Academia.eduAcademia.edu

TRENDS IN eBUSINESS AND eGOVERNMENT

2020, EFE AKADEMI, E-ISBN : 978-625-7729-47-5, ISBN : 978-625-7729-46-8

Technology affects all areas. Business and government processes are changing with the use of the internet, mobile devices, internet of things, blockchain, machine learning, artificial intelligence and many other new technologies. In this book, it is aimed to focus the use of technology, new trends in business life and government covering the studies in all sub-areas of Information Systems, Knowledge Management, eBusiness, eCommerce, eMarketing, mCommerce, eGovernment, ePublic Services, eGovernance etc. The book consists of 7 chapters. Book chapter authors are reputable scientists from different countries of the world. The first chapter is a critical review and a case study in e-Business, with special attention to the digital currencies resource and its possibilities. The second chapter attempts to incorporate the Unified Theory of Acceptance and Use of Technology (UTAUT) model with perceived risk theory (security risk and privacy risk) to explore its impact towards the intention to use m-government services. The third chapter aims to assess the level of gender inclusivity in the municipal e-procurement processes in the City of Johannesburg as a case study. The fourth chapter examines the impediments that derail the intensive uptake of eLearning programmes in a particular higher education institution. The fifth chapter investigated the role of Knowledge Management Systems (KMS) in enhancing the export performance of firms operating within the manufacturing sector in Zimbabwe. In the sixth chapter, a survey was undertaken on 131 small and medium-sized enterprises (SMEs) from Pelagonija region in order to determine the current level of SME digitalization within the region. It is aimed to compare with European Union (EU) average and to make conclusions on the impact of the SME digitalization to region gross domestic product (GDP) growth as well as revenues collection. The last chapter's purpose was to develop a measuring and modelling framework/instrument of Internet banking service quality (IBSQ) for the South African banking sector.

TRENDS IN eBUSINESS AND eGOVERNMENT Edited by Dr. Ömer AYDIN İstanbul December, 2020 TRENDS IN eBUSINESS AND eGOVERNMENT Editor : Dr. Ömer AYDIN Orcid: 0000-0002-7137-4881 E-ISBN : 978-625-7729-47-5 ISBN : 978-625-7729-46-8 Date of Pub./Basım : December 2020 Publishing, selling and copying rights of that book belong to EFE ACADEMY. EFE ACADEMY is an OFFICE 2005 organization LIBRARY CARD Editor: Aydın, Ömer Trends in eBusiness and eGovernment , Printing, vi + 117 p., 160 x 240 mm. Keywords: 1. Ebusiness, 2. Egovernment, 3. Digital transformation, 4. Technology 5. Digitalization Typographic/Dizgi Cover design/Kapak tasarımı Certificate No/Sertifika No : Dr. Ömer AYDIN ([email protected]) : Duygu DÜNDAR : 43370 Efe Akademi Yayınevi Address: Yıldız Teknik Üniversitesi Davutpaşa Kampüsiçi Esenler / İSTANBUL Phone :0212 482 22 00 Web : www.efeakademi.com Email : [email protected] Printing house address: Address: Ofis2005 Fotokopi ve Büro Makineleri San. Tic. Ltd. Şti. Yıldız Teknik Üniversitesi Davutpaşa Kampüsiçi Esenler / İSTANBUL Phone : 0212 483 13 13 Web : www.ofis2005.com TRENDS IN eBUSINESS AND eGOVERNMENT This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned. Nothing from this publication may be translated, reproduced, stored in a computerized system or published in any form or in any manner, including, but not limited to electronic, mechanical, reprographic or photographic, without prior written permission from the publisher EFE ACADEMY. The individual contributions in this publication and any liabilities arising from them remain the responsibility of the authors. The publisher and the editor is not responsible for possible damages, which could be a result of content derived from this publication. The authors of the relevant chapter are fully responsible for the content in this publication. When the authors send the book chapter for publication, they are deemed to have committed to abide by all ethical rules. All material and moral responsibility that may arise due to the chapters in this book belongs to the relevant chapter authors. The authors accepted these conditions in advance by participating in this book as chapter authors. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of going to press, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher and editor make no warranty, express or implied, with respect to the material contained herein. FOREWORD Technology affects all areas. Business and government processes are changing with the use of the internet, mobile devices, internet of things, blockchain, machine learning, artificial intelligence and many other new technologies. In this book, we aimed to focus the use of technology, new trends in business life and government also we publish high-quality research studies in all sub-areas of Information Systems, Knowledge Management, eBusiness, eCommerce, eMarketing, mCommerce, eGovernment, ePublic Services, eGovernance etc. In the chapters of the book, original studies on electronic business and government are included. Studies give an idea about technologies that can be used in this field and new methods that can be applied. This book covers some of the topics listed in the "Call for book" web page that can be accessed on http://www.izmiracademy.com/1/trends-in-ebusiness-and-egovernment/. All other required information is listed on that page. This book is an edited book that has been reviewed through a double-blind peerreview process. Each book chapter was reviewed by at least two different reviewers who are experts in their field. The chapters in the book have been edited and this publication has emerged as a result. The book consists of 7 chapters. Book chapter authors are reputable scientists from different countries of the world. The first chapter is a critical review and a case study in e-Business, with special attention to the digital currencies resource and its possibilities. It is an example of technovation for the improvement of personnel income and motivation, as a good practice of CSR 3.0. The study explains how it works this win-win practice, with a real example of a Spanish company. The second chapter attempts to incorporate the Unified Theory of Acceptance and Use of Technology (UTAUT) model with perceived risk theory (security risk and privacy risk) to explore its impact towards the intention to use m-government services. Age, gender and education level were also adopted as moderator variables to provide an in-depth understanding of citizens’ preference in m-government services. Partial Least Square (PLS) Structural Equation Modelling method was conducted. The third chapter aims to assess the level of gender inclusivity in the municipal eprocurement processes in the City of Johannesburg as a case study. It uses a Gender and Development (GAD) approach. Among the questions raised in the chapter are whether gender mainstreaming is considered in the municipal procurement processes; and if there are any initiatives in place to capacitate men and women to ensure their participation in the e-procurement processes. The fourth chapter examines the impediments that derail the intensive uptake of eLearning programmes in a particular higher education institution. The study adopted an inductive research paradigm that followed a qualitative research strategy. Data were collected by means of one-on-one in-depth interviews from selected faculty members at a nominated institution of higher learning. The fifth chapter investigated the role of Knowledge Management Systems (KMS) in enhancing the export performance of firms operating within the manufacturing sector in Zimbabwe. The study used a quantitative approach in which a survey questionnaire was distributed to 555 managers drawn from 185 manufacturing firms based in Harare. Data analyses involved the use of descriptive statistics, Spearman correlations and regression analysis. In the sixth chapter, a survey was undertaken on 131 small and medium-sized enterprises (SMEs) from Pelagonija region in order to determine the current level of SME digitalization within the region. It is aimed to compare with European Union (EU) average and to make conclusions on the impact of the SME digitalization to region gross domestic product (GDP) growth as well as revenues collection. The last chapter's purpose was to develop a measuring and modelling framework/instrument of Internet banking service quality (IBSQ) for the South African banking sector. Snowball and convenience sampling, both non-probability techniques were used to recruit participants for the study. A total of 310 Internet banking customer responses were utilised in the analysis. Dr. Ömer AYDIN December, 2020 İzmir, Turkey CONTENT Trends in eBusiness: digital currencies for a CSR 3.0 good practice ...... 1 Antonio Sánchez-Bayón, Miguel Ángel García-Ramos Lucero Intention to Use M-Government Services: Age, Gender and Education Really Matter? ......................................................................................................... 19 Annie Ng Cheng San, Choy Johnn Yee, Krishna Moorthy, Alex Foo Tun Lee E-Procurement within the City of Johannesburg Metropolitan Municipality, South Africa: A gendered perspective .................................. 43 Angelita Kithatu-Kiwekete, Shikha Vyas-Doorgapersad Impediments to the use of eLearning technology in an applied sciences and technology at a university in South Africa ............................................. 57 Anthony Kiryagana Isabirye, Nobukhosi Dlodlo, Lydia Mbati The Role of Knowledge Management Systems On the Export Performance of Manufacturing Firms: Evidence from Zimbabwe ....... 71 Edmore Tarambiwa, Chengedzai Mafini Public finance support for digitalization implementation within the SME’s in Pelagonija region ................................................................................. 85 Anastas DJUROVSKI Structural Equation Modelling of Internet Banking Service Quality in South Africa: A Framework for Managers ..................................................... 99 Ephrem Habtemichael Redda, Jhalukpreya Surujlal Trends in eBusiness: digital currencies for a CSR 3.0 good practice* Antonio Sánchez-Bayón1 , Miguel Ángel García-Ramos Lucero2 Abstract This is a critical review and a case study in e-Business, with special attention to the digital currencies resource and its possibilities. It is an example of technovation for the improvement of personnel income and motivation, as a good practice of CSR 3.0. The study explains how it works this win-win practice, with a real example of a Spanish company. In this case, there are benefits for the whole stakeholders, the environment, other companies and the next generations. Keywords: Wellbeing economics, happiness management, digital transition, corporate social responsibility, digital currencies, technovation. Jel Codes: D24, D31, I31, J3, K0, L2, M14, O15, O33. INTRODUCTION: Is there a resistance to the digital transition & business culture transformation? This is a critical and practical study to support the digital transition and the eBusiness in the timeline of Horizon 2030 (H2030)3. The attention is focused on the digital currency, as an example of technovation for personnel income and a good practice of CSR 3.0, which distingues the enterprises oriented towards people wellness & happiness management. In other publications, there was a general contextualization: - an initial balance of globalization and its changes (with its troubles and challenges to reach the knowledge society, Sánchez-Bayón, 2016); - the attention to the main economic-business transformations (Andreu & Sánchez-Bayón, 2019); - an introduction to the current stage of post-globalization (as a transitory period of global convergence: from the value crisis of 2008 to H2030, Valero and Sánchez-Bayón, 2018); Paper written for the PhD dissertation in Economics; with the support of the research group GESCE-URJC (URL: https://gestion2.urjc.es/pdi/groups-investigacion/gesce). 1 SJD (UCM), PhD in Theology (UM), PhD in Humanities (UVA), PhD in Philosophy (UCM) & PhDc. in Economics (UVA & UCM). Prof. Applied Economics at URJC (office J49, Vicalvaro campus, Paseo de Artilleros s/n, 28032 Madrid). Email: [email protected]; Orcid: 00000003-4855-8356 2 PhDc. in Economy (UCJC). Prof. Finances at EAE Business School (Madrid campus, c/Joaquin Costa 42, Madrid). Email: [email protected]; Orcid: 0000-0002-8671-0374 3 It is the date established as the point of no-return: the nations, which accept the projects and alliances in international fora and institutions (e.g. United Nations: Sustainable Development Goals, Global Compact, Future of Work), in the way to get the convergence for knowledge society. * 1 - an explanation about the 4th. industrial & technological revolution and the digital economy (included, gig phase, wellbeing economics, etc., Sánchez-Bayón, 2019a & 2019b); - even a range of innovation trends in business culture, occupational wellbeing and organizational health & wellness (González & SánchezBayón, 2019). In this occasion, it is offered a case of business practice, based in social-business digital currencies (SBDC –beyond the current social currencies-). They are useful as a refutation to the proposals of mainstrain academics (from welfare state economics-WSE) and the new-luddite militants (opposed to technological advances because they are considerated a violation of working conditions, destroying jobs and increasing social disparity, Bailey, 1998. Sale, 1996). Current and previous luddites (see table 1), they are wrong, since the disappearance of jobs in one sector leads to the appearance of new jobs in emerging sectors; the same ones being more suitable for human inventiveness. For example, a tenant farmer with no limit of hours and with a subsistence production to become an industrial worker with shifts and an steady salary (2º industrial rev.), going through being an office clerk with fixed hours and income that allows savings (3º industrial rev.), even professionals with financial and schedule freedom (4º industrial rev.). Actually, the relationship between technological advances and labor wellbeing is not proportionally inverse, but exponentially convergent. The more technological advances take place, the more global wealth increases (both in terms of income and benefits to be enjoyed); and the greater convergence takes place in the planetary standard of living, thus increasing the wellbeing of humanity and its life expectancy. Those are two of the major components of the measurement of the global happiness index. In addition, both were announced by Bentham and Malthus in the 19th century, and they were the inspiration to measure the development, since the 1960s, by the Organization of Economic Cooperation and Development-OECD, and worldwide since 2012 (Rojas, 2014. VV.AA.a, 2012. VV.AA.b, 2020). Such a phenomenon, by which artificial intelligence has to overcome and replace the human being in tedious tasks - doing it even better - is called singularity (Kurzweil, 2005), and its point of no return is predicted for 2030 (coinciding with the rest of planetary convergence plans, such as Global Compact-United Nations/UN, Future of work-International Labour Organization/ILO, Green Compact-Europena Union/EU, etc.). As evidence we find the reports of specialized international organizations, such as the World Bank or the International Monetary Fund, as well as the indexes evolution such as the Gini-OECD coefficient (which is decreasing as the Lorenz curve flattens worldwide) or the human development index-UN (that is being improving yearly, see Table 1). In this framework of global improvement, universalized since globalization, a risk exists as the Easterlin paradox, if only attention is paid to production and not to people's happiness (Easterlin, 1974. Easterlin et al 2010). This alarm was useful for the States part of the OECD, which after the great crisis of the 70s (and its 2 stagflation), led to the reformulation of the Business Schools of the Anglo-Saxon and Nordic countries (Sánchez-Bayón et al., 2020). Currently, after globalization, the collection of all revolutions (see table 1), they have spread worldwide, taking place in a concentrated manner, allowing the accelerated growth of the vast World region of the Trans-Pacific Area (Pacific, Oceania and Southeast Asia), which by H2030 it will have surpassed the Atlantic World (origin of the aforementioned revolutions). Now, for this increase to become well-being, it requires a reinvestment of the wealth generated in infrastructure and education services, health, transport, housing, etc. What is more a profound change in business culture is needed, so that organizations stop being exclusively results-oriented and no longer treat their workers as mere human resources (interchangeable pieces of a mechanical system), thus beginning to pay attention to talent and motivation of employees and their organizational well-being (Sánchez-Bayón, 2019a). Table 1. Comparison relating industrial and technological revolutions (SánchezBayón, 2019a). Revolutions Features Macro and social indexes 1st Rev. (1790- coal and steam engine; it goes from the countryside to Less than 1,200 million 1870, Atlantic urban workshops (highlighting the textile sector); civil people, with a world Europe) service leasing contracts (for agreed days and benefits); GDP per capita of less estates and unions slow their progress than $ 1,000. 2nd Rev. (18801950, in Europe and the AngloSaxon world) oil, electricity and assembly line, it goes from At the beginning of the workshops to factories (highlighting the automobile c. XX the world sector); proper employment contracts (under a population was of 2,000 protective legal regime); its advance slows down (with million people approx., accelerations and recessions) wars and state With a GDP per capita interventions. over 1,000 $ 3rd Rev. (19602008, in the West – especially Asian tigers) computing and robotization, plus nuclear and At the turn of the renewable energy; It goes from factories to centralized millennium, the techno-bureaucratic headquarters and offshored worldwide population production and sales modules, plus the emergence of was over 6,000 million malls or shopping centers, with a diversity of labor inhabitants and its GDP relations and employability (civil and commercial per capita was close to $ contracts, labor, civil servants, etc.). State interventions 10,000 continue to alter their progress (this is WSE's golden age). 4th Rev. (2008- internet, programming (especially, block-chain since We are currently more 2030, 2009) and mobiles (smartphone as an office), it is the era than 7,400 million planetarium) of social networks, apps & everywhere commerce-ewc or population on the virtual continuous marketing, giving the return of the planet, with a per capita professional (knowmads v. freeriders), who can be a GDP of more than $ commission agent, biller, affiliate, etc. (New formulas 13,500. for the regulation of mixed labor relations emerge, eg. click-pay, flexecurity, part-time jobs mix). It is also the period of the emergence of smart-contracts & DAO (smart contracts, like codes in the cloud, whose parts are artificial intelligence, which operate from the Stock Market to driving with no driver). 3 This has been the deficit of the corporate production model of the Asian tigers (e.g. Japan, South Korea, Singapore, Taiwan, Hong-Kong), which carried out their revolutions after World War II, putting themselves at the level of the most developed countries (OECD), but running out of its model for not advancing to the stage of the digital economy relative to the economy of happiness (serve as evidence, from the alienation of the South Korean chaebol model, to the death of work due to karoshi - excess work - or karojisatsu - suicide by working conditions- of Japanese corporations, Frank, 2014. Amagasa et al, 2005). The first stage of the digital economy has been the gig phase or bowling phase (Sánchez-Bayón, 2019b), which includes: a) the collaborative and circular economy-CCE (it is based on social networks and platforms, recycling shared goods and services, e.g. AirBnB, Uber, Wallapop); b) the autonomous economy-AE (it is based on big-data, internet of things-IoT, artificial intelligence-IA, augmented reallyty/AR-virtual reallyty/VR-mixed reallyty/MR, etc., articulated through 5G, block-chain, smart-contracts and DAOs, e.g. funds of investment in autonomous car fleet, fintech); c) the orange economy-OE (it is based on talent and creativity applied to experience and entertainment, eg. gastronomy, tourism, video games, festivals). With post-globalization, there is implementing around the World a collaborative intelligence network (e.g. Global Compact-UN, Wellbeing Economics Alliance-Wold Economic Forum) to share experiences and good practices that allow progress towards the next stage of the digital economy, such as the authentic welfare economy or wellbeing economics. This new stage includes expressions like talent & happiness management (Cubeiro, 2012. Frey, 2018). Other expression of the wellbeing economics, it is the corporate social responsibility 3.0 (CSR 3.0). In this case, it pays attention to the social-business digital currencies (SBDC), as a resource to improve the remuneration of employees and, at the same time, to care the environmental and other social benefits. Therefore, previously, what is understood and how digital currencies operate will be clarified, as well as its contribution to the promotion of CSR 3.0 (which is typical of companies oriented towards people, their talent and their happiness), in addition to illuminating about the hypothetical initially raised paradox. CRYPTOCURRENCIES V. DIGITAL CURRENCIES: what they are, how they operate and what are their implications in digital economy Cryptocurrencies, or better said (for this study) digital currencies, are autonomous, virtual and decentralized pecuniary units, which can be exchanged as a payment instrument for means of a system or network of electronic operations that does not require financial intermediaries (since all participants are notaries). The cited features are summarized in their digital condition, as they are carried out through an electronic procedure (such as a transfer or card payment). As for its origin and development, find the synopsis of the Table 2. 4 Table 2. Development of digital currencies (own elaboration for this research) Stages Milestones and features Relevant cases Backgrou Denationalization of money Reference baskets of currencies nd (1988) (advertisement of non-national are introduced, which will give currencies, Hayek, 1976). Cover way to cases such as the ECU of The Economist (predicting the (antecedent of the euro and with appearance of a currency that which it could be operated via stock exchange interconnection would displace national ones). systems). 