{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T14:17:38Z","timestamp":1771942658619,"version":"3.50.1"},"reference-count":55,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,12,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This research aims to investigate the extent and pattern of information and communication technology (ICT) usage by women entrepreneurs in Malaysia, as well as the impact of personal traits on usage.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>All the members of the National Association of Women Entrepreneurs in Malaysia (NAWEM) were surveyed, out of which a 62 percent usable response rate was achieved.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results of the analysis show that slightly above 50 percent of the respondents are using seven out of the eight varieties of systems presented. Seven out of the ten job tasks listed were done using computer technology by more than 60 percent of the respondents. A total of 78 percent of the respondents use basic systems and 48 percent use advanced systems. A total of 92 percent of respondents use systems for administrative purposes, 42 percent for planning, and 52 percent for control purposes. Mean usage differs among racial groups, educational levels, industry type, computer experience, and size of organization (measured by number of employees). Personal traits such as innovativeness and risk\u2010taking propensity are significantly correlated with usage.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper discusses the marketing and other implications of the findings as well as suggesting some marketing approaches.<\/jats:p><\/jats:sec>","DOI":"10.1108\/17410390510628418","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T20:11:04Z","timestamp":1168891864000},"page":"721-739","source":"Crossref","is-referenced-by-count":42,"title":["Malaysian women entrepreneurs: understanding the ICT usage behaviors and drivers"],"prefix":"10.1108","volume":"18","author":[{"given":"Nelson","family":"Oly Ndubisi","sequence":"first","affiliation":[]},{"given":"Cengiz","family":"Kahraman","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020820014665300_b101","doi-asserted-by":"crossref","unstructured":"Adams, D., Nelson, R.R. and Todd, R. (1992), \u201cPerceived usefulness, ease of use, and usage of information technology: a replication\u201d, MIS Quarterly, Vol. 16 No. 2, pp. 227\u201048.","DOI":"10.2307\/249577"},{"key":"key2022020820014665300_b1","doi-asserted-by":"crossref","unstructured":"Bozionelos, N. (1996), \u201cPsychology of computer use: XXXIX. Prevalence of computer anxiety in British managers and professionals\u201d, Psychological Reports, Vol. 78 No. 3, pp. 995\u20101002.","DOI":"10.2466\/pr0.1996.78.3.995"},{"key":"key2022020820014665300_b102","unstructured":"Burch, J.G. (1986), Entrepreneurship, Wiley, New York, NY."},{"key":"key2022020820014665300_b2","unstructured":"Chee, P.L. (1990), Development of Small\u2010Scale Business in Developing Asian Countries \u2013 Policy Environment and Institutional Infrastructure, International Small Business Series 1, University of G\u00f6ttingen, G\u00f6ttingen, pp. 1\u201028."},{"key":"key2022020820014665300_b3","doi-asserted-by":"crossref","unstructured":"Chen, M. (1985), \u201cGender differences in adolescents' uses of attitudes toward computers\u201d, in McLaughlan, M. (Ed.), Communication Yearbook, Vol. 10, Sage Publications, Beverly Hills, CA, pp. 200\u201016.","DOI":"10.1080\/23808985.1987.11678645"},{"key":"key2022020820014665300_b4","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 319\u201039.","DOI":"10.2307\/249008"},{"key":"key2022020820014665300_b5","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022020820014665300_b6","doi-asserted-by":"crossref","unstructured":"DeCarlo, J.F. and Lyons, P.R. (1979), \u201cA comparison of selected personality characteristics of minority and non\u2010minority female entrepreneurs\u201d, Journal of Small Business Management, Vol. 17, pp. 22\u20108.","DOI":"10.5465\/ambpp.1979.4977629"},{"key":"key2022020820014665300_b7","doi-asserted-by":"crossref","unstructured":"Felter, M. (1985), \u201cSex differences on the California Statewide Assessment of Computer Literacy\u201d, Sex Roles, Vol. 13, pp. 181\u201092.","DOI":"10.1007\/BF00287909"},{"key":"key2022020820014665300_b8","unstructured":"Garca, R., Carreras, S., Mancilla, B. and Peacock, S. (1998), \u201cLas mujeres empresarias: una fuerza economica emergente en Mexico\u201d, Center for Women's Business Research, Washington, DC, available at www.womensbusinessresearch.org\/Research\/10\u201028\u20101998\/10\u201028\u20101998.htm."