Beruflich Dokumente
Kultur Dokumente
a r t i c l e i n f o a b s t r a c t
Article history: Cloud computing technology use in higher education institutions is rapidly expanding and becoming a
Received 13 December 2015 more integral part of the collegiate experience. This expansion of the use of cloud applications comes with
Received in revised form some significant learning and adoption challenges to the end users along with the technical advantages
23 September 2016
that allow greater accessibility and ease of use. The influence of individual user perceptions toward these
Accepted 17 December 2016
technologies is an issue that merits further investigation. Several technology acceptance models have
Available online 3 January 2017
demonstrated some degree of success in predicting adoption behaviors utilizing individual user traits
and beliefs. However, there have been limited investigations of variables after the technology has been
Keywords:
Cloud computing
implemented and used. This paper focuses on the associations between variables identified in the litera-
Higher education ture that are considered to be influencing use and perceptions of technology for undergraduate students
Usefulness of technology at a mid-sized university in Southeast Michigan. The results statistically present signifi-
Self-efficacy cant correlations between each measured variable and support the interaction between perceived ease
Computer anxiety of use, computer anxiety, computer self-efficacy, and internet self-efficacy with the perceived usefulness
of cloud applications in a higher education setting.
© 2017 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.jocs.2016.12.007
1877-7503/© 2017 Elsevier B.V. All rights reserved.
174 S. Ashtari, A. Eydgahi / Journal of Computational Science 23 (2017) 173–180
computing, service-oriented computing and market-oriented com- promote their own needs and may actually be viewed as competi-
puting add complications to the efforts for creating a standardized tors to one another.
cloud computing definition and methodology. A public cloud is the most common form of cloud deployment
The National Institute of Standards and Technology (NIST) with which students, instructors or faculty have experience. In a
defines cloud computing as a model for enabling ubiquitous, conve- public cloud deployment, the service provider has full ownership
nient, on-demand network access to a shared pool of configurable of the infrastructure. Many of the most popular cloud services fit
computing resources (e.g., networks, servers, storage, applications into the public cloud deployment model. These services include
and services) that can be rapidly provisioned and released with Amazon EC2, Amazon S3, Google Drive, and Microsoft One Drive.
minimal management effort or service provider interaction [3]. In The final deployment model, hybrid cloud, is a combination
[4], cloud computing is referred to as a new operation rather than of two or more of the other cloud deployment models (private,
a new technology. Furthermore, cloud computing is actually a set community, or public) that aims to address the limitation of each
of existing technologies that are operating businesses in a differ- approach by combining different aspects of each model. As a gen-
ent way [4]. In [5], cloud computing is defined as a convergence of eral rule, hybrid cloud deployments have more flexibility and range
grid computing, utility computing and software-as a-service (SaaS), of use than either public or private clouds.
which is a new concept of cloud computing. In [6], the design of
next generation data centers is introduced as an objective for cloud 2.2. Cloud computing for education
technology application. It is argued that by intentionally designing
data centers as networks of virtual services (hardware, database, The advantages that cloud computing can provide to educators
user-interface, application logic), users could gain access to their and students make it an attractive option in university envi-
applications from everywhere. ronments. The ability to collaboratively share, edit, process, and
store huge amounts of data have obvious applications within the
research and educational communities. Another distinct advantage
2.1. Cloud computing services and deployment models to users of cloud computing is the availability and ease of access
using their own equipment, mobile devices, university equipment,
Based on [3] cloud computing can be viewed as a triad of ser- or some combination of these options at whatever time or place
vice models consisting of Software as a Service (SaaS), Platform they find most beneficial.
as a Service (PaaS) and Infrastructure as a Service (IaaS). The SaaS In [9], one of the main characteristics of cloud computing is
model of cloud computing involves the cloud provider offering the identified as economies of scale. This feature assures cloud services
application to the end user on or through a cloud infrastructure. In could be delivered at a lower cost when compared with in-house
this case the consumer does not manage or control the underlying mainframe computers, networks, and computer infrastructure that
cloud infrastructure including network, servers, operating systems, are expected to be provided by the educational institutions. As
or data storage. Cloud applications using the SaaS model can either stated in [10], applying information technology tools could pro-
be accessed through a program interface in the way that Drop- vide access to more resources in a global scale and as a result could
box works or directly through a client interface as is the case with increase the quality of learning. Additionally, the use of information
web-based email like Gmail. technology resources, including cloud computing, could reduce the
PaaS model of cloud computing provides the consumer a cost of resource usages and ease the sustainability of education.