1998 The word cryptocurrency introduced and consolidated is Appearance of the Wei Dai BMoney system 2008/200 The first paper on Bitcoin is Satoshi Nakamoto spreads 9 published Bitcoin and his first operation takes place on metzdowd.com May 22, First real transaction with Bitcoin Some pizzas were paid with 2010 Bitcoins Decembe Price of derivatives contracts on Futures on Bitcoin are traded in r 2017 Bitcoin CME and CBOE Figure 1. Evolution of the price of Bitcoin (own elaboration for this research) This kind of instruments were conceptualized and developed to be used as traditional currencies, as conventional currencies to acquire goods and services, with the difference that they avoid entering into commissions from financial intermediaries and under a novel technology called blockchain. At present they can be related more to a commodity or financial asset than to a foreign currency, since many traders acquire cryptocurrencies seeking to generate a return (capital gain) derived from their price, they are more used for speculation 5 than to be a means of payment in commercial transactions. There is a lot of financial literature on the intention of users when they exchange their domestic currencies for digital ones. There are empirical studies (Glaser et al, 2014) that, mainly users or investors with little information or academic preparation are not interested in an alternative transaction system, what they want is to participate in cryptocurrencies as an investment vehicle. The question of the usefulness of cryptocurrencies as an exchange practice (which has aroused the interest of regulators) is their immense volatility, which leads to think that it is used as a speculative investment. In 2012, the ECB said that Bitcoin should be considered a high risk system for its participants from a financial perspective. It was even hinted at its similarity to a Ponzi scheme (ECB, 2012). China, in 2013, announced a ban on Bitcoin as a currency for financial institutions (Ruwitch and Sweeney, 2013). If this was the case at the beginning of the boom in digital currencies (and other crypto assets), one can imagine the current protectionism of Central Banks before the implementation of payment systems such as Google pay and its G currency, or before Facebook's Libra (as it comes happening since 2018) - it will be understood why it is interesting to keep the suffix “crypto”, as a connotation, when it is actually due to the encryption code-. As for the so-called crypto assets, they are a set of crypto currencies together with other forms of goods and services which use cryptography (blockchain technology) for their operation. These crypto assets include cryptocurrencies and tokens. Tokens are a value unit of private entity for exchanges. William Mougayar defined the token as a unit of value, which helps an organization to govern the business model and give more power to its users to interact with its products, while facilitating the distribution of benefits among all its shareholders (Mougavar, 2016). Tokens have different uses and utilities in the blockchain (internal unit of account, intermediating transactions between buyers and sellers in the internal markets of the platform, or granting rights to token holders) but, regardless of their use, the tokens have been revealed as an effective method for technology start-ups to raise capital at the earliest stage of their business cycle. Instead of making capital increases or trying to convince Venture Capital funds (venture capital), blockchain companies are frequently financed through ICOs: initial coin offering. Tokens are offered at auction and used to fund the projects. In 2016, 250 million dollars were raised with this financing methodology for SMEs (Conley, 2017). The development of tokens, both as currencies and financial assets, respond to a compliance framework; however, there are issues such as capital increases through ICOs that are still not legally well defined (at least in Spain). If the tokens are currencies, ICOs must comply with know-yourcustomer legislation and anti-money laundering rules. If it is a financial asset, they will be subject to the legislation of the regulators (e.g. SEC, CNMV). Whether crypto-tokens or crypto assets are currencies, financial assets, or a different and new asset, it also affects how they should be analyzed from an economic point of view. Although there is a theoretical body of knowledge with strong academic foundations in monetary and financial economics, how the theory 6 should be applied to crypto assets and ICOs is still beginning to be explored. There is hardly any quantitative research on the estimation of cryptocurrencies/assets for potential investors, how start-ups should structure ICOs, etc. As has already been mentioned, the technology under which cryptocurrencies work is called blockchain, or chain of blocks. This blockchain removes all intermediaries through complete decentralization. So that it can be understood in a better way, a chain of blocks is like a record book which is the blocks themselves that are connected and encrypted, like a distributed and secure database. In order for the blockchain to function properly, the information must be verified by several users, and in each block there are a large number of transactions. As more and more transactions are completed, the block reaches the point where it no longer supports more and there it must be validated and sealed, this is what users do when mining. What is mining? Mining describes how blocks are generated within the blockchain. The chain contains blocks with information and transactions. In order for transactions to flow, we need confirmation from the miners. The so-called miners compete among themselves in order to have the right to create a new block in the chain (Zheng et al, 2017). It is a P2P (peer to peer) network, miners compete with each other. The first to create a valid block and seal it receives cryptocurrencies. A very important aspect that we want to highlight is the high level of security of the system. The blockchain is unbreakable against a possible modification of the account book and the theft of Bitcoins turns unfeasible (Berentsen, 2018). The miners collect pending transactions (of Bitcoins for example), verify the legitimacy and chain it into what they call a “candidate for a block” in order to win new issues of the cryptocurrency if they convince the rest of the participants of the network or chain to add their candidate to the blockchain block. Access is usually free (in Bitcoin), you do not need authorization to become a miner, just download the software and the most recent copy of the chain. In practice, however, there are few and huge miners that produce most of the new blocks accepted in the chain due to the high competitiveness that allows profitability thanks to the economies of scale at the hardware and electricity level. Regulation is extremely important, digital currencies can significantly reduce tax revenues for nations and is a serious danger to the banking sector (as has been recognized by the Bank of America), mainly in the current scenario of low interest rates and growth in developed countries. For instance, John Cryan, former Chairman of Deutsche Bank, warned about the possibility of traditional banknotes and coins disappearing in ten years due to their inefficiency. Cryptos and Blockchain increase the uncertainty in the financial autonomy of national economies, as recently recognized by Margarita Delgado, Deputy Governor of the Bank of Spain, speaking of Libra as a serious danger for monetary policy (see below). Proof of this are, for example, the recent reactions of the ECB, the IMF and the Fed regarding Facebook's Libra cryptocurrency, which shows concern regarding the financial system due to digital assets created by technology 7 multinationals with strong penetration power in the monetary use of the population. The concerns relate to the protection of customer data, protection against money laundering or potential abuse of a leading position. Basically, there is a trade-off between cost reduction, speed of financial transactions and the menace of international financial volatility due to credit risk due to lack of support from a public institution. The European Banking Authority defined 70 risks, divided into several categories based on who or what is threatened by them (Lansky, 2018). Today's payment systems are one of the groups. Obviously, the traditional banking system is fading, its business model is outdated due to new technologies and cryptocurrencies mean a radical change in transactions and business models. It is certain that digital assets have risks, but we cannot forget that currently around 2 billion people do not have access to the banking system. New technologies allow them to participate in the international economy and lift them out of poverty. Peer-to-peer currency networks are becoming increasingly common, making centralized control of funding difficult and posing a serious threat to the financial industry. If they want to survive, large banks must digitize and provide real-time services such as those offered by cryptocurrencies and are already investing in research and development of Blockchain technology. Institutions that adapt will survive, the rest will die. USE OF DIGITAL CURRENCIES TO IMPROVE EMPLOYEES’ COMPENSATION The advantages of digital currencies as a medium of exchange in the financial and monetary system are, first of all, in relation to the cost of transactions. The technology provides high cost efficiency in international transactions to digital currencies compared to traditional instruments. According to Enciso (2018), cryptocurrencies are a contribution to the economic development of countries because it becomes an alternative stock exchange with costs that reach a 50% reduction in relation to the traditional stock market. As the CEO of the Andreessen-Horowitz Venture Capital Manager, Marc Andreessen, said about Bitcoin: it introduces value into the system, transfers the value, the receiver obtains the value, no need for authorization and in many cases, free of commissions. The last advantage is of high importance. Bitcoin is the first internet payment system where transactions can be made with little or no fees. Traditional transaction systems charge commissions of 2/3% and this is in developed countries. In many other countries, modern payment systems do not exist or fees are much higher (Andreessen, 2014). Second, one of the main advantages refers to their decentralized nature, that is, they are not controlled or administered by any government or public administration. Decentralization lies in the open nature of the code of its protocol, which means that the programming code is freely available to access and redistribute it. Nature 8 of the system is based on the so-called collaborative economy, because any collaborator (with hardware provision) can process transactions on the Blockchain and obtain remuneration for it (what we have previously called mining). The reason for this simile is because, as in a mineral mine, the commodity decreases as it is exploited, the bitcoin algorithm is designed so that in 2,140 all Bitcoins are taken for granted. That open technology provides the third advantage for collaborators, its infallibility (Lakomski-Daguerre and Desmedt, 2015): since any attempt to manipulate transactions results in a computer block incompatible with the previous and the next. For this reason, cryptography supporters call these systems "trust-less", because it means the substitution of a computer code in the trust of the public collateral of the traditional currency. Dozen authors portray Blockchain as the "reliable protocol" and Blockchain makes the network more than the internet of information, the internet of money. The birth of this technology stems from the loss of confidence in businesses and other institutions after the 2008 financial crisis (as indicated by the Edelman Confidence Barometer). The fourth advantage for economic agents submits to transactions privacy, their anonymous nature. The right to privacy and anonymity arouses enormous interest in economic and commercial transactions and the World in general. There are plenty of examples of the monitoring of public government entities to prevent criminal and terrorist activities and of marketing companies to profile different users. We consider useful to clarify the distinction between privacy and anonymity in the context of financial transactions (Gallardo et al, 2019). Anonymity refers to the lack of knowledge towards the actor or actors who take part in it. Privacy submits to whether the product and quantity of the transaction are unknown, but not its actors. In relation to cryptocurrencies, transactions are anonymous, identities are not registered, but each transaction is registered in an electronic book of public nature. The anonymous nature alters the regulatory capacity in the financial field and therefore is used for the payment of criminal transactions. The fifth application with which the payment system is improved is because with cryptocurrencies all transactions are carried out from person to person, there are no intermediaries. It is a "peer to peer" (P2P) system. In addition, with which we enter the sixth advantage, the faster transactions in relation to fiat currencies. This project for the technological advancement of means of payment would be in line with technological development, economic globalization and the necessary agility of transactions today, and would be a rational evolution of the monetary concept in our days. Therefore, the rise of electronic commerce and the financial crisis gradually led to the introduction as a means of payment, the idea born in 1998 by Wei Dai in the "cypherpunks" email list, where he proposed the idea of a new type of money used by cryptography to control its creation and transactions (see table below). 9 ARTICULATION OF THE CSR 3.0 CASE: ADVANTAGES OF THE SOCIAL-BUSINESS DIGITAL CURRENCIES (SBDC) Consider the development of digital currencies, then how do they relate to the economy of happiness and talent, and how can they serve as a case for CSR 3.0? To respond, allow yourself a brief clarification on the future of CSR and its three stages, to then give an account of examples of CSR 3.0, and finally record the advantages and benefits of SBDC in this regard. The world consecration of CSR (beyond the business sphere, reaching all types of corporations, including NGOs or the public sector) took place with convergent initiatives of the United Nations (e.g. the millennium agenda of its General Secretariat, the future of the work of the ILO), harmonizing all this with the global compact (announced by K. Annan in his speech on January 31, 1999 in Davos, during the World Economic Forum meeting, and formally constituted on July 26, 2000). Since then, minimum global standards have been set in relationships between people, communities and the environment. In addition, a network of local support networks has been established to deepen, broaden and disseminate this commitment. This has made it possible to generate a collaborative intelligence that has given rise to new concurrent and reinforcing initiatives (e.g. the wellbeing economics alliance by World Economic Forum, the surveys and good practices of Great Place To Work). In accordance with this collection, it is possible to establish the following evolutionary categories of CSR (in the transition towards the happiness and talent economy model): a) CSR 1.0: characteristic of incipient organizations only oriented to results and in which the hygienic measures of the workers are hardly taken care of (e.g. working risks prevention, adequate wages and payment of overtime). As such, CSR is understood in a marketing way (out-door advertising) so it is outsourced to consultants or is directly replicated by others, but does not correspond to its own business culture. It is detected by his pretentious speech, his abuse of barbarisms (linguistic loans), and commitments that are difficult to verify (e.g. reducing the carbon footprint, helping a remote town). b) CSR 2.0: visible in consolidated organizations, in terms of their market share, but who wish to make improvement changes, going beyond hygienic measures and initiate the promotion of motivational measures (those that stimulate workers to improve and increase their productivity and your commitment). Their CSR accounts for compliance local (eg. equality plans, ethical codes, recycling programs), is supported by international quality certifications (such as those of ISO standards), and they begin to participate in global transformation forums (e.g. Global Compact-UN.). In this way, one begins to become aware of the importance of corporate culture, so that it can be lived and participated in a sustained way, with verifiable impacts and shared with others. 10 c) CSR 3.0: mature organizations are produced, not by seniority, but by focus, since they are companies prepared for the new corporate culture, oriented towards people and their motivation. Its CSR is local and easily measurable and verifiable, as it is based on measures that affect its social and natural environment. Thus, CSR ceases to be something from outside doors (as a mere attempt to improve the business brand, or diligent and transparent regulatory compliance), becoming something from inside (thought by and for employees, together with their families: a culture to feel part of and celebrate). Temporarily speaking, CSR 1.0 dominated until the 2000s (although it survives in those incipient organizations - regardless of their seniority, as it is a matter of aptitude and attitude towards the economy of happiness and talent); Since the 2000s, thanks to international organizations and transnational forums, CSR 2.0 has been promoted. For its part, CSR 3.0 is the result of the creative destruction of the 2008 crisis of values, as the companies that survived and improved were due to their orientation towards talented employees and their involvement in the new corporate culture, based on a mission, vision and values with which to identify and give the best of each one. As required by CSR 3.0 in its succinctness, just consider the following example, which already links to SBDC. In the Basque Country (in Spain), on March 5, 2019, Fagor Industrial (household appliances manufacturer) signed an agreement with Orbea (bicycle company), by which a bonus of 200 euros was offered to workers for the acquisition of sports equipment and went to work without a car. In this way, Fagor achieved the following positive results from CSR 3.0: a) it looked after the well-being and health of its employees, when they came to work by bicycle; b) it cared for the environment, by reducing emissions with the reduction of cars at work; c) it improved the natural and social environment, since as new parking spaces were not required (even some of the existing ones could be dispensed with), a larger green recreational area was available; d) increased rest space for employees and the venue for business meetings, as well as with the families of employees, etc. And all this at no cost, only increasing profits: there was no need to spend on an extension of the car park, or on future places for holding meetings; the share of health insurance was reduced; It was not even necessary to pay the 200 euros of bonus, as it was part of the discount agreement with Orbea, which thus manages to increase its sales and release stock. So simply, Fagor had created money from RSC 3.0. These practices are very common in insurance companies, which count the steps taken each day through an app on their mobile, which translates into discounts on fees and gifts. Thus, corrected and increased, more and more companies create their own social currency, being granted for good coexistence practices and production results, being valid for the company cafeteria and surrounding businesses, or for the purchase of reduction of working hours, or any other consideration for flexibility of work (this is not only done by the leading companies of the GAFA model Google, Amazon, Facebook & Apple- but also those that have gone through a 11 process of conversion, Kodak type, even good part of the companies ranked by GPTW). The practice of rewarding virtual tokens for environmentally friendly behavior is called “eco-friendly activities”. It is recalled that CSR also affects public sector organizations, since more and more municipalities reward their fellow citizens with social currencies for their good practices: for example, Viladecans (a municipality near Barcelona), it was returned to the neighbors part of the energy savings achieved in local currency (Vilawatt) to be spent in local shops (Viladecans, 2020). This has also been done in other places, such as Brussels and its Eco Iris, and other cases that arise later (when dealing with the paradox of social currencies). Therefore, the resource of digital social currencies is something on the rise (despite its prediction in 1976 by Hayek or in 1988 by The Economist), present in all types of organizations, which reports benefits not only to direct collaborators (being possible higher and better remuneration, as their purchasing power always increases, without the risk of higher tax pressure or inflation), but, as a matter of CSR 3.0, it also results in the environmental, social, etc. common good. (It is a positive externality, until its standardization in markets, which will be when the forecasts of Hayek and the editors of The Economist). DISCUSSION AND CONCLUSIONS At the beginning of this paper, the exposition of a sample of business practice was assumed that could serve as a refutation of the proposals by academic mainstrean (of welfare state economics-WSE) and the new-luddite activists (contrary to technological advances), who consider that there is an inversely proportional relationship between technology and job well-being. They oppose technological advances because they believe that they violate working conditions, leaving people without work and increasing social inequalities. However, it turns out that the relationship between technological advances (such as digital currencies) and work well-being (by increasing remuneration, but from motivation, by undertaking from gamification to achieve it and the commitment to help with CSR) is not proportionally inverse (dismantling the fallacy that the more machinery and programming, the less work available to people), but is exponentially convergent (the more technological advances are produced, the more suitable work is for human beings, since they can dedicate themselves to exploit your personal talent). The real paradox (if not directly a discursive contradiction in the form of ideological cognitive dissonance), occurs with the double standard: local social currencies are beneficial if promoted by the public sector (as they are a small complement to national money), however, they become suspicious (of lack of transparency - with accusations of money laundering, including pyramid scam, see below BCE) if they appear in electronic format and, even more, if they are the result of private initiative., the collaborative intelligence shared in international forums such as the Global Compact-UU.NN. or Wellbeing Economics 12 Alliance-WEF, prove the opposite: unlike the state welfare economy, which is based on the redistribution of scarcity, on the other hand, the digital economy is based on the constant and diverse generation of abundance, thanks to creativity, talent and entrepreneurship (a question developed in other publications). It turns out that regarding the use of alternative local currencies or social currencies (Cortés, 2008. Corrons, 2017), if it is carried out by local entities of the public sector (such as the case of Bristol Pound in Bristol, SoNantes in Nantes or the most recent , of 2018, Citizen Economic Resource-REC in Barcelona), is considered an example of a social and solidarity economy –even, money with values (Corrons, 2017) -, despite the fact that companies are conditioned to participate for their operation; However, the appreciation varies (becoming speculative) if it is an initiative of the companies themselves (in Spain, since the Rumasa case in 1983, companies were prevented from having their own banks, something that facilitated their own financing) . Faced with such prejudice, one of the most successful antecedents to date should be mentioned, as is the case of Wir (short for Wirtschaftsring, which means economic circle), the currency of the Wir Cooperative Bank in Switzerland (since 1934, under the postulates of the economist Gesell on free money). This system has helped finance almost 100,000 Swiss SMEs (reaching an accumulated value of operations close to 1.5 trillion euros), proving very useful especially in periods of crisis (when there has been a lack of liquidity, such as the crisis in 2008). Going back to the so-called social currencies, already in the 2000s, cases such as the French Sol-Violette or the German Chiemgauer (each one existing in multiple municipalities, with more than half a thousand of participating companies and with operations worth several million euros per year). In Spain, after the financial crisis of 2008, there have been cases of social currencies now only electronic (via mobile app), such as Real de Vila Real in the Valencian Community; However, reluctance increases due to transferring social currencies to electronic support and their employability in the digital economy (as happened with the Mexican Túmin, created by professors Castro and López from the Intercultural Veracruzana University, who were charged with violation of the peso and the impulse of illegal currency). In short, as leading companies in digital transformation and in the implementation of the talent and happiness economy model (such as those ranked by GPTW) have been proving, the resource of digital socio-business currencies has the benefit of CSR 3.0 practices (helping companies, collaborators, communities and the environment), but it has many more possibilities, which will soon be discovered after the great lockdown and work stoppage by Covid19 and its associated economic depression (as already seen after the 2008 stock crisis, with Bitcoin and the subsequent boom in digital currencies, given the lack of liquidity and financing, the loss of purchasing power and incentives, etc.). Finally, keep in mind that in the last half century alone, there have been almost 150 bank crashes, more than 200 monetary, and 75 sovereign debt crisis. This means that a world average of a failure of the traditional monetary system (of national currency) is fulfilled every month and a half (shortening the terms in this 13 period of depression just started). If to this is added the aggravation of the debt crisis at the beginning of the 2019 recession and the post-Covid depression, it is obvious that the use of alternative instruments that favor the financing of companies is indispensable (introducing new fluidity), the remuneration of collaborators (including, if necessary, their hiring via alternative billing), etc. At bottom line, digital socio-business currencies balance seems quite positive, taking into account that it is something incipient and whose possibilities will start to emerge in the cycle of economic depression that is opening after the Covid19 crisis (as will already happened with blockchain and Bitcoin after the 2008 stock crisis). 