Academia.eduAcademia.edu

Outline

Voter's Intention to Use Electronic Voting Systems

https://doi.org/10.4018/IJEBR.2017070102

Abstract

Electronicgovernmentinitiativesplayacentralroleinopeningdoorsforpotentialvoterstoparticipate in the political process by using electronic voting systems. Electronic voting is attracting more attentionbygovernmentsaroundtheworld,wheremanycountrieshaveexploitede-votingsystemsas analternativetotraditionalvotingintheirnationalelections.Citizensdifferintheirattitudetowards usinge-voting.Thisstudyextendedthetechnologyacceptancemodeltopredicttheintentionsto usee-voting.Thispaperexploredtheintentionsofcitizenstousee-votingsystemsbyconducting anempiricalresearch.Toaccomplishthemainobjectivesofthispaper,320surveyswerecollected fromJordaniancitizens.Thefindingsindicateasignificantinfluenceofperceivedusefulnessand perceivedeaseofuseandsecurity.Trustfailedtopredictintentionstousee-votingsystems.

References (54)

  1. Abandah,G.,Darabkh,K.,Ammari,T.,&Qunsul,O.(2014).SecureNationalElectronicVotingSystem.Journal of Information Science and Engineering,30,1339-1364.
  2. Abu-Shamaa,R.,Abu-Shanab,E.,&Khasawneh,R.(2016).PaymentMethodsandPurchaseIntentionfrom Online Stores: An Empirical Study in Jordan. International Journal of E-Business Research, 12(2), 31-44. doi:10.4018/IJEBR.2016040103
  3. Abu-Shanab, E. (2014). Antecedents of Trust in E-Government Services: An Empirical Test in Jordan. TransformingGovernment:People.Process and Policy,8(4),480-499.
  4. Abu-Shanab,E.(2015,October).ReengineeringtheOpenGovernmentConcept:AnEmpiricalSupportfora ProposedModel.Government Information Quarterly,32(4),453-463.doi:10.1016/j.giq.2015.07.002
  5. Abu-Shanab,E.,&Al-Dalou,R.(2016).AnEmpiricalStudyofE-participationLevelsinJordan.International Journal of Information Systems and Social Change,7(1),63-79.doi:10.4018/IJISSC.2016010104
  6. Abu-Shanab,E.,Knight,M.,&Refai,H.(2010).E-votingSystems:AToolforE-Democracy.Management Research and Practice,2(3),264-274.
  7. Achieng,M.,&Ruhode,E.(2013).TheAdoptionandChallengesofElectronicVotingTechnologieswithinthe SouthAfricanContext.International Journal of Managing Information Technology,5(4),1-12.doi:10.5121/ ijmit.2013.5401
  8. Al-Ameen,A.,&Talab,S.(2013).ThetechnicalFeasibilityandSecurityofE-Voting.The International Arab Journal of Information Technology,10(4),397-404.
  9. Al-Zoubi,M.,Sam,T.,&Eam,L.(2011).AnalysisofE-GovernmentAdoptionandOrganizationPerformance intheJordanBusinessesSector.Academic Research International,1(3),334-348.
  10. Alaaraj, H., & Ibrahim, F. (2014). The Mediating Effect of Employees Trust on E-Government and Good GovernanceinthePublicSectorofDevelopingCountries.International Journal of Learning & Development, 4(3),92-103.doi:10.5296/ijld.v4i3.6460
  11. Aladwaan,A.(2014).JordanianPopularPoliticalActivityandtheNationalSecurity.World Applied Sciences Journal,32(4),704-717.
  12. Alateyah,S.,Crowder,R.,&Wills,G.(2012).TowardsanIntegratedModelforCitizenAdoptionofE-Government Services.International Journal of Information Technology & Computer Sciences,6,47-57.
  13. Alathur,S.,Ilavarasan,P.V.,&Gupta,M.P.(2016).Determinantsofe-participationinthecitizensandthe government initiatives: Insights from India. Socio-Economic Planning Sciences, 55, 25-35. doi:10.1016/j. seps.2016.04.005
  14. Alenezi,H.,Tarhini,A.,&Sharma,S.(2015).Developmentofquantitativemodeltoinvestigatethestrategic relationshipbetweeninformationqualityande-governmentbenefits.TransformingGovernment:People.Process and Policy,9(3),324-351.