platform to deploy applications into the wider existing cloud infras- Learning needs of a new generation of students are different
tructure. PaaS gives the end user a space to build their own from their predecessors [11]. As a result, they favor increased use
application using shared languages, libraries and services that are of technology and its successful applications. The cloud comput-
either supplied or supported by the cloud platform provider. Exam- ing applications can benefit students by providing them with quick
ples of this model include Heroku and the Google App Engine. connections to the core materials and with each other. According to
The IaaS cloud technology model provides the processing, stor- [11], cloud computing can provide higher educations with the fol-
age, networks, and other fundamental computing resources that lowing benefits: (a) allowing for the use of the users own personal
allow consumers to deploy and run the software of their choice. workspace; (b) facilitating interactive teaching and learning com-
This can include programs and application and can even extend munities; (c) no need for backup due to shared cloud storage; and
to running operating systems via the cloud infrastructure service. (d) the availability of large amounts of processing power. Cloud
Amazon Web Services and Microsoft Azure are prominent exam- computing can also provide a digital learning environment, per-
ples of the IaaS providers. sonal portfolio, and web-based self-service options for students and
In [3], four distinct deployment models for cloud technology faculty alike.
applications namely private cloud, community cloud, public cloud The potential gains that cloud computing can bring to the higher
and hybrid cloud are described. Based on [8], a private cloud is learning environments are numerous while the potential risks
operated solely within a single organization and either the organi- include the concerns about security, privacy, and issues related to
zation or a third party could manage the infrastructure. Concerns the reliability and performance of the technology [12]. Cloud com-
about security issues are one of the main reasons for choosing a pri- puting can also provide a digital learning environment, personal
vate cloud deployment model in an organization [8]. In an academic portfolio, and web-based self-service options for students and fac-
setting, the ability to build a private cloud to keep proprietary mate- ulty alike. In [12], the benefits of cloud computing for students are
rials secured and to facilitate an online educational community are described as: (a) ubiquitous availability of online applications; (b)
another advantage of a private cloud deployment. flexibility to create structured learning environments; (c) support
In community cloud, several organizations jointly use the same for mobile learning; and (d) scalability
cloud infrastructure and a third party or one of the organizations Eastern Michigan University (EMU) began using web-based
could host the infrastructure. The advantages of a shared cloud online course materials and class interfaces in 1999. This effort was
include minimizing loss or failure risks by spreading the resources on the margins of cloud computing, but as an early adopter, EMU
and decreasing costs by utilizing shared scalable resources. At the continued to expand the online, and eventually cloud supported,
same time, to be successful, sharing resources requires a higher course support applications and resources. Each successive version
degree of agreement and cooperation, which can be a challenge added more functionality and relied more heavily on cloud com-
among higher education institutions that are each trying to best puting to meet the needs of the largely commuter student body.
S. Ashtari, A. Eydgahi / Journal of Computational Science 23 (2017) 173–180 175
technology than the benefits they may gain from its use. In [26], it H6. Internet self-efficacy has a stronger association to the per-
was demonstrated that successful or positive experiences with sim- ceived usefulness of cloud-based applications than computer
ilar technologies may increase the self-efficacy of users for related self-efficacy.
technologies.
H7a. The combined scale of Information Technology Self-efficacy,
While we contend that the skills and experiences using a per-
which is comprised of Computer Self-efficacy and Internet Self-
sonal computer are similar to those necessary to successfully adapt
efficacy has a stronger association with the perceived usefulness
cloud-based computing, there are sufficient differences between
of cloud-based applications than the computer self-efficacy scale
cloud computing and desktop based applications that require addi-
alone.
tional factors to be considered when evaluating user self-efficacy.
Since the majority of cloud computing services relate to tasks on H7b. The combined scale of Information Technology Self-efficacy,
the cloud or internet, it was determined that splitting the tech- which is comprised of Computer Self-efficacy and Internet Self-
nology self-efficacy scale into component subscales of computer efficacy has a stronger association with the perceived usefulness of
self-efficacy and internet self-efficacy would be a more meaningful cloud-based applications than the internet self-efficacy scale alone.
examination of the user perceptions.