14 REFERENCES Amagasa, T., et al. (2005). Karojisatsu in japan. Journal of Occupational Health, 47(2), 157– 157. Andreessen, M. (2014). “Why Bitcoin Matters”, New York Times (URL: https://dealbook.nytimes.com/2014/01/21/why-bitcoin-matters/; consulted: May, 2020). Andreu, A., Sánchez-Bayón, A. (2019). Claves de Administración y Dirección de Empresas en la Posglobalización, Madrid: Delta Publicaciones. Bailey, B.J. (1998). The luddite rebellion. New York: NYU Press. Berentsen, A. (2018). A Short Introduction to the World of Cryptocurrencies. St. Louis: Federal Reserve Bank of St. Louis. Conley, J.P. (2017). Blockchain and the Economics of Crypto-tokens and Initial Coin Offerings, Nashville: Vanderbilt University Press. Cortés, F. (2008): Las monedas sociales, Almería: Cajamar. Corrons, A. (2017): “Monedas complementarias: dinero con valores”, Revista Internacional de Organizaciones, 18, 109–34. Cubeiro, J.L. (2012). Del capitalismo al talentismo, Bilbao: Univ. Deusto. Easterlin, R.A. (1974). Does Economic Growth Improve the Human Lot? en David, P., Reder, M. (eds.). Nations and Households in Economic Growth, New York: Academic Press Inc. Easterlin, R.A., et al (2010) The happiness-income paradox revisited. Proceeding of the National Academy of Sciences, 107(52), 22463-68. Edelman (2020). Introduction. Edelman (URL: https://www.edelman.com/, consulted: May, 2020). Enciso, E. (2018). Las criptomonedas, el futuro de la economía mundial, UTADEO (URL:https://www.utadeo.edu.co/es/noticia/destacadas/expeditio/264566/las -criptomonedas-el-futuro-de-la-economia-mundial; consulted: May, 2020). Frank, R. (2014). Karoshi: death from overwork. Sherwood Park News, 24, 24. Frey, B. (2018). Economics of Happiness, Basel: University of Basel. Gallardo, I., et al. (2019). Análisis del anonimato aplicado a las criptomonedas. Río Cuarto: XXV Congreso Argentino de Ciencias de la Computación. Glaser, F., et al. (2014). Bitcoin. Asset or currency? Revealing users´ hidden intentions. Tel Aviv: 15 ECIS. González, E., Sánchez-Bayón, A. (2019). Nuevas tendencias de RR.HH. y desarrollo de talento profesional. Porto: Ed. Sindéresis. Kurzweil, R. (2005). The singularity is near. New York: Penguin Group. Lakomski-Laguerre, O., Desmedt, L. (2015). L’alternative monétaire Bitcoin: une perspective institutionnaliste. Revue de la régulation. Capitalisme, institutions, pouvoirs, 18, 1-22. Lansky, J. (2018). Possible state approaches to cryptocurrencies. Journal of Systems integration. 9(1), 19-31. Leitaer, B. (2005): El futuro del dinero (trad.). Buenos Aires: Longsheller. Leitaer, B. (2010) “El futuro ya está aquí”, en VV.AA.: El futuro del dinero, Madrid: Fundación de la Innovación Bankinter, Mougayar, W., (2016). The Business Blockchain. Hoboken: John Wiley & Sons Inc. Rojas, M. (2014). El estudio científico de la felicidad, México DF: FCE. Ruwitch, J., Sweeney, P. (2013). China prohíbe a los bancos realizar transacciones con bitcoin. London: Reuters. Sale, K. (1996). Rebels against the future: the luddites and their war on the industrial revolution: lessons for the computer age. New York: Basic Books. Sánchez-Bayón, A. (2020). “Renovación del pensamiento económico-empresarial tras la globalización: Talentism & Happiness Economics”, Bajo Palabra, 24, 293-318. Sánchez-Bayón, A. (2019a). Una historia crítica de sociología del trabajo y de las organizaciones: de “trabajadores de cuello azul y blanco” a “Knowmads & freeriders”. Miscelánea Comillas, 77(151), 431-51. Sánchez-Bayón, A. (2019b). Transición a la Economía GIG. Encuentros multidisciplinares, 21(62), 1-19. Sánchez-Bayón, A. (2016). Problemas y retos para alcanzar la sociedad del conocimiento. Madrid: Delta Publicaciones. Sánchez-Bayón, A., et al. (2020). “The Spanish B-Schools trouble in digital economy”, Journal of Entrepreneurship Education, 23(5), 1-8. Valero, J., Sánchez-Bayón, A. (2018). Balance de la globalización y teoría social de la posglobalización. Madrid: Dykinson. Viladecans (2020). ¿Qué es 16 vilawatt? Viladecans (URL: https://www.viladecans.cat/es/vilawatt, consulted: May, 2020). VV.AA.a (2020). Defining a New Economic Paradigm: The Report of the High-Level Meeting on Wellbeing and Happiness. UU.NN. (URL: https://sustainabledevelopment.un.org/index.php?page=view&type=400&nr= 617&menu=35, consulted: May, 2020). VV.AA.b (2020). World Happiness Report 2020. UU.NN. (URL: https://s3.amazonaws.com/happiness-report/2020/WHR20.pdf; consulted: May, 2020). Zheng, Z., et al. (2017). An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends, en VV.AA.: 2017 IEEE International Congress on Big Data, Boston: IEEE. 17 18 Intention to Use M-Government Services: Age, Gender and Education Really Matter? Annie Ng Cheng San1, Choy Johnn Yee2, Krishna Moorthy3, Alex Foo Tun Lee4 Abstract With the highest level of mobile penetration rate, the globe is now moving rapidly into mobile government (M-government). Despite its benefits, the acceptance of m-government services in Malaysia is still not widespread. This study attempts to incorporate the Unified Theory of Acceptance and Use of Technology (UTAUT) model with perceived risk theory (security risk and privacy risk) to explore its impact towards the intention to use m-government services. Age, gender and education level were also adopted as moderator variables to provide in-depth understanding of citizens’ preference in m-government services. Partial Least Square (PLS) Structural Equation Modelling method was conducted. The results indicate that the facilitating condition, performance expectancy, social influence, and security risk can be used as the predictor of m-government services adoption. These findings confirm the application of theory in the m-government context, which provide valuable insight to the government, citizens as well as future researchers to implement a successful m-government for a better communication between government and citizens. Keywords: Mobile Government, UTAUT, Security risk, Privacy risk Jel Codes: 032, 033 INTRODUCTION With the advancement of mobile technology, it changes the form of public services globally. Today, mobile technology is no longer used for the purpose of communication and entertainment only, but it is also used to improve the competence, intelligibility, and accountability of government services. With its unique characteristics of mobility and wirelesses, mobile technology plays essential and growing roles in the government position to deliver reliable information and services anytime, anywhere and on any devices to meet the needs of people (Thunibat, Mat Zin, & Sahari, 2010). Mobile government (hereinafter called M-government) is the integral components of electronic government. It focuses on the use of mobile platforms in government operation and services (Al-Hujran, 2012). Effective M-government practices aid the government to advance the sustainable development and communication with 1 Lecturer, Department of Commerce and Accountancy, Universiti Tunku Abdul Rahman, Perak Campus, Malaysia. Email: [email protected] Orcid: 0000-0003-3553-550X 2 Lecturer, Department of Marketing, Universiti Tunku Abdul Rahman, Perak Campus, Malaysia. Email: [email protected] Orcid: 0000-0003-4527-0111 3 Assistant Professor, School of Economics and Management, Xiamen University Malaysia, 43900 Sepang, Selangor, Malaysia.Email: [email protected] Orcid: 0000-0003-0431-0957 4 Lecturer, Department of Commerce and Accountancy, Universiti Tunku Abdul Rahman, Perak Campus, Malaysia. Email: [email protected], Orcid:0000-0001-8248-5336 19 citizens by providing better access to public services in health, education, labor as well as environment (Ohme, 2014; Waller & Genius, 2015). The influence of m-government has been witnessed in many developed and developing countries including Malaysia. M-government services in Malaysia With the increasing number of mobile users and high mobile penetration rate of 150%, it is a good opportunity to promote and implement M-government in Malaysia (Malaysian Communications and Multimedia Commission, 2015). Table 1. Types of m-government services provided in Malaysia M-services mySMS Number 15888 myUSSD *158# myMMS 15888 myApp myPay Functions Received short message service (SMS) on:  License application status  Alert on renewing road tax, driving license expiry and income tax return due date  Information about government housing loan balance, road safety tips, traffic summons and train schedules Send SMS complaints to the government agencies such as Social Security Organization (SOCSO) or (PERKESO) Request respond via Unstructured Supplementary Service Data (USSD) such as provide a menu to check:  Status or result of public exam monthly pension payment  Application status of myKAD  Operation hour for marriage counter registration  Credit loan status It is an enhancement of SMS, which allow public to share the Multimedia Messages (MMS) comprising the text, images, and video clips. It provides broadcast functions such as:  Sending alert message on missing child or  Complaints of traffic or vandalism. It provides mobile application download. The current applications offered are:  myHealth - provide tips for health issues  myJakim – provide Solah information such as prayer time, mosque and Qibla locator  myKPDNKK – provide domestic trade information from Ministry of Domestic Trade, Cooperatives and Consumerism  mySPAD – provide public transport terminals, routes, schedules and fare such as rapid public bus routes, KTM commuter schedule, and Kuala Lumpur Monorail schedule. It provides payment channel through mobile for the government service such as:  Traffic summons  Utility bills  Income tax payment 20 Thus, a number of innovative initiatives have been launched by the government such as the No Wrong Door Policy in the Tenth Malaysia Plan and Mobile Community Transformation Centres to expand and strengthen the service quality of M-government to reach more people. To date, there are more than 77% of public services provided through the mobile technology such as mySMS, myMMS, myAPP, myUSSD and myPay. Table 1 shows the current mobile government service provided in Malaysia. Challenges of M-government services in Malaysia and Research Questions Despite the benefits, convenience and a number of initiatives adopted for mgovernment services, the acceptance rate is still far from the enormous utilization in Malaysia (Abdullah, Mansor, & Hamzah, 2013). Out of the 27.3 millions of mobile users in 2015, yet only 335,768 logins were recorded (Performance Management & Delivery Unit, 2016). Besides, Malaysia has a dramatic drop from 40 to 52 in the ranking of world e-government development in the latest United Nations E-government survey (2014). As such, the Performance Management and Delivery Unit (2014) urged that the awareness activities remain essential to educate and alert the citizen about the significance of m-government services. To realize the vision 2020 to transform Malaysia into a fully developed country, the key challenge for m-government is to ensure its quality and service delivery to transform a successful citizen centric of m-government (Abdulla, Mohd Noor, & Ibrahim, 2016). The success of government initiatives always heavily depends on the end users (Sharma, 2015). Hence, it is essential to understand the needs of citizens towards the m-government services to strengthen the service quality and delivery model which best suited the citizens’ expectation. The high acceptance of mobile devices for daily activities might not guarantee the acceptance of using this technology for government service (Venkatesh, Chan, & Thong, 2012). The past literatures on m-government services’ acceptance mainly focused on Technology Acceptance Model (Belanche, Casalo, & Flavian, 2012; Wang, 2014; Liu, Lim Kostakos, Goncalves, Hosio, & Hu, 2014) and Theory of Planned Behavior (Hung, Chang, & Kuo, 2013). Yet, majority of all the above said models are not specifically designed for m-government and the past literature often faced difficulty in choosing the best model for government services. Moreover, Shafinah, Sahari, Sulaiman, Mohd Yusoff and Mohd Ikram (2013) claim that by solely grounding on theory or model, it is incomplete to understand the technology acceptance. To overcome it, Unified Theory of Acceptance and Use of Technology (UTAUT) unified eight popular models to examine the acceptance based on organizational context. It consists of four main determinants, which are Performance Expectancy (PE), Effort Expectancy (EE), Social Influence (SI), and Facilitating Condition (FC) to explain the technology adoption. It is a highly validated model, which tailors on the acceptance of technology. 21 Moreover, risks are major problems faced in the government services. 97% of Malaysians think that security and privacy risks are the major obstacles for them not to use the m-government services (Thunibat, Mat Zin, & Sahari, 2010; Shafinah et al., 2013). The authors highlighted that security risk and privacy risk are the most crucial determinants in government services. However, majority studies have neglected the contribution of perceived risk (Shafinah et al., 2013). Hence, this study serves to narrow the research gaps by adopting the UTAUT and perceived risk theory (Perceived Security Risk (SR) and Perceived Privacy Risk (PR)) to investigate the determinants of m-government services. It will also investigate the moderator impact of age, gender and education level on each of the causal relationship of all constructs. Accordingly, the research questions are: RQ1: Can the determinants in UTAUT model be confirmed in Mgovernment services context? RQ2: Do the SR and PR have an impact on the ITU of M-government services? RQ3: Do age, gender and education level moderate the causal relationship between these determinants? LITERATURE REVIEW AND HYPOTHESES DEVELOPMENT Unified Theory of Acceptance and Use of Technology (UTAUT) In the past decade, several theoretical models have been developed to explain the user’s acceptance of technology usage. Among the models proposed, UTAUT is one of the popular models with most encompassing theory which provides a high explanation power of the intention of mobile technology adoption. Yet, Ohme (2014) highlighted limited studies that adopted UTAUT model in m-government services. Intention to use of M-government Services Intention is the individual’s subjective probability to accept certain action. It is immediate antecedent of behaviour to indicate the individual’s readiness to perform the said services (Lin, Tzeng, Chin, & Chang, 2010). In this study, the m-government services’ intention is used as the proxy to measure the actual behaviour as it is the best indicator for actual user behaviour (Hew, Lee, Ooi, & Wei, 2015). The prior empirical studies related to the influence of the proposed constructs with the intention are presented in the following part. Performance Expectancy (PE) It is defined as one’s belief on the usage of technology will assist him or her in achieving goal in the job performance (Venkatest et al., 2003). When the user perceives that the technology is able to enhance their goal and performance, it will cause a favourable preference towards the acceptance intention (Dwivedi, Shareef, Simintiras, Lal, & Weerakkody, 2015). PE has been in the limelight in the past literatures. Among the past studies, it is the strong determinant of 22 acceptance intention in organization context (Tung, Chang, Chou, 2008; Ng & Choy, 2013). Consistently, the following hypothesis was tested: H1. PE significantly influences the intention to use M-government services. Effort Expectancy (EE) EE is one’s perception of the degree of effortlessness associated with the use of technology (Venkatest et al., 2003). The users will intend to use m-government service if they believe that the technology is easy to control, operate and understand. Leong, Hew, Tan and Ooi (2013) also purported the significant association between EE and PE. This is supported in the empirical finding in Hew, Lee, Ooi and Wei (2015), which agreed that when the users found that the technology are convenient and easy to accessible, he or she will have high possibility to adopt the said technology and have a perception that the technology is useful. Thus, the following hypotheses are posited: H2. EE significantly influences the intention to use M-government services. H3. EE significantly influences the PE of M-government services. Social Influence (SI) SI is the degree of individual’s perception on those who are important to them who think that he or she should accept the technology (Yi, Jackson, Park, and Probst (2006). The past studies concluded that it is an important indicator for acceptance intention of technology. One might learn and intend to adopt the technology when he or she observes the other carries the similar behaviour in the social group. According to Singh et al. (2010), individual will intend to adopt the mobile commerce service when they are influenced by friends, family or colleagues. The findings in Venkatest et al. (2003), Venkatest, Thong and Xu (2012), as well as Abdelghaffar and Magdy (2012) have proven that no matter in mandatory or voluntary setting, SI is the most significant determinant for acceptance intention of technology. Thus, the hypothesis is proposed as below: H4. SI significantly influences the intention to use M-government services. Facilitating Condition (FC) FC is the degree of technical support or training that supports the use of technology (Venkatest et al., 2003). According to Venkatest, Thong and Xu (2012), FC significantly affects the acceptance intention as well as the user behavior towards technology. For instance, an individual is willing to accept the M-government service if there is a favourable set of FC such as training, tutorial or vendor support on the m-government services. Besides, Marshall, Mills and Olsen (2008) also found that with sufficient supports, users will be able to perceive the said technology as useful and easy to use/practical. However, limited studies have focused on the association of FC with the PE and EE. In other word, the complex tri-dimensional between FC, PE, and EE remains ambiguous in the literature. Thus, this study proposes the following hypotheses: 23 H5. FC significantly influences the intention to use M-government services. H6. FC significantly influences the PE. H7. FC significantly influences the EE. Perceived Risk Theory Perceived risk refers to the uncertainty that potentially affects the users’ confidence towards the services in a long term (Im, Kim, & Han, 2008). The authors further commented that perceived risk and anxiety are different whereby “anxiety can be mitigated” but perceived risk will remain unchanged for a long time. Government services are dissimilar with the m-commerce activities as it often involves highly sensitive and personal information (Venkatest, Chan, & Thong, 2012). Yu (2005) argued that citizens are highly concerned about the security and privacy risks when they are enjoying the government services. Hence, security and privacy are among the major aspects that require extra surveillance in the m-government services in order to foster the usage. To narrow down the literature gap, the perceived security risk (SR) and privacy risk (PR) are incorporated to test their significant influence towards the intention to use mgovernment services in Malaysia. (a) Perceived Security Risk (SR) According to Ohme (2014), SR is the uncertainty of users towards the said technology due to the concern about the technical fraud by unauthorized third parties such as system hacking. When the citizens have a high doubt on the security of system, it is unlikely for the citizens to use the system. Venkatest, Chan, and Thong (2012) also agreed that when the users adopt the government services such as e-filling, they have a greater concern about the security since it involves high volume of personal and sensitive information. Hence, when the SR concern is high, the citizen will have lack of confidence towards the service which then contribute to the negative impact towards the usage of technology. Hence, the following hypothesis is put forward: H8. SR significantly influences the intention to use M-government services. (b) Perceived Privacy Risk (PR) Majority of past studies often combine the PR and SR in their research. Yet, PR and SR are different. SR focused on the technical fraud done by unauthorized third parties; while PR emphasized on the uncertainty arises from the misuse of personal information by the authorized parties (Ozdemir, Trott, & Hoecht, 2008). Ohme (2014) further commented that PR is the uncertainty or doubt on the authority or government handling the data transmitted during the mgovernment services. When the PR is high, the loss of trust towards the system and the technology in general is highly likely to occur. Based on the concern on privacy, the hypothesis is formulated: H9. PR significantly influences the intention to use M-government services. 