the
following
formula
bj
ti=
sbj
Description
ti = ttest
bj = regression of
coefficient
Sbj = standard error of
regression
With
degree
of
freedom (df) = (n-k-l), and
= 0.1 (90%), so:
a. If tstatistic ttable. This
means
that
partially
independent
variable has no
significant effect
on the dependent
variable.

b. If tstatistic > ttable.


This means that
the
partial
independent
variables have a
significant
influence on the
dependent
variable.
3. The
Coefficient
of
2
Determination (R )
Value the coefficient
of determination indicates
the influence percentage
of
all
independent
variable
toward
the
depend
variables.
Formula coefficient of
determination can be
demonstrated as follow:
JK reg
2
R=
Y 21
The close r the value
of coef. Determination 1
then independent variable
almost provide all the
information to predict the
dependent variable or the
bigger the ability to
explain the change of
independent
variables
toward
dependent
variable.
REFERENCE
Abubakar, Faruq M. and Ahmad, Hartini
B. 2013. The Moderating Effect
of Technology Awareness on the
Relationship between UTAUT
Constructs and Behavioral
Intention to Use Technology: A
Conceptual Paper. Australian
Journal of Business and
Management Research Vol.3
9

No.02 [14-23] | May-2013 ISSN:


1839 0846
Ajzen, I. 1991. The Theory Of Planned
Behavior. Organizational
Behavior And Human Decision
Processes, 50(2), 179-211.
Akbar, Fatema. 2013. What affects
students acceptance and use of
technology?. Dietrich College of
Humanities and Social Sciences.
Carnegie Mellon University
Alia, SSSMohammad, Tamimi,
Abdelfatah and AlAllaf,
Omaima. 2013. Integrated
System For Monitoring And
Recognizing Students During
Class Session. AIRCCs:
International Journal of
Multimedia & Its Applications
(IJMA).
Bowen, E., Price, T., Lloyd, S. &
Thomas, S. 2005. Improving the
quantity and quality of
attendance data to enhance
student retention. Journal of
Further and Higher Education,
29 (4), pp 375-385.
Compeau, D. R., and Higgins, C. A.
1995. Computer Self-Efficacy:
Development of a Measure and
Initial Test. MIS Quarterly
(19:2), 1995b, pp. 189-211.
Compeau, D. R., Higgins, C. A., and
Huff, S. 1999. Social Cognitive
Theory and Individual
Reactions to Computing
Technology: A Longitudinal
Study. MIS Quarterly (23:2), pp.
145158.
Coventry, L., De Angeli, A., & Johnson,
G. 2003. Honest ItS Me! Self
Service Verification. Paper

presented at the CHI Workshop


on Human-Computer
Interaction, Adoption Study and
Security Systems.
Davis, F. D. 1989. Perceived
Usefulness, Perceived Ease of
Use, and User Acceptance of
Information Technology. MIS
Quarterly (13:3), pp. 319-339.
Davis, F. D., Bagozzi, R. P., and
Warshaw, P. R. 1989. User
Acceptance of Computer
Technology: A Comparison of
Two Theoretical Models.
Management Science (35:8),
pp. 982-1002.
Davis, F. D., Bagozzi, R. P., and
Warshaw, P. R. 1992. Extrinsic
and Intrinsic Motivation to Use
Computers in the Workplace.
Journal of Applied Social
Psychology (22:14).
Davis, F., Bagozzir, R. & Warshaw, P.
1989. User Acceptance of
Computer Technology: A
Comparison of Two Theoretical
Models. Management Science,
pp. 982-1003.
G. Ho, G. Stephens and R.
Jamieson.2003. Biometric
Authentication Adoption Issues.
Australasian Conference on
Information Systems, pp. 1-12.
Ghalandari, Kamal. 2012. The Effect of
Performance Expectancy,
Effort Expectancy, Social
Influence and Facilitating
Conditions on Acceptance of
E-Banking Services in Iran:
the Moderating Role of Age
and Gender. Middle-East
Journal of Scientific Research

10

12 (6): 801-807, 2012 ISSN


1990-9233
Handayani, Rini. 2005. Analisis FaktorFaktor yang Mmepengaruhi
Minat Pemanfaatan Sistem
Informasi dan Penggunaan
Sistem Informasi (Studi
Empiris Pada Perusahaan
Manufaktur di Bursa Efek
Jakarta). Jurnal Perpustakaan
Universitas Mercubuana.
(http://digilisb.mercubuana.ac.i
d)
Ilyas. 2001. Teori penilaian dan
penelitian kinerja. Cetakan
kedua. Jakarta : Pusat Kegiatan
Ekonomi Kesehatan FKM-UI
Jain, Anil K., Hong, Lin, and Bolle,
Ruud.
1997.
On-Line
Fingerprint Verification. IEEE
Rransactions
on
Pattern
Analysis
and
Machine
Intelligence, Vol. 19, no. 4.
Jimoh, R. G, Olaniyi, A. S., and
Adewole, Kayode S. 2011.
Adoption of Fingerprinting as
an Automated Access Control
Technique in University
Hostels. Volume 1 No. 4, July
2011 ISSN 2222-9833 ARPN
Journal of Systems and
Software.
Karray, F., Saleh, J. A., Arab, M. N. and
M. Alemzadeh. 2007.
Multimodal Biometric Systems:
a State of the Art Survey.
Journal of Smart Sensing and
Intelligent Systems vol.1.
Kocaleva, M., Stojanovik, I. and
Zdravev, Z. 2013. Utaut And
Its Application in an
Educational Environment:
State-of-The-Art. Faculty of

