Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK

Tujuan kajian ini untuk mengkaji hubungan antara Sistem Pemantauan RangkaianKomputer (SPRK) berasaskan Model SPRK-UTAUT dengan penerimaan Guru TMK.Model ini merupakan lanjutan model Unified Theory of Acceptance and Use ofTechnology (UTAUT) yang menggabungkan beberapa konstruk daripada modelUTAUT dan...

Full description

Saved in:
Bibliographic Details
Main Author: Siti Rahayu Abdul Aziz
Format: thesis
Language:zsm
Published: 2019
Subjects:
Online Access:https://ir.upsi.edu.my/detailsg.php?det=5314
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:ir.upsi.edu.my:5314
record_format uketd_dc
institution Universiti Pendidikan Sultan Idris
collection UPSI Digital Repository
language zsm
topic QA76 Computer software
spellingShingle QA76 Computer software
Siti Rahayu Abdul Aziz
Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
description Tujuan kajian ini untuk mengkaji hubungan antara Sistem Pemantauan RangkaianKomputer (SPRK) berasaskan Model SPRK-UTAUT dengan penerimaan Guru TMK.Model ini merupakan lanjutan model Unified Theory of Acceptance and Use ofTechnology (UTAUT) yang menggabungkan beberapa konstruk daripada modelUTAUT dan Teori Flow. Kajian kuantitatif ini telah dilaksanakan dengan melibatkan30 orang guru TMK daripada 11 buah sekolah menengah di Putrajaya, Malaysia.Keputusan daripada ujian korelasi bivariat menunjukkan bahawa wujudnya hubunganyang signifikan antara lima daripada enam pemboleh ubah tidak bersandar iaituJangkaan Prestasi (r=0.58, p
format thesis
qualification_name
qualification_level Doctorate
author Siti Rahayu Abdul Aziz
author_facet Siti Rahayu Abdul Aziz
author_sort Siti Rahayu Abdul Aziz
title Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
title_short Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
title_full Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
title_fullStr Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
title_full_unstemmed Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK
title_sort hubungan antara sistem pemantauan rangkaian komputer berasaskan model sprk-utaut dengan penerimaan guru tmk
granting_institution Universiti Pendidikan Sultan Idris
granting_department Fakulti Seni, Komputeran dan Industri Kreatif
publishDate 2019
url https://ir.upsi.edu.my/detailsg.php?det=5314
_version_ 1747833180326461440
spelling oai:ir.upsi.edu.my:53142020-10-20 Hubungan antara sistem pemantauan rangkaian komputer berasaskan model SPRK-UTAUT dengan penerimaan guru TMK 2019 Siti Rahayu Abdul Aziz QA76 Computer software Tujuan kajian ini untuk mengkaji hubungan antara Sistem Pemantauan RangkaianKomputer (SPRK) berasaskan Model SPRK-UTAUT dengan penerimaan Guru TMK.Model ini merupakan lanjutan model Unified Theory of Acceptance and Use ofTechnology (UTAUT) yang menggabungkan beberapa konstruk daripada modelUTAUT dan Teori Flow. Kajian kuantitatif ini telah dilaksanakan dengan melibatkan30 orang guru TMK daripada 11 buah sekolah menengah di Putrajaya, Malaysia.Keputusan daripada ujian korelasi bivariat menunjukkan bahawa wujudnya hubunganyang signifikan antara lima daripada enam pemboleh ubah tidak bersandar iaituJangkaan Prestasi (r=0.58, p 2019 thesis https://ir.upsi.edu.my/detailsg.php?det=5314 https://ir.upsi.edu.my/detailsg.php?det=5314 text zsm closedAccess Doctoral Universiti Pendidikan Sultan Idris Fakulti Seni, Komputeran dan Industri Kreatif 1Bestari Net. (n.d.). Retrieved from http://www.moe.edu.my/btp57% of Employees Use Work Instant Messaging for Personal Reasons, According toMETA Group; Advice to CIOs: At Minimum, Develop an IM Policy Now toRegulate Use. (2004). Retrieved fromhttp://www.thefreelibrary.com/57%25+of+Employees+Use+Work+Instant+Messaging+for+Personal+Reasons,...-a0124492113Abdul Hamid, N. (2011). Development and Validation of Knowledge Society Modeland Indicators in the Malaysian Context. Universiti Kebangsaan Malaysia.Abdullah, C. A., Qistina, N., & Ali, H. (2010). Penggunaan Teknologi Maklumat DanKomunikasi (ICT) Dalam Kalangan Guru-Guru Sekolah Kebangsaan.Penggunaan Teknologi Maklumat Dan Komunikasi (ICT) Dalam KalanganGuru-Guru Sekolah Kebangsaan.Abras, C., Maloney-Krichmar, D., & Preece, J. (2004). User-centered design.Bainbridge, W. Encyclopedia of Human-Computer Interaction. ThousandOaks: Sage Publications, 37(4), 445456.Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use,and usage of information technology: a replication. MIS Quarterly, 227247.Ajzen, I. (1985). From Intentions to Actions: A Theory of Planned Behavior. InAction Control (pp. 1139). https://doi.org/10.1007/978-3-642-69746-3_2Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior andHuman Decision Processes, 50, 179211.Ajzen, I. (2005). Attitudes, personality, and behavior ((2nd edition). Berkshire, UK:Open University Press-McGraw Hill Education.Ajzen, I., Fishbein, M., Atomic, I., Agency, E., Federal, T., & Commission, T. (1980).Theory of Reasoned Action/Theory of Planned Behavior. Social Psychology,2007, 6798. Retrieved from http://hsc.usf.edu/~kmbrown/TRA_TPB.htmAl-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015).Internet of things: A survey on enabling technologies, protocols, andapplications. IEEE Communications Surveys & Tutorials, 17(4), 23472376.Al-Qeisi, K., Dennis, C., Alamanos, E., & Jayawardhena, C. (2014). Website designquality and usage behavior: Unified Theory of Acceptance and Use ofTechnology. Journal of Business Research, 67, 22822290.https://doi.org/10.1016/j.jbusres.2014.06.016Alapetite, A., Andersen, H. B., & Hertzum, M. (2009). Acceptance of speechrecognition by physicians: A survey of expectations, experiences, and socialinfluence. International Journal of Human-Computer Studies, 67(1), 3649.Ali, R. A., & Arshad, M. R. M. (2016). Perspectives of students behavior towardsmobile learning (M-learning) in Egypt: an extension of the UTAUT model.Engineering, Technology & Applied Science Research, 6(4), 11091114.Aripin, N., Mustafa, H., & Hussein, A. (2011). Instant Messaging (IM) used in theWorkplace. Journal of Techno-Social, 3(1).Avrahami, D., & Hudson, S. E. (2006). Responsiveness in instant messaging:predictive models supporting inter-personal communication. Proceedings ofthe SIGCHI Conference on Human Factors in Computing Systems. Canada:ACM. https://doi.org/10.1145/1124772.1124881Bandura, A. (1989). Human Agency in Social Cognitive Theory. The AmericanPsychologist, 44, 117584. https://doi.org/10.1037/0003-066X.44.9.1175Bangor, A., Kortum, P., & Miller, J. (2009). Determining what individual SUS scoresmean: Adding an adjective rating scale. Journal of Usability Studies, 4, 114123. https://doi.org/66.39.39.113Bangor, A., Kortum, P., & Miller, J. A. (2008). The system usability scale (SUS): Anempirical evaluation. International Journal of Human-Computer Interaction,24(6), 574594.Bangor, A., Kortum, P. T., & Miller, J. T. (2008). An Empirical Evaluation of theSystem Usability Scale. International Journal of Human-Computer Interaction,24(6), 574594. https://doi.org/10.1080/10447310802205776Barrett, K., & Power, R. (2003). State of the art: Context management. M-ZonesResearch Programme, 6987.Barrett, R., Kandogan, E., Maglio, P. P., Haber, E. M., Takayama, L. A., & Prabaker,M. (2004). Field studies of computer system administrators: analysis of systemmanagement tools and practices (pp. 388395). ACM.Barrett, R., Maglio, P. P., Kandogan, E., & Bailey, J. (2004). Usable autonomiccomputing systems: the administrators perspective. In AutonomicComputing, 2004. Proceedings. International Conference on (pp. 1825).Batchelder, R., & Smith, D. (2001). Instant messaging: the sleeping giant. RetrievedMay 30, 2013, from https://www.gartner.com/doc/338943/instant-messagingsleeping-giantBaumgartner, I., & Green, P. (2008). Adoption of Service Oriented Computing fromthe IT Professionals Perspective: An e-Government Case Study. In D.Avison, G. M. Kasper, B. Pernici, I. Ramos, & D. Roode (Eds.), Advances inInformation Systems Research, Education and Practice: IFIP 20th WorldComputer Congress, TC 8, Information Systems, September 7-10, 2008,Milano, Italy (pp. 189201). Boston, MA: Springer US.https://doi.org/10.1007/978-0-387-09682-7-9_16Behling, O., & Law, K. S. (2000). Translating questionnaires and other researchinstruments: Problems and solutions. Quantitative applications in the