  15. Alsmadi, I. & Abu-Shanab, E. (2016). E-government Website Security Concerns and Citizens' Adoption. Electronic Government, an International Journal,12(3),243-255.
  16. Alvarez,R.,Katz,G.,&Pomares,J.(2011).TheimpactofNewTechnologiesonVoterConfidenceinLatin America:EvidencefromE-VotingExperimentsinArgentinaandColombia.Journal of Information Technology & Politics,8(2),199-217.doi:10.1080/19331681.2011.559739
  17. Ammonnews.net.(2016).TheRoyaldesignationletterforDR.HaniAl-MulkiGovernment(inArabic).Retrieved fromhttp://www.ammonnews.net/article.aspx?articleno=270668
  18. Ashraf,A.,Thongpapanl,N.,&Auh,S.(2014).TheApplicationoftheTechnologyAcceptanceModelUnder DifferentCulturalContexts:TheCaseofOnlineShoppingAdoption.Journal of International Marketing,22(3), 68-93.doi:10.1509/jim.14.0065
  19. Avgerou,C.(2013).ExplainingTrustinIT-MediatedElections:ACaseStudyofE-VotinginBrazil.Journal of the Association for Information Systems,14(8),420-451.
  20. Biswas,S.(2015).GSMVerificationBasedSecureE-VotingFramework.InternationalJournalofu-ande-Service. Science and Technology,8(1),231-238.
  21. Brislin, R. (1976). Comparative research methodology: Cross-cultural studies. International Journal of Psychology,11(3),215-229.doi:10.1080/00207597608247359
  22. Carter,L.,&Campbell,R.(2011).TheImpactofTrustandRelativeAdvantageofInternetVotingDiffusion. Journal of Theoretical and Applied Electronic Commerce Research, 6(3), 28-42. doi:10.4067/S0718- 18762011000300004
  23. Choi,S.,&Kim,B.(2012).VoterIntentiontoUseE-VotingTechnologies:Security,TechnologyAcceptance, ElectionType,andPoliticalIdeology.Journal of Information Technology & Politics,9(4),433-452.doi:10.1 080/19331681.2012.710042
  24. Davis,D.(1989).PerceivedUsefulness,PerceivedEaseofUse,andUserAcceptanceofInformationTechnology. Management Information Systems Quarterly,13(3),319-340.doi:10.2307/249008
  25. Deakins, E., Dillon, S., Al-Namani, H., & Zhang, C. (2010). Local E-Government Impact in China, New Zealand,Oman,andtheUnitedKingdom.International Journal of Public Sector Management,23(6),520-534. doi:10.1108/09513551011069004
  26. Delaune,S.,Kremer,S.,&Ryan,M.(2009).VerifyingPrivacy-TypePropertiesofElectronicVotingProtocols. Journal of Computer Security,17(3),435-487.doi:10.3233/JCS-2009-0340
  27. Dillon, S., Buchanan, J., & Al-Otaibi, K. (2014). Perceived Risk and Online Shopping Intention: A Study AcrossGenderandProductType.International Journal of E-Business Research,10(4),17-38.doi:10.4018/ ijebr.2014100102
  28. DoS.(2012).InformationTechnologyuseathomesSurvey.Retrievedfromhttp://www.dos.gov.jo/dos_home_a/ main/Analasis_Reports/it_tech/tech_2012.pdf
  29. Druckman, J., & Kim, C. (2009). Students as Experimental Participants: A Defense of the "Narrow Data Base".InstituteforPolicyResearch,NorthwesternUniversity.Retrievedfromhttp://www.ipr.northwestern.edu/ publications/docs/workingpapers/2009/IPR-WP-09-05.pdf
  30. El-Qawasmeh,E.,&Owais,S.(2010).E-DemocracyinMiddleEast:HardtoApproach.Journal of Theoretical and Applied Information Technology,12(1),57-63.
  31. Fador,A.(2014).InnovationandTechnologyAcceptanceModel(TAM):ATheoreticalApproach.Romanian Journal of Marketing,2,59-65.
  32. Hair,J.,Anderson,R.,Tatham,R.,&Black,W.(1998).Multivariate Data Analysis.UpperSaddleRiver,New Jersey:PrenticeHall,Inc.
  33. Haziemeh,F.,Khazaaleh,M.,&Al-Talafha,K.(2011).NewAppliedE-VotingSystem.Journal of Theoretical and Applied Information Technology,25(2),88-97.
  34. Henry, S. (2003). Can remote Internet voting increase turnout? Aslib Proceedings, 55(4), 193-202. doi:10.1108/00012530310486557
