Thursday, November 28, 2019

25 Names of Fabrics, Wools, and Leathers Derived from Place Names

25 Names of Fabrics, Wools, and Leathers Derived from Place Names 25 Names of Fabrics, Wools, and Leathers Derived from Place Names 25 Names of Fabrics, Wools, and Leathers Derived from Place Names By Mark Nichol This post lists and defines terms for apparel materials that have in common that the terms are derived from place names. 1. angora: a type of wool from Angora rabbits, which originated near Ankara (previously Angora), Turkey 2. Bedford cord: a corduroy-like fabric, named after Bedford, England, or New Bedford, Massachusetts 3. calico: a type of cloth originally from Calicut, India 4. cambric: a type of cloth originally from Cambrai, France 5. cashmere: a type of wool and a woolen fabric from Kashmir goats, which come from the Kashmir region of India 6. chino cloth: a cloth originating in China (the name is Spanish for â€Å"Chinese†) 7. Cordovan leather: a type of shoe leather first produced in Cordoba, Spain 8. damask: a type of fabric named after Damascus, Syria 9. denim: a type of fabric originally called serge de Nà ®mes, or â€Å"serge of Nà ®mes,† after Nà ®mes, a town in France 10. dungaree: a type of denim cloth originating in DongrÄ «, India; pants or overalls made from this fabric are called dungarees 11. duffel: a cloth first made in Duffel, Belgium 12. Harris tweed: a type of handwoven tweed cloth originating on the island of Lewis and Harris and adjacent islands in Scotland (the name of the cloth type tweed is coincidental with the name of the river Tweed) 13. Holland (or Holland cloth): a type of linen originally made in various parts of Europe, including the province of Holland in the Netherlands 14. jaconet: a fabric originally from Puri, India (the word is derived from the name of the city’s Jagannath Temple) 15. jean: a type of fabric originating in Genoa, Italy 16. jersey: a type of knit fabric originating on the island of Jersey, next to France (but a dependency of the United Kingdom) 17. Mackinaw cloth: a woolen cloth used for thick, warm jackets (called Mackinaws or Macs) originally favored by lumberjacks and then hunters and fishermen in the Mackinac (or Mackinaw) region of Michigan 18. madras: a lightweight cloth originally from Madras, India (now called Chennai) 19. muslin: a lightweight fabric originally from Mosul, Iraq 20. Morocco leather: a type of leather originally from Moroccan goats 21. nankeen: a type of fabric originating in Nanjing, China (previously called Nanking or Nankin); also refers to pants made of this material, as well as the pale buff or yellow color of the fabric, a type of porcelain originating in the city, and a type of lace (often called nankins) and part of the name of numerous animals and plants featuring this color 22. osnaburg: a coarse cloth originally made in Osnabrà ¼ck, Germany 23. suede: a type of leather made from the underside of animal skins, originally referenced in the French phrase gants de Suà ¨de (â€Å"gloves from Sweden†); similar-looking fabrics are referred to as â€Å"sueded silk† and so on 24. tulle: a type of fabric originating in Tulle, France 25. worsted: a type of wool whose name is derived from that of Worstead, one of the villages from which it originated; also, the name of a type of yarn and a category of yarn weight Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:Regarding Re:Proved vs. ProvenEnglish Grammar 101: Prepositions

Monday, November 25, 2019

Cause and Effect for Congested Schools essays

Cause and Effect for Congested Schools essays It was the first day of class and students are ready to start a new year. As you walk into the next period, you see new faces, but you find yourself to have no place to sit. All the seats were filled in every part of the classroom. On top of that, the teacher had assigned all the books with none to spare. As you sit on the floor like a child, you hear all the commotion around you, and ask to yourself, is high school becoming to big for me to handle or are the number of students too big for this high school? In todays public schools, overcrowding has become a bigger problem than ever, across America. We may not see the effects of overcrowded classes now, but these students will becomes the working citizens. Overcrowded classes will have a toll on the economy. Classes have strayed far the ideal class size in high school. Just trying to find space for individual students is more of a concern. Educational studies by the Eric Clearinghouse said the ideal teacher to student ratio should be fifteen to twenty students per teacher (Ellis). Most public schools in America are not even close to those standards. The main source of this problem has been directed to the lack of funds schools are receiving. The class size has risen as the population has grown in the United States. We cannot turn away students from receiving an education that would be contradicting everything high schools stand for. We have to turn our attention toward main cause of the situation, funds. In Chicago alone more than three billion dollars is needed for expansion of overcrowded schools (Walters). Not just big city areas are feeling the effects of overcrowding due to the lack of funds. In the small town of Glen Burnie, Ohio, 2.3 million dollars are needed to renovate local schools (Kiehl). These types of problems are all over our country and needs to be addressed. A step has been take to help public education by implementing Bushs b...