socialsciences. https://doi.org/10.4135/9781412986373Bevan, N. (2001). International standards for HCI and usability. International Journalof Human-Computer Studies, 55, 533--552.Bindu, C. S. (2015). Secure Usable Authentication Using Strong Pass text Passwords.International Journal of Computer Network and Information Security, 7(3), 57.Birch, A., & Irvine, V. (2009). Preservice teachers acceptance of ICT integration inthe classroom: applying the UTAUT model. Educational Media International,46, 295315. https://doi.org/10.1080/09523980903387506Black, U. D. (1995). Network management standards: SNMP, CMIP, TMN, MIBs,and object libraries (2nd edition). McGraw-Hill.Bourgonjon, J., Valcke, M., Soetaert, R., & Schellens, T. (2010). Studentsperceptions about the use of video games in the classroom. Computers &Education, 54(4), 11451156. https://doi.org/10.1016/j.compedu.2009.10.022Brooke, J. (1996). SUS-A quick and dirty usability scale. Usability Evaluation inIndustry, 189, 194.Byrne, B. M. (2001). Structural equation modeling with AMOS.(Eds) LawrenceErlbaum associates, publishers. Mahwah, New Jersey, USA.Cai, Y. (2010). Development of an open source network management & monitoringplatform for wireless broadband service provider in rural areas. 2010 IEEEInternational Conference on Electro/Information Technology, 16.https://doi.org/10.1109/EIT.2010.5612169Celik, H. (2016). Customer online shopping anxiety within the Unified Theory ofAcceptance and Use Technology (UTAUT) framework. Asia Pacific Journalof Marketing and Logistics, 28(2), 278307.Chan, S., Hill, B., & Yardi, S. (2005). Instant Messaging Bots: Accountability andPeripheral Participation for Textual User Interfaces. In Proceedings of the2005 International ACM SIGGROUP Conference on Supporting Group Work(pp. 113115). New York, NY, USA: ACM.https://doi.org/10.1145/1099203.1099221Chau, P. Y. K., & Hu, P. J. (2001). Information technology acceptance by individualprofessionals: A model comparison approach*. Decision Sciences, 32(4), 699719.Chen, G., & Kotz, D. (2000). A Survey of Context-Aware Mobile ComputingResearch. Science (Vol. 3755). https://doi.org/10.1.1.117.4330Chen, H., Finin, T., & Joshi, A. (2003). An ontology for context-aware pervasivecomputing environments. The Knowledge Engineering Review, 18(3), 197207.Chen, H., Rong, W., Ma, X., Qu, Y., & Xiong, Z. (2017). An Extended TechnologyAcceptance Model for Mobile Social Gaming Service Popularity Analysis.Mobile Information Systems, 2017, 112.https://doi.org/10.1155/2017/3906953Chin, J. P., Diehl, V. a, & Norman, L. K. (1988). Development of an instrumentmeasuring user satisfaction of the human-computer interface. CHI 88-Proceedings of the SIGCHI Conference on Human Factors in ComputingSystems, 213218. https://doi.org/10.1145/57167.57203Chua, Y. P. (2006). Kaedah dan Statistik Penyelidikan. Malaysia: Mc. Graw Hill SdnBhd.Chua Yan Piaw. (2014). Ujian Regresi, Analisis Faktor dan Analisis SEM.McGrawHill Education. Retrieved fromhttp://www.mphonline.com/books/nsearchdetails.aspx?&pcode=9789675771958Cohen, J. (1988). Statistical power analysis for the behavioral sciences. StatisticalPower Analysis for the Behavioral Sciences. https://doi.org/10.1234/12345678Compeau, D., & Higgins, C. (1995). Computer Self-Efficacy: Development of aMeasure and Initial Test. MIS Quarterly, 19, 189211.https://doi.org/10.2307/249688Compeau, D., Higgins, C. A., & Huff, S. (1999). Social Cognitive Theory andIndividual Reactions to Computing Technology: A Longitudinal Study. MISQuarterly, 23, 145158. https://doi.org/10.2307/249749Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and UserAcceptance of Information Technology. MIS Quarterly, 13(3), 319340.Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsicmotivation to use computers in the workplace1. Journal of Applied SocialPsychology, 22(14), 11111132.Day, M., Aggarwal, S., Mohr, G., & Vincent, J. (2000). Instant messaging/presenceprotocol requirements (No. RFC 2779).Day, M., Rosenberg, J., & Sugano, H. (2000). A Model for Presence and InstantMessaging. Request for Comments. IETF. Retrieved fromhttp://www.ietf.org/rfc/rfc2778.txtDebuse, J. C. W., Lawley, M., & Shibl, R. (2008). Educators perceptions ofautomated feedback systems. Australasian Journal of Educational Technology,24(4), 374386.Deci, E. (1975). L.