},{"key":"key2022020820014665300_b110","unstructured":"Glick\u2010Smith, J.L. (1999), \u201cWhat are the characteristics of a successful entrepreneur?\u201d, available at: http:\/\/207.17.212.203\/FAQ\/characteristics_successful_entre.html."},{"key":"key2022020820014665300_b9","unstructured":"Harper, D. (1996), Entrepreneurship and the Market Process, Routledge, London."},{"key":"key2022020820014665300_b10","unstructured":"Hennig, M. and Jardim, A. (1977), The Managerial Woman, Anchor Press, Garden City, NY."},{"key":"key2022020820014665300_b109","unstructured":"Henzel, M. (1995), \u201cCoping styles and self\u2010efficacy in women entrepreneurs and managers\u201d, PhD thesis, The Fielding Institute, Santa Barbara, CA."},{"key":"key2022020820014665300_b11","doi-asserted-by":"crossref","unstructured":"Hornaday, J.A. and Aboud, J. (1971), \u201cCharacteristics of successful entrepreneurs\u201d, Personnel Psychology, Vol. 24, pp. 141\u201053.","DOI":"10.1111\/j.1744-6570.1971.tb02469.x"},{"key":"key2022020820014665300_b103","unstructured":"Jacobsen, M.L. (1993), \u201cEssential values and characteristics of entrepreneurial women formerly managers in a corporate setting\u201d, PhD thesis, The Union Institute, Cincinnati, OH."},{"key":"key2022020820014665300_b12","unstructured":"Jantan, M. and Kannan, S. (1997), \u201cInformation technology deployment and competitive advantage of organisations in Penang, Malaysia\u201d, Proceedings of the International Conference on Business Development Strategies in Asia Pacific, Brunei Darussalam, pp. 371\u201086."},{"key":"key2022020820014665300_b100","unstructured":"Jantan, M., Ismail, N., Ramaiyah, T. and Salehuddin, A.H.M. (2001), \u201cThe CEO and AMT adoption in Malaysian small and medium scale manufacturing industries\u201d, Proceedings of the International Conference on Information Technology, Lausanne, Switzerland, March 19\u201022, p. 178MJ."},{"key":"key2022020820014665300_b13","unstructured":"Johansen, R. and Swigart, R. (1996), Upsizing the Individual in the Downsized Organisation: Managing in the Wake of Reengineering, Globalisation, and Overwhelming Technological Change, Addison\u2010Wesley, Reading, MA."},{"key":"key2022020820014665300_b107","doi-asserted-by":"crossref","unstructured":"Kitchell, S. (1997), \u201cCEO characteristics and technological innovativeness: a Canadian perspective\u201d, Journal of Administrative Sciences, Vol. 14 No. 2, pp. 111\u201025.","DOI":"10.1111\/j.1936-4490.1997.tb00123.x"},{"key":"key2022020820014665300_b14","doi-asserted-by":"crossref","unstructured":"Kuruppuarachchi, P.R., Mandal, P. and Ross Smith, R. (2002), \u201cIT project implementation strategies for effective changes: a critical review\u201d, Logistics Information Management, Vol. 15 No. 2, pp. 126\u201037.","DOI":"10.1108\/09576050210414006"},{"key":"key2022020820014665300_b15","doi-asserted-by":"crossref","unstructured":"Landauer, T.K. (1995), The Trouble with Computers: Usefulness, Usability, and Productivity, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/6918.001.0001"},{"key":"key2022020820014665300_b16","unstructured":"Laudon, C.K. and Laudon, J.P. (1997), Essentials of Management Information Systems: Organisation and Technology, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020820014665300_b17","unstructured":"Lincoln, D.J. and Warberg, W.B. (1987), \u201cThe role of micro computers in small business marketing\u201d, Journal of Small Business Management, Vol. 25 No. 2, pp. 8\u201017."},{"key":"key2022020820014665300_b18","unstructured":"Lohr, S. (1997), \u201cInformation technology field is rated largest US industry\u201d, New York Times, November 18."