In [27], an instrument as the extension of computer self-efficacy 4. Methodology
scale is developed, which focuses in the World Wide Web domain
and the internet. The internet self-efficacy scale is multidimen- In this study, the definition of cloud computing is close to the one
sional and measures the capabilities of the end user in interacting proposed by the NIST [3], in which those aspects that all cloud com-
with the internet. Also, it adds that the function of end-user self- puting applications must have in common are considered. Thus,
efficacy has more impact on technology use than aspects of how cloud computing in this study refers to the shared applications and
the technology is designed. services that the surveyed students were using via the internet to
manage application activities or to access data stored on shared
3.2. Computer anxiety servers.
In [28], it is suggested that cloud computing is one of the pop- 4.1. Sample
ular technologies of our time, but it is also the one that elicits the
most fear among users. Cloud computing users have greater safety The sample was limited to undergraduate students enrolled in
and security concerns compared with users of other technologies the College of Technology at Eastern Michigan University. The par-
[29]. Also, it was recommended in [29] that the cloud platforms ticipants were from two sections of an introduction to engineering
should devote more effort to convincing users of the safety of the technology course. A total of 40 students were invited to partici-
applications. Based on [28], the fear of cloud computing has left pate in the survey; the response rate was 100.0% (n = 40). None of
many users confused about their options and in a state of hesita- the undergraduates surveyed were excluded from the analysis. The
tion as participants indicated that they did not trust the cloud to survey is included in Appendix A.
keep their information safe and that perceived risk resulted in fear
of use. It was suggested in [26] that the major factors influencing 4.2. Measures
apprehension relating to cloud computing are concerns relating to:
(a) privacy; (b) fears relating to loss of access to the data; and (c) The survey consisted of five demographic items, and 36 Likert-
traditional informational technology security concerns like unau- type items divided into six Likert scales: (1) Cloud-Computing
thorized access and loss relating to breaches of security. Usage; (2) Perceived Usefulness; (3) Perceived Ease of Use; (4)
According to [30], computer anxiety was defined as a complex Computer Self Efficacy; (5) Internet Self Efficacy; and (6) Computer
interplay of behavioral, emotional and attitudinal components. In Anxiety.
[31], computer anxiety is a resistance to talking about computers or The scales for measuring the constructs are developed by uti-
even thinking about computers, fear or anxiety towards comput- lizing items from previously validated scales so that they are
ers, and hostile or aggressive thoughts about computers. Based on more suitable for the cloud computing applications. The aggre-
[32], computer anxiety refers to negative emotions and cognitions gated Information Technology Self-Efficacy scale consists of the
evoked in actual or imaginary interactions with computer-based items from the Internet Self-Efficacy and Computer Self-Efficacy
technology, which it affects the utilization of computer-based tech- Likert-type scales.
nology and performance on tasks that involve the use of computers. The items of computer anxiety Likert-type scale used in this
study are modifications of the items from Computer Anxiety Rat-
ing Scale [32]. The Internet Self-Efficacy Scale [27] was used to
3.3. Hypotheses develop the Internet Self-Efficacy items and the Computer Self-
Efficacy Scale [33] contributed to the Computer Self-Efficacy items.
The following hypotheses are considered in this study: Perceived Ease of Use and Perceived Usefulness items were drawn
H1. Computer self-efficacy is positively associated with the per- in part from the Technology Acceptance Model Scale [17].
ceived usefulness of cloud-based applications. Conceptually, the individual characteristic scales of Internet
Self-Efficacy Scale, Computer Self-Efficacy, Internet Self-Efficacy,
H2. Internet self-efficacy is positively associated with the per- and Computer Anxiety are separated from the Perceived Ease of
ceived usefulness of cloud-based applications. Use and Perceived Usefulness scales. The individual characteristic
constructs are measured using a 5-point Likert-type scales rang-
H3. Information technology self-efficacy is positively associated
ing from 1 = “Disagree” to 5 = “Agree”. In an effort to better capture
with the perceived usefulness of cloud-based applications.
directionality of decisions, the Perceived Ease of Use and Perceived
H4. Computer anxiety is negatively associated with the perceived Usefulness Likert-type scales are given a larger 7-point range from
usefulness of cloud-based applications. 1 = “Strongly Disagree” to 7 = “Strongly Agree”.
Face validity of the measures is addressed by having two full
H5. Perceived ease of use is positively associated with the per- professor faculty members with field expertise review the items
ceived usefulness of cloud-based applications. and scales.