(1975) Intrinsic motivation. Perspectives in Social Psychology, (1).Deci, E. L., Ryan, R. M., & Miller, K. A. (1988). Intrinsic Motivation and Self-Determination in Human Behavior. Contemporary Sociology.https://doi.org/10.2307/2070638Dey, A. K. (2001). Understanding and using context. Personal and UbiquitousComputing, 5(1), 47.Diekhoff, G. (1992). Statistics for the social and behavioral sciences: Univariate,bivariate, multivariate. WCB/McGraw-Hill.Digital Asia News. (2015). Malaysian Workers All For the Cloud, Whatsapp MostPopular IM App. Digital News Asia. Retrieved from https://www.digitalnewsasia.com/mobile-telco/malaysian-workers-all-for-thecloud-whatsapp-most-popular-im-appDillon, A., & Morris, M. G. (1996). User acceptance of new information technology:theories and models. In Annual review of information science and technology.Medford, NJ: Information Today.Dong, C., & Dulay, N. (2011). Argumentation-based fault diagnosis for homenetworks (pp. 3742). ACM.El-gayar, O. F., & Moran, M. (2006). College Students Acceptance of Tablet PCs:An Application of the UTAUT Model. In 36th Annual Meeting of theDecision Sciences Institute (DSI) (pp. 28452850).Endsley, M. R. (1996). Automation and situation awareness. Automation and HumanPerformance: Theory and Applications, 163181.Fogarty, J., Lai, J., & Christensen, J. (2004). Presence versus availability: the designand evaluation of a context-aware communication client. International Journalof Human-Computer Studies, 61(3), 299317.https://doi.org/10.1016/j.ijhcs.2003.12.016Fornell, C., & Larcker, D. F. (1981). Evaluating Structural Equation Models withUnobservable Variables and Measurement Error. Journal of MarketingResearch (JMR), 18, 3950. https://doi.org/10.2307/3151312Gao, Y., Xiao, C., Gao, C., & Chen, H. (2009, April). A novel design of mobile IMsystem with network management. In Networks Security, WirelessCommunications and Trusted Computing, 2009. NSWCTC'09. InternationalConference on(Vol. 2, pp. 492-495). IEEE.Garrett, R. K., & Danziger, J. N. (2007). IM = Interruption Management? InstantMessaging and Disruption in the Workplace. Journal of Computer-MediatedCommunication, 13(1), 2342. https://doi.org/10.1111/j.1083-6101.2007.00384.xGay, L. R., Diehl, P. L. (1992). Research Methods for Business and. Management.Mac Millan Publishing Company, New York.Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reportingCronbachs alpha reliability coefficient for Likert-type scales. MidwestResearch-to-Practice Conference in Adult, Continuing, and CommunityEducation.Goyal, P., Mikkilineni, R., & Ganti, M. (2009). FCAPS in the Business ServicesFabric Model. In 2009 18th IEEE International Workshops on EnablingTechnologies: Infrastructures for Collaborative Enterprises (pp. 4551).https://doi.org/10.1109/WETICE.2009.21Gupta, A. (2006). Network Management: Current Trends and Future Perspectives.Journal of Network and Systems Management, 14(4), 483491.https://doi.org/10.1007/s10922-006-9044-7Ha, Y. U., Jin, J.-H., & Lee, M.-J. (2015). Lets3D: A collaborative 3d editing toolbased on cloud storage. International Journal of Multimedia and UbiquitousEngineering, 10(9), 189198.Ha, Y. U., Jin, J.-H., & Lee, M.-J. (2016). Lets3D-C: A robust collaborative 3dediting tool utilizing distributed consensus protocol. International Journal ofApplied Engineering Research, 11(2), 12031207.Hair, J. F. (2010). Multivariate data analysis. Pearson College DivisionHair, J. F., Anderson, R. E., Babin, B. J., & Black, W. C. (2010). Multivariate dataanalysis: A global perspective (Vol. 7). Pearson Upper Saddle River, NJ.Handayani, P. W. (2012). Analisis Faktor-Faktor Yang Memengaruhi PenerimaanPengguna Dalam Menggunakan Sistem ERP Dengan Studi Kasus PT XYZ.Jurnal Sistem Informasi, 7(1), 69-75.Haslina Mohd. Azizah Ahmad., A. Z. (2002). Analisis dan reka bentuk sistem UML :pendekatan berorientasikan objek menggunakan UML. Petaling Jaya: PrenticeHall.Hildebrand, J., Houri, A., & Saint-Andre, P. (2015). Interworking between the sessioninitiation protocol (SIP) and the extensible messaging and presence protocol(XMPP): Instant Messaging.Hornbaek, K. (2006). Current practice in measuring usability: Challenges to usabilitystudies and research. International Journal of Human-Computer Studies, 64(2),79--102.Horng, M. F., Hung, M. H., Chen, Y. T., Pan, J. S., & Huang, W. (2010). A newapproach based on XMPP and OSGi technology to home automation on web.In 2010 International Conference on Computer Information Systems andIndustrial Management Applications, CISIM 2010 (pp. 487490).https://doi.org/10.1109/CISIM.2010.5643462Huang, A. H., Hung, S.