Thursday, November 21, 2019

Financial accounting standards board Research Paper

Financial accounting standards board - Research Paper Example However, after the approval of the amendment, entities going through mergers and acquisitions are obliged by the Financial Accounting Standards Board to implement this change in their financial reporting. This is to ensure consistency in the application of these standards among the entities affected. Accounting for any combination taking place after the approval date must be in accordance with the provisions of this standards. In addition, full implementation must be observed, that is, once an entity decides to use these standards, it must be applied fully, ensuring compliance with every paragraph of the standard and not partial compliance (FASB, p14).The board may permit early application to implement the standard by entities undergoing combinations. They can simply apply to the board if they are certain about using the standard. The board may however choose to accept or reject such applications. When the board is sufficiently satisfied that the applicants can implement this standar d, it grants the permission for an early implementation. When such permission is granted, the applicant must comply with the requirements of each provision of the standard as partial compliance is prohibited. They must ensure recognition, measurement, and disclosure are as per the requirements of the standard (FASB, p18).The proposed amendment would result in more relevant information as compared to the current standard on disclosure of identifiable intangible assets. Firstly, this standard limits the separate recognition to non-cancelable contractual terms and other legal rights.

Wednesday, November 20, 2019

Modern and Post-Modern Views of a Great Company Research Paper

Modern and Post-Modern Views of a Great Company - Research Paper Example The company selected for this assignment is General Dynamics Information Technology. It is the IT wing of General Dynamics and the world’s 5th largest defense contractor, provides information technology (IT) services, professional services and systems engineering services to customers ranging from federal and state governments, homeland security, defense, health, and commercial sectors. It is also involved in simulation and training with worldwide professionals accounting to approximately 17,000. A trusted name with over 50 years as a pioneer in systems integrator, this company manages large-scale and often mission-critical IT operations and enterprise solutions. The advent of information technology (IT) has resulted in changes in the U.S. military warfare and tactics thereby leading to a transformation in General Dynamics. General Dynamics Information Systems and Technology business segment has four business units and General Dynamics Information Technology is one of them. Ea rlier General Dynamics was known as provider of tanks, submarines and ships to the Department of Defense. Today General Dynamics leads the market in providing the United States government and its allies with technologies. It also is the market leader in mission-critical information systems. General Dynamics’ largest and fastest growing segment is its Information Systems & Technology group. Worldwide it boasts of employee strength of 91,700 approximately while the headquarters of GDIT is in Fairfax, Virginia. General Dynamics is the market leader in the following: †¢information systems and technologies †¢shipbuilding and marine systems †¢armaments and munitions †¢land and expeditionary combat systems †¢Business aviation. ... It also is the market leader in mission-critical information systems. General Dynamics’ largest and fastest growing segment is its Information Systems & Technology group. Worldwide it boasts of employee strength of 91,700 approximately while the headquarters of GDIT is in Fairfax, Virginia. General Dynamics is the market leader in the following: information systems and technologies shipbuilding and marine systems armaments and munitions land and expeditionary combat systems Business aviation (General Dynamics Information Technology, 2011). John Philip Holland started the parent company of Holland Torpedo Boat Company (parent company of General Dynamics) which was responsible for developing the first submarines of US navy. The company after the acquisition of Canadair in 1946 and its subsequent expansion in aircraft production was then renamed to General Dynamics on 24 April 1952. The U.S. defense conglomerate is the world’s fifth largest defense contractor today. Althou gh the company has now diversified and caters to a much wider variety of commercial businesses, from healthcare to mobile service networks, the company still remains principally a defense contractor, providing services and products to Army, State and Federal Governments. Modern and Post-Modern Theories One major difference between the two theories is their dates of inspiration-Modern 1960-1970 and Post-Modern 1990s (Hatch & Cunliffe, 2006, pg. 6). The modernist feel that you must commit to limitations based on knowledge of our five senses (Hatch &Cunliffe, 2006, pg. 15). It is all in what a modernist call their reality based on the data form their five senses. According to Hatch &Cunliffe (2006) the post-modernist perspective commits to uncovering and