24 Moderating Effects: Age, Gender and Education level From the observation of past literature reviews which adopted the UTAUT model, it can be concluded that the past studies have overlooked the moderating impact towards the constructs influence (Venkatesh, Thong, & Xu, 2012). To narrow the literature gaps as well as to enrich the UTAUT model in mgovernment context, this study proposes individual differences such as age, gender and education level as the moderating variables. Differences of individual characteristics such as age, gender, and education background have contradicted opinions in the technology intention (Venkatesh, & Morris, 2000). For example, Yang (2005) discovered that male is more inclined towards technology as compared to female. Mature adults will be more likely to concern about the risk of adopting the technology as compared to the young users. Young users tend to be risk takers, who are willing to use the new technology (Lian & Yen, 2014). Hew, Lee, Ooi and Wei (2015) highlighted that the past studies have neglected the moderating effects of individual’s education level. Individual with high education level will tend to encounter fewer barriers to adopt new technology (Chopra & Rajan, 2016). Hence, with the supportive evidences, the following hypothesis is formed: H10. Age, gender and education level moderate all relationships among the proposed constructs and intention of M-government services. Proposed Conceptual Framework With the above discussion of prior empirical studies, there are a total of six determinants: PE, EE, SI, FC, SR and PR to gauge the influence towards the behavioural intention of m-government services. To simplify the study, use behaviour was removed in this study. Figure 1 below presents the proposed conceptual framework for this study: Figure 1: Proposed conceptual framework Note: PE=Performance Expectancy; EE=Effort Expectancy; SI=Social Influence; FC=Facilitating Condition; SR=Perceived Security Risk; PR=Perceived Privacy Risk; ITU=Intention to use. 25 Sampling technique and data collection method Questionnaire survey was adopted for the purpose of data collection in this study. With national mobile users as the targeted population, quota sampling technique was used by narrowing our sampling target to four states with the highest number of mobile users in Malaysia (MCMC, 2015). They are Selangor (20.9%), Johor (12.7%), Kuala Lumpur (8.9%), and Perak (8.5%), hence making up a sum of 51% out of total population. Pre-test of the questionnaire was conducted with six dominant researchers in the M-commerce field in order to ensure its feasibility and validity. Instrument Development Then, 300 self-administrated questionnaires were distributed, and 265 complete responses were collected which were usable for the data analysis. The medium of language is English. Self-administration was incorporated with the hope to reduce interviewer’s bias in terms of influencing the response of the questionnaire. The survey questionnaire was made up of two sections, i.e., demographic profile as well as 26 items responsible in measuring mobile user’s perception on the constructs of the study. The items in the questionnaires were adopted from the past literature, in which each construct is measured by three to four items in a 7-point Likert scale format (as provided in Table 3.1). The reliability of the instrument is attested to be within acceptable threshold, and is hence satisfactory to proceed to descriptive and inferential analysis. DATA ANALYSES Demographic Profile of respondents Table 4.1 shows all the demographic profiles of the 265 target respondents. It is reported that majority of the respondents are female with the age group of 2030 years old. Majority of them achieved Bachelor degree with the monthly income within the range of RM 2001 to RM 3,000. All of the target respondents owned at least one mobile device. Results of statistical analyses Smart-PLS 2.0 of partial least square (PLS) structural equation modelling (SEM) method was used to analyse the said model in Figure 1. According to Santhanamery and Ramayah (2015), PLS is a pertinent technique for analyzing predictive models with multiple-item constructs. Hair et al (2014) also commented that the variance-based SEM provides better efficiency in parameter estimated which is manifested in advance statistical power than the covariance based SEM. For such rationales, the PLS-SEM is the one that fits for this study. Two-step analytical procedures suggested by Santhanamery and Ramayah (2015) and Anderson and Gerbing (1988) are used to analyze the empirical findings. The reliability and validity measurement model were first evaluated, followed by the structural model assessment and hypotheses testing. According to Wu and Chen (2014), the desired sample size for PLS is ten times of the number of indicators 26 associated or the highest number of antecedent constructs. Thus, the sample size of 265 is considered adequate for the study. Table: 3.1 Survey Instruments 27 Table: 4.1 Demographic profiles of respondents The Measurement Model Evaluation The measurement model is presented in Figure 4.1 as below: Figure: 4.1 Measurement model The assessment of measurement model focuses on both reliability and validity of the study. Firstly, to examine the reliability for all constructs, Cronbach’s alpha and composite reliability (CR) are assessed. Hair et al. (2014) advised that the CR and Cronbach’s alpha’s value should be greater than 0.7 in order to demonstrate a high internal consistency of scales used in each constructs. Table 4.2 showed that both the CR and Cronbach’s alpha value for all constructs are looking good. Next, validity for constructs was evaluated by the convergent validity and discriminant validity. Convergent validity denotes as the degree to which two or more attempts share a high proportion of variance in common and it can be 28 confirmed by the factor loadings and average variance extracted (AVE). According to the rules of thumb suggested by Hair et al. (2014), the factor loading should exceed 0.70 and AVE should be greater than 0.50. Table 4.2 presents the factor loading and AVE for each construct which has been attained. For the PR1 under the perceived privacy risk, as the factor loadings is smaller than 0.7, hence the item PR 1 will be dropped. On the other hand, discriminant validity serves as the extent to which a construct is truly discrete from others constructs. As suggested by Fornel and Lacker (1981), discriminant validity test is conducted to determine the correlation between the constructs and square root of AVE for that construct. Referring to Table 4.3, the square root of AVE as presented in the bolded value for each construct is higher than the correlations between constructs. Hence, discriminant validity is achieved. As recorded in Table 4.2 and 4.3, we can conclude that all constructs exhibited acceptable reliability and validity. Table: 4.2 Indicator factor loadings, Cronbach’s alpha, composite reliability, and AVE of constructs The structural model shows the relationship between the findings of the hypotheses testing proposed in this research model. It was assessing by running bootstrap procedure using five thousand samples in SmartPLS and the findings for structural model are presented in Table 4.5 and Table 4.6. All the hypotheses proposed are supported except for H2 and H9. Firstly, the antecedents to intention to use M-government services in Malaysia were evaluated. The path coefficient for direct effects model indicated that PE (β =0.285, p<0.001), SI (β =0.226, p<0.001), FC (β=0.286, p<0.001) and SR (β=0.119, p<0.05) has a direct positive influence on the intention to use the m-government services. Whereby, 29 the influence of EE and PR are not statistically significant to the intention to use, thus not supporting H2 and H9. The R square (R2) revealed that 51.30 percent of the variation in intention to use M-government services can be explained by explanatory constructs. Besides, the results show that the FC has a direct and positive influence towards the PE (β=0.346, p<0.001, R2 =0.403) and EE (β=0.661, p<0.001, R2=0.437). All these R2 are higher than the rule of thumb 0.35 suggested by Cohen (1988) and the FC is found as the strongest predictor of intention to M-government services. Table: 4.3 Discriminant Validity Test Note: PE=Performance Expectancy; EE=Effort Expectancy; SI=Social Influence; FC=Facilitating Condition; SR=Perceived Security Risk; PR=Perceived Privacy Risk; ITU=Intention to use. The diagonals (bolded) represent the square root of the AVE while the offdiagonals are correlations among constructs. Diagonal elements should be larger than off-diagonal elements in order to establish discriminant validity. The Structural Model Evaluation The structural model is shown in Figure 4.2 below: Figure: 4.2 Structural model Moderating Effects of gender, age and education level Multigroup analysis via PLS-SEM was carried out to examine the moderating effects of gender, age and education level in all paths of the proposed research model (Figure 1). Firstly, the female is coded as 1 and male is coded as 2 for 30 gender perspective. Age and education level was re-grouped into two main categories; younger and lower education level was coded as 1 and eldest and with higher education level was coded as 2 according to the median. Table: 4.4 Moderate effects: multiple group analysis Notes: PE=Performance Expectancy; EE=Effort Expectancy; SI=Social Influence; FC=Facilitating Condition; SR=Perceived Security Risk; PR=Perceived Privacy Risk; ITU=Intention to use. 31 The method is consistent with the technique recommended in Hew, Lee, Ooi, and Wei (2015) and Rahman, Taghizadeh, Ramayah, and Ahmad (2015) studies. The result in Table 4.4 reported that the gender was found to have significant moderating effect on PE ITU; EE PE, SI ITU, and FC PE. Whereby, age was found to be significantly moderate in the relationship between EE PE, FC PE; FC EE and PR ITU. Lastly, education level also found to have significant moderating effect in the path between SI ITU, FC PE; FC EE and PR ITU. Hence, H10 is partially supported. Predictive Relevance and Effect Size Sullivan and Feinn (2012) urged that the statistical significance (p-value) does not disclose the statistical power of the research model (substantive significant, effect size). According to Cohen’s (1988) rules of thumb, the magnitude of effect size (f2) of 0.02, 0.15 and 0.35 indicate the small, medium and large effect size respectively. Based on the result in Table 4.5, it can be observed that all the relationships have a passable effect size. Further to that, Table 4.6 also reported the predictive relevance of the endogenous latent variable via blindfolding procedures. Cohen (2013) suggested that Q2 should be greater than the value of 0 and 0.02, 0.15 and 0.35 denoting small, medium and large predictive relevance. Table 4.6 reported that the ITU (Q2=0.40) has large predictive relevance with Q2 more than 0.35, whereby the PE (Q2=0.298) and EE (Q2=0.299) which have medium predictive relevance. Therefore, it is concluded that the research model proposed has a material predictive power in explaining the ITU to use Mgovernment services. Table: 4.5 Results of structural model analysis Notes: ***p<0.001; **p<0.05; PE=Performance Expectancy; EE=Effort Expectancy; SI=Social Influence; FC=Facilitating Condition; SR=Perceived Security Risk; PR=Perceived Privacy Risk; ITU=Intention to use. Table 4.6 Predictive relevance and effect size of the endogenous latent Notes: PE=Performance Expectancy; EE=Effort Expectancy, ITU=Intention to use. 32 DISCUSSIONS With the PLS-SEM analysis, the empirical results found that all constructs have positive and significant relationship with the ITU m-government services, except the constructs of EE and PR. Among the constructs proposed, FC is seen to be the most important determinant which has stronger influence on ITU. Fundamentally, all paths from the UTAUT have been confirmed in this study except the EE and PR. Performance Expectancy (PE) Based on the empirical result, PE is the second strongest predictor for the ITU of m-government services. The finding is in agreement with the findings of Venkatesh, Morris, Davis and Davis (2003); Hew, Lee, Ooi and Wei (2015); and Chopra and Rajan (2016). Hence, only when the citizens viewed that the mgovernment services are productive and useful for their daily life, it leads to high intention to adopt the said services. This is particularly in view of the benefit brought about by the m-government services in term of fast and beneficial transaction. Effort Expectancy (EE) The result shows a surprising and interesting fact, that EE has insignificant influence towards the ITU of m-government services. This opposes the findings by Venkatest et al. (2003); Venkatest, Chan, and Thong (2012); and Leong, Hew, Tan and Ooi (2013) which suggested the EE has a significant effects towards the ITU. The inconsistent finding might be due to the fact that the target respondents are techno-savvy who perceive mobile services as friendly to them (Yu, 2012). Consequently, EE would not affect the citizens’ intention to adopt the m-government services. However, the significant relationship between EE and PE is confirmed. Leong, Hew, Tan and Ooi (2013) suggested that to boost the adoption and usage of technology, the high level of convenience should be highly regarded as it results in the positive perception on the usefulness, or else users might perceive it as difficult and a hassle instead. Consequently, the purpose of adopting the m-government services will be defeated. Social Influence (SI) SI has been confirmed as significant determinant of ITU. It is comparable with to the majority of past studies such as Yi, Jackson, Park, & Probst (2006); and Abdelghaffar and Magdy (2012). It is believed that family, colleagues, peers and friends’ recommendation or word of mouth have a powerful impact on the individual intention to use the m-government services. Facilitating Condition (FC) FC is confirmed as the most significant determinant of ITU in this study. The empirical result also confirmed that there are positive association between FC to PE and EE. These results therefore support the importance of technical support in m-government services whereby it creates favourable preference among 33 citizens towards the implementation of m-government. When there is sufficient technical support, the citizens will have trust towards the m-government services for they are useful and easy to use (Marshall, Mills, & Olsen, 2008; Venkatest, Chan, & Thong, 2012). Thus, this study shall contribute to the significant association between FC to PE as well as EE which are neglected by the majority of past studies. Perceived Security Risk (SR) SR’s empirical finding is in line with the past studies by Ohme (2014) and Nasir, Wu, Yago, and Li (2015). Yet, it was surprisingly found that the SR has positively influenced the ITU of M-government services as this direction of result contradicts the past literature reviewed. This finding provides relevant insight that the higher the SR concern, the higher one’s intention to use the mgovernment services. Roger (1995) reasoned this finding as majority of the target respondents fall between 20 to 30 years old, a group that can be classified as technology savvy. This might explain why the citizens intent to adopt the mgovernment services, even after some reports or incident about the security violation has been reported. Perceived Privacy Risk (PR) PR was not found to have any significant influence towards the ITU of mgovernment services. This finding is in line with Tan, Qin, Kim and Hsu (2012) and Ohme (2014), who agreed that with the improvement of m-government policy, the citizens might have sufficient confidence towards the government in handling the data. Therefore, as compared with the SR, PR is no longer the major concern for the citizens. Moderating effect of Age, Gender and Education Level In this study, the moderating effects of age, gender and education level were examined in all constructs. Remarkably, the empirical result demonstrated that gender has moderating effects on relationship of PE ITU; EE PE, SI ITU, and FC PE, which is parallel with the study of Venkatesh et al. (2003). It is agreed that male tend to be more task-oriented. Thus, when they perceive the mgovernment services as useful (PE) and have sufficient technical support (FC), they will be more likely to adopt the services. For female, they are more sensitive to others’ recommendation and focus more on the degree of effort involved (Venkatesh & Morris, 2000). Therefore, SI and EE are more prominent for them. Next, individual with from different ages are found to have significant moderating impact on the relationship between EE PE, FC PE; FC EE and PR ITU. Older citizens tend to face more difficulties in adopting new technology; they are less innovative and more concern about the risk. As a result, the older citizens tend to emphasize on the technical supports (FC) and PR in adopting the m-government services. For younger citizens, they tend to focus more of the degree of effort and usefulness, which results in a greater moderating influence in relationship between EE and PE. Lastly, difference of education 34 level of the citizen yields moderating effect in causal relationship between SI ITU, FC PE; FC EE and PR ITU. It is concluded that citizens with higher education level will tend to depend more on the FC which leads them to a better control and knowledge towards the m-government services. They believe that the system is convenient and useful with sufficient resources and support. On the other hand, citizens with lower educational level are more conscious, will consider more on the details and privacy of the data and has a higher level of risk concern before making any technology adoption (Chopra & Rajan, 2016). As a result, SI and PR are more salient in the m-government services’ adoption. IMPLICATIONS Theoretical Implications Shafinah et al. (2013) suggested that prevalence of m-government services, often referred to as the users’ behavioural intention and citizens’ demands and needs, and are vary. However, limited studies showcased the complete constructs as well as the moderating effects proposed by the UTAUT model. This study incorporates the UTAUT and perceived risk theory to explore the conceptual connection between the proposed variables and the behavioural intention of the m-government services among the citizens. From the theoretical point of view, all the constructs proposed have been successfully justified in this study. All of the constructs such as perceived expectancy, social influence, facilitating condition and perceived security risk have been examined and found as the salient predictors for intention to use m-government services. Furthermore, this study serves to narrow the existing literature gaps by incorporating the moderating effects of age, gender and education level in the proposed model to yield better insight in explaining the intention to use m-government services. Successful incorporation of UTAUT model and perceived risk theory (PR and SR) is another accomplishment made by this study which explained 51.3 percent of the variances in intention to use m-government services in Malaysia. The new research model would serve as a baseline for future researchers in the mgovernment service study. Managerial Implications With the vision 2020, Malaysian government is aiming for a better, more effective and higher quality government services to the citizens. With the unique characteristic of mobile devices and high level of mobile penetration, there are clear opportunities for the SMART (Social, Mobile, Analytics, Radical Openness and Trust) m-government in Malaysia. The managerial implications of this study are crucial and comprehensive to the m-government service providers. The government should be aware of the impact of performance expectancy, social influence, facilitating condition, and security risk upon the implementation of the m-government services. In order to improve the communication between government and citizen, Malaysian government must ensure that the service is in the highest level of usefulness, with sufficient technical support, and limited security flaws. 35 Out of all predictors, facilitating condition contributes the highest influence power towards the intention to use. Technical support is always important. Therefore, close attention should be given to the technical support and resource in m-government services in Malaysia. Government should provide demonstration, animated tutorial as well as real time assistance to facilitate the citizens in using the m-government services. Next, performance expectancy is the second strongest predictor leading to the intention to use the m-government services. The m-government services should be able to cater the daily lives of citizens and see how it could be assimilated with the citizens’ routines. Survey should be conducted from time to time to understand the citizens’ needs to improve the usage of m-government services. Inter-government agencies as well as private sectors at the national or global level should be invited and engaged to provide an extensive m-government services. Given with the unlimited access to media nowadays, it is very important to promote the usage of m-government services via mass media and social network channels. Next, citizens are worried about the increasing use of m-government services which will result in the increasing vulnerability of sensitive information as well as the security flaws. By recognizing the significant contribution of security risk, the m-government service providers in Malaysia must safeguard security principles and review the existing regulations in order to address the security concerns. Due diligence must be implied to ensure that the citizen sensitive information is protected in a secured system access, user identification and other advanced security measures. The service providers must always bear in mind that insufficient data security will greatly pose an influence on the citizen’s uptake of m-government service. The moderating effects of age, gender and education level indicates the need for market segments to provide explicit consideration for different citizens’ characteristics. One size suits all strategies is not applicable in the m-government services. Male and older citizens with high education are more concerned about the usefulness and technical resource or support of m-government services. Female are more sensitive with the words of mouth and the degree of efforts in which they want the system to be more convenient and easy to use. All these findings can serve as momentum for the Malaysian government to be aware of the citizens’ preferences and needs to develop a successful m-government service. LIMITATIONS AND RECOMMENDATIONS Even if the study contributes a new insight into the m-government services adoption, it is limited in which the study was carried out only in Malaysia. Hence, the findings can only been transferable to country with similar culture and mgovernment infrastructure. A comparison with cross country or cross culture study on m-government services should be conducted in future research. On a side note, this study did not integrate mediator into the research model. It will be 36 exciting to examine the mediating effects in the constructs to contribute deeper insight for the service provider. CONCLUSION The study has successfully examined the predictors of m-government services by incorporating the UTAUT and risk theory. The effects of FC, SR, and EE are quite surprising because the results differed from the expected outcomes. FC has been proven as the most important predictor of m-government services which leads the citizens to perceive that the services are useful and convenient to use. Moreover, instead of having negative effects on ITU of m-government services, SR was found to have positive influence towards the ITU. For EE, the findings also showed that the convenience of m-government services is no longer a major impact towards the ITU. This might be due to the targeted citizens who are technology savvy and risk takers with high level of innovation. Even though there might be a high security concern, citizens are still willing to use the mgovernment services. As a conclusion, citizens prefer useful m-government services with adequate technical assistance and support and zero security flaw to benefit them. 37 REFERENCES Abdelghaffar, H. & Magdy, Y. (2012). The adoption of mobile government services in developing countries: the case of Egypt. International Journal of Information and Communication Technology Research, Vol.2, No.4, pp. 333-341. Abdullah, N. R. W., Manson, N. B. & Hamzah, A. (2013). Keeping ahead of the game: Innovations and challenges in e-government in Malaysia. The Economic and Labour Relations Review, Vol.24, No.4, pp. 549-567. Al-Hujran, O. (2012). Toward the utilization of m-government services in developing countries: A qualitative investigation. International journal of Business and social science, Vol.3, No.5, pp.155-160. Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two step approach. Psychological Bulletin, Vol. 103, No. 3, pp. 411–423. Belanche, D., Casalo, L. V., & Flavian, C. (2012). Integrating trust and personal value into Technology Acceptance Model: the case of e-government services adoption. Cuadernos de Economía y Dirección de la Empresa, Vol. 15, No. 4, pp. 277-288. Chopra, S. & Rajan, P. (2016). Modeling intermediary satisfaction with mandatory adoption of E-government technology for food distribution. Information Technologies & International Development, Vol, 12. No. 1, pp. 15-34. Cohen, J. (1988). Statistical power analysis for the behavioral sciences. Mahwah, New Jersey: Lawrence Erlbaum. Dwivedi, Y. K., Shareef, M. A., Simintiras, A. C., Lal, B., & Weerakkody, V. (2015). A generalised adoption model for services: A cross-country comparison of mobile health (m-health). Faaeq, M. K., Alqasa, K., & Al-Matari, E. M. (2014). Technology adoption and innovation of E-Government in republic Iraq. Asian Social Science, Vol.11, No. 3, pp. 135-145. Hair, J. F., Hult, G. T. M., Ringle, C. M. & Sarstedt, M. (2014), A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage Publications, Los Angeles, CA. Hew, J. J., Lee, V. H., Ooi, K. B., & Lin, B. (2016). Mobile social commerce: The booster for brand loyalty? Computers in Human Behavior, Vol. 59, No.2016, pp. 142-154. Hew, J. J., Lee, V. H., Ooi, K. B., & Wei, J. (2015). What catalyses mobile apps usage intention: An empirical analysis. Industrial Management & Data Systems, Vol. 115, No.7, pp. 1-18. 38 Hung, S. Y., Chang, C. M., & Kuo, S. R. (2013). User acceptance of mobile e-government services: An empirical study. Government Information Quarterly, Vol. 30, No. 1, pp. 33-44. Im, I., Kim, Y., & Han, H, J. (2008). The effects of perceived risk and technology type on users’ acceptance of technologies. Information & Management, Vol. 45, No. 2008, pp. 1-9. Leong, L. Y., Hew, T. S., Tan, W. H. G., & Ooi, K. B. (2013). Predicting the determinants of the NFC-enabled mobile credit card acceptance: A neural networks approach. Expert Systems with Applications, Vol. 40, No. 2013, pp. 5604-5620. Lian, J. W., & Yen, D. C. (2014). Online shopping drivers and barriers for older adults: age and gender differences. Computers in Human Behavior, Vol. 37, No. 2014, pp. 133-143. Lin, C. S., Tzeng, G. H., Chin, Y. C., & Chang, C. C. (2010). Recommendation Sources on the Intention to Use E-Books in Academic Digital Libraries. The Electronic Library, Vol. 28, No. 6, pp. 844-857. Liu, Y., Li, H., Kostakos, V., Goncalves, J., Hosio, S., & Hu, F. (2014). An empirical investigation of mobile government adoption in rural China: A case study in Zhejiang province. Government Information Quarterly, Vol. 31, No. 3, pp. 432-442. Malaysian Communications and Multimedia Commission. (2015). Communications & Multimedia Pocket Book of Statistics Quarter 1, 2015. Marshall, B., Mills, R., & Olsen, D. (2008). The role of end-user training in technology acceptance. Review of Business Information Systems, Vol. 12, No. 2, pp. 1-8. Nasir, M.A., Wu, J. J., Yago, M., & Li, H.H. (2015). Influence of psychographics and risk perception on internet banking adoption: Current state of affairs in Britain. International Journal of Economics and Financial Issues, Vol.5, No. 2, pp. 461-468. Ng, C. S. A., & Choy, J. Y. (2013). The Modified Technology Acceptance Model for Private Clinical Physicians: A Case Study in Malaysia, Penang. International Journal of Academic Research In Business and Social Sciences, Vol. 3, No.2, pp. 380-403. Ohme, J. (2014). The acceptance of mobile government from a citizens’ perspective: Identifying perceived risks and perceived benefits. Mobile Media & Communication, Vol. 2, No. 3, pp. 298-317. Ozdemir, S., Trott, P., & Hoecht, A. (2008), Segmenting internet banking adopters and non-adopters in the Turkish retail banking sector. The International Journal of Bank Marketing, Vol. 26, No. 4, pp. 212-236. Performance Management & Delivery Unit. (2014). Economic Transformation Programme Annual Report 2014. Retrieved July 1, 2015, from 39 http://etp.pemandu.gov.my/annualreport2014/upload/ETP2014_ENG_full_v ersion.pdf Rahman, S. A., Taghizadeh, S. K., Ramayah, T., & Ahmad, N. H. (2015). Service innovation management practice in the telecommunications industry: what does cross country analysis reveal. SpringerPlus, Vol. 4, No. 810, pp. 1-25. Rakhi, T. & Mala, S. (2014). Adoption readiness, personal innovativeness, perceived risk and usage intention across customer groups for mobile payment services in India. Internet Research, Vol. 24, No. 3, pp. 369 – 392. Rogers, E.M. (1995). Diffusion of Innovations, 4th ed. The Free Press, New York, NY. Santhanamery, T., & Ramayah, T. (2015). Understanding the effect of demographic and personality traits on the E-filing continuance usage intention in Malaysia. Global Business Review, Vol. 16, No. 1, pp. 1-20. Shafinah, K., Sahari, N., Sulaiman, R., Mohd Yusoff, M. S., & Mohd Ikram, M. (2013). Determinants of user behavioural intention (BI) on mobile services: A preliminary view. Procedia Technology, Vol. 11, No. 2013, pp. 127-133. Singh, S., Srivastava, V., and R. K. Srivastava. (2010). Customer acceptance of mobile banking: A conceptual framework. SIES Journal of Management, Vol. 7, No. 1, pp. 55-64 Tan, X., Qin, L., Kim, Y.B., & Hsu, J. (2012). Impact of privacy concern in social networking web sites. Internet Research, Vol. 22, No. 2, pp. 211–233. Thunibat, A. A., Mat Zin, N. A., & Sahari, N. (2010). Mobile government service in Malaysia: Challenges and opportunities. Information Technology International Symposium (ITSim), Vol. 3, No. 1, pp. 1244-1249. Tung, F. C., Chang, S. C., & Chou, C. M. (2008). An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry. International Journal of Medical Informatics, Vol.77, No. 5, pp. 324-335. Venkatesh, B., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly, Vol. 36, No. 1, pp.157-178. Venkatesh, V. & Morris, M. G. (2000), “Why men don't ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage”, MIS Quarterly,Vol. 24, No. 1, pp. 115-139. Venkatesh, V., Chan, F. K. Y., & Thong, J. Y. L. (2012). Designing e-government services: Key service attributes and citizens’ preference structures. Journal of Operations Management, Vol. 30, No. 1-2, pp. 116-133. 40 Venkatesh, V., Morris, M. G., B. Davis, G., & D. Davis, F. (2003). User Acceptance of Information Technology: Toward A Unified View. MIS Quarterly, Vol. 27, No. 3, pp. 425-478. Waller, L., & Genius, A. (2015). Barriers to transforming government in Jamaica: Challenges to implementing initiatives to enhance the efficiency, effectiveness and service delivery of government through ICTs (e-Government). Transforming Government: People, Process and Policy, Vol.9, No. 4, pp. 480-497. Wang, C. (2014). Antecedents and consequences of perceived value in mobile government continuance use: An empirical research in China. Computers in Human Behavior, Vol. 34, No. 2014, pp. 140-147. Yang, K. C. (2005). Exploring factors affecting the adoption of mobile commerce in Singapore, Telematics and Informatics, Vol. 22, No.3, pp. 257-277. Yi, M. Y., Jackson, J. D., Park, J. S., & Probst, J. C. (2006). Understanding information technology acceptance by individual professionals: toward an integrative view. Information & Management, Vol. 43, No. 3, pp. 350-363. Yu, C.S. (2012). Factors Affecting Individuals to Adopt Mobile Banking: Empirical Evidence from the Utaut Model. Journal of Electronic Commerce Research, Vol. 13, No. 2, pp. 104-121. 41 42 E-Procurement within the City of Johannesburg Metropolitan Municipality, South Africa: A gendered perspective1 Angelita Kithatu-Kiwekete2, Shikha Vyas-Doorgapersad3 Abstract Municipalities in South Africa are expected to utilise their purchasing processes to promote gender equality. A key external goal of municipal procurement is to redress inequalities through economic opportunities and economic equity to the benefit of both men and women. Currently, most municipalities are transforming their services through electronic mode, resulting in the use of e-procurement processes which link business-to-business, business-to-consumer, and businessto-government via information and communication technologies. Using a Gender and Development (GAD) Approach, this chapter aims to assess the level of gender inclusivity in the municipal e-procurement processes in the City of Johannesburg as a case study. Among the questions raised in the chapter are whether gender mainstreaming is considered in the municipal procurement processes; and if there are any initiatives in place to capacitate men and women to ensure their participation in the e-procurement processes. The review of literature and official documents forms part of the desktop conceptual and theoretical analysis. Utilising qualitative, descriptive and analytical research approaches, the chapter explores the need for gender mainstreaming in the municipal e-procurement value chain processes such as e-informing, e-tendering and vendor management. The chapter then offers policy implications and suggestions for improvement. Keywords: Capacity building, e-procurement, gender, information and communication technologies, municipal procurement. Jel Codes: N77, H57 INTRODUCTION Esther Eghobamien, an interim director and head of Gender in the Social Transformation Programmes Division in the Commonwealth Secretariat (Kirton, 2013: 4) states that globally, very few “countries have designed public procurement policies which provide special derogation for competing companies based on gender (or ethnicity, for racially polarised countries)”. Gender is important for public procurement policy because it can contribute positively to 1 Kithatu A, Vyas-Doorgapersad S. (2017). Gender Based E-Procurement within the City of Johannesburg Metropolitan Municipality. International Journal of eBusiness and eGovernment Studies. 9 (1).2017. pp. 9-23. 2 Post-Doctoral Research Fellow, School of Public Management, Governance and Public Policy, University of Johannesburg, Republic of South Africa, Email: [email protected], Orcid: 0000-0001-5769-9965 3 Full Professor, School of Public Management, Governance and Public Policy, College of Business and Economics, University of Johannesburg, Johannesburg, South Africa, Email: [email protected], Orcid: 0000-0002-8146-344X 43 ensuring equitable access and provide benefits by diversifying the supply chain. Increasing the opportunities for more economic agents, particularly small and medium-sized enterprises (SMEs) to engage in the delivery of goods and services can result in improved outcomes for the alleviation of poverty and increasing gender equality, given that women-owned businesses are disproportionately located in this sub-sector of the economy (cited in Vyas-Doorgapersad & Kinoti, 2015: 97). Despite abundant scholarship on gender equality in Africa, the gendered dynamics within public procurement remains understudied (Nyeck, 2015: 28). Callerstig (2014: 53) agrees that more research is required in this field. The article therefore explores the relationship between gender and procurement and investigates the level of gender inclusiveness in procurement policies for socio-economic development. CONCEPTUAL CLARIFICATION Public procurement refers to the purchase by governments and state-owned enterprises of goods, services and works (Organisation for Economic Cooperation and Development (OECD), 2016: 1). E-procurement is defined as a system “incorporating all purchasing activities such as purchaser request, authorization, ordering, delivery and payment by utilizing electronic means such as internet, web technology and e-commerce” (Suleiman, 2013: 1). Before the advent of the internet, procurement functions were perceived by many to be routine and repetitive processes. This perception has since been modified by the expanding capabilities of the worldwide web (www) in recent years. Various business concerns found it both appropriate and inevitable to embrace the use of internet facilities to enhance the performance of their tasks (cited in Suleiman, 2013: 2). Underpinned by the Feminist Theory, this article adopts a Gender and Development (GAD) Approach because of its proposed policy implications. The GAD “addresses inequalities in women’s and men’s social role in relation to development (March, Ines and Mukhopadhyay, 1999: 9). This approach argues for “an integrated gender planning perspective” that concentrates “on the power relations between men and women” to challenge “the assumptions between traditional planning methods” (March, et al., 1999: 55). Furthermore, it links the GAD with the Empowerment Approach to mainstream gender in institutional processes. Razavi and Miller (1995: 2) see this collaboration as a “strategy of relevance” which challenges established institutional dynamics and makes gender equality a key part of the development dialogue. GENDER AND PROCUREMENT Public procurement has great potential to promote gender equality (European Institute for Gender Equality (EIGE), 2016: 1). It has therefore been suggested that “whenever possible … gender equality should be incorporated in the subject of the contract itself” and that his will mean “the incorporation of gender equality clauses requiring gender technical competence … as well as the inclusion of 44 gender criteria for the evaluation of the submitted proposals and for further implementation.” (EIGE, 2016: 1). In the African context, as cited in Nyeck (2015: 22), procurement opportunities raise several concerns, such as “future of human and gender security given outsourcing in key sectors such as health, education, the environment and security”; and that “money lost through procurement is opportunity delayed for gender equality in the financing of development”. Djan (2015: 6) takes up the debate and mentions that there are those who argue that there is no “correlation between the processes of public procurement and gender equality” and that “public procurement itself lies outside the field of relevance …[to] actualize social objectives (respect for equality between men and women among them)”. In other words, when public procurements are viewed solely in relation to economic development, “then their wider social impact is commonly disregarded”. This article furthermore stresses that in todays’ public administration, public procurement is not only linked with economic development but also requires technological understanding to utilise the technological aspect of procurement (known as e-procurement). This viewpoint is substantiated by Barahona and Elizondo (2012: 109) who argue that “new disruptive technologies – Internet services, social media, collaborative platforms, cloud computing – enable the development and diffusion of new disruptive models to provide services”, but caution that these must also be used to design and manage innovation and enhance the abilities and skill sets of public leaders and administrators. In addition, appropriate training must be provided for both men and women entrepreneurs to utilise the e-procurement system. GENDER INCLUSIVENESS IN PROCUREMENT PROCESSES: THE CASE OF SOUTH AFRICA By acknowledging the economic disparities entrenched by apartheid, the South African Constitution, 1996, requires that national legislation be enacted to ensure that public procurement provide for categories of preference in the allocation of contracts as well as the “protection or the advancement of persons” who have been “disadvantaged by unfair discrimination” (Republic of South Africa, 1996, section 217).The contestation for economic redress that drives the agenda for economic transformation in South Africa provides the leverage for enhancing gender equality. The result is an evolving dynamic legal framework for procurement that governs all state agencies and spheres of government. Legislation that recognizes the need to include previously excluded groups, such as all categories of women, offers the opportunity to promote gender inclusiveness through procurement. Laws such as the Preferential Procurement Policy Framework Act, 2000; and the Broad Based Black Economic Empowerment (BBBEE) Act, 2003 with its corresponding Codes of Good Practice (2007), stipulate a preferential point system that encourages the use of women-owned enterprises to benefit from preferential procurement of all state organs. 45 A desktop study was conducted by Vyas-Doorgapersad and Kinoti in 2015. The researchers reviewed the Department of Public Works (DPW) Strategic Plan 2012-2016 and deduced that “at the institutional structure level, the DPW, under its sub-programme: Corporate Services, set a Strategic Objective 6 that emphasises mainstreaming of gender, disability and youth development in the core business of both DPW and its related industry (Construction and Property)” confirming that “the gender aspect of DPW Strategic Plan 2012-2016 only incorporates ‘people with disabilities’” (Vyas-Doorgapersad & Kinoti, 2015: 104). This viewpoint is supported by Nyeck and Benjamin (cited in VyasDoorgapersad & Kinoti 2015: 100) emphasising that even “today, the theoretical and pragmatic rationales for complete outsourcing, privatization, or a combination of both” has implications for women in the public services supply chain. Furthermore, “shifts in the role of the state as an employer of women in the service and caring occupations around the world have not received sufficient attention. The role and impact of new public-private partnerships compared to other forms of privatization for the delivery of public services for women and by women also remains under researched”. In order to address this challenge, the Ministry of Women, Children and People with Disabilities (2012) has formulated the Women Empowerment and Gender Equality Bill (WEGE) and this was published in the Government Gazette of 29 August 2012 for public comment. The objective is the “monitoring and the setting of targets for women empowerment to achieve equal representation of women” in the public procurement sector (Frontier Advisory, 2013: 18). The Bill is still under consideration and its impact will only be assessed in the coming years. The Presidency acknowledges that constraints on the gendered implementation of these laws still persist (The Presidency, 2009: 29). Gender integration will thus require that proactive steps be taken in the implementation of procurement and that such steps should be made more visible to service providers that are owned by women and men. One of the ways of improving visibility is by modernising procurement. In 2015, national treasury implemented a centralised and computerised procurement system for the three tiers of government, state departments, agencies and entities through the Office of the Chief Procurement Officer (National Treasury, 2015). E-procurement makes the process more transparent and enhances accountability. This online platform utilises the e-procurement value chain that comprises e-informing, e-tendering, e-auctioning; and also vendor management, purchase order integration, e-invoicing, e-payment, and contract management. These e-procurement phases should adhere to the supply chain processes through which government purchases goods and services. This makes the recent introduction of e-procurement to be of particular importance to gender mainstreaming. In the metropolitan areas, women entrepreneurs have often been isolated from municipal procurement particularly in the larger contracts. It then becomes important for the larger municipalities to interrogate their supply chain management particularly e-procurement which encapsulates the municipal process in its entirety. The City of Johannesburg is therefore being used as a case study below. 