-Y., & Yen, D. C. (2007). An exploratory investigation of twointernet-based communication modes. Computer Standards & Interfaces,29(2), 238243.Huser, V., Narus, S. P., & Rocha, R. A. (2010). Evaluation of a flowchart-based EHRquery system: A case study of RetroGuide. Journal of Biomedical Informatics,43(1), 4150. https://doi.org/10.1016/j.jbi.2009.06.001Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technologyadoption. Information & Management, 48(1), 18.https://doi.org/10.1016/j.im.2010.09.001ISO, I. (1989). 7498-4: Information Processing Systems Open SystemsInterconnection Basic Reference Model-Part 4: Management Framework.International Standards Organization, Geneva, Switzerland.Jarvinen, J., Marttinen, A., Luoma, M., Peuhkuri, M., & Manner, J. (2017).Architecture of XMPP proxy for server-to-server connections. In MilitaryCommunications and Information Systems Conference (MilCIS), 2017 (pp. 16). IEEE.Javali, S. B., Gudaganavar, N. V, & Raj, S. M. (2011). Effect of varying sample sizein estimation of coefficients of internal consistency.Jeng, Y.-L., Huang, T.-C., Chen, C.-C., Shu, Y., & Huang, Y.-M. (2015). Developinga mobile instant messaging system for problem-based learning activity. In2015 International Conference on Interactive Collaborative Learning (ICL)(pp. 313316). IEEE. https://doi.org/10.1109/ICL.2015.7318044Jong, D., & Wang, T. S. (2009, May). Student acceptance of web-based learningsystem. In Proceedings of the 2009 International Symposium on WebInformation Systems and Applications (WISA09) (Vol. 8, pp. 533-536).People's Republic of China: Nanchang.Juristo, Natalia and Moreno, Ana M and Sanchez-Segura, M.-I. (2007). Analysing theimpact of usability on software design. Journal of Systems and Software,80(9), 15061516. https://doi.org/http://dx.doi.org/10.1016/j.jss.2007.01.006Kebritchi, M. (2010). Factors affecting teachers adoption of educational computergames: A case study. British Journal of Educational Technology, 41(2), 256270. https://doi.org/10.1111/j.1467-8535.2008.00921.xKementerian Pendidikan Malaysia. (2013). Pelan Pembangunan Pendidikan 2013-2025.Kirakowski, J. (1994). The use of questionnaire methods for usability assessment.Unpublished Manuscript. Retreived from Http://sumi. Ucc. Ie/sumipapp.Html.Kirakowski, J. (1996). The software usability measurement inventory: backgroundand usage. Usability Evaluation in Industry, 169178.Kortum, P. T., & Bangor, A. (2013). Usability Ratings for Everyday ProductsMeasured With the System Usability Scale. International Journal of Human-Computer Interaction, 29, 6776.https://doi.org/10.1080/10447318.2012.681221Koufaris, M. (2002). Applying the Technology Acceptance Model and Flow Theoryto Online Consumer Behavior. Information Systems Research, 13(2), 205223. https://doi.org/10.1287/isre.13.2.205.83Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for researchactivities. Educational and psychological measurement, 30(3), 607-610.Leech, N. L., Barrett, K. C., & Morgan, G. A. (2014). SPSS for IntermediateStatistics: Use and Interpretation. Igarss 2014. https://doi.org/10.1007/s13398-014-0173-7.2Leedy, P. D., & Ormrod, J. E. (2001). Practical research. Pearson educationinternational.Li, B., Huang, W., Gao, L., & Li, D. (2005). U.S. Patent Application No. 10/698,675.Li, D., Chau, P., & Lou, H. (2005). Understanding individual adoption of instantmessaging: An empirical investigation. Journal of the Association forInformation Systems, 6(4), 102129.Li, W. (2010). Virtual knowledge sharing in a cross-cultural context. Journal ofKnowledge Management, 14(1), 3850.Lin, C.