},{"key":"key2022020820014665300_b19","unstructured":"McBer & Co. (1986), Entrepreneurship and Small\u2010Enterprise Development, Second Annual Report to the United States Agency for International Development, March 25, McBer & Co., Boston, MA."},{"key":"key2022020820014665300_b105","doi-asserted-by":"crossref","unstructured":"McClelland, D.C. (1961), The Achieving Society, Wiley, New York, NY.","DOI":"10.1037\/14359-000"},{"key":"key2022020820014665300_b20","doi-asserted-by":"crossref","unstructured":"McGaffey, T.N. and Christy, R. (1975), \u201cInformation processing capability as a predictor of entrepreneurial effectiveness\u201d, Academy of Management Journal, Vol. 18, pp. 857\u201063.","DOI":"10.2307\/255383"},{"key":"key2022020820014665300_b21","unstructured":"MARA (1988), \u201cRole of technology towards entrepreneurial development\u201d, briefing paper for Asian development bank research missions, Majlis Amanah Rakyat, Manila, p. 5."},{"key":"key2022020820014665300_b23","doi-asserted-by":"crossref","unstructured":"Mathieson, K. (1991), \u201cPredicting user intentions: comparing the technology acceptance model with the theory of planned behaviour\u201d, Information Systems Research, Vol. 2 No. 3, pp. 173\u201091.","DOI":"10.1287\/isre.2.3.173"},{"key":"key2022020820014665300_b24","doi-asserted-by":"crossref","unstructured":"Miller, D. (1983), \u201cThe correlates of entrepreneurship in three types of firms\u201d, Management Science, Vol. 29, pp. 770\u201091.","DOI":"10.1287\/mnsc.29.7.770"},{"key":"key2022020820014665300_b25","doi-asserted-by":"crossref","unstructured":"Mirowsky, J. and Ross, C.E. (1990), \u201cControl or defense? Depression and the sense of control over good and bad outcomes\u201d, Journal of Health and Social Behaviour, Vol. 31, pp. 71\u201086.","DOI":"10.2307\/2137046"},{"key":"key2022020820014665300_b26","unstructured":"Moore, G.A. (1991), Crossing the Chasm: Marketing and Selling Technology Products to Mainstream Customers, HarperCollins, New York, NY."},{"key":"key2022020820014665300_b27","doi-asserted-by":"crossref","unstructured":"Morrow, P.C., Presll, E.R. and McElroy, J.C. (1986), \u201cAttitudinal and behavioural correlates of computer anxiety\u201d, Psychological Reports, Vol. 59, pp. 1199\u2010204.","DOI":"10.2466\/pr0.1986.59.3.1199"},{"key":"key2022020820014665300_b28","doi-asserted-by":"crossref","unstructured":"Ndubisi, N.O. and Jantan, M. (2003), \u201cEvaluating IS usage in Malaysian small and medium\u2010sized firms using the technology acceptance model\u201d, Logistics Information Management, Vol. 16 No. 6, pp. 440\u201050.","DOI":"10.1108\/09576050310503411"},{"key":"key2022020820014665300_b30","unstructured":"Ndubisi, N.O. and Richardson, S. (2002), \u201cThe entrepreneurs' technology acceptance model\u201d, Academy of Entrepreneurship Journal, Vol. 8 No. 2, pp. 95\u2010114."},{"key":"key2022020820014665300_b29","unstructured":"Ndubisi, N.O., Jantan, M. and Richardson, S. (2001), \u201cIs the technology acceptance model valid for entrepreneurs? Model testing and examining usage determinants\u201d, Asian Academy of Management Journal, Vol. 6 No. 2, pp. 31\u201054."},{"key":"key2022020820014665300_b31","doi-asserted-by":"crossref","unstructured":"Patel, N.V. and Irani, Z. (1999), \u201cEvaluating information technology in dynamic environments: a focus on tailorable information systems\u201d, Logistics Information Management, Vol. 12 No. 1, pp. 32\u20109.","DOI":"10.1108\/09576059910256231"},{"key":"key2022020820014665300_b32","unstructured":"Peacock, S. (1997), \u201cWomen entrepreneurs embrace the internet and information technology\u201d, Center for Women's Business Research, Washington, DC, available at: www.womensbusinessresearch.org\/Research\/9\u201030\u20101997\/9\u201030\u20101997.htm."},{"key":"key2022020820014665300_b33","unstructured":"Peacock, S. (1998), \u201cWomen entrepreneurs worldwide voice optimism\u201d, Center for Women's Business Research, Washington, DC, available at: www.womensbusinessresearch.org\/Research\/3\u20103\u20101998\/3\u20103\u20101998.htm."},{"key":"key2022020820014665300_b34","unstructured":"Peacock, S. (1999), \u201cCharacteristics of women entrepreneurs worldwide are revealed\u201d, Center for Women's Business Research, Washington, DC, available at: www.womensbusinessresearch.org\/Research\/3\u20105\u20101999\/3\u20105\u20101999.htm."