Monday, November 18, 2019

Reflection on Powwow Highway & Native American Stories of the Sacred Essay

Reflection on Powwow Highway & Native American Stories of the Sacred - Essay Example "But they can be your friends and grandchildren. Your main purpose is to give plenty of light". He is repeatedly asked by all other heavenly creatures that represent parents, friends and relatives, who provide us warmth and light as old man tells them "I have now told all of you the best ways to guide yourselves and what you can do to help the people of the world. You must always remember that these children of the human race are my children!". In this story there is lesson for parents that as adults they have special responsibility, which is to take care of the children, but not with a tendency of owing them and forcing, which often results in rebellion and consistent disappointments. And another occasion the Cherokee says that "Treat every person, from the tiniest child to the eldest elder, with respect at all times" which is an essential thing desperately needed in modern times. Gambling today is inherent part of Western culture, but it has been seen as an alternative to war in Indian culture. Similarly these stories are drawn from the diverse Indian tribes across North American retells the Tribal Indian traditions in a simpler way, stories such as Son of the light, who goes on quest to rescue his wife, and the Muskrat's self sacrifice emphasise the sense of sacrifice for other people, even if he has to pay the price, so that other being can live in peace and happiness; and the White Buffalo profound gift of the scared pipe to his people, all illuminates the essential elements of tribal cultural life and their wisdom in these beliefs. It is through such tales that essential lessons of life can be learned, which affirms the belief that we are not separate, but an essential part of the natural world. THE POWWOW HIGHWAY The Powwow Highway is not only a movie, but it is rather a meditation, the way Tribal American Indians understand land in terms of space rather than time. For Indians going from one place to another is not a trip in miles or km, but rather a journey from one land to another. The movie provides the reason, why two Indians are going on the journey. The main plot of the movie involves a Buddy, who cannot see native land be confiscated due to a lame excuse, even though his sister is thrown into jail, yet he is persistent to take her out even, though its ploy to take him out of the controversy. It also shows, the Americans Indian beliefs and practices are essential for their spiritual growth. Despite being living in an advanced age, still old tribal bonds are strong even though for an outsider these Indian traditions and norms often look strange, they keeps Native Americans intact. The movie enlightens the viewer that the culture values and traditions of native people are more than crafts and carvings, but it Indian culture has solid foundation. The arrival of Europeans marked a major change in Native American society, millions died due to sickness, slavery and extermination. The Europeans missionaries looked upon Native Spirituality as worthless superstition inspired by the devil, while many survivors were forcibly converted to Christianity on the pretext of white man's burden. However, nothing could change their cultural values as the movie shows, how Natives Americans respect the land, nature and their concept of family responsibilities, concern for the environment and willingness to share - all of these values together. It

