{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T05:54:39Z","timestamp":1760853279123,"version":"3.41.2"},"reference-count":49,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2007,4,24]],"date-time":"2007-04-24T00:00:00Z","timestamp":1177372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4,24]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The primary purpose of this paper is to test and augment the original technology acceptance model (TAM) with three external variables: computer attitude, computer self\u2010efficacy and personality to study the use of the internet of the business executives not addressed previously.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The study is based upon survey approach to collect the primary data from 105 business executives selected randomly. The study tests and augments the proposed model by using structural equation modeling techniques and explained 42 percent of the variance as shared by the three variables. The final model has shown the influence of computer attitude and self\u2010efficacy on the TAM component. Finally, perceived usefulness (PU) directly affects the executives' use of the internet.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results show that computer attitude has a significant effect on perceived ease of use (PEOU). Whereas, computer self\u2010efficacy has significant but negative effect on PU and has a positive and significant effect on PEOU.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The study has its own limitations and suggests that with the inclusion of some more variables<jats:italic>R<\/jats:italic><jats:sup>2<\/jats:sup>could be enhanced and would be further improved by controlling the response biasness due to the self\u2010reported items. The study also lacks direction in assessing the problems faced by the executives at the inter\u2010organizational level.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The study has practical significance as at the inter\u2010organizational level these external variables are under the direct control of the top management and by capitalizing on them through structured training program improved self\u2010efficacy and by adding variety to the task of executives, the management could further expedite the use of the internet.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This preliminary work adds value to the existing knowledge and supports the previous work that PU belief segments have relationship to predict the behavior intentions to use the technology. The study concludes that business executives consider ease of use as a fundamental belief that helps them to achieve the usefulness component of the technology.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637150710740491","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T09:32:22Z","timestamp":1175765542000},"page":"263-278","source":"Crossref","is-referenced-by-count":18,"title":["The influence of external variables on the executives' use of the internet"],"prefix":"10.1108","volume":"13","author":[{"given":"A.H.","family":"Seyal","sequence":"first","affiliation":[]},{"given":"N.A.","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021320475556100_b1","unstructured":"Ajzen, I. and Fishbein, M. (1980), Understanding Attitude and Predicting Social Behavior, Prentice\u2010Hall Inc., Englewood Cliffs, NJ."},{"key":"key2022021320475556100_b45","doi-asserted-by":"crossref","unstructured":"Bagozzi, R.P., Davis, F.D. and Warshaw, P.R. (1992), \u201cDevelopment and test of a theory of technological learning and usage\u201d, Human Relations, Vol. 45 No. 7, pp. 659\u201086.","DOI":"10.1177\/001872679204500702"},{"key":"key2022021320475556100_b2","doi-asserted-by":"crossref","unstructured":"Bandura, A. (1982), \u201cSelf efficacy mechanism in human agency\u201d, American Psychologist, Vol. 37, pp. 122\u201047.","DOI":"10.1037\/0003-066X.37.2.122"},{"key":"key2022021320475556100_b3","doi-asserted-by":"crossref","unstructured":"Campbell, D. and Fiske, D.W. (1959), \u201cConvergent and discriminant validation by the multi\u2010trait, multi\u2010method matrix\u201d, Psychological Bulletin, Vol. 56, pp. 81\u2010105.","DOI":"10.1037\/h0046016"},{"key":"key2022021320475556100_b46","doi-asserted-by":"crossref","unstructured":"Chau, P.Y.K. (1996), \u201cAn empirical assessment of a modified technology acceptance model\u201d, Journal of Management Information Systems, Vol. 