  35. Jafari,S.,Karimpour,J.,&Bagheri,N.(2011).AnewSecureandPracticalElectronicVotingProtocolwithout RevealingVoters.International Journal on Computer Science and Engineering,3(6),2191-2199.
  36. Jaradat,M.(2013).Applyingthetechnologyacceptancemodeltotheintroductionofmobilevoting.International Journal of Mobile Learning and Organization,7(1),29-47.doi:10.1504/IJMLO.2013.051572
  37. Kachwamba,M.(2011).ImpactofE-GovernmentonTransactionCostandFDIInflows:AProposedConceptual Framework.International Journal of Business and Management,6(11),285-296.doi:10.5539/ijbm.v6n11p285
  38. Khasawneh,R.,Rabayah,W.,&Abu-Shanab,E.(2013,May8-10).E-GovernmentAcceptanceFactors:Trustand Risk.Proceedings of the 6 th International Conference on Information Technology (ICIT '13),Amman,Jordan.
  39. Kumar, A., Sikdar, P., & Alam, M. (2016). E-Retail Adoption in Emerging Markets: Applicability of an Integrated Trust and Technology Acceptance Model. International Journal of E-Business Research, 12(3), 44-67.doi:10.4018/IJEBR.2016070104
  40. Kuye,C.,Coker,J.,Ogundeinde,I.,&Coker,C.(2013).DesignandAnalysisofElectronicVotingSystemin Nigeria.International Archive of Applied Science and Technology,4(2),15-20.
  41. Lee,T.,Park,C.,&Jun,J.(2014).TwoFacesofMobileShopping:Self-EfficacyandImpulsivity.International Journal of E-Business Research,10(1),15-32.doi:10.4018/ijebr.2014010102
  42. Li,C.,&Hwang,M.(2012).SecurityEnhancementofChange-LeeAnonymousE-VotingScheme.International Journal of Smart Home,6(2),45-51.
  43. Li,C.,&Hwang,M.(2013).ASecureandAnonymousElectronicVotingSchemeBasedonKeyExchange Protocol.International Journal of Security and Its Applications,7(1),59-70.
  44. Moynihan,D.(2004).BuildingSecureElections:E-Voting,Security,andSystemsTheory.Public Administration Review,64(5),515-528.doi:10.1111/j.1540-6210.2004.00400.x
  45. Nabavi,A.,Taghavi-Fard,T.,Hanafizadeh,P.,&Taghva,M.R.(2016).InformationTechnologyContinuance Intention:ASystematicLiteratureReview.International Journal of E-Business Research,12(4),1-22.
  46. Nguyen, T., & Dang, T. (2013). Enhanced Security in Internet Voting Protocol Using Bling Signature and DynamicBallots.Electronic Commerce Research,13(3),257-272.doi:10.1007/s10660-013-9120-5
  47. Nu'man,A.(2012).AFrameworkforAdoptingE-VotinginJordan.Electronic Journal of E-Government,10(2), 133-146.
  48. Papagiannidis,S.,&Manika,D.(2016).PoliticalParticipationandEngagementviaDifferentOnlineandOffline Channels.International Journal of E-Business Research,12(1),58-95.
  49. Patil,M.,Pimplodkar,V.,Zade,A.,Vibhute,V.,&Ghadge,R.(2013).ASurveyonVotingSystemTechniques. International Journal of Advanced Research in Computer Science and Software Engineering,3(1),114-117.
  50. Peterson,R.,&Merunka,D.(2014).Conveniencesamplesofcollegestudentsandresearchreproducibility. Journal of Business Research,67(5),1035-1041.doi:10.1016/j.jbusres.2013.08.010
  51. Puiggali-Allepuz,J.,&Guasch-Castello,S.(2010).PrivacyandAnonymityManagementinElectronicVoting. The European Journal for Informatics Professional,6(1),59-65.
  52. Tarhini,A.,Arachchilage,N.,Masadeh,R.,&Abbasi,M.(2015).CriticalReviewofTheoriesandModelsof TechnologyAdoptionandAcceptanceinInformationSystemResearch.International Journal of Technology Diffusion,6(4),58-77.doi:10.4018/IJTD.2015100104
  53. Wong,K.,Osman,R.,Goh,P.,&Rahmat,M.(2013).UnderstandingStudentTeachers'BehavioralIntention toUseTechnology:TechnologyAcceptanceModel(TAM)ValidationandTesting.International Journal of Instruction,6(1),89-104.
  54. WorldEconomicForum.(2014).TheGlobalInformationTechnologyReport2014.Retrievedfromhttp://www. weforum.org/reports/global-information-technology-report-2014