-P., & Anol, B. (2008). Learning online social support: an investigation ofnetwork information technology based on UTAUT. Cyberpsychology andBehavior, 11, 268272.Lindgaard, G. (1989). Testing the usability of interactive computer systems. InTesting the usability of interactive computer systems. Proceedings ofWorkshop at HCI Australia (Vol. 89, pp. 113).Liu, W., Li, X., & Huang, D. (2011). A survey on context awareness. In ComputerScience and Service System (CSSS), 2011 International Conference on (pp.144147). IEEE.Lu, Y., Zhou, T., & Wang, B. (2009). Exploring Chinese users acceptance of instantmessaging using the theory of planned behavior, the technology acceptancemodel, and the flow theory. Computers in Human Behavior, 25(1), 2939.https://doi.org/10.1016/j.chb.2008.06.002Mahmoud, M., Aly, S. G., Sabry, A., & Hamza, M. (2009). A Jabber BasedFramework for Building Communication Capable Java Mobile Applications.International Journal of Information Technology, 15(1).Maslin, M., & Ramlah, H. (2008). User acceptance of information technology:Understanding theories and models. Selangor: Venton Publishing (M) Sdn.Bhd.McClo&kcy, D. (2003). Evaluating electronic commerce acceptance with thetechnology acceptance model. Information Technology and Organizations:Trends, Issues, Challenges and Solutions, 1, 413.McCombs, J. (2012). A Path Analysis of the Behavioral Intention of SecondaryTeachers to Integrate Technology. In P. Resta (Ed.), Proceedings of Societyfor Information Technology & Teacher Education International Conference2012 (pp. 33923399). Austin, Texas, USA: AACE.Ming, T. S., Azman, H., Nambiar, R., Wah, L. K., Keong, Y. C., & Bidmeshki, L.(2009). Teachers views of their involvement in an online community ofpractice project. CALL-EJ Online, 11(1).Moon, J.-W., & Kim, Y.-G. (2001). Extending the TAM for a World-Wide-Webcontext. Information & Management, 38(4), 217230.Moran, M., Hawkes, M., & El Gayar, O. (2010). Tablet Personal ComputerIntegration in Higher Education: Applying the Unified Theory of Acceptanceand Use Technology Model to Understand Supporting Factors. Journal ofEducational Computing Research, 42(1), 79101.https://doi.org/10.2190/EC.42.1.dNardi, B. A., Whittaker, S., & Bradner, E. (2000). Interaction and Outeraction: InstantMessaging in Action. In Proceedings of the 2000 ACM Conference onComputer Supported Cooperative Work (pp. 7988). New York, NY, USA:ACM. https://doi.org/10.1145/358916.358975Nazareth, D. L., & Choi, J. (2014). A System Dynamics Model for InformationSecurity Management. Information & Management, 52(1), 123134.https://doi.org/10.1016/j.im.2014.10.009Nielsen, J. (1994). Usability engineering. Access Online via Elsevier.Nielsen, J. (1994). Usability inspection methods. In Conference Companion onHuman Factors in Computing Systems (pp. 413414). New York, NY, USA:ACM. https://doi.org/10.1145/259963.260531Nielsen, J. (2003). Usability 101: Introduction to usability.Nugroho, Hargyo Tri and Wicaksono, B. A. (2013). Utilizing Instant Messaging forReal-Time Notification and Information Retrieval of Snort Intrusion DetectionSystem. ISICO 2013.Osborne, J. W., & Overbay, A. (2004). The power of outliers (and why researchersshould always check for them). Practical Assessment, Research & Evaluation,9(6), 112.Ou, C. X. J., Davison, R. M., Zhong, X., & Liang, Y. (2010). Empowering employeesthrough instant messaging. Information Technology & People, 23(2), 193211. https://doi.org/10.1108/09593841011052165Oye, N. D., Rabin, Z. A., & Iahad, N. A. (2011). A Model of ICT Acceptance andUse for Teachers in Higher Education Institutions. International Journal ofComputer Science & Communication Networks, 1(1).Pallant, J. (2013). SPSS survival manual. McGraw-Hill Education (UK).Park, K. S., & Hwan Lim, C. (1999). A structured methodology for comparativeevaluation of user interface designs using usability criteria and measures.International Journal of Industrial Ergonomics, 23(5), 379389.Pavlou, G. (2007). On the evolution of management approaches, frameworks andprotocols: a historical perspective. Journal of Network and SystemsManagement, 15(4), 425-445.Pembestarian Sekolah. (2012). Retrieved May 12, 2013, fromhttp://pembestarian.wordpress.com/Perttunen, M., & Riekki, J. (2004). Inferring presence in