},{"key":"key2022020820014665300_b35","unstructured":"Rotter, G.S. and Portugal, S.M. (1969), \u201cGroup and individual effects in problem solving\u201d, Journal of Applied Psychology, Vol. 31, pp. 537\u201047."},{"key":"key2022020820014665300_b108","unstructured":"Schumpeter, J.A. (2000), \u201cEntrepreneur online encyclopaedia\u201d, available at: www.encyclopadeia.com\/articles\/11586.html#columbia."},{"key":"key2022020820014665300_b36","doi-asserted-by":"crossref","unstructured":"Sexton, D.L. and Bowman, N. (1983), \u201cDetermining entrepreneurial potential of students\u201d, Academy of Management Proceedings, Vol. 42, pp. 408\u201012.","DOI":"10.5465\/ambpp.1983.4976385"},{"key":"key2022020820014665300_b37","unstructured":"Sexton, D.L. and Bowman, N. (1984), \u201cPersonality inventory for potential entrepreneurs: evaluation of a modified JPI\/PRF\u2010E test instrument\u201d, in Hornaday, J.A. and Aboud, J. (Eds), Frontiers of Entrepreneurial Research, Centre for Entrepreneurial Studies, Babson College, Wesley, MA."},{"key":"key2022020820014665300_b38","unstructured":"Sichel, D.E. (1997), The Computer Revolution: An Economic Perspective, The Brookings Institution, Washington, DC."},{"key":"key2022020820014665300_b106","unstructured":"Stevenson, H.H. (1983), \u201cA perspective on entrepreneurship\u201d, in Kao, J. (Ed.), The Entrepreneur, Routledge, London, pp. 166\u201076."},{"key":"key2022020820014665300_b39","unstructured":"Taib, K. (1994), \u201cOpportunities \u2013 the world available to women\u201d, paper presented at the Women in Management Seminar, Kuala Lumpur, July 27\u201028."},{"key":"key2022020820014665300_b40","unstructured":"Tan, S.P. (1990), \u201cSmall firm: definition, growth factors, and their role in economic development\u201d, Malaysian Management Review, Vol. 25 No. 2, pp. 1\u20108."},{"key":"key2022020820014665300_b41","doi-asserted-by":"crossref","unstructured":"Taylor, S. and Todd, P. (1995), \u201cUnderstanding information technology usage: a test of competing models\u201d, Information Systems Research, Vol. 6 No. 2, pp. 144\u201076.","DOI":"10.1287\/isre.6.2.144"},{"key":"key2022020820014665300_b43","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Morris, M.G. and Ackerman, P.L. (2000), \u201cA longitudinal field investigation of gender differences in individual technology adoption decision making processes\u201d, Organisational Behaviour and Human Decision Processes, Vol. 83, pp. 33\u201060.","DOI":"10.1006\/obhd.2000.2896"},{"key":"key2022020820014665300_b44","doi-asserted-by":"crossref","unstructured":"Weiner, M. (1993), \u201cSome computer science issues in ubiquitous computing\u201d, Communications of the ACM, Vol. 36 No. 7.","DOI":"10.1145\/159544.159617"},{"key":"key2022020820014665300_b104","unstructured":"Wells, S.J. (1994), \u201cLearning and leadership development of women entrepreneurs: and exploratory discussion\u201d, EDD dissertation, North Carolina State University, Raleigh, NC."},{"key":"key2022020820014665300_b45","unstructured":"Yonekura, S. (1984), \u201cEntrepreneurship and innovative behaviour of Kawasaki Steel: the post\u2010World War II period\u201d, Discussion Paper No. 120, Institute of Business Research, Hitotsubashi University, Tokyo."},{"key":"key2022020820014665300_b46","unstructured":"Zain, N.M. (1998), \u201cStrategic use of information technology: a conceptual approach\u201d, Asian Academy of Management Journal, Vol. 3 No. 2, pp. 83\u201096."}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/17410390510628418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17410390510628418\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17410390510628418\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:19:00Z","timestamp":1753402740000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/18\/6\/721-739\/207417"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,1]]},"references-count":55,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2005,12,1]]}},"alternative-id":["10.1108\/17410390510628418"],"URL":"https:\/\/doi.org\/10.1108\/17410390510628418","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2005,12,1]]}}}