46 E-PROCUREMENT IN THE CITY OF JOHANNESBURG Johannesburg retains the premier position as economic hub for the Gauteng region, South Africa, as well as the southern Africa region. This is emphasised in the municipality’s vision and medium term strategy as aligned to the National Development Plan (NDP). The current integrated development plan (IDP), 2016-2021, sets “economic growth, job creation, investment attraction, poverty reduction, informal economy and small, medium and micro-sized enterprises (SMMEs) support” as key strategic objectives (City of Johannesburg, 2016: 9). Five economic transformation priorities have been identified, namely: i) industrial transformation to alter the present dominance of mining and service industries; ii) spatial transformation to restructure spatial patterns embedded by apartheid through efforts such as the corridors of freedom; iii) global positioning for the country in the international value chains; iv) competitive transformation particularly for SMMEs; and v) institutional transformation to support national development objectives. The city is using a fifteen-point economic development plan to realise these goals (City of Johannesburg, 2016: 46). This political economy places the municipality “at the coalface of facilitation of local economic development and delivery of utilities and other services necessary for sustainable communities, economic development and growth” (City of Johannesburg, 2016: 46). Being a municipality bound by international and national commitments for gender equality and the empowerment of women in local communities, compels Johannesburg to mainstream gender in its policies and programmes for economic growth and development. Municipal procurement thus increases the significance for realising economic development as determined by Nijaki and Worrel (2012: 135). Initiatives such as the Soweto Empowerment Zone; the local EPWP projects; and the Jozi Equity Fund have seen improved support for SMME and women-owned businesses (City of Johannesburg, 2013: 19). The next external role that local government can play in procurement is for the local sphere to realise economic equity for enterprises owned by women and other previously disadvantaged groups. Municipal procurement may be “specifically crafted as a tool to mediate equity concerns by targeting economic opportunities” for particular categories of people (Nijaki & Worrel, 2012: 140). This deliberate inclusion of enterprises that are on the periphery is important for gender mainstreaming because integrating gender into the municipal procurement enables women-owned enterprises to benefit and enhance their participation in Johannesburg’s local economic development. In looking to take advantage of competition between suppliers as well as “streamline the municipality’s purchase of goods and services”, efforts must also be made to ensure that gender equality is enhanced through procurement (City of Johannesburg, 2013: 19; also refer Gildenhuys, 2000: 187). The city’s procurement is managed by a Supply Chain Management policy (SCM) that is prescribed by national legislation including the Local Government: Municipal Finance Management Act, 2003. Johannesburg’s Supply Chain Management policy ascribes to a procurement system that supports Broad-Based Black 47 Economic Empowerment (BBBEE) and the Preferential Procurement Policy Framework Act (PPPFA) regulations. The policy also commits the city to make a deliberate effort to empower women-owned enterprises and enhance their gendered participation in the local economy. Johannesburg should therefore use its municipal procurement policies and processes to realise economic development as well as economic equity. It is critical that the city be able to assess, measure and integrate gender into procurement because regular evaluation provides the means to “integrate gendered data into the policy cycle” (Ambe & Badenhorst-Weiss, 2012: 252). The gender strategies presented above should “lead to better responsiveness to purchasing needs [and] a better understanding of unique local needs” because local purchasing is closer to suppliers which in turn will facilitate the inclusion of women owned enterprises in municipal procurement (Ambe & Badenhorst-Weiss, 2012: 253). Therefore, the performance advantages of utilising e-procurement should assist in increased municipal productivity, offer access to more suppliers, enhance transparency in purchasing, reduce costs as well as to promote the use of one interface that manages the municipal bid process. These benefits should in turn provide the opportunity for women owned businesses to partake in municipal procurement. More importantly, e-procurement must highlight critical areas of concern as will be examined below where women entrepreneurs encounter obstacles in increasing their share of the municipal procurement objectives for economic empowerment and economic equity. Obstacles include timeous access to electronic platforms as well as the mandate for preferential treatment of women entrepreneurs throughout the municipal bidding process Addressing these obstacles should enable Johannesburg to address gender bias that is inherent in its procurement processes that would otherwise not be highlighted. To achieve the above objectives, the municipality’s gender policy provides specific guiding strategies to mainstream gender into its municipal purchasing, namely: i) to ensure that 25% of all procurement contracts in non-traditional areas are granted to women and youth; ii) to develop systems and mechanisms to identify women involved in the informal economy and SMME level; iii) to create a data registration for SMMEs and traders in the informal sector; iv) to put in place a programme to capacitate women who run SMMEs and enable successful tenders for city projects; v) to strengthen links with entrepreneurial institutions to benefit women entrepreneurs; vi) to make available funding for women entrepreneurs through a community development bank to improve their capacity to deliver on tenders; vii) to develop a programme for women in the informal sector to enable them to participate in the mainstream economy; viii) to review the procedures of the payment system specifically for SMME because current procedures disempower women; ix) to disaggregate data on the Expanded Public Works Programme (EPWP); x) to monitor procurement trends and patterns in the city with a focus on gender; xi) to develop a strategy for women’s access to credit and capital; xii) to review (with the goal to increase) the tender point system for the women’s category; and xiii) to ensure that there is regular reporting on the awarding of contracts to women business owners and 48 suppliers of services (City of Johannesburg, 2013: 19). The city must make use of online platforms for e-procurement processes that should be gender sensitive. The following analysis on specific aspects of the city’s e-procurement gives an indication of the level of gender integration on the online platforms. Three of the strategies from the above list are used, namely: reviewing the e-procurement tender process with a focus on gender; monitoring the city’s procurement trends and patterns; and the disaggregation of data on Johannesburg’s purchasing processes. The process of e-tendering and vendor management should provide information on: the pre-bid phase where potential service providers are invited to register on the city’s database; the bidding process that includes the bidding period, evaluation of bids, adjudication period and finally the bid award to selected service provider. Information should also be available on the post-bid phase which involves the contract management by the Supply Chain Management (SCM) within the municipality (City of Johannesburg, 2009). Einforming involves communication to current and potential service providers on procurement processes and tenders. The SCM policy requires the city to use its official website, www.joburg.org.za as a platform for e-informing. As an example, it provides details on tender and bid documents. In addition, it must be acknowledged that the city offers free Wi-Fi in the Braamfontein area via the Braamfontein wireless mesh. Wi-Fi is also available in municipal libraries and clinics. This means the public is able to access the internet and furthermore, at municipal libraries computer facilities are available to check for tenders (City of Johannesburg, 2015). Johannesburg’s e-procurement platform is available on the city’s website https://joburg.org.za/index.php?option=com_content&id=309&Itemid=152. A screenshot is presented in Figure 1. Through the review of official documents (City of Johannesburg: Point Claim forms, Undated a,b), it can be emphasised that the online invitation to register on the city’s supplier database is given periodically. This call for interested service providers makes specific mention of SMMEs owned by women to make submissions. Despite the city’s commitment to collect gendered data on procurement, there is no evidence of gendered data in the tender forms that should be completed by potential service provides and included in their tender submissions. The forms that regulate the promotion of SMMEs during service provider registration illustrate this deficiency. Interested SMMEs should supply information in compliance to the PPPFA which is the verification on the SMME status and business location within the municipal jurisdiction of Johannesburg. 49 Figure 1. Johannesburg’s e-procurement platform 50 The forms do not include a gender component that the SMME can provide when completing the application. The absence of this requirement constrains the ability of the city to capture gendered data for the interested enterprises registering on the database. The website gives information on the bid process through the bid registers and reports going back at least five years; on cancelled proposals; on awarded contracts and previous tenders, including municipal entities such as Johannesburg Water and the Metropolitan Trading Company. The SCM also manages the contracts for successful tenders. In addition, the city’s website provides reports by the SCM on the contract management for approved projects. The SCM reports indicate which companies bid for the tenders; specific details of the company that was awarded the contract; the work provided by the service provider; as well as the value and duration of contract including any amendments to the contract project deliverables via status reports. Reports provided online comply with MFMA regulations and show the status of current tenders that are implemented by the city including any changes in prices or duration of the tenders. The data on the city’s reports on the contracts and awarded bids also highlight the motivation for selecting the particular bidders by citing specific reference to PPPFA requirements on the point system. However, the reports give no indication of SMME empowerment in these projects. In addition, there is no mention of whether or not the service providers are women-owned enterprises. Moreover, from Johannesburg’s e-procurement value chain highlighted here, service providers do not provide evidence of gender inclusion in their operations. Tenders are still increasingly awarded to larger, more established companies than to women-owned enterprises. As a result, the “present BEE model benefits a relatively small number of individuals” and a rather skewed implementation of the BEE, whereby “ownership and senior management receive disproportionate emphasis”. This is evident in the preferential point system in the awarding of municipal bids while the empowerment regulations “do not incentivise employment creation” or deliberately provide support for SMMEs (Ambe & Badenhorst-Weiss, 2012: 253).Therefore, while the city’s procurement trends and patterns can be monitored in terms of type of contracts, corresponding values awarded and whether these projects are aligned to local economic development goals, it is difficult to determine whether service providers are women-owned enterprises and/or women SMMEs. The absence of gender disaggregated data throughout the e-procurement value chain impedes the city’s ability to track and to improve gender thresholds through its procurement. POLICY RECOMMENDATIONS The City of Johannesburg operates its procurement and e-procurement as per its SCM policy which is guided by a national framework that acknowledges the need to proactively implement measures that enhance gender equality and the empowerment of women-owned businesses within its municipal jurisdiction. This article finds that gender mainstreaming in the implementation of the city’s 51 SCM has yet to be done adequately. Although the city has a gender policy to guide internal operational procedures as well as municipal service delivery, the eprocurement value chain for Johannesburg does not reflect any gender integration measures in the procurement process; there are no measures that may be used by women- owned enterprises to enhance their participation and visibility. While it is important to create a space for women-owned enterprises, it is also critical to transform the procurement space that large enterprises occupy so that gender mainstreaming can also be meaningfully implemented with the larger municipal contracts. Decuyper (Undated: 2) recommends three main approaches that can be used to integrate gender in public sector procurement, namely: in the selection criteria (exclusion of discriminating companies); the contract award criteria (by including gender as a sub-criterion when evaluating the quality of the offer); and in the contract performance conditions (the obligation to take the gender perspective into account when executing the commissioned tasks). Firstly, the service providers should be required to mainstream gender in their operations and gendered data should be collected during the bid process and implementation of the procured contracts. Johannesburg should therefore include gender criteria in the procurement processes such as e-registration and e-tender submission, whereby service providers be required to give “details concerning the promotion of equal opportunities” for women and men in their operations and support to womenowned SMMEs (Weewauters, 2007: 14). The reporting on the e-procurement value chain should also encapsulate gendered data to enhance gender mainstreaming. Therefore, going forward the city’s SCM should collect gender disaggregated data from service providers throughout the e-procurement value chain to enhance the participation of women entrepreneurs in its municipal eprocurement. CONCLUSION This article finds that municipal procurement is critical in enhancing local economic development as well as attaining economic equity particularly for women entrepreneurs. Women are often marginalised from supplying goods and services to Johannesburg. E-procurement offers the opportunity to enhance gendered reporting of the process, but fails to do so. Johannesburg must adopt far-reaching strategies in its municipal procurement practices to ensure that gender is mainstreamed and that women-owned businesses, SMMEs as well as large enterprises adopt gender sensitive measures to win contracts with the municipality. It is important that the collection and provision of gendered data throughout the city’s e-procurement process be made visibly available for women SMMEs as well as potential service providers. 52 REFERENCES Ambe, Intaher, E. and Johanna A. Badenhorst-Weiss (2012), Procurement Challenges in the South African Public Sector, Journal of Transport and Supply Management, Vol. 6, No. 1, pp. 242–261. Barahona, Juan Carlos and Andrey Elizondo (2012), The Disruptive Innovation Theory Applied to National Implementations of E-Procurement, Electronic Journal of EGovernment, Vol. 10, No 2, pp.107 – 119. Callerstig, Anne-Charlott (2014), Can Public Procurement be an Instrument for Policy Learning in Gender Mainstreaming? Scandinavian Journal of Public Administration, Vol. 18, No. 4, pp. 51–71. City of Johannesburg (Undated a), MBD 6.3: Reference Points Claim Form in terms of the Preferential Procurement Regulations 2001 Promotion of Small Business, http://www.joburg-archive.co.za [Accessed 17.11.2016]. City of Johannesburg (Undated b), MBD 6.11: Reference Points Claim Form in terms of the Preferential Procurement Regulations 2001 Promotion of enterprises located in a specific municipal area, http://www.joburg-archive.co.za [Accessed 17.11.2016]. City of Johannesburg (2009), Supply Chain Management Policy Adopted in Terms of Section III of the Municipal Finance Management Act, No. 56 of 2003, Johannesburg: City of Johannesburg. City of Johannesburg (2013), Gender Policy http://www.joburg.org.za/images/stories [Accessed 16.11.2016]. City of Johannesburg (2015), Braamfontein Gets http://www.joburg.org.za [Accessed 19.11.2016]. Free Framework, Blanket Wi-Fi, City of Johannesburg (2016), IDP 2016/21, http://www.joburg.org.za [Accessed 17.11.2016]. City of Johannesburg (2017), Johannesburg’s e-procurement platform, https://joburg.org.za [Accessed 02.05.2017]. Decuyper, Jeroen (Undated), Position Paper: The Introduction of the Gender Dimension in the Public Budgets, Public Procurement Contracts and Subsidies. http://www.oecd.org [Accessed 02.12.2016]. Department of Trade and Industry (2007), BBBEE Codes of Good Practice, Pretoria: Government Gazette No. 29617. Djan, Aurelija (2015), Public Procurement and Gender Equality: Its Impact on Women in the Security Sector in Serbia, Belgrade: Belgrade Centre for Security Policy. 53 European Institute for Gender Equality (2016), http://eige.europa.eu [Accessed 24.09.2016]. Gender Procurement, Frontier Advisory (2013), The Current Status of Policies, Practices, Measures and Barriers Regarding Women-owned Businesses in Government Procurement: Report Prepared for the Businesswomen’s Association of South Africa (BWASA), http://bwasa.co.za [Accessed 28.11.2016]. Gildenhuys, J.S. Hans (2000), Introduction to Local Government Finance: A South African Perspective, Pretoria: J.L. Van Schaik Publishers. Kirton, Raymond Mark (2013), Gender, Trade and Public Procurement Policy: Kenya, Australia, Jamaica, http://assets.thecommonwealth.org [Accessed 25.10.2016]. March, Candida, Innes Smyth and Maitrayee Mukhopadhyay (1999), A Guide to Gender Analysis Frameworks. Oxford: Oxfam GB. Ministry of Women, Children and People with Disabilities (2012), Women Empowerment and Gender Equality Bill, Pretoria: Government Printers. National Treasury (2015), Central Procurement Portal https://eprocurement.csd.gov.za [Accessed 24.11.2016]. for Government, Nijaki, Laurie Kaye and Gabriela Worrel (2012), Procurement for Sustainable Local Economic Development, International Journal of Public Sector Management, Vol. 25, No. 2, pp.133–153. Nyeck, S.N. (2015), (Out)bidding Women: Public Procurement Reform Diffusion and Gender Equality in Africa, http://webhost1.cortland.edu [Accessed 23.11.2016]. Organisation for Economic Co-operation and Development (OECD) (2016), Public Procurement, http://www.oecd.org [Accessed 28.11.2016]. Razavi, Shirin and Carol Miller (1995), From WID to GAD: Conceptual Shift in the Women and Development Discourse, United Nations Research Institute for Social Development, Occasional Paper 1, Geneva: Switzerland. Republic of South Africa (1996), Constitution of the Republic of South Africa, Pretoria: Government Printer. Republic of South Africa (2000), Preferential Procurement Policy Framework Act. No. 5 of 2000, Pretoria: Government Printer. Republic of South Africa (2003), Broad Based Black Economic Empowerment Act. No. 53 of 2003, Pretoria: Government Printer. 54 Republic of South Africa (2003), Local Government: Municipal Finance Management Act. No. 53 of 2003, Pretoria: Government Printer. Suleiman, Mohammed A. (2013), Adoption of e-procurement and value addition to Tanzanian public institutions a case of Tanzania public institutions, Tanzania: Mzumbe University. The Presidency (RSA) (2009), South African CEDAW Report: Progress Made on the Implementation of the Convention 1998 – 2008, Pretoria: The Presidency. Vyas-Doorgapersad, Shikha and Abel Kinoti (2015), Gender-based Procurement Practices in Kenya and South Africa, African Journal of Public Affairs, Vol. 8, No. 3, pp. 96–108. Weewauters, Marijke (2007), Equal Opportunities for Women and Men in Public Procurement Contracts: A Few Recommendations, Brussels: Institute for the Equality of Women and Men. 55 56 Impediments to the use of eLearning technology in an applied sciences and technology at a university in South Africa Anthony Kiryagana Isabirye1, Nobukhosi Dlodlo2, Lydia Mbati3 Abstract This chapter examines the impediments that derail the intensive uptake of eLearning programmes in a particular higher education institution. The study adopted an inductive research paradigm that followed a qualitative research strategy. Data were collected by means of one-on-one in-depth interviews from selected faculty members at a nominated institution of higher learning. Data were iteratively and reflexively analysed, leading to the emergence of four themes. Notably, the scepticism towards the implementation of transformative eLearning was ascribed to complex initiation procedures, inadequate training and support, an incoherent e-policy at the institution as well as resistance to change. In lieu of this, the paper advocates for the incremental adoption of fully-fledged eLearning strategies and policies among academic institutions as well as the effusive use of blended learning approaches. Thus, as opposed to merely enabling academic faculty to refine their teaching, eLearning strategies could possibly alter the manner in which faculty members conduct their teaching and assessment activities. Keywords: eLearning, implementation, transformative. Jel Codes: 031, 032, 033 INTRODUCTION If current university structures have to embrace innovative teaching and learning strategies, they must be flexible enough to adapt to the contemporary teaching and learning approaches. Without such flexibility, students’ entrance to the worldwide knowledge repositories could be impeded. Within the same vein, an array of transformational enablers exists to provide academics with adequate motivation for re-thinking curricula. These may include among others; globalisation, commercialisation and internationalisation of higher education (Zakaria, Janjua & Fida, 2016); the inevitable shift from product based economies to knowledge based economies together with the changing student profiles and learning styles (Engelbrecht, 2003). The discussion is no longer about whether to introduce digital technologies into mainstream teaching and learning but rather, how to use the technology and skills students already have to create meaningful learning experiences (Ng’ambi, Brown, Bozalek, Gachago & Wood, 2016). Similarly, Garrison and Kanuka (2004) maintain that curriculum transformations that cater for emerging technologies play a pivotal role in the global 1 Dr., Department of Human Resource Management, Vaal University of Technology, South Africa, Email: [email protected], Orcid: 0000-0003-3601-2241 2 Dr., Department of Marketing, Vaal University of Technology, South Africa, Email:[email protected], Orcid: 0000-0002-4727-5453 3 Dr, Open Distance Learning Research Unit, College of Education, University of South Africa, South Africa, Email: [email protected], Orcid: 0000-0002-1182-2654 57 competitiveness of universities. Consistent with this view is the evident phenomenal growth in the integrated usage of information communication technologies (ICTs) in South African higher education institutions (HEIs). This is because the ‘traditional’ lecture is no longer an appealing product to the digital natives who are leading a ‘wired,’ anytime, anywhere lifestyle (Czerniewicz & Brown, 2009). Relatedly, universities’ competitiveness in the global higher education market will be dependent on their flexibility and ability to embrace and make use of current technological advancements to change educational and business practices. The precarious position of many HEIs is the struggle to wade off the threat of being ‘left behind’ by their competitors. Likewise, in the business world, new entrants continue to give innovative solutions at low cost as the markets continue to expand. This makes it difficult for the ‘static’ or ‘complacent’ higher education providers to compete (Mapuva, 2009). At the primary level, the emphasis on the part of higher education institutions is to create a learning experience that prepares the higher education student to function in the global world. Secondarily, students and academic faculty are encouraged to contribute meaningfully to the digitally connected global work environment. Keegan (2003:1) defines electronic learning (henceforth referred to as eLearning) as the “provision of education or training electronically through the Internet” whereas Koohang and Harman (2005) portray eLearning as a confluence between Internet interfaces and software developments that produces education and learning that is ubiquitous and engaging. However, these definitions are only limited to the Internet’s ability to alter the cognitive abilities of users. Other scholars argue that real learning is an activity that changes the individual’s perceptions and attitudes whilst simultaneously empowering them with both cognitive and physical skills (Rekkedal & Qvist Eriksen, 2003). In this study, the authors conceptualise eLearning as all forms of authentic web-enabled teaching and learning that actively engages students in the process of knowledge construction. eLearning has been adopted in South Africa as an inevitable advancement in spite of the plethora of challenges that are consequential toward its adoption by the learner, the academic, the web developer and university management (Ravjee, 2007). This study focuses on eLearning challenges presented to full-time academics at a South African University of Technology (UoT). LITERATURE REVIEW The review of literature in this section focuses on the eLearning and mobile learning (mLearning) affordances that may be effective in enhancing teaching and learning within the fields of applied sciences and technology disciplines. eLearning in the field of applied sciences and technology disciplines eLearning allows for collaborative activities in disciplines that rely on practical application as a demonstration of learning. Literature on the prominent pedagogical underpinnings of applied sciences and technology education denotes the use of social constructivism (Fransen, Weinberger & Kirschner, 2013), 58 interactive lecturing and modelling and simulation (Saraswat, Anderson & Chircu, 2014). In addition, problem-based learning is viewed as a viable pedagogical approach in applied sciences and technology education practice. While there are other pedagogical approaches that may be used in teaching applied sciences and technology education, the focus of this chapter is on the prominent approaches mentioned in this paper. in