{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:05:31Z","timestamp":1761393931005},"reference-count":55,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7,1]]},"abstract":"<p>Perceptions of computer self-efficacy (CSE) and computer anxiety are valuable predictors of various computer-related behaviors, including acceptance and utilization of information systems (IS). Although both factors are purported to have general and application-specific components, little research has focused on the application or system-specific component, especially in IS acceptance contexts. Thus, little is known about the effects of application-specific beliefs on IS acceptance or how such effects compare with the effects of more general CSE and computer anxiety beliefs. Accordingly, a research model comprising application CSE, application anxiety, perceived ease of use, perceived usefulness, attitude, and intention was proposed and tested via path analysis. The results demonstrated that the direct impacts of application CSE and application anxiety on perceived ease of use and perceived usefulness were almost equal, but in opposite directions. However, the indirect effect of application CSE on attitude and intention was stronger than that of application anxiety.<\/p>","DOI":"10.4018\/joeuc.2010070105","type":"journal-article","created":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:15:12Z","timestamp":1277943312000},"page":"82-95","source":"Crossref","is-referenced-by-count":19,"title":["A Path Analysis of the Impact of Application-Specific Perceptions of Computer Self-Efficacy and Anxiety on Technology Acceptance"],"prefix":"10.4018","volume":"22","author":[{"given":"Bassam","family":"Hasan","sequence":"first","affiliation":[{"name":"The University of Toledo, USA"}]},{"given":"Mesbah U.","family":"Ahmed","sequence":"additional","affiliation":[{"name":"The University of Toledo, USA"}]}],"member":"2432","reference":[{"key":"joeuc.2010070105-0","doi-asserted-by":"publisher","DOI":"10.2307\/249577"},{"key":"joeuc.2010070105-1","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"joeuc.2010070105-2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.418.11876"},{"key":"joeuc.2010070105-3","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"joeuc.2010070105-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.010"},{"key":"joeuc.2010070105-5","author":"A.Bandura","year":"1986","journal-title":"Social foundations of thought and action: A social cognitive theory"},{"key":"joeuc.2010070105-6","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(00)00036-4"},{"key":"joeuc.2010070105-7","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.63.6.677"},{"issue":"2","key":"joeuc.2010070105-8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4018\/irmj.2002040102","article-title":"Breaking the myths of rewards: an exploratory study of attitudes about knowledge sharing.","volume":"15","author":"G. W.Bock","year":"2002","journal-title":"Information Resources Management Journal"},{"issue":"2","key":"joeuc.2010070105-9","doi-asserted-by":"crossref","first-page":"81","DOI":"10.17705\/1jais.00046","article-title":"Who\u2019s afraid of the virtual world? The role of anxiety in computer-mediated communication use and satisfaction.","volume":"5","author":"S. A.Brown","year":"2004","journal-title":"Journal of the Association for Information Systems"},{"key":"joeuc.2010070105-10","author":"A.Bryman","year":"1994","journal-title":"Quantitative data analysis for social scientists"},{"key":"joeuc.2010070105-11","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(96)01074-9"},{"issue":"1","key":"joeuc.2010070105-12","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/joeuc.2001010103","article-title":"Influence of computer attitude and self-efficacy on IT usage behavior.","volume":"13","author":"P. Y. K.Chau","year":"2001","journal-title":"Journal of End User Computing"},{"key":"joeuc.2010070105-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.003"},{"key":"joeuc.2010070105-14","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(99)00039-4"},{"key":"joeuc.2010070105-15","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.118"},{"key":"joeuc.2010070105-16","doi-asserted-by":"publisher","DOI":"10.2307\/249749"},{"key":"joeuc.2010070105-17","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"joeuc.2010070105-18","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"joeuc.2010070105-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.10.008"},{"key":"joeuc.2010070105-20","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(97)00032-0"},{"key":"joeuc.2010070105-21","doi-asserted-by":"publisher","DOI":"10.2307\/258514"},{"key":"joeuc.2010070105-22","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(02)00006-X"},{"issue":"1","key":"joeuc.2010070105-23","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1108\/19355181200400007","article-title":"A study of computer anxiety among business students.","volume":"19","author":"D.Havelka","year":"2004","journal-title":"Mid-American Journal of Business"},{"key":"joeuc.2010070105-24","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00079-X"},{"key":"joeuc.2010070105-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.014"},{"key":"joeuc.2010070105-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2003.08.001"},{"key":"joeuc.2010070105-27","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00050-8"},{"key":"joeuc.2010070105-28","doi-asserted-by":"publisher","DOI":"10.1080\/01449299008924239"},{"key":"joeuc.2010070105-29","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(95)00035-6"},{"key":"joeuc.2010070105-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.02.008"},{"key":"joeuc.2010070105-31","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.402.11869"},{"key":"joeuc.2010070105-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.05.003"},{"issue":"50","key":"joeuc.2010070105-33","first-page":"752","article-title":"The technology acceptance model: Past, present, and future.","volume":"12","author":"T. Y.Lee","year":"2003","journal-title":"Communications of the Association for Information Systems"},{"key":"joeuc.2010070105-34","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"joeuc.2010070105-35","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(00)00005-0"},{"issue":"2-3","key":"joeuc.2010070105-36","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1161345.1161354","article-title":"Perceived system performance: A test of an extended technology acceptance model.","volume":"37","author":"L.Liu","year":"2006","journal-title":"The Data Base for Advances in Information Systems"},{"key":"joeuc.2010070105-37","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00059-8"},{"issue":"1","key":"joeuc.2010070105-38","doi-asserted-by":"crossref","first-page":"59","DOI":"10.4018\/joeuc.2004010104","article-title":"The technology acceptance model: A meta-analysis of empirical findings.","volume":"16","author":"Q.Ma","year":"2004","journal-title":"Journal of Organizational and End User Computing"},{"key":"joeuc.2010070105-39","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1102_02"},{"key":"joeuc.2010070105-40","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.126"},{"key":"joeuc.2010070105-41","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.173"},{"key":"joeuc.2010070105-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.06.008"},{"key":"joeuc.2010070105-43","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.12.013"},{"key":"joeuc.2010070105-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.06.002"},{"key":"joeuc.2010070105-45","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.10.007"},{"key":"joeuc.2010070105-46","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00079-X"},{"key":"joeuc.2010070105-47","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.144"},{"key":"joeuc.2010070105-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.11.007"},{"key":"joeuc.2010070105-49","doi-asserted-by":"publisher","DOI":"10.2307\/4132314"},{"key":"joeuc.2010070105-50","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"joeuc.2010070105-51","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1996.tb01822.x"},{"issue":"2","key":"joeuc.2010070105-52","first-page":"28","article-title":"Predicting computer task performance: Personal goal and self-efficacy.","volume":"16","author":"M. U.Yi","year":"2004","journal-title":"Journal of Organizational and End User Computing"},{"key":"joeuc.2010070105-53","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00114-9"},{"key":"joeuc.2010070105-54","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2005.08.006"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=43753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:08:41Z","timestamp":1654096121000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/joeuc.2010070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,7,1]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,7]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2010070105","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"value":"1546-2234","type":"print"},{"value":"1546-5012","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7,1]]}}}