S. Ashtari, A. Eydgahi / Journal of Computational Science 23 (2017) 173–180 177
Table 1 Table 2
Demographics of Sample. Cronbach’s Alpha Testing.
supports rejection of the null in H4. The theoretical model used Given that cloud technologies are a combination of platform,
would suggest there was a very strong relationship between Per- software, and infrastructure services that go beyond desktop com-
ceived Ease of Use and Perceived Usefulness (rs(38) = 0.93) that was puting and internet use, it is our belief that self-efficacy for cloud
statistically significant at a p value of 0.01; for this reason, the null applications will involve some combination of both skills. The
for H5 was rejected. results found suggest that a combined model drawing from more
To evaluate the hypotheses that deal with comparisons, aspects of internet technology will be more useful in further exam-
Spearman rank-order correlations were run and the strength of sig- inations of cloud computing.
nificant associations was compared at the p = 0.01 value. We failed
to reject the null in H6 as we found that Computer Self-Efficacy
(rs(37) = 0.80) had a slightly stronger association to Perceived Use- 6. Limitations and future research
fulness than Internet Self-Efficacy (rs(38) = 0.71).
The seventh Hypothesis suggested that the combined scale for This study has a number of limitations that should be men-
Information Technology Self-Efficacy would have a stronger asso- tioned here and should be addressed in future research. The scales
ciation to Perceived Usefulness than either of the two component used in this study were developed from well-reviewed and strin-
scales at the same p values (p < 0.01). Finding that Information gently validated studies. However, they have not been validated
Technology Self-Efficacy in fact did have a stronger correlation in their current form. The Cronbach ␣’s found support their use,
(rs(37) = 0.83), than either Computer Self-Efficacy or Internet Self- but a more thorough validation of the scales is suggested for future
Efficacy (rs(38) = 0.71) caused us to reject the null in H7a and H7b. research. The use of a small convenience sample is a further limi-
Significant associations are presented in Fig. 3. tation of this study. Drawing the sample from a population that is
familiar with interacting with technology and that have substan-
tial experience operating the cloud-based EMU-Online educational
portal may have influenced the strength of the association; it is our
5.5. Discussion
hope that we can expand both the size and the populations sam-
pled in future research. Furthermore, the number of male students
The primary goal of this paper was to investigate if the con-
in the STEM, especially Technology major, is substantially bigger
structs used to predict technology acceptance remain important
than female population. The influence of Ethnicity as a moderator
after the decision to adopt the technology has already been made.
variable could be worth examining in the future study.
Specifically, we looked at cloud computing applications among uni-
Future research evaluating the ability of the factors identified
versity students in the field of technology, because it was our belief
in predictive models of technology acceptance expand our under-
that their focus on technology would likely cause them to have a
standing of the interaction between people and technology. It is
substantial level of experience with cloud computing. While we
also our hope that through the study of these factors, researchers
acknowledge that this is only a preliminary study, our results sug-
are able to identify points of leverage that can be used to improve
gest that among the population sampled, the constructs identified
the state of technology use for users and organizations alike. This
in the TAM and Determinants of Perceived Ease of Use model [19]
path of investigation can also lead to training best practices imple-
remain important in the evaluation of the technology long after its
mentable in technology development and delivery that would
adoption.
improve the experience and utility of future cloud applications [7].
A bulk of prior research into technology acceptance has been
limited to studies of business models or technology use predic-
tion. This critical research has set the stage for the next direction
of acceptance research. By using the variables shown to have pre- Acknowledgements
dictive qualities, researchers can begin to examine the factors that
influence continued use and perceptions of the technologies in use. We would like to thank Dr. Alphonso Bellamy for his support,
Using this approach, it is our hope that future researchers of tech- advice and very timely editing assistance. We would also like to
nology in the field of higher education will be able to identify factors express our appreciation to the Office of Research Development
that lead to best practices and timely interventions to improve and Matthew Dick in providing resources to help support research
student success. at Eastern Michigan University.
S. Ashtari, A. Eydgahi / Journal of Computational Science 23 (2017) 173–180 179
The following questions are 36 Likert-type items divided into The following set of questions are related to your general com-
six Likert scales: (1) Cloud-Computing Usage; (2) Perceived Use- puter/IT skills. Please use the following scale when responding to
fulness; (3) Perceived Ease of Use; (4) Computer Self Efficacy; (5) the following items. Disagree–1–2–3–4–5–-Agree
Internet Self Efficacy; and (6) Computer Anxiety.
1 I feel confident getting any software up and running
2 I feel confident escaping/exiting from any program or software
Cloud-Computing Usage 3 I feel confident troubleshooting computer problems
4 I feel confident getting help for problems in the computer systems
1. How long have you been using the Internet? 5 I feel confident writing simple programs for the computers
2. Are you using cloud applications such as EMU Online, Dropbox, 6 I feel confident learning to use a variety of programs (software)
Google Drive and etc.?