Friday, November 15, 2019

History Of Internet Banking In Malaysia Information Technology Essay

History Of Internet Banking In Malaysia Information Technology Essay In early 2001 the bursting of the Internet bubble has created numerous assumptions that Internet services companies have lost their opportunities. The Internet companies and Internet players have been fighting for survival, and most of them have been still experiencing losses. There are still going discussions among practicing managers and academics in reaching a consent in their debate about this new technology: whether the Internet changes the basic way people do business or whether it is just an evolutionary process, offering simply a new distribution channel and communication medium (Moe and Fader, 2001). According to Brown (2001), the New Economy or e-commerce businesses are still at the early life stage. In spite of the collapse of dot.com stock prices in March 2001, Internet usage and e-commerce continued to grow at a fast speed. According to eMarketer (2003), the US B2C e-commerce returns comparing to US$51 billion in 2001reached US$70 billion in 2002, i.e., a jump of 37%. It also forecasted that revenues of the e-commerce would increase by 28% to US$90 billion by 2003; by 2004 would occur another increase of 21% to US$109 billion; and to US$133 billion, a further 22% increase, by 2005. The expected extensive growth of online purchases via the Internet will give enormous chances to businesses in general, and Internet Banking (IB) in particular. In this study the terms IB and Online Banking (OB) are used interchangeably. IB/OB is different from Electronic Banking (e-banking) in that the latter is a higher level activity that encompasses not only IB/OB, but also Mobile Banking, SMS Banking, ATM, WAP-banking and other electronic payment systems that are not operated through the Internet. Our study will focus on IB, because it is considered as the most significant and most popular delivery channel for banking services in the cyber age. Banks can benefit from much lower operating costs by offering IB services, which require less staff and fewer physical branches. Customers will also benefit from the convenience, speed and round-the-clock availability of IB services. In order to be able to formulate better marketing strategies for increasing IB usage in the future banks need to study the factors that influence customers intention to adopt IB so that banks. This study aims to examine the behavioral intention of UUM students to use IB services with a focus on users perceptions of ease of use and usefulness of IB, and of security of using this new technology to meet their banking needs. In Chapter 2, we provide a review of the previous literature on innovation diffusion and technology adoption, based on which we propose a model of customers intention to adopt IB. We discuss the research methodology in Chapter 3. History of internet banking in Malaysia On June 1, 2000, the Bank Negara Malaysia let locally owned commercial banks offer Internet banking services. On June 15, 2000 the first bank to offer Internet banking services in Malaysia was Maybank, the largest domestic bank in terms of assets as well as network distribution which commands its own portal at www.maybank2U.com. Subsequently, internet banking services were offered by Hong Leong Bank, Southern Bank, Multi-Purpose Bank and etc. A review of the Malaysian banking sites in the Internet discovered that all domestic banks, which have been settled an anchor bank status by the BNM, have a web presence. This banking service is currently being provided to individual customers of the bank and the site boasts of the latest 128-bit encryption technology to dispel worries of security among bank customers. Internet banking service provided in the portal consists of banking enquiry functions, credit card payment, bill payment, accounts summary, and funds transfer as well as transacti on history. In the banks providing internet banking services customer support service is provided via e-mails as well as via telephone lines and it is available daily from morning to mid-night (source: http://www.arraydev.com/commerce/JIBC/0103_01.htm). Problem Statement From reviewing related articles on the current topic, we can find evidence that although consumers have had an interest in advanced internet banking services and tended to have various financial sources or tools for money transactions; they have not quickly changed their main propensity to use banking services or goods that they are already familiar with (Futurics 2001). For example, new electronic banking goods or services have not quickly substituted for traditional ones and non-online banking goods or services. Although various electronic banking services have emerged since the ATM was introduced 30 years ago, a lot of consumers still use checks as a primary source for money transactions, and banks still have a lot of bricks and mortar branches in the market. According to the Survey of Consumer Finances in 2001, about 60% of household heads used checks as a primary source. Furthermore, the number of bank branches expanded from about 65,000 to about 73,000 from 1994 to 2003, even t hough the number of U.S banks fell from about 12,500 in 1994 to about 9,000 during the same period (Hirtle Metli, 2004). In spite of the emergence of a series of advanced electronic banking services, both consumers and banks still regard non-electronic banking as one of the important sources for money transaction. However, in global terms the majority of private bankers are still not using internet-banking channel. There are multiple reasons for this. To start with, customers need to have an access to the internet in order to utilize the service. Furthermore, new online users need first to learn how to use the service (Mols et al., 1999). Second, nonusers often complain that internet banking has no social dimension, i.e. you are not served in the way you are in a face-to-face situation at a bank branch (Mattila et al., 2003). Third, customers have been afraid of security issues (Sathye, 1999; Hamlet and Strube, 2000; Howcroft et al., 2002). However, this study focuses in the adoption of internet banking services by customers in evidence of the students of Universiti Utara Malaysia. Our study aims to gain a deeper understanding of the factors influencing the adoption of internet banking services by UUM students. Research questions The study intends to answer the following questions: How UUM students Attitude influence their Intention to use IB? What relationship does the Perceived Usefulness have with the UUM students Attitude and Intention to use IB? What relationship does the Perceived Ease of Use have with the UUM students Attitude and Intention to use IB? Is Perceived Web Security really a concern to UUM students who are using IB? Research Objectives The main aim of this study to determine the basic factors influence the usage of internet banking in UUM and to examine the factors that affect the adoption of internet banking. The specific objectives are as follow: To investigate how UUM students Attitude influence their Intention to use IB; To