13 No. 2, pp. 185\u2010203.","DOI":"10.1080\/07421222.1996.11518128"},{"key":"key2022021320475556100_b5","doi-asserted-by":"crossref","unstructured":"Chau, P.Y.K. (1997), \u201cReexamining a model for evaluating information center success using a structural equation modeling approach\u201d, Decision Science, Vol. 28 No. 2, pp. 309\u201034.","DOI":"10.1111\/j.1540-5915.1997.tb01313.x"},{"key":"key2022021320475556100_b4","doi-asserted-by":"crossref","unstructured":"Chau, P.Y.K. (2001), \u201cInfluence of computer attitude and self\u2010efficacy on IT usage behavior\u201d, Journal of End User Computing, Vol. 13 No. 1, pp. 26\u201033.","DOI":"10.4018\/joeuc.2001010103"},{"key":"key2022021320475556100_b6","doi-asserted-by":"crossref","unstructured":"Chin, W.W. and Todd, P.A. (1995), \u201cOn the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution\u201d, MIS Quarterly, Vol. 19 No. 2, pp. 237\u201046.","DOI":"10.2307\/249690"},{"key":"key2022021320475556100_b7","doi-asserted-by":"crossref","unstructured":"Churchill, G.A.J. (1979), \u201cA paradigm for developing better measures of marketing constructs\u201d, Journal of Marketing Research, Vol. 5, pp. 64\u201073.","DOI":"10.1177\/002224377901600110"},{"key":"key2022021320475556100_b8","doi-asserted-by":"crossref","unstructured":"Compeau, D. and Higgins, C. (1995), \u201cComputer self efficacy: development of a measure and initial test\u201d, MIS Quarterly, Vol. 19, pp. 189\u2010211.","DOI":"10.2307\/249688"},{"key":"key2022021320475556100_b11","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 319\u201040.","DOI":"10.2307\/249008"},{"key":"key2022021320475556100_b13","doi-asserted-by":"crossref","unstructured":"Eysenck, H.J. and Eysenck, S.B.G. (1975), Eysenck Personality Questionnaire, Hodder and Stoughton, Essex.","DOI":"10.1037\/t05462-000"},{"key":"key2022021320475556100_b14","doi-asserted-by":"crossref","unstructured":"Ghani, J.A. and Al\u2010Meer, A.R. (1989), \u201cEffect of end\u2010user computing on job satisfaction: an exploratory study\u201d, Information and Management, Vol. 17, pp. 191\u20105.","DOI":"10.1016\/0378-7206(89)90042-6"},{"key":"key2022021320475556100_b15","doi-asserted-by":"crossref","unstructured":"Ghorab, K.E. (1997), \u201cThe impact of technology acceptance consideration on system usage and adopted level of technological sophistication: an empirical investigation\u201d, International Journal of information Management, Vol. 17 No. 4, pp. 249\u201059.","DOI":"10.1016\/S0268-4012(97)00003-0"},{"key":"key2022021320475556100_b16","doi-asserted-by":"crossref","unstructured":"Harris, R. (1999), \u201cAttitudes towards end\u2010user computing: a structural equation model\u201d, Behavior & Information Technology, Vol. 18 No. 2, pp. 109\u201025.","DOI":"10.1080\/014492999119156"},{"key":"key2022021320475556100_b47","doi-asserted-by":"crossref","unstructured":"Harrison, A.W. and Rainer, R.K. (1992), \u201cThe influence of individual differences on skill in end\u2010user computing\u201d, Journal of Management Information Systems, Vol. 9 No. 1, pp. 93\u2010111.","DOI":"10.1080\/07421222.1992.11517949"},{"key":"key2022021320475556100_b17","doi-asserted-by":"crossref","unstructured":"Howell, J.M. and Higgins, C.A. (1990), \u201cChampions of technological innovation\u201d, Administrative Science Quarterly, Vol. 35, pp. 317\u201041.","DOI":"10.2307\/2393393"},{"key":"key2022021320475556100_b19","doi-asserted-by":"crossref","unstructured":"Hubona, G.S. and Geitz, S. (1997), \u201cExternal variables, beliefs, attitudes and information technology usage behavior\u201d, IEEE, Vol. 3, pp. 21\u20108.","DOI":"10.1109\/HICSS.1997.661560"},{"key":"key2022021320475556100_b18","doi-asserted-by":"crossref","unstructured":"Hubona, G.S. and Kennick, E. (1996), \u201cThe influence of external variables on information technology usage behavior\u201d, In the Proceedings of the 29th Annual Hawaii International Conference on System Sciences, pp. 166\u201075.","DOI":"10.1109\/HICSS.1996.495323"},{"key":"key2022021320475556100_b23","doi-asserted-by":"crossref","unstructured":"Igbaria, M. and Iivari, J. (1995), \u201cThe effects of self\u2010efficacy on computer\u201d, OMEGA, Vol. 23 No. 6, pp. 587\u2010605.","DOI":"10.1016\/0305-0483(95)00035-6"},{"key":"key2022021320475556100_b22","doi-asserted-by":"crossref","unstructured":"Igbaria, M. and Toraskar, K. (1994), \u201cImpact of end\u2010user computing on the individual: an integrated model\u201d, Information Technology & People, Vol. 6 No. 4, pp. 271\u201092.","DOI":"10.1108\/09593849310076286"},{"key":"key2022021320475556100_b48","doi-asserted-by":"crossref","unstructured":"Jackson, C.W., Chow, S. and Leitch, R.A. (1991), \u201cTowards an understanding of the behavioral intention to use an information system\u201d, Decision Sciences, Vol. 28 No. 2, pp. 357\u201089.","DOI":"10.1111\/j.1540-5915.1997.tb01315.x"},{"key":"key2022021320475556100_b24","doi-asserted-by":"crossref","unstructured":"Jawahar, I.M. and Elango, B. (2001), \u201cThe effect of attitudes, goal setting and self\u2010efficacy on end user performance\u201d, Journal of End User Computing, Vol. 13 No. 2, pp. 40\u20105.","DOI":"10.4018\/joeuc.2001040104"},{"key":"key2022021320475556100_b25","doi-asserted-by":"crossref","unstructured":"Kay, R.H. (1993), \u201cAn exploration of theoretical and practical foundation for assessing attitudes toward computer, the computer attitude measure\u201d, Computer in Human Behavior, Vol. 9 No. 4, pp. 371\u201086.","DOI":"10.1016\/0747-5632(93)90029-R"},{"key":"key2022021320475556100_b26","unstructured":"Kelloway, E.K. (1998), Using LISREL for Structural Equation Modeling, Sage, London."},{"key":"key2022021320475556100_b49","doi-asserted-by":"crossref","unstructured":"Marakas, G.M., Yi, M.Y. and Johnson, R.D. (1998), \u201cThe multilevel and multifaceted character of computer self\u2010efficacy: toward clarification of the construct and an integrated framework for research\u201d, Information Systems Research, Vol. 9 No. 2, pp. 126\u201063.","DOI":"10.1287\/isre.9.2.126"},{"key":"key2022021320475556100_b27","unstructured":"Mawhinney, C.H. and Lederer, A.L. (1996), \u201cA study of personal computer utilization by managers\u201d, Information and Management, Vol. 18, pp. 369\u201076."},{"key":"key2022021320475556100_b28","doi-asserted-by":"crossref","unstructured":"Melone, N.P. (1990), \u201cA theoretical assessment of the user\u2010satisfaction construct in information systems research\u201d, Management Science, Vol. 36, pp. 76\u201091.","DOI":"10.1287\/mnsc.36.1.76"},{"key":"key2022021320475556100_b29","doi-asserted-by":"crossref","unstructured":"Pare, G. and Elam, J.J. (1995), \u201cDiscretionary use of the personal computer by knowledge workers: testing of a social psychology theoretical model\u201d, Behavior and Information Technology, Vol. 14, pp. 215\u201028.","DOI":"10.1080\/01449299508914635"},{"key":"key2022021320475556100_b30","doi-asserted-by":"crossref","unstructured":"Pijpers, G.G.M., Bemelmans, T.M.A., Heemstra, F.J. and Montfort, K.A.G.M. (2001), \u201cSenior executives' use of information technology\u201d, Information and Software Technology, Vol. 43, pp. 959\u201071.","DOI":"10.1016\/S0950-5849(01)00197-5"},{"key":"key2022021320475556100_b31","doi-asserted-by":"crossref","unstructured":"Rainer, R.K. Jr and Miller, M.D. (1996), \u201cAn assessment of the psychometric properties of the computer attitude scale\u201d, Computer in Human Behavior, Vol. 12 No. 1, pp. 93\u2010105.","DOI":"10.1016\/0747-5632(95)00021-6"},{"key":"key2022021320475556100_b33","doi-asserted-by":"crossref","unstructured":"Seeley, M.E. and Targett, D. (1997), \u201cA semi executive end\u2010user framework\u201d, Information System Journal, Vol. 7 No. 4, pp. 289\u2010308.","DOI":"10.1046\/j.1365-2575.1997.00019.x"},{"key":"key2022021320475556100_b32","doi-asserted-by":"crossref","unstructured":"Seeley, M.E. and Targett, D. (1999), \u201cPatterns of senior executives' personal use of computers\u201d, Information and Management, Vol. 35 No. 6, pp. 315\u201030.","DOI":"10.1016\/S0378-7206(99)00002-6"},{"key":"key2022021320475556100_b34","doi-asserted-by":"crossref","unstructured":"Segars, A.H. and Grover, V. (1993), \u201cRe\u2010examining perceived ease of use and usefulness: a confirmatory factor analysis\u201d, MIS Quarterly, Vol. 17 No. 4, pp. 517\u201025.","DOI":"10.2307\/249590"},{"key":"key2022021320475556100_b35","doi-asserted-by":"crossref","unstructured":"Sethi, V. and King, W.R. (1994), \u201cDevelopment of measure to access the extent to which an information technology application provides competitive advantages\u201d, Management Science, Vol. 40 No. 12, pp. 1601\u201027.","DOI":"10.1287\/mnsc.40.12.1601"},{"key":"key2022021320475556100_b36","doi-asserted-by":"crossref","unstructured":"Seyal, A.H. and Pijpers, G.G.M. (2004), \u201cSenior