addition to eLearning, this chapter focuses on mobile learning as a subset of eLearning. Interactive lecturing Interactive lectures include a strong element of interaction on multiple levels. Interaction may be between the facilitator and the students, interaction between the students themselves, as well as student interaction with learning resources, which may be facilitated through eLearning platforms. In an eLearning environment, lectures may be offered via synchronous means through video conferencing and interaction can be facilitated using synchronous online discussions. Supportive resources may also be accessed on the internet to supplement the lecture. Problem based learning Problem-based learning is a learning approach in which students are expected to work (in teams), harnessing a variety of resources to solve a specific problem. Problem-based learning calls for teamwork, creativity and meta-cognition (Kumar & Natarajan, 2007). In the eLearning environment, problem-based learning may be facilitated through eLearning using applications that allow for interaction and social constructivism. Social constructivism views learning as occurring because of the social process of knowledge construction. In the realm of eLearning, social constructivism may occur through the social learning enabled applications such as blogs, discussion forums and/or wikis. These tools allow for social learning and collaboration beyond geographical boundaries. Modelling and simulation A number of applied sciences require authentic practice and application, which can be expensive, impractical and even risky. Modelling and simulation could be presented using controlled eLearning platforms. As technology advances, simulated and virtual learning contexts could be harnessed to develop skills required in real life situations. These modelling techniques and simulations are available as cloud-based computing; four-dimensional (4D) computer-aided design as well as geometric software. Mobile Learning (mLearning) in the field of applied sciences and technology disciplines mLearning is ordinarily assumed to mean “learning on the move”, however mLearning refers to learning with the use of a mobile device, particularly a smartphone or tablet, typically a handheld mobile device. The affordances 59 offered by mLearning to applied sciences and technology education are the focus of this section. Game-based Learning Game-based learning combines virtual reality with location-based learning. These affordances allow for learning to occur within authentic settings and stimulates competition both collaboratively and individually. Motivation is enhanced in game-based learning activities. Game-based learning may serve as a means to achieving other pedagogical goals such as problem-based learning, collaborative learning and interactive learning. Simulations and Virtual Reality Simulations in teaching and learning are particularly relevant to the field of applied sciences and technology. There are skills (both cognitive and motor) which are essential in certain applied disciplines. Similarly, it may be too expensive, too dangerous or against ethical norms to carry out training and skill enhancement in certain fields of study. This may be true of pilot training and medical procedures. In this fields, the use of simulations and virtual reality is a realistic, safer and cheaper option. Augmented Reality The portability of mobile devices allows students to conduct field work in situ. Using augmented reality enabled devices, students may view plants, buildings and other physical artefacts with information in a variety of formats related to the artefact embedded and displayed on the mobile device. Usage of a variety of mobile apps to achieve learning Mobile devices are capable of carrying out multiple functions due to the variety of tools and devices available in students’ hands. The excerpt below provides an example of the use of multiple mobile apps to enhance students’ learning experiences: A mobile application was designed to create an in situ experience of geospatial concepts and representations in science. This was achieved through the use of cameras, video data logging, and QR codes to access lecturer selected web-based information… PSTs (Pre-Service Teachers) selected a number of in-application features, illustrating adaptive use with various groups of students. Primary features chosen were the camera, QR codes, plant characteristics, video and ambient data section accessible on the “collect data” page Cameras were used to take pictures Ambient data logging on mobile devices QR codes were used to give students access to information not readily available in situ 60 QR codes linked to different representations related to the same concept (Price et. al., 2014). MOTIVATION FOR THE STUDY In its Draft White Paper on E-education in South Africa (2003:44), the Department of Education recommended that innovative teaching and learning in the form of eLearning becomes a “mainstream activity” among HEIs. This recommendation is consistent with the department’s (2015) development strategy of attaining the millennium goal of inclusivity through the “education for all by 2020” plan. Regardless of these evident plans and policies, Salmon (2005) notes that implementation of real eLearning beyond HEI initiated projects has so far been modest. Some institutions still strive to bring aboard the majority of students and staff onto the eLearning podium. Notwithstanding this fact, the scant technology champions who already exist are rarely appropriately guided towards the use of educational innovation. Furthermore, they are not amply motivated to effect comprehensive changes through eLearning. The reasons why academics shun the use of eLearning is worthy of investigation. This study is therefore, structured to find out the constraints towards embracing eLearning by considering the experiences of academic staff at a tertiary institution in South Africa. The authors are of the view that consultations with the academics will assist in determining the intervening variables that influence nonadoption decisions with a view to condense these constructs whilst developing a framework for eLearning inhibitors within the contextual setting of the university. RESEARCH DESIGN In accordance with Henning, Van Rensburg and Smit (2004), a qualitative, interpretive research design was adopted for the study with a view to solicit detailed information to explain the constraints to eLearning. The authors envisage that this type of information would expand knowledge and understanding beyond what is already known, consequently proffering a detailed account of the experiences of academics and providing clear explanations of the reasoning behind the decisions not to adopt eLearning in spite of its numerous advantages. Sample participants The purposive sampling method was used to select the participants for inclusion in this study. The process commenced with identification of a single participant. More respondents were further traced through the snowballing technique, ensuring that only participants with the required information were included in the sample. New participants were continually brought into the study until after ten participants, where no new information was being added. This signified completeness or saturation of the data (Charmaz, 2003; Groenewald, 2004; Henning et al., 2004). 61 Data collection process Semi-structured interviews were used to collect research-specific data. The process of the qualitative interviews entailed preparing the interview-guide based on the research questions, familiarising with the interviewees, the actual interview sessions and audio recording of the interviews. The interviews were conceptualised as planned social interactions between equals (interviewerinterviewee). This created a sense of relaxation and trust between the interviewee and the participants; enabling the latter to provide the best narration of their experience, thoughts and feelings with regard to eLearning constraints. The interviews were documented through audio-recordings and notes for further analysis. The field notes were used as part of the data. The field notes were also used as a measure of triangulation, whereby interviewees’ facial expressions and easiness (or uneasiness) during the course of the interview sessions were captured. In view of discerning any contradiction between what the participants had said and the non-verbal signals, exhibited characteristics were collated with the responses and reconciled. The notes were also made use of during the coding process. In line with Charmaz’s (2003) recommendation, the notes were used to document the products of coding, examine the codes further, establish and ascertain how the different categories were related and further explore emergent gaps in the formed categories. DATA ANALYSIS Data were iteratively and reflexively analysed (Srivastava & Hopwood, 2009). Collected data were organised and re-arranged following the procedures of a qualitative investigation, as suggested by Henning et al. (2004) and Ezzy (2010). The audio-recorded interviews were transcribed verbatim. The researchers listened to each audio-taped interview, read and re-read the transcripts several times, line by line; ensuring familiarity with the data and further determining data quality (Holliday, 2007). Moreover, constant reference was made to the research questions in order to keep the analysis focused. The data were then compiled, labeled, separated and organised through a process called coding. Credibility Maritz and Visagie (2010) indicated that research credibility is about truth-value and truth in reality. This study provides a comprehensible and justifiable connection linking each phase of the research from the data collection process right through to the reporting of findings. The authors make further attempts to present information coherently, while interpreting it in light of the empirical findings and eluding any personal assumptions and pre-conceived ideas that would possibly influence the outcomes the research. Ethical considerations Ethical clearance was obtained through the Ethical Research committee of the UoT under whose auspices the study was conducted. Participation in the study was voluntary and the respondents were free to withdraw at any stage without 62 victimisation. None withdrew, however. Informed consent was attained by revealing the purpose of the investigation to all participants in writing and verbally. Assurance was given to participants that their names would remain anonymous and the collected data would not be used for any other purposes other than to advance scholarly research and enhance scientific findings in the field. RESULTS AND DISCUSSION Data were collected from ten participants’ code named R1 to R10. The respondents’ revealed that adopting ICTs within HEIs was unavoidable. This was based on their observation that digital communication and information models are the preferred methods of preserving, retrieving and distributing information. However, the academics’ voices were beset with undertones of under-preparedness with regard to teaching within a blended learning domain, whereas eLearning platforms are used without the basic facilitating conditions. From the interviews, it emerged that the process of access registration at the institution was a cumbersome exercise, which was short of buy-in from staff members (complex initiation procedures). It also emerged that a de-motivator towards eLearning adoption was a technologically illiterate academic populace (Inadequate training and support). Additionally, the interviewees indicated that there were many cases when the academics themselves were unable to make use of eLearning since there was no clear e-policy to that effect (incoherent e-policy). Resultantly, a majority of the academics opted to remain attached to the traditional way of teaching (resistance to change). The ensuing themes are elaborated on in the ensuing subsections. Theme 1: Complex initiation procedures Complex initiation procedures were cited as a big deterrent towards the implementation of eLearning at the institution. The respondents indicated that not all staff members were able to use eLearning without going through a cumbersome and time-consuming registration procedure. While the faculty members were reluctant to go through the lengthy eLearning registration process, those who were already registered were discouraged from using the system due to lack of IT support coupled with the scantily available e-support material (Childs, Blenkinsopp & Walton, 2005). To exacerbate the eLearning implementation problem even further, registering the students online did not always happen timeously and academics would be unable to access learning materials until mid-semester every academic year. The participants’ concerns were aptly captured in the words of R5 when she stated that: “…there are tedious registration problems before an academic can obtain access rights on the LMS [learning management system]… as a lecturer I feel that I have limited accessibility rights on the LMS”… [and]… “some students may be omitted from the eplatform if there is incongruence between the institution’s online system and student enrolment services.” 63 A majority of the respondents further voiced their concern with regard to the lack of collaboration between the academics and the online enrolment services personnel. Noble (2002) suggests that departmental synergies and university buyin are necessary in order to ensure that both learners and staff members are enrolled on the online platform and obtain un-interrupted access to the LMS. Though research has proved the importance of top-down strategies in the implementation of eLearning, such strategy implementation requires the buy-in and engagement of academic staff (Cummings et al., 2005). For wider adoption, there is also need for the support of senior management, among other stakeholders. In this vein, academic staff as subject matter experts could potentially shun the implementation of eLearning if they were to be left out in the process of implementation. These sentiments were strongly captured by participants R3 and echoed by R9: “……I am comfortable with my (traditional) way of teaching” “I would not want to move from one teaching method to another because the face to face contact is working very well for me.” Theme 2: Inadequate training and support Schuler and Jackson (2006) point out the importance of training and development as major tools to ensure successful acquisition of the relevant skills and knowledge to implement eLearning. Training does not only provide participants opportunities to engage in practical training sessions but it also empowers them with the cognitive, affective and psycho-motor skills and knowledge to use online tools. There was need in this case for participants to receive training in audio podcasts, script-writing, recording, editing, uploading and the use of different software. They also needed to acquires skills and knowledge vital for the use of the self-assessment and onscreen marking tools. But training alone may not yield the expected results as it should be accompanied by a supportive context. In such a context training is not only supported by participants in the training programme but also the facilitators and the institution. What this implies is that the entire University management, junior and senior lecturers should be motivated and buy into the training programme. Therefore, for training and development to be effective academic faculty should also be motivated to learn. Indeed, Volery (2000) observes that technical proficiency (on its own) is not of great value unless the academics are encouraged and internally motivated to use eLearning. Some of the respondents admitted that they possessed limited knowledge about eLearning and its contribution. This was a very interesting finding for the study since eLearning aptitude plays a fundamental role towards providing the impetus for academics to utilise eLearning in their teaching practise (Meyer, 2001). Suffice to say; the academics who had computer proficiency demonstrated greater confidence and perceived ease of eLearning use. On the contrary, respondents who had minimal skills were reluctant to use eLearning as highlighted by R10: 64 “I am expected to use online learning tools and yet I have not been trained on what the eLearning platform can help me to achieve in terms of teaching and assessment”. This finding is in line with Rekkedal and Qvist Eriksen’s (2003) assertion that lack of skills and IT competencies significantly contribute towards the nonadoption of eLearning. According to Charlesworth (2002), academic faculty are neither resistant to training nor to the use of technology in their teaching. On the contrary, the entire process is obfuscated by a lack of training regarding the implementation and incorporation of technology in their daily teaching. Such perceptions inadvertently become impediments in the process of implementing an innovation, causing problems in perception, application and technology usage (Volery, 2000). Training of staff should therefore, be used as an invaluable motivational tool for augmenting the confidence of academics towards various eLearning initiatives. It is indeed against this backdrop that Shapiro (2000) advocates for proficient training that should include both technical and conceptual issues. Relatedly, Macpherson et al. (2005) observe that appropriate skills and ability to use eLearning platforms generates increased user’ satisfaction. Such satisfaction is closely connected to active participation and devotion to the innovation. Thus, if lecturers do not realise the importance of a particular technology and its contribution towards the achievement of teaching goals, they are likely to be deprived of any commitment towards using the technology, rendering it impossible to integrate the technology into teaching practise (Meyer, 2001). Theme 3: Incoherent e-policy Generally, the university training policy, needs to acknowledge the importance of staff development. Such a policy should ensure that faculty take part in professional development activities that are related to their work. The policy should not only support e-learning, like in this context, but also other staff development related activities like professional conferences and sabbatical leave. Furthermore, the policy needs to make allowance for the university to accord enough human and physical resources to ensure the success of the e-learning intervention. Resources like appropriate presentations, handouts, venues, materials and refreshments during the period of training are as vital as the provision of human resources. Furthermore, the need for a staff development budget, support and guidance for all staff participating in e-training should be well embedded in the e-policy. All this calls for efficient management as managers should always act as the champions of professional development. Leu and Ginsburg (2011) note in this regard that as their leadership role has the potential to influence change as they direct academics towards professional development Mapuva (2009) discusses the absence of institutional leadership that channels the modus operandi of HEIs towards the fruitful adoption of eLearning. In this regard, the successful implementation and use of the technology is dependent upon created institutional structures that are designed to improve the effectiveness of pedagogical methods to disseminate educational material 65 through technological innovations. E-policy documents usually act as indispensable tools through which institutions can avoid a laissez-faire proliferation of eLearning (Czerniewicz & Brown 2009). These documents range from systematic teaching and assessment e-documents, strategic documents, equality assurance documents and manuals that guide university processes towards uptake of ICTs (Department of Education, 2015). The institution under review is currently in the process of establishing eLearning policy documents for the first time since its re-organisation from a former technikon to a university in 2004. The need to appoint faculty-based eLearning managers dedicated at tailoring the eLearning packages to discipline-specific needs was emphasised. The university is currently pursuing a strategic mission that integrates ICT usage in teaching and assessment but does not necessarily have core institutional polices on ICT usage or appointed faculty-based eLearning managers. Some participants have highlighted that this apparent absence of frameworks governing the use of eLearning has often acted as an impediment towards the adoption of eLearning technologies by academics at the university. Moreover, some academics are of the opinion that the decision by management to exclude them from the policy development process leads to a contestation of ideas, seemingly contrary to the adherence to eLearning (Sesemane, 2008). Academics feel that they are being coerced to implement eLearning owing to commands from management, rather than facilitator or learner progression. Resultantly, academic faculty implement flawed pedagogical practises upon servicing the eLearning technology (O’Neill, Singh & O’Donoghue, 2004). This has left staff sceptical about the likelihood not only of successful implementation of the innovation, but also of realising teaching and learning objectives. The absence of e-policies and the corresponding exclusion of staff members from the development thereof; have almost certainly resulted in the unplanned and ad hoc, fragmented and uncoordinated adoption of eLearning at the institution. In line with this notion, the frustration of respondents were captured in R7’s responses which epitomised the rest of the respondents’ views. The respondent stated thus: “Students and staff members are thirsty for eLearning but the haphazard (lack of e-policy) implementation and support structures are a problem”… [and]… “I wish we could have a dedicated eLearning manager to help us within our faculty.” Theme 4: Resistance to change Several academics seemed to have a negative attitude towards eLearning. Whilst some felt comfortable using traditional ways of teaching, others felt that it was time consuming and cumbersome to learn new ways and methods of teaching. This resistance to the uptake of innovative teaching methods was mostly noted among academics who lionised the traditional teaching methods. Giving his reasons for not embracing eLearning, R10’s response epitomised the responses of all those who did no readily embrace eLearning technologies, stating that: 66 “I feel comfortable with the way I teach. I need to be in class and physically face my students other than posting assignments on the eLearning platform”. RECOMMENDATIONS AND FUTURE RESEARCH AVENUES Against the findings of this study, it is recommended that institutional leadership be directly driven towards eLearning solutions and where possible, support blended learning strategies, e-skills training and development in order to empower academics. In this vein, there is need to launch eLearning awareness programs. Such programmes should be implemented in line with management driven e-quality assurance strategies. Care and caution should be exercised upon developing institutional policies that recommend eLearning interventions. It is also the authors’ view that IT support personnel can play an important role towards the development of eLearning. This can be done when they render support to academic faculty as and when it is required. Ultimately, synergy among content, pedagogy and technology is fundamental prior to the complete integration of eLearning across the applied sciences curriculum. Future studies can identify the importance of institutional leadership as a key driver towards eLearning uptake by academic staff. In this respect, the focus of institutional policies falls squarely on the circumstances upon which eLearning can be utilised, with consideration for the needs of both academics and students alike. CONCLUSION This paper explored the eLearning adoption constraints faced by academics at a university. While it is envisaged that successful adoption of eLearning will transform teaching and learning to meet the increasing demands for change and modernisation in higher education, faculty members alluded to a number of factors that impede technology adoption. Primarily, the stated barriers include inter alia; complex initiation procedures, inadequate teacher training and support, absence of a coherent e-policy in the institution as well as general staff resistance. Based on this, it was recommended that institutional leadership plays a supportive and pro-active role to counter the identified constraints. 