examine the relationship of Perceived Usefulness with the UUM students Attitude and Intention to use IB; To investigate the relationship of Perceived Ease of Use with the UUM students Attitude and Intention to use IB; To investigate whether Perceived Web Security is a concern for the usage of internet banking. Significance of the Study The study will contribute in expanding the body of knowledge in the internet and technology adoption literature. It will provide academicians and researchers with an update on the usage and acceptance of internet in the banking sector. This research can contribute to an improved understanding of the factors related to users acceptance of new technology. In particularly, this study acts as an understanding of the Technology Acceptance Model (TAM). Also, this research can stimulate the banks providing their services inside UUM Campus such as CIMB, Islamic Bank and Maybank to improve their internet banking services. In the particular perspective, this study is significant to offer useful information for bank management in creating IB marketing strategies. For marketing practitioners, the aim is to offer a holistic and in-depth overview of how customer forms, experience and exploit their satisfaction towards services that offered by the banks. This study contributes to the literature by formulating and validating TAM to predict IB adoption. CHAPTER TWO Literature review Although in the past most of studies aim were to extent of understanding of user adoption of technology, few of these studies were conducted on IB services by extending the well-established Technology Acceptance Model (TAM). It is an appropriate time to study the user adoption of IB when the numbers of global banking groups are rapidly offering and improving IB services on the rise (American Banker, 2002). Both academics and banking executives will be interested in such a study. in particular, this study investigates the students perception on the adoption of internet banking for their private purpose. In other words, our survey focused on UUM students purpose to use internet banking to handle their banking issues. 2.1. Technology Acceptance Models Davis (1989) developed the Technology Acceptance Model, according to this model users adoption of computer system depends on their behavioral intention to use, which in turn depends on attitude, consisting of two beliefs, namely Perceived Ease of Use and Perceived Usefulness. In fact, Davis developed TAM by building upon an earlier theory, the Theory of Reasoned Action (TRA) by Fishbein and Ajzen (1975). In TRA, Fishbein and Ajzen (1975) proposed that intention is the immediate determinant of the corresponding behavior, which is divided into (1) attitude toward behavior, and (2) subjective norm concerning behavior. Davis posited d in TAM that the two theoretical constructs, Perceived Usefulness and Perceived Ease of Use, are fundamental determinants of system use in an organization. These constructs also provide better measures for predicting and explaining system use than other constructs (Davis, 1989). TAM has been widely used for predicting the acceptance and use of information systems, and recently has been applied to predict Internet adoption as well. In a recent study, Lederer et al. (2000) adapted TAM to study World Wide Web (WWW) usage and found evidence to support TAM. Another study of applying TAM in the WWW context was conducted by Moon and Kim (2001). They introduced the construct Playfulness to predict Attitude. Data were collected from 152 graduate students of management in Korea. Although the results of findings of test of TAM-related hypotheses showed that they were all supported, the results deviated from the basic belief of TAM that Perceived Usefulness is the key determinant of user acceptance of IT. The results of Moon and Kim (2001) revealed that Perceived Ease of Use has a more significant relationship with Attitude than Perceived Usefulness in the WWW context, and Perceived Playfulness (an intrinsic motivational factor) has a more positive effect on Attitude th an Perceived Usefulness (an extrinsic motivational factor). 2.2. Theoretical Model for IB Adoption IB is a new distribution channel for the delivery of banking services. From both academic and practical perspectives, it is interesting to understand and assess customers intention to use IB services. We have chosen TAM as the baseline model for this study because it is a well-tested model concerning users acceptance of technology. We augment TAM with the construct Perceived Web Security. Specifically, we hypothesize that Intention to Use is influenced by Attitude, Perceived Usefulness, Perceived Ease of Use and Perceived Web Security. We will test the strength of the hypothesized relationships embedded in the theoretical model and the robustness of the model in predicting students intention to adopt IB in Universiti Utara Malaysia Campus. TAM has been used by various researchers to predict users intention to accept or adopt a variety of technologies and computer systems. The technologies include electronic mail, text editor, word processing systems, and graphics software (Davis, 1989; Davis et al., 1989), spreadsheets (Hendrickson et al., 1993), Database Management Systems (Szajna, 1994), voice-mail and word processors (Adams et al., 1992; Chin and Todd, 1995). We use TAM with the constructs Perceived Usefulness and Perceived Ease of Use to assess the determinants of students Attitude and Intention to Use (equivalent to the construct Behavioral Intention in TAM). While we adopt the original TAM in this study, we use Behavioral Intention as the dependent variable and skip the construct Actual Usage. On the theoretical front, an abundance of research studies have reported a strong and significant causal relationship between behavioral intention and usage of technology or targeted behavior (Sheppard et al., 1988; Venkate sh and Morris, 2000). It is therefore theoretically justifiable to use Behavioral Intention as a dependent variable to examine the acceptance of IB (Mathieson, 1991). Agarwal and Prasad (1999) also argued that for a survey-based research design, Behavioral Intention is more appropriate than Actual Usage as they are measured contemporaneously with beliefs and our study is survey-based research. On the practical front, it is worth noting that IB is still at an early stage of development among UUM students. The percentage of usage is not relatively high. Therefore, the choice of Behavioral Intention, rather than Actual Usage, as the dependent variable is considered both appropriate and necessary. In addition, Salisbury et al. (2001) argue that feeling secure in doing transactions on the Web is often cited by users as a major factor that removes their concerns about the efficient use of the Internet for making online purchases. Therefore, we include the construct Perceived Web Security as a predictor of Attitude and Intention to Use, as in the earlier study conducted by Salisbury et al. (2001). In their study, Salisbury et al. (2001) developed a set of four items to measure Perceived Web Security using a 7-point Likert scale. The results of their study showed that the three constructs, namely Perceived Web Security, Perceived Ease of Use and Perceived Usefulness, have a positive relationship with intention to purchase online. However, we will include the construct Attitude in our theoretical model. CHAPTER THREE Research Methodology There exists virtually no research examining UUM students behavioral intention to adopt IB services by extending TAM. To fill this gap, we will conduct a survey study for hypothesis testing using the framework of the original TAM as the foundation to determine the predictors of students Intention to use IB in UUM. To collect data, we will design a questionnaire by adapting the instrument and scales developed for TAM. We will augment TAM by adding the construct Perceived Web Security developed by Salisbury et al. (2001) and adapting their instrument and scale to measure this construct in our questionnaire. 