government executives use of the internet: a Bruneian scenario\u201d, Behavior and Information Technology, Vol. 21 No. 3, pp. 197\u2010210.","DOI":"10.1080\/01449290410001669978"},{"key":"key2022021320475556100_b38","doi-asserted-by":"crossref","unstructured":"Seyal, A.H., Rahim, M.Md. and Rahman, M.N. (2002a), \u201cDeterminants of academic use of the internet: a structural equation model\u201d, Behavior and Information Technology, Vol. 21 No. 1, pp. 71\u201086.","DOI":"10.1080\/01449290210123354"},{"key":"key2022021320475556100_b39","unstructured":"Seyal, A.H., Rahman, M.N. and Tazraijiman, S. (2002b), \u201cPredicting student use of the internet in bruneian technical colleges: a structural equation model\u201d, Proceedings of the Thirteenth Australasian Conference on Information Systems, Melbourne, 4\u20106 December, pp. 835\u201050."},{"key":"key2022021320475556100_b40","doi-asserted-by":"crossref","unstructured":"Soh, C., Mah, Q.Y., Gan, F.J., Chew, D. and Reid, E. (1997), \u201cThe use of the internet for business: the experience of early adopters in Singapore\u201d, Internet Research, Vol. 7 No. 3, pp. 207\u201028.","DOI":"10.1108\/10662249710171869"},{"key":"key2022021320475556100_b41","doi-asserted-by":"crossref","unstructured":"Taylor, S. and Todd, P. (1995), \u201cUnderstanding information technology usage: a test of competing models\u201d, Information Systems Research, Vol. 6 No. 2, pp. 144\u201076.","DOI":"10.1287\/isre.6.2.144"},{"key":"key2022021320475556100_b42","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. (2000), \u201cDeterminants of perceived ease of use: integrating control, intrinsic motivation and emotion into the technology\u201d, Information Systems Research, Vol. 11 No. 4, pp. 342\u201065.","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"key2022021320475556100_b43","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 425\u201078.","DOI":"10.2307\/30036540"},{"key":"key2022021320475556100_b44","doi-asserted-by":"crossref","unstructured":"Winter, S.J., Chudoba, K.M. and Gutek, B.A. (1998), \u201cAttitudes towards computer: when do they predict computer use?\u201d, Information and Management, Vol. 34, pp. 275\u201083.","DOI":"10.1016\/S0378-7206(98)00065-2"},{"key":"key2022021320475556100_frd1","doi-asserted-by":"crossref","unstructured":"Cragg, P.B. and King, M. (1993), \u201cSmall\u2010firm computing: motivators and inhibitors\u201d, MIS Quarterly, Vol. 17 No. 1, pp. 47\u201060.","DOI":"10.2307\/249509"},{"key":"key2022021320475556100_frd2","doi-asserted-by":"crossref","unstructured":"Cronbach, L.J. (1951), \u201cCoefficient alpha and the internal structure of test\u201d, Psychometrika, Vol. 16, pp. 297\u2010334.","DOI":"10.1007\/BF02310555"},{"key":"key2022021320475556100_frd3","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022021320475556100_frd4","unstructured":"Huboria, G.S. and Cheney, P.H. (1994), \u201cSystems effectiveness of knowledge\u2010based technology: the relationship of user performance and attitudinal measures\u201d, In the Proceedings of the 27th Annual Hawaii International Conference on System Sciences,Vol. 3, pp. 532\u201041."},{"key":"key2022021320475556100_frd5","doi-asserted-by":"crossref","unstructured":"Igbaria, M. and Chakrabarti, A. (1990), \u201cComputer anxiety and attitudes towards microcomputer use\u201d, Behavior and Information Technology, Vol. 9 No. 3, pp. 229\u201041.","DOI":"10.1080\/01449299008924239"},{"key":"key2022021320475556100_frd6","doi-asserted-by":"crossref","unstructured":"Seyal, A.H., Rahim, M.Md. and Rahman, M.N. (2000), \u201cComputer attitudes of non\u2010computing academics: a study of technical colleges in Brunei Darussalam\u201d, Information and Management, Vol. 37, pp. 169\u201080.","DOI":"10.1016\/S0378-7206(99)00045-2"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637150710740491","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710740491\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637150710740491\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:35:58Z","timestamp":1753403758000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/13\/2\/263-278\/258447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4,24]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,4,24]]}},"alternative-id":["10.1108\/14637150710740491"],"URL":"https:\/\/doi.org\/10.1108\/14637150710740491","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2007,4,24]]}}}