3. What types of cloud application do you use? Internet Self Efficacy
a EMU Online
b Dropbox 1 I feel confident finding information on the World Wide Web
c Google Drive (WWW)
d Apple iCloud 2 I feel confident surfing among different web browsers such as
e Amazon Cloud Drive Internet explorer, Mozilla, Chrome and etc.
4. What are your reasons for using cloud services? 3 I feel confident to have a collaborative discussion (chatting) over
a Accessibility (access from any place with any device) the Internet
b Share data with my classmate and friends 4 I feel confident opening the attachment of email messages that I
c Low cost (ex. Google Drive is free) receive
d Enough storage capacity 5 I feel confident downloading from the Internet
e Make a backup of my files 6 I feel confident uploading my assignment over the Internet
f Editable
g Not applicable
5. What are your reasons for not using cloud services? Computer Anxiety
a Worried about data privacy
b Fear of losing data 1 I worry about making mistakes on the computer
c Difficult to use 2 It scares me to think that I could cause the computer to destroy
d No need a large amount of information by hitting the wrong key
e Not enough storage 3 I am terrified of being connected to the internet, someone might
f Not applicable be tracking me
4 I feel anxious whenever I am using computers
5 I feel anxious every time I use a new program
Perceived Usefulness 6 I experience anxiety whenever I sit in front of a computer termi-
nal.
The following set of questions are related to cloud-
based application usage only. Please use the following References
scale when responding to the following items. Strongly
disagree–1–2–3–4–5–6–7–Strongly agree [1] CDW Report, From Tactic To Strategy: The CDW 2013 Cloud Computing
Tracking Poll, 2013 (last Access on 30 May 2015) http://www.cdwnewsroom.
com/wp-content/uploads/2013/02/CDW 2013 State of The Cloud Report
021113 FINAL.pdf.
1 Using cloud applications at EMU would enable me to accomplish [2] T.S. Behrend, E.N. Wiebe, J.E. London, E.C. Johnson, Cloud computing adoption
tasks more quickly and usage in community colleges, Behav. Inf. Technol. 30 (2) (2011) 231–240.
2 Using cloud applications would improve my study performance [3] P. Mell, T. Grance, The NIST Definition of Cloud Computing, 2011, National
Institute of Standards and Technology Special Publication, 2014 (800-145).
3 Using cloud applications at EMU would increase my productivity [4] S.Y. Jing, S. Ali, K. She, Y. Zhong, State-of-the-art research study for green
4 Using cloud applications would enhance my effectiveness in my cloud computing, J. Supercomput. 65 (1) (2013) 445–468.
courses [5] D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Gener.
Comput. Syst. 28 (3) (2012) 583–592.
5 Using cloud applications would make it easier to do my home-
[6] A. Beloglazov, A. Abawajy, R. Buyya, Energy-aware resource allocation
work heuristics for efficient management of data centers for cloud computing,
6 I would find cloud applications useful in doing my assignments Future Gener. Comput. Syst. 28 (5) (2012) 755–768.
[7] M. Tebaa, S. El Hajji, A. El Ghazi, Homomorphic encryption applied to the
cloud computing security, in: Proceedings of the World Congress on
Engineering, July 4–6, London, UK, 2012 (Vol. 1).
Perceived Ease of Use [8] T. Dillon, C. Wu, E. Chang, Cloud computing: issues and challenges,
Proceedings of 24th IEEE International Conference on Advanced Information
Networking and Applications (2010) 27–33.
1 Learning to use cloud applications would be easy for me
[9] A.S. Weber, Cloud computing in education, in: Ubiquitous and Mobile
2 I would find it easy to get cloud applications to do what I want it Learning in the Digital Age, Springer, New York, 2013, pp. 19–36.
to do [10] L.M. Vaquero, EduCloud: paaS versus IaaS cloud usage for an advanced
3 My interaction with cloud applications would be clear and under- computer science course, IEEE Trans. Educ. 54 (4) (2011) 590–598.
[11] M.A.H. Masud, X. Huang, An e-learning system architecture based on cloud
standable computing, System 10 (11) (2012).