3.1. Sample Size This study aims to investigate the self-reported behaviors of students and their intention to use IB services for their private purposes in UUM. We will request respondents to return their completed questionnaires. We will collect data from UUM students who use internet banking. We will as to fill in the survey questionnaires to a sample of 250 randomly students selected from a total of over 25,000 students in UUM. 3.2. Measurement of the Constructs In devising a useful measurement instrument for this study, we want to adapt an instrument and scales developed and validated in previous studies. We will base on TAM instrument, which has been replicated and widely used in other studies. In this study we use the adapted question items as the instrument to measure the respective constructs below, using a 7-point Likert scale for each item (with 1 = strongly disagree, 2 = disagree, 3 = slightly disagree, 4 = neutral, 5 = slightly agree, 6 = agree, and 7 = strongly agree). The constructs are defined in the following: Perceived Ease of Use (PEOU) defined by Davis (1989) as the degree to which a person believes that using a particular system would enhance his job performance. Perceived Usefulness (PU) defined by Davis (1989) as the degree to which a person believes that using a particular system would be free of effort. Perceived Web Security (PWS) defined by Salisbury et al. (2001) as the extent to which one believes that the World Wide Web is secure for transmitting sensitive information. It is also noted that the adoption of purchasing products on the World Wide Web may involve a greater degree of risk than the adoption of other IT innovations. When one purchases products online, there may be a perception of risk involved in transmitting sensitive information such as credit card numbers across the World Wide Web. Attitude (ATT) refers to an individuals positive or negative feelings (evaluative affect) about performing a particular behavior (Fishbein and Ajzen, 1975). Intention to Use (INT) refers to customers intention to use, as opposed to their actual use of, IB services. 3.3. Survey Questionnaire Based on the hypothesized model developed through a detailed review of the related literature on user acceptance of technology and new technology diffusion, we will devise a questionnaire as a measurement scale for the research. The questionnaire will be developed in English. We will try to make the questionnaire readable and ensure its accuracy and appropriateness. A factor analysis will be performed on the data collected from the pilot study. CHAPTER FOUR FINDINGS Total 85 research questionnaires were distributed to and collected from the respondents in the library building of Universiti Utara Malaysia. The sample period consists of 3 weeks from August 22 to September 12, 2010. Factor analysis was done by using SPSS with the data collected by distributing questionnaires. 4.1. Respondents Demographic Characteristics The analysis of the statistics of the demographic characteristics of the respondents is presented in Table 1. Of the 85 respondents, 47.1% were female and 52.9% male; 37.6% were in the 21-25 age group, 41.2% were 26-30 in age, and 20% were 31-40 in age. As the research was done among master students, any respondent was not under the age of 20, and only one of them was over 40. Table 1 Demographics of respondents Demographic profile Frequency Percentage (%) Gender F Female 40 47.1 M Male 45 52.9 Total 85 100.0 Age A Under 20 0 0 B 21-25 32 37.6 C 26-30 35 41.2 D 31-40 17 20.0 E Over 40 1 1.2 85 100.0 Rogers (1983) has found the characteristics of innovation adopters as having high levels of education, and social status as well as income. Moreover, Gefen (1997) and Teo Lim (2000) by testing the gender differences which affect the awareness of e-mail and the Internet usage, found similar results with Rogers (1983). 4.2. Factor Analysis Using SPSS we conducted our exploratory factor analysis on our survey data. Table 2 presents the rotated factor matrix which is a result from independent variables Varimax rotated principal axis factor extraction. The 1.0 eigenvalue cut-off criterion was used for the independent variables factor extraction. The table points out that five factors which are the variables used for our research emerged and reports their factor loadings. For evaluation of the Cronbachs alpha we tested the data using the SPSS Exploratory Factor Analysis (EFA), where the Cronbachs alpha ranged from 0.896 to 0.914. To ensure convergent validity and item reliability we evaluated each of the items individually. All factor loadings except for b7, b10 and b15 (0.478; 0.424 and 0.486, respectively) were larger than 0.5, which characterize an acceptable significant level of internal validity. The factor loadings vary from 0.554 to 0.744 for Perceived Ease of Use, 0.478 to 0.686 for Perceived Usefulness, 0.424 to 0.642 for Perceived Web Security, 0.486 to 0.536 for Attitude, and 0.539 to 0.621 for Intention to Use. All 19 questionnaire items were held on to further analysis, because all factor loadings were found to be of an acceptable significant level. Table 2 Reliability and factor analysis (from SPSS analysis) Reliability Factor loading Cronbach alpha Variance explained (%) Perceived Ease of Use 0.911 76.920 B/b1-Using the Internet Banking (IB) service is easy for me 0.925 0.594 B/b2-I find my interaction with the IB services clear and understandable 0.929 0.613 B/b3-It is easy for me to become skillful in the use of the IB services 0.925 0.554 B/b4-Overall, I find the use of the IB services easy 0.927 0.744 Perceived Usefulness (PU) 0.914 7.979 B/b5-Using the IB would enable me to accomplish my tasks more quickly 0.929 0.522 B/b6-Using the IB would make it easier for me to carry out my tasks 0.925 0.603 B/b7-I would find the IB useful 0.927 0.478 B/b8-Overall, I would find using the IB to be advantageous 0.926 0.686 Perceived Web Security (PWS) 0.896 7.075 B/b9-I would feel secure sending sensitive information across the IB 0.926 0.575 B/b10-The IB is a secure means through which to send sensitive information 0.927 0.424 B/b11-I would feel totally safe providing sensitive information about myself over the IB 0.924 0.642 B/b12-Overall, the IB is a safe place to transmit sensitive