Computer Science, Goce


Delcev University Stip
Lee, H.C. and Gaenslen R. E. 2001.
Advances in fingerprint
technology. CRC Press, Boca
Raton, FL.
Liu, Yi Chun and Huang, Yong-Ming.
2015. Using The UTAUT
Model to Examine The
Acceptance Behavior of
Synchronous Collaboration to
Support Peer Translation.
Jaltcall journal ISN 1832-4215.
Vol 11, no. 1, page 77-91.
Mark, B. S., Debjani, D., Vijay, K., &
Ernst, B. 2008. A proposed
study and analysis of user
perceptions of Biometric
acceptance retrieved March 1,
2011 from
http://www.decisionsciences.o
rg/proceedings/DS
I2008/docs/396-2784.pdf
Mattam, M., Karumuri, S. R. M., and
Meda. S. R. 2012.
Architecture for Automated
Student Attendance. in Proc.
IEEE Fourth International
Conference on Technology for
Education
Mishra, Rishabh and Trivedi, Prashant.
2011. Student Attendance
System Based On Fingerprint
Recognition and One-to-Many
Matching. Rourkela: Bachelor
of Technology Degree in
Computer Science and
Engineering at National
Institute of Technology.
Moore, G. C., and Benbasat, I. 1991.
Development of an Instrument
to Measure the Perceptions of
Adopting an Information
11

Technology Innovation.
Information Systems Research
(2:3), pp. 192-222.
Muir, J. 2009. Student Attendance: Is It
Important, and What Do
Students Think. CEBE
Transactions, Vol. 6, Issue 2,
pp 50-69 (20).
Nagar, Abhishek, Nandakumar, Karthik,
and Jain, Anil K. 2008.
Securing Fingerprint
Template: Fuzzy Vault with
Minutiae Descriptors.
International Conference on
Pattern Recognition: pp.1-4
Award winning papers from the
19th International Conference
on Pattern Recognition (ICPR)
Neo, H. F. and Eze, U. C. 2011. User
Acceptance of Fingerprintbased Smart Kiosk: A
Conceptual Framework.
International Conference on
Social Science and Humanity
IPEDR vol.5 (2011) (2011)
IACSIT Press, Singapore
Patel, U. A. and Priya, S. 2014.
Development of a Student
Attendance Management
System Using RFID and Face
Recognition: A Review., august
International Journal of Advanc
e Research in
Computer Science and Manage
ment Studies vol. 2 issue 8
ISSN: 232 7782
Shoewu, O. Ph.D. and Idowu, O.A.
B.Sc. 2012. Development of
Attendance Management
System using Biometrics. The
Pacific Journal of Science and
Technology

Smedley, J. K. 2010. Modeling the


impact of Knowledge
Management Using
Technology. OR Insight 2010,
23, pp. 233-250.
Taiwo, A. A and Downe A. G. 2013. The
Theory of User Acceptance and
Use Of Technology (UTAUT):
A Meta-Analytic Review of
Empirical Findings . Journal of
Theoretical and Applied
Information Technology. Vol.
49 No.1 2005 - 2013 JATIT
& LLS. All rights reserved.
Thompson, R. L., Higgins, C. A., and
Howell, J. M. 1991. Personal
Computing: Toward a
Conceptual Model of
Utilization. MIS Quarterly
(15:1), pp. 124-143.
Thompson, R. L., Higgins, C. A., and
Howell, J. M. 1994. Influence
of Experience on Personal
Computer Utilization: Testing
a Conceptual Model. Journal of
Management Information
Systems (11:1), pp. 167-187s.
Tjhai Fung Jin. 2003. Analisis FaktorFaktor yang Mempengaruhi
Pemanfaatan Teknologi
Informasi dan Pengaruh
Pemanfaatan Teknologi
Informasi terhadap Kinerja
Akuntan Publik. Jurnal Bisnis
dan Akuntansi, 5(1):1 26
Uma Sekaran. 2006. Metodologi
Penelitian untuk Bisnis, Edisi
4, Buku 1, Jakarta: Salemba
Empats
Venkatesh, V. & Davis, F. D. 2000.
Theoretical Extension of the
Technology Acceptance Model.

12

Management Science , 46 (2),


186 204.
Venkatesh, V., Morris, M. G., Davis G.
B. and Davis, F. D. 2003. User
Acceptance of Information
Technology: Toward a Unified
View. MIS Quarterly, Vol. 27.

Warshaw, P. R. 1980. A New Model for


Predicting Behavioral
Intentions: An Alternative to
Fishbein. Journal of Marketing
Research (17:2), pp. 153-172.

13

You might also like