4 I would find cloud applications to be flexible to interact with [12] J.A. González-Martínez, M.L. Bote-Lorenzo, E. Gómez-Sánchez, R. Cano-Parra,
5 It would be easy for me to become skillful at using any cloud Cloud computing and education: a state-of-the-art survey, Comput. Educ. 80
(2015) 132–151.
applications [13] L.G. Tornatzky, M. Fleischer, A.K. Chakrabarti, Processes of Technological
6 I would find cloud applications easy to use Innovation, Lexington Books, 1990.
180 S. Ashtari, A. Eydgahi / Journal of Computational Science 23 (2017) 173–180
[14] M.M. Yusof, J. Kuljis, A. Papazafeiropoulou, L.K. Stergioulas, An evaluation [27] G. Torkzadeh, T.P. Van Dyke, Development and validation of an Internet
framework for Health Information Systems: human, organization and self-efficacy scale, Behav. Inf. Technol. 20 (4) (2001) 275–280.
technology-fit factors (HOT-fit), Int. J. Med. Inf. 77 (6) (2008) 386–398. [28] A. Ume, The fear and phobia of the cloud and cloud computing, J. Educ. Soc.
[15] W.H. Delone, E.R. Mclean, Measuring e-commerce success: applying the Res. 2.8 (2012) 147–154.
DeLone & McLean information systems success model, Int. J. Electron. [29] K. SO, Cloud computing security issues and challenges, Int. J. Comput. Netw. 3
Commer. 9 (1) (2004) 31–47. (5) (2011).
[16] M.S.S. Morton, The Corporation of the 1990: Information Technology and [30] D. Gilbert, L. Lee-Kelley, M. Barton, Technophobia, gender influences and
Organizational Transformation, Oxford University Press, 1991. consumer decision-making for technology-related products, Eur. J. Innov.
[17] F.D. Davis, Perceived usefulness, perceived ease of use, and user acceptance of Manage. 6 (4) (2003) 253–263.
information technology, MIS Q. (1989) 319–340. [31] T. Jay, Computerphobia: what to do about it, Educ. Technol. 21 (1) (1981)
[18] M. Esmaeili, Assessment of Users’ Information Security Behavior in 47–48.
Smartphone Networks., Doctoral Dissertation, Eastern Michigan University, [32] R.K. Heinssen, C.R. Glass, L.A. Knight, Assessing computer anxiety:
2014. development and validation of the computer anxiety rating scale, Comput.
[19] V. Venkatesh, Determinants of perceived ease of use: integrating control, Hum. Behav. 3 (1) (1987) 49–59.
intrinsic motivation, and emotion into the technology acceptance model, Inf. [33] C.A. Murphy, D. Coover, S.V. Owen, Development and validation of the
Syst. Res. 11 (4) (2000) 342–365. computer self-efficacy scale, Educ. Psychol. Meas. 49 (4) (1989) 893–899.
[20] V. Venkatesh, F.D. Davis, A theoretical extension of the technology acceptance
model: four longitudinal field studies, Manage. Sci. 46 (2) (2000) 186–204.
[21] A. Bandura, D. Cervone, Differential engagement of self-reactive influences in Sadaf Ashtari is the PhD candidate in Technology Manage-
cognitive motivation, Org. Behav. Hum. Decis. Processes 38 (1) (1986) 92–113. ment at Eastern Michigan University and also is a doctoral
[22] M. Esmaeili, A. Eydgahi, The effects of undergraduate project-based courses fellow at College of Technology. Her field of research is in
on student attitudes toward STEM classes, Int. J. Eng. Res. Innov. 6 (2) (2014) Information Technology Application in Healthcare at East-
66–72 (Fall/Winter). ern Michigan University. Her research interest is in Health
[23] A. Bandura, Self-efficacy: toward a unifying theory of behavioral change, Informatics, Business Intelligence, Data Warehousing and
Psychological Review 84 (2) (1977) 191. Data Mining, Machine Learning and Cloud Computing.
[24] D.R. Compeau, C.A. Higgins, Computer self-efficacy: development of a Before she started her study in the United State, she was a
measure and initial test, MIS Q. (1995) 189–211. researcher at Iran Telecommunication Research Center for
[25] D.R. Compeau, C.A. Higgins, S. Huff, Social cognitive theory and individual four years. She also has experience of working in indus-
reactions to computing technology: a longitudinal study, MIS Q. (1999) try. She has worked in mobile network company in Iran as
145–158. an information technology system analyst for two years.
[26] R. Bates, S. Khasawneh, Self-efficacy and college students’ perceptions and Her paper won the best paper award at Graduate research
use of online learning systems, Comput. Hum. Behav. 23 (1) (2007) 175–191. Conference at Eastern Michigan University.