a context-aware instantmessaging system. Intelligence in Communication Systems, 160174.Rajalahti, T., & Kvalheim, O. M. (2011). Multivariate data analysis in pharmaceutics:A tutorial review. International Journal of Pharmaceutics. Pearson CollegeDivision. https://doi.org/10.1016/j.ijpharm.2011.02.019Raman, L. (1998). OSI systems and network management. CommunicationsMagazine, IEEE, 36.Ramayah, T. (2010). The role of voluntariness in distance education students usageof a course website. TOJET, 9(3), 96105.Rogers, E. M. (1983). Diffusion of innovations. An integrated approach tocommunication theory and research (Vol. 3). Simon and Schuster.https://doi.org/10.1525/aa.1963.65.5.02a00230Rondan-Catalua, F. J., Arenas-Gaitn, J., & Ramrez-Correa, P. E. (2015). Acomparison of the different versions of popular technology acceptancemodels: A non-linear perspective. Kybernetes, 44(5), 788805.Royce, W. W. (1970). Managing the development of large software systems. Inproceedings of IEEE WESCON (Vol. 26). Los Angeles.Ryan, N. S., Pascoe, J., & Morse, D. R. (1998). Enhanced reality fieldwork: thecontext-aware archaeological assistant. In Computer applications inarchaeology. Tempus Reparatum.Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: Classicdefinitions and new directions. Contemporary Educational Psychology, 25(1),5467.Saiful afzan baru, Lazim Abdullah, Ali, A., & Yusoff, H. (2014). PemodelanPenerimaan Pelajar Terhadap Persekitaran Pembelajaran Maya ( Vle ). Journalof Business and Social Development Volume 2 Number 2, September 2014:36-47, 2(2), 3647.Saint-Andre, P. (2004). Extensible Messaging and Presence Protocol (XMPP): Core.Security. IETF. Retrieved from http://www.ietf.org/rfc/rfc3920.txtSaint-Andre, P. (2005). Streaming xml with jabber/xmpp. Internet Computing, IEEE,(October), 8289.Saint-Andre, P. (2011). Extensible messaging and presence protocol (XMPP): Instantmessaging and presence. Retrieved fromhttp://xml2rfc.tools.ietf.org/html/rfc6121Santoso, H. B., Fadhilah, S., Nurrohmah, I., & Goodridge, W. H. (2016). Theusability and user experience evaluation of web-based online self-monitoringtool: Case study human-computer interaction course. In User Science andEngineering (i-USEr), 2016 4th International Conference on (pp. 122127).IEEE.Sauro, J. (2011). Measuring Usability With The System Usability Scale (SUS).Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. InMobile Computing Systems and Applications, 1994. WMCSA 1994. FirstWorkshop on (pp. 8590). IEEE.Schilit, B. N., & Theimer, M. M. (1994). Disseminating active map information tomobile hosts. Network, IEEE, 8(5), 2232.Schmidt, A., Beigl, M., & Gellersen, H.-W. (1999). There is more to context thanlocation. Computers & Graphics, 23(6), 893901.https://doi.org/http://dx.doi.org/10.1016/S0097-8493(99)00120-XShackel, B. (1991). Usability-context, framework, definition, design and evaluation.Human Factors for Informatics Usability, 2137.SKMM. (2008). Household use of the Internet survey 2008. Retrieved January.Retrieved fromhttp://www.skmm.gov.my/skmmgovmy/files/attachments/HUIS08_02.pdfSloman, M. (1994). Network and distributed systems management. Addison-WesleyLongman Publishing Co., Inc.Suki, N. M., & Ramayah, T. (2010). User acceptance of the e-government services inMalaysia: structural equation modelling approach. Interdisciplinary Journal ofInformation, Knowledge, and Management, 5, 395413.Sundaravej, T. (2010). Empirical validation of unified theory of acceptance and use oftechnology model. Journal of Global Information Technology Management,13(1), 527.T. Ramayah ; Lee Sze Lin. (2005). kesan persepsi kebergunaan, kesenanganmengguna dan keseronokan mengguna terhadap penggunaan emel. JurnalKemanusiaan, 5, 2336.Tabachnick, B. G., & Fidell, L. S. (1996). Analysis of covariance. Using MultivariateStatistics, 8(1), 321374.Tabachnick, B. G., & Fidell, L. S. (2007). Experimental designs using ANOVA.Thomson/Brooks/Cole.Tan, L., & Wang, N. (2010). Future internet: The internet of things. In AdvancedComputer Theory and Engineering (ICACTE), 2010 3rd InternationalConference on (Vol. 5, pp. V5-376). IEEE.Taylor, S., & Todd, P. A. (1995). Understanding Information Technology Usage: ATest of Competing Models. Information Systems Research.https://doi.org/10.1287/isre.6.2.144Tech Daily. (2011). Malaysian No 1 in Social Networking. TechDaily.Teo, T. (2011). Factors influencing teachers intention to use technology: Modeldevelopment and test. Computers & Education, 57(4), 24322440.https://doi.org/10.1016/j.compedu.2011.06.008Teo, T. (2011). Technology acceptance research in education. In Technologyacceptance in education (pp. 15). Springer.Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing:toward a conceptual model of utilization. MIS Quarterly, 125143.Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience onpersonal computer utilization: testing a conceptual model. Journal ofManagement Information Systems, 11(1), 167187.Triandis, H. C. (1979). Values, attitudes, and interpersonal behavior. In Nebraskasymposium on motivation. University of Nebraska Press.Tullis, T. S., & Stetson, J. N. (2004). A comparison of questionnaires for assessingwebsite usability. In Journal of Global Information Technology Management.Van Schaik, P. (2009). Unified Theory of Acceptance and use for Websites used byStudents in Higher Education. Journal of Educational Computing Research,40(2), 229257. https://doi.org/10.2190/EC.40.2.eVaziri, D. D., Aal, K., Ogonowski, C., Von Rekowski, T., Kroll, M., Marston, H. R.,Wieching, R. (2016). Exploring user experience and technology acceptancefor a fall prevention system: results from a randomized clinical trial and aliving lab. European Review of Aging and Physical Activity, 13(1), 6.Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating Control,Intrinsic Motivation, and Emotion into the Technology Acceptance Model.Information Systems Research, 11(4), 342365.https://doi.org/10.1287/isre.11.4.342.11872Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the TechnologyAcceptance Model: Four Longitudinal Field Studies. Management Science.https://doi.org/10.1287/mnsc.46.2.186.11926Venkatesh, V., & Morris, M. G. (2000). Why dont men ever stop to ask fordirections? Gender, social influence, and their role in technology acceptanceand usage behavior. MIS Quarterly, 115139.Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptanceof Information Technology: Toward a Unified View. MIS Quarterly, 27, 425478. https://doi.org/10.2307/30036540Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use ofinformation technology: Extending the unified theory of acceptance and use oftechnology. MIS Quarterly, 36(1), 157178.Vliet, H. Van. (2007). Software Engineering: Principles and Practice. RequirementsEngineering. https://doi.org/10.1016/0950-5849(94)90015-9Walczak, D., Wrzos, M., Radziuk, a., Lewandowski, B., & Mazurek, C. (2012).Machine-to-Machine communication and data processing approach in FutureInternet applications. 2012 8th International Symposium on CommunicationSystems, Networks & Digital Signal Processing (CSNDSP), 15.https://doi.org/10.1109/CSNDSP.2012.6292779Wang, W., Hsieh, J. P.A., & Song, B. (2012). Understanding User Satisfaction WithInstant Messaging: An Empirical Survey Study. International Journal ofHumanComputer Interaction, 28, 153162.https://doi.org/10.1080/10447318.2011.568893Wenzel, Matthias and Meinel, C. (2016). Full-body WebRTC video conferencing in aweb-based real-time collaboration system. In Computer SupportedCooperative Work in Design (CSCWD), 2016 IEEE 20th InternationalConference on (pp. 334--339).Wright, B. D., & Stone, M. H. (1979). Best Test Design. Rasch MeasurementWu, Y.-L., Tao, Y.-H., & Yang, P.-C. (2008). The use of unified theory of acceptanceand use of technology to confer the behavioral model of 3G mobiletelecommunication users. Journal of Statistics and Management Systems,11(5), 919949.Yaacob, A., Nor, N., & Azman, H. (2005). Implementation of the Malaysian SmartSchool: An investigation of teaching-learning practices and teacher-studentreadiness. Internet Journal of E-Language Learning & Teaching.Zhang, P., Li, N., & Sun, H. (2006). Affective quality and cognitive absorption:Extending technology acceptance research. Proceedings of the Annual HawaiiInternational Conference on System Sciences, 8(C), 110.https://doi.org/10.1109/HICSS.2006.39