1,674
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      G2C Acceptance in Malaysia: Trust, Perceived Risk and Political Efficacy

      Published
      proceedings-article
      , , , ,
      Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009) (ISIICT)
      Innovation and Information and Communication Technology (ISIICT 2009)
      15 - 17 December 2009
      TAM, Intention to use, Perceived Risk, Trust, Political Efficacy
      Bookmark

            Abstract

            Electronic government or e-government has long been known as a breakthrough of a new form of communication and transaction between the government and citizens, the government and industries, and among the government agencies. Simply, e-government is meant not only to help the government to accomplish its daily administrative activities but also to provide an easier way to communicate with external entities such as citizens and businesses throughout the utilization of information and communication technology (ICT). With the implementation of e-government in Malaysia, study about Government to Citizens (G2C) adoption could be significantly important in reflecting its progress. Against this backdrop, this research intends to study G2C adoption in Malaysia by adopting Technology Acceptance Model (TAM) theory as a framework. We investigated factors that are believed to influence citizens’ intention to use G2C system. The factors were trust, perceived risk and political efficacy.

            Content

            Author and article information

            Contributors
            Conference
            December 2009
            December 2009
            : 165-174
            Affiliations
            [0001]Department of Information Systems, Faculty of ICT, International Islamic University Malaysia
            Article
            10.14236/ewic/ISIICT2009.13
            8398fd92-aafb-4370-892f-25d234df3043
            © Ramlah Hussein et al. Published by BCS Learning and Development Ltd. Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), Philadelphia University, Amman, Jordan

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009)
            ISIICT
            3
            Philadelphia University, Amman, Jordan
            15 - 17 December 2009
            Electronic Workshops in Computing (eWiC)
            Innovation and Information and Communication Technology (ISIICT 2009)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ISIICT2009.13
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            TAM,Trust,Intention to use,Political Efficacy,Perceived Risk

            Comments

            Comment on this article