information 0.925 0.639 Attitude (ATT) 0.907 4.772 B/b13-Using the IB is a good idea 0.927 0.536 B/b14-I would feel that using the IB is pleasant 0.928 0.502 B/b15-In my opinion, it would be desirable to use the IB 0.928 0.486 B/b16-In my view, using the IB is a wise idea 0.927 0.508 Intention to Use (IU) 0.906 3.254 B/b17-I would use the IB for my banking needs 0.925 0.621 B/b18-Using the IB for handling my banking transactions is something I would do 0.926 0.551 B/b19-I would see myself using the IB for handling my banking transactions 0.926 0.539 4.3. Reliability test For reliability tests, the Cronbachs alpha ranged from 0.925 to 0.929 for both Perceived Ease of Use and Perceived Usefulness, from 0.924 to 0.927 for Perceived Web Security, while it ranged from 0.927 to 0.928 for Attitude and from 0.925 to 0.926 for Intention to Use. Correlation analyses of variables show that estimation ranges from 0.620 to 0.778 with significant P for all variables as shown in Table 3. Perceived Ease of Use has a direct impact on Perceived Usefulness with 0.000 significant level. Perceived Usefulness, Perceived Ease of Use and Perceived Web Security significantly impacts on Attitude at the 0.000 level. Consequently, Attitude, Perceived Usefulness and Perceived Web Security significantly effect Intention to Use. Table 3 Correlation of variables Estimate P PUà ¢Ã¢â‚¬  Ã‚ PEOU 0.683** 0.000 ATà ¢Ã¢â‚¬  Ã‚ PU 0.680** 0.000 ATà ¢Ã¢â‚¬  Ã‚ PEOU 0.620** 0.000 ATà ¢Ã¢â‚¬  Ã‚ PWS 0.778** 0.000 IUà ¢Ã¢â‚¬  Ã‚ ATT 0.768** 0.000 IUà ¢Ã¢â‚¬  Ã‚ PU 0.642** 0.000 IUà ¢Ã¢â‚¬  Ã‚ PWS 0.735** 0.000 **. Correlation is significant at the 0.01 level (2-tailed). CHAPTER FIVE CONCLUSIONS 5.1 Limitations Since our research was performed with time limitation, as with other crossectional studies, it is not without limitations. A wider study for more fully investigation of the pre-launch stage, the promotion stage and the post-launch stage of IB would surely be an important donation to the IB literature in the future. Our research only covers Web security construction. Future research might concentrate on security and privacy separately, as the latter is arousing rising concentration in the Web literature (Jarvenpaa and Todd, 1997). Moreover, the measurement instrument for Web security could be further developed to increase its validity in future studies. Our research was carried out in Universiti Utara Malaysia among international master students only. It may not represent all the students of UUM, as well as other territories and people. 5.2 Conclusions The findings of our empirical study support the theoretical model implementing TAM and the put up Perceived Web Security. From the results of our study Perceived Ease of Use and Perceived Web Security are supported as predicting variables, which have an effect on intervening variables, Perceived Usefulness and Attitude, and the dependent variable Intention to Use IB. Perceived Usefulness and Perceived Web Security as well as Perceived Ease of Use directly effect Intention to Use. Perceived Web Security effects on Intention to Use directly, rather than passing through Attitude which is the intervening variable. It is consistent with the findings of empirical studies provided earlier (Salisbury et al., 2001). Reference Adams, D.A., Nelson, R.R. and Todd, P.A., 1992. Perceived usefulness, ease of use, and usage of information technology: a replication, MIS Quarterly, 16, 227-247. Agarwal, R., and Prasad, J., 1999. Are individual differences germane to the acceptance of new information technologies? Decision Sciences, 30, 361-391. American Banker, In brief: fast growth for small-biz web banking, American Banker 167 (20) (2002). Brown R.D., E-commerce: customer service success factors, Futurics 25 (2001) 18-30. Chin, W.W. and Todd, P.A., 1995. On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution. MIS Quarterly, 19, 237-246. Davis, F. D., 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 319-336. Davis F.D., Bagozzi R.P. and Warshaw P.R., 1989. User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35, 982-1003. eMarketer, The US B2C Review, 2003, http://www.emarketer.com/estats/081699_data.html http://www.emarketer.com/products/report.php?eglobal (retrieved on 29 August 2003). Fishbein, M.A. and Ajzen, I., 1975. Belief, Intention and Behavior: An introduction to Theory and Research. Addison-Wesley, Reading, Massachusetts. Gefen, D., Karahanna, E. and Straub, D. W., 2003. Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27, 51-90.Hamlet, C. and Strube, M. (2000), Community banks go online, ABA Banking Journals 2000 White Paper/Banking on the Internet, March, pp. 61-5. Hendrickson, A.R., Massey, P.D. and Cronan, T.P., 1993. On the test-retest reliability of perceived usefulness and perceived ease of use scales. MIS Quarterly, 17, 227-230. Hirtle, Beverly J. and Christopher Metli. The Evolution of U.S. Bank Branch Networks: Growth, Consolidation, and Strategy, Federal Reserve Bank of New York, Current Issues in Economic and Finance, July 2004, 10(8). Howcroft, B., Hamilton, R. and Hewer, P. (2002), Consumer attitude and the usage and adoption of home-based banking in the United Kingdom, The International Journal of Bank Marketing, Vol. 20 No. 3, pp. 111-21. Jarvenpaa, S.L. and Todd, P.A., 1997. Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 1, 59-88. Lederer A.L., D.J. Maupin, M.P. Sena, Y.L. Zhuang, 2000. The technology acceptance model and the world wide web, Decision Support Systems 29, 269-282. Mathieson, K., 1991. Predicting user intention: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 173-191 Mattila, M., Karjaluoto, H. and Pento, T. (2003), Internet banking adoption among mature customers: early majority or laggards, Journal of Services Marketing, Vol. 17 No. 5, pp. 514-26. Moe, W.W. and Fader, P.S., 2001. Uncovering patterns in cybershopping. California Management Review, 43, 106-117. Mols, N.P., Bukh, P.N.D. and Nielsen, J.F. (1999), Distribution channel strategies in Danish retail banking, International Journal of Retail Distribution Management, Vol. 27 No. 1, pp. 37-47. Moon, J.W. and Kim, Y.G., 2001. Extending the TAM for a World-Wide-Web context. Information and Management, 38, 217-230. Rogers, E.M., 1995. Diffusion of Innovations, 4th Edition. The Free Press, New York. Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller D.W., 2001, Perceived security and World Wide Web purchase intention. Industrial Management Data Systems, 101, 165-176. Sathye, M., 1999. Adoption of Internet Banking by Australian consumers: an empirical investigation. International Journal of Bank Marketing, 17, 324-334. Sheppard, B.H., Hartwick, J., and Warshaw, P.R., 1988. The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 6, 144-176. Szajna, B., 1994. Software evaluation and choice: predictive validation of the technology acceptance instrument. MIS Quarterly, 18, 319-324. Teo, T.S.H., Lim, V.K.G. and Lai, R.Y.C. (1999), Intrinsic and extrinsic motivation in Internet usage, Omega, International Journal of Management Science, Vol. 27, pp. 25-37. Venkatesh, V. and Morris, M.G., 2000. Why dont men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24, 115-139.

Wednesday, November 13, 2019

South Africa :: essays research papers

AMAGASAKI, Japan - The death toll jumped to 71 Tuesday as crews pulled more victims from the wreckage of Japan's deadliest rail crash in decades. Investigators focused on whether excessive speed or the driver's inexperience caused the train to derail and slam into a building. AP Photo AFP Slideshow: Train Derails in Japan, Dozens Dead Train Derails in West Japan, Killing 50 (AP Video) The seven-car commuter train carrying 580 passengers left the rails Monday morning near Amagasaki, a suburb of Osaka about 250 miles west of Tokyo. It hit an automobile and then a nine-story apartment complex. More than 440 people were injured. Rescuers working under floodlights pulled out a conscious but seriously injured 46-year-old woman then reached a 19-year-old man passenger, also in serious condition. But most of the work was grim as crews pulled 14 more bodies from the twisted rail carriages, pushing the death toll from 57 to 71. Two of the five derailed cars were shoved inside and flattened against the wall of the building's first-floor parking garage. Distraught relatives rushed to hospitals looking for loved ones who might have been injured or killed in the 5:18 a.m. crash. They struggled to comprehend their loss. "I only saw him the night before," said Hiroko Kuki, whose son died in the crash. "I wish he were alive somewhere... I wish it were only a nightmare." Takamichi Hayashi said his elder brother, 19-year-old Hiroki, might be among those still in the wreck. He said Hiroki had called their mother twice on a mobile phone from inside one of the train cars hours after the crash but remained unaccounted for.