67 REFERENCES Charmaz, K. (2003). Qualitative interviewing and grounded theory analysis. In J.F. Gubrium & J.A. Holstein (eds.). Handbook of Interview Research: Context and Methods (pp. 675 - 694). London: Sage. Childs, S. Blenkinsopp, H.A. & Walton, G. (2005). Effective eLearning for health professionals and students; barriers and their solutions: A systematic review of the literature, findings from the HeXL project. Health Information and Libraries Journal, 22, 20-32. Czerniewicz, L. & Brown, C. (2009). A study of the relationship between institutional policy, organisational culture and eLearning use in four South African universities. Computers & Education, 53(1), 111-121. Department of Education (2015). Strategic plan for the fiscal years 2015-2020. http://www.dhet.gov.za/Strategic%20Plans/Strategic%20Plans/Department% 20of%20Higher%20Education%20and%20Training%20Strategic%20Plan%202 015-16%20-%202019-20.pdf. Accessed2016/04/21. Draft White Paper on E-education (2003). Transforming Learning and Teaching through ICT. Department of Education, (2003). http://www.info.gov.za/whitepapers/2003/e-education.pdf. Accessed 2016/08/27. Engelbrecht, E. (2003). A look at eLearning models: investigating their value for developing an eLearning strategy. Progressio, 25(2), 38-47. Ezzy, D. (2010). Qualitative interviewing as an embodied emotion performance. Qualitative Inquiry, 16(3), 163-170. Fransen, J., Weinberger, A. & Kirschner, P.A. (2013). Team effectiveness and team development in CSCL. Educational Psychologist, 48(1), 9-24. Garrison, D.R. & Kanuka, H. (2004). Blended learning: Uncovering its transformative potential in higher education. Internet and Higher Education, 7(1), 95-105. Groenewald, T. (2004). A phenomenological research design illustrated. International Journal of Qualitative Methods, 3(1), 1-26. Henning, E. Van Rensburg, W. & Smit, B. (2004). Finding your way in qualitative research. Pretoria: Van Schaik. Holliday, A.R. (2007). Doing and writing qualitative research, 2nd ed. London, UK: Sage Publications. Keegan, D. (2003). Ireland Ericsson competence solutions. Working Paper in ZIFF Papiere 121. Hagen, Germany: Fern Universität, University of Hagen. 68 Koohang, A. & Harman, K. (2005). Open Source: a Metaphor for eLearning. Information Science Journal, 8(1), 1-12. Kumar, M. & Natarajan, U. (2007). A problem-based learning model: Showcasing an educational paradigm shift. The Curriculum Journal, 18(1), 89-102. Macpherson, A. Homan, G. & Wilkinson, K.H. (2005). The implementation and use of eLearning in the corporate university. Journal of workplace learning, 17(1/2), 33-48. Mapuva, J. (2009). Confronting challenges to eLearning in higher education institutions. International Journal of Education and Development using Information and Communication Technology, 5(3), 101-114. Maritz, J. & Visagie, R. (2010). Methodological rigour and ethics of accountability within a qualitative framework. Paper presented to academic staff at UNISA. Pretoria, South Africa. Meyer, S.M. (2001). The adoption of technology in higher education. Curationis, 24, 3236. Ng’ambi, D., Brown, C., Bozalek, V., Gachago, D. & Wood, D. (2016). Technology enhanced teaching and learning in South African higher education: A review of a 20-year journey. British Journal of Educational Technology, 14, 30-44. Noble, D.F. (2002). Digital diploma mills: The automation of higher education. Albany, NY: Monthly Review Press. O’Neill, K. Singh, G. & O’Donoghue, J. (2004). Implementing eLearning programmes for higher education: A review of the literature. Journal of Information Technology Education, 3, 314-323. Price, S., Davies, P., Farr, W., Jewitt, C., Roussos, G. & Sin, G. (2014). Fostering geospatial thinking in science education through a customisable smartphone application. British Journal of Educational Technology, 45(1), 160-170. Ravjee, N. (2007). The politics of eLearning in South African higher education. International Journal of Education and Development using Information and Communication Technology, 3(4), 27-41. Rekkedal, T. & Qvist Eriksen, S. (2003). Internet-based eLearning, pedagogy and support systems. Working Paper in ZIFF Papiere 121. Hagen, Germany: Fern Universität, University of Hagen. Salmon, G. (2005). Flying not flapping: a strategic framework for eLearning and pedagogical innovation in higher education institutions. Research in Learning Technology, 13(3), 201-218. 69 Saraswat, S.P., Anderson, D.M. & Chircu, A.M. (2014). Teaching business process management with simulation in graduate business programs: an integrative approach. Journal of Information Systems Education, 25(3), 221-232. Sesemane, M.J. (2008). E-Policy and higher education: from formulation to Implementation. South African Journal of Higher Education, 21(6), 643-654. Shapiro, L. (2000). Evolution of Collaborative Distance Work at ITESM: structure and process. Journal of Knowledge Management, 4(1), 44-55. Srivastava, P. & Hopwood, N. (2009). A practical iterative framework for qualitative data analysis. International Journal of Qualitative Methods, 8(1), 76-84. Volery, T. (2000). Critical success factors in online education. The International Journal of Educational Management, 14(5), 216-223. Zakaria, M., Janjua, S.Y. & Fida, B.A. (2016). Internationalization of higher education: Trends and policies in Pakistan. Bulletin of Education and Research, 38(1), 75-88. 70 The Role of Knowledge Management Systems On the Export Performance of Manufacturing Firms: Evidence from Zimbabwe Edmore Tarambiwa1, Chengedzai Mafini2 Abstract There is a general acceptance that Knowledge Management Systems (KMS) are a primary source of value and have taken a center stage in the definition, operation and performance of most business organisations. However, their use within the manufacturing sector in developing countries remains inconsistent. This chapter investigated the role of KMS in enhancing the export performance of firms operating within the manufacturing sector in Zimbabwe. The study used a quantitative approach in which a survey questionnaire was distributed to 555 managers drawn from 185 manufacturing firms based in Harare. Data analyses involved the use of descriptive statistics, Spearman correlations and regression analysis. The results of the study showed that combined IT/social driven KMS exerted the greatest impact on export performance. The availability of both information technology centered and social centered KMS influences export performance by improving the firm’s export strategy, export commitment, export orientation, export growth, export sales, export profits and export market share. Keywords: Knowledge management systems, export performance, manufacturing firms, Zimbabwe Jel Codes: M10 INTRODUCTION AND BACKGROUND Despite being endowed with a wide array of natural resources, most developing countries continue to face economic challenges (Vijil & Wagner, 2012). As noted in a report by the World Economic Forum (2013) most countries in Asia, South America and Africa have remained as net importers of finished and capital goods. The report further indicates that 31 percent and 34 percent of exports from the European and American manufacturing sector respectively, end in developing countries. According to the Bertelsmann Stiftung’s Transformation Index (2016), these imports normally result in a high trade deficit amounting to billions of United States dollars within most developing countries. The report further reveals that in Southern Africa, Zimbabwe had a trade deficit of USD3.9 billion in the 2015-2016 fiscal year whilst Zambia had a trade deficit of USD1.24 billion within the same year. Likewise, Botswana had a trade deficit of P176 million in 2016 (United States Census Bureau, 2017) and South Africa had a trade deficit Mr, PHD Student, Vaal University of Technology, South Africa Email: [email protected], Orcid: 0000-0002-6175-846X 2 Professor, Logistics, Vaal University of Technology, South Africa Email: [email protected], Orcid: 0000-0002-9426-0975 1 71 of ZAR9.5 billion by May 2017. Another report by the Namibia Statistics Agency (2016) indicates a N29.8 billion trade deficit in 2016 for Namibia (Trading Economics, 2017). According to the United States Census Bureau (2017), most of the trade deficits in the above countries were as a result of poor export performance. To counter their unsatisfactory export performance, some countries have resorted to economic integration by becoming members of regional economic blocs (Hartzenberg, 2011). Regional economic integration is aimed at improving on export performance through market expansion (Felix, 2007). An example of a country that has resorted to the adoption and implementation of regional economic integration as a strategy of boosting its export performance is Zimbabwe. The country became a signatory to a number of regional and international economic blocs such as the Common Market for Eastern and Southern Africa (COMESA), Southern Africa Development Committee Preferential Trade Area (SADC PTA) and World Trade Organization (WTO) (Mapuva & Muyengwa-Mapuva, 2014). However, this strategy has not yielded any positive results, particularly in the manufacturing sector. In 2013, the Zimbabwean government acknowledged that the country had been turned into an import-based economy and attributed this development to global competition which had increased in response to the country’s enlarged bloc membership (Bimha, 2013). The situation calls for the implementation of other strategies that augment current efforts to turnaround the economic fortunes of the country. Both individual corporates and countries of today cannot avoid global competition, which may in part, be linked to the increased use of Information Communication Technologies (ICT) all over the world (Kotler, 2011)). Even most notable multi-national corporations such as Nestle, Coca Cola and Toyota have embraced ICT models based information technology (IT) driven knowledge management systems (KMS) as tools for improving performance (Edward & Alves, 2009). Various authors (Argote & Ingram, 2000; Malik & Malik, 2008; Pawlowski & Bick, 2012) support the use of KMS as vehicles for the improvement of corporate performance at micro level, which translates to economic performance at macro level. A study conducted by Man Li (2012) concluded that there were great gains in competitive advantage to be realised by corporations utilising ICT infrastructure as KMS to manage knowledge. Malik and Malik (2008) also found out that there is a general acceptance that knowledge management is a primary source of value, which is an indication that knowledge has taken a center stage in the definition, operation and performance of corporates. Pawlowski and Bick (2012) suggest that as corporates develop globally, their need for KMS increases. Other authors (Barney, 1991; Singer & Czinkota, 1994; Coff, 1997; Shamsuddoha, Ali & Ndubisi, 2009) have also highlighted the importance of KMS in export marketing. These researches seem to suggest the existence of a relationship between KMS and export performance, although not explicitly. 72 PURPOSE AND EXISTING RESEARCH GAPS The aim of the current study is to test the relationship between KMS and export performance from a context of manufacturing firms in Zimbabwe. A literature search shows that most previous studies on KMS included one focusing on definitions (Edwards, 2011) challenges and benefits (Alavi & Leidner, 1999); practices and theories (Dalkir, 2005). Other studies focused on limitations (Swan, Newell & Robertson, 2000); formulation of theoretical frameworks (Gallupe, 2001; Maier & Lehner, 2003); evolution (Halverson, Ericson & Ackerman, 2004); KMS in product development (Hidiyanto & Efendy, 2010); KMS in Business (Thierauf, 1999); and requirements of a KMS (Mau & Mau, 2008). In addition, Plessis and Boon (2004) examined the role of knowledge management in customer relationship management in South Africa. Kaniki and Mphahlele, (2002) and Ngulube (2002) focused on knowledge management related approaches to the preservation of indigenous knowledge. Jain (2007) conducted a survey to establish the level of knowledge management practices in east and southern Africa. Although these studies gave an insight into the subject of knowledge management, none of them investigated its link to export performance, which leaves an important research gap. This study suggests that the adoption and implementation of KMS could be a vehicle for the improvement of export performance by manufacturing firms in Zimbabwe. Hence the study investigates the relationship between KMS and export performance. LITERATURE REVIEW The review of literature discusses export performance and knowledge management systems. Export Performance Export performance is defined as either the relative success or failure of the efforts of an entity to sell its goods and services in other nations (Lages & Lages, 2004). There are several reasons why superior export performance is important for firms. Through exporting, firms are able to increase their sales potential by ensuring that their markets have been expanded beyond national borders (Lages, Silva & Styles, 2009). Since the average orders from international customers are often larger than those from domestic buyers, exporting can be a useful way of increasing firm profits (Sousa & Bradley, 2008). Exporting is also an important approach to diversification, which assists in avoiding risks or exposures due to fluctuations in local markets (Carneiro, da Rocha & da Silva, 2011). In addition, exports are essential in putting redundant production capacity to work, leading to more efficient utilisation of the existing factories, equipment and employees (Freeman, Styles & Lawley, 2012). Exporting may further be a useful means to offset seasonal fluctuations in sales (Boehe & Cruz, 2010). For instance, when an unfavourable season in one country begins, certain product sales take a knock. However, in the same period, the same products can be exported to markets in another country where the season is favourable to sales. Still, some domestic 73 markets are either too small or saturated, creating the need for expansion to other untapped markets (Brouthers, Nakos, Hadjimarcou & Brouthers, 2009). These reasons, amongst others, demonstrate the importance of maximising export performance to both firms and the economy. Knowledge Management Systems Several authors (Thierauf, 1999; Alavi & Leidner, 2001; Hidayanto & Efendy, 2010; Assegaf & Hussin, 2012) define KMS as the IT technology that supports or facilitates knowledge management. There are various categorisations of KMS. However, in this study, a categorisation of KMS developed by Nielsen and Michailova (2007), which divided KMS into three classes namely IT driven KMS, social driven KMS and combinations of IT driven and social driven KMS, was adopted. IT driven KMS are based on information technologies whereas social driven KMS are based on interactions of people. Examples of IT driven KMS include decision support systems, data mining and warehousing, simulations, intranet and the internet. Examples of social driven KMS include organisational structure, organisational culture and communities of practice. To counteract the strengths and weaknesses of IT and social driven KMS, the two can be combined, creating a robust and often more effective hybrid system (Hidiyanto & Efendy, 2010). According to Malik and Malik (2008) KMS are an important tool for driving export performance. In support, Pawlowski and Bick (2012) adds that KMS manage the intangible asset of intellectual capital within organisations thus creating distinct competencies. Lowry (2014) reports that the European Union and the USA have embraced KMS as tools for improving export marketing. This contributed significantly to the European Union and USA’s success in exporting to international markets. In Zimbabwe, the National Trade Development and Promotion Organisation of Zimbabwe (ZimTrade) was established to provide the relevant knowledge and support structures to stakeholders at national level (Chigumira, 2013). ZimTrade implemented IT driven KMS by launching a website in 2007 to enhance national exports as suggested by Malik and Malik (2008). However, regardless of having implemented KMS strategies that have worked elsewhere, Zimbabwe’s export promotion reports from Zimbabwe National Statistics Agency indicate a continuously downward trend. Based on the literature review, the following hypotheses were formulated and put forward to guide this investigation: H1: There is a positive relationship between IT driven KMS and export performance H2: There is a positive relationship between social driven KMS and export performance H3: There is a positive relationship between combined IT driven and social driven KMS and export performance RESEARCH DESIGN The research adopted a quantitative survey design, based on the need to generalise the study to other environments of manufacturing firms in developing 74 countries. In addition, a review of previous literature showed that previous studies on both KMS and export performance (Zou, 1998; Alavi & Leidner, 2001; Kautz & Mahnke, 2003; Abdullah, Selamat, Sahibudin & Alias, 2005; Pawlowski & Bick, 2012) were conducted using quantitative surveys. Sample Design The target population in this study was composed of firms operating within the Zimbabwean manufacturing sector. This included eleven industries, namely food, drink, textile, wood, clothing, paper, chemicals, metals and automotive, as categorised by Zimbabwe National Statistics Agency (2016). The names of the firms were drawn from the Confederation of Zimbabwe Industries (CZI) and ZimTrade databases. To select the sample, a combination of the cluster and some purposive techniques were used. Firms were clustered according to their respective industries. Thereafter, within each cluster three key professionals with the relevant information were selected using the purposive sampling technique. The professionals that were considered as respondents were marketing managers, human resources managers and information technology. The purposive sampling technique was used since the field of study was a technical one which required individuals possessing the required information in each situation. The final sample was composed of 555 respondents drawn from 185 firms. Instrumentation and Data Collection Procedures Data were collected by means of a questionnaire. The questionnaire was divided into four sections. Section A elicited information on the demographic profile of respondents and their firms. Section B sought responses on three KMS subelements, namely IT driven KMS, Social driven KMS and Combined IT and Social driven KMS based on measures developed by Nielsen and Michailova (2007) and Malik and Malik (2008). Section C sought information on export performance based on measures developed by Zhou, Taylor and Osland (1998). Response options in Section B of the questionnaire were presented on Likerttype scales anchored by 1=strongly disagree and 5= strongly agree. Data were gathered from manufacturing firms between June and December 2015. Questionnaires were either emailed to respondents, or administered in person by the principal researcher. Out of a total of 410 questionnaires emailed to respondents, 271 usable questionnaires were retained after the process of screening the questionnaires. Moreover, out of a total of 145 questionnaires that were administered using the drop and collect method, 96 were retained after the screening of the questionnaires. This culminated in a total of 555 questionnaires that were used in the final data analysis. Respondents were given a period of two weeks to complete the questionnaire. During the process of data collection, several ethical considerations, namely participant’s rights to anonymity, voluntary participation, confidentiality and protection from victimisation were followed. 75 Data Analysis Data were analysed using the Statistical Packages for the Social Sciences (version 22.0). The strengths and direction of associations between KMS and export performance were measured using Spearman Correlation analysis, whilst predictive relationships between constructs were measured using regression analysis. Validity and Reliability To establish face validity, the questionnaire was reviewed by four faculty members at a Zimbabwean military university who are experts in ICT. Three staff members of ZimTrade who are experts in export marketing were also given the opportunity to review the questionnaire. Feedback obtained from the two panels was used to modify the questionnaire in order to establish face validity. To establish content validity, a pilot study was conducted using a conveniently selected sample of 50 respondents. Further modifications were made to the questionnaire, using feedback obtained from the pilot sample. The pilot sample was excluded from the main survey. To establish construct validity, Spearman’s correlations were used. The results of the correlation analysis as shown in Table 2 showed positive correlations between the constructs, thereby providing evidence of acceptable construct validity. Predictive validity was tested using regression analysis. The results of the regression analysis showed statistically significant relationships between the constructs and are illustrated in Table 3, which attests to satisfactory predictive validity within the scales. Reliability was tested using the Cronbach alpha coefficient. All measurement scales attained alpha values above the recommended threshold of 0.7 as indicated in Table 1, thereby providing evidence of satisfactory reliability in the study. RESEARCH RESULTS Demographic Profile of Respondents An analysis of the demographic profile of the respondents shows that 29.7 percent of the respondents were marketing professionals, 48.5 percent were IT professionals and 21.8 percent were HR professionals. With respect to their age groups, 54.2 percent of respondents were aged between 31 and 49 years of age. The racial profile showed that all but three respondents who were of the mixed race, were black. At least 72.6 percent of the respondents were male. In terms of the distribution of respondents per manufacturing industry, 22.1 percent of the respondents were in the chemical industry, 42.8 percent in the beverages industry and 35.1 percent in the metals industry. Further analysis revealed that 39.8 percent of the firms had been in operation for up to 15 years; 52.3 percent had been in operation for periods ranging between 16 and 30 years and 7.9 percent had been in operation for more than 45 years. 76 Mean Scores and Reliabilities The mean-scores and reliabilities of the measurement scales used in the study are reported in Table 1. Table 1: Mean scores and Reliabilities Mean scores for the four scales ranged between 3.94 and 4.44. These values depict an inclination towards the ‘agree’ point in the Likert-type scale. This implies that most respondents perceived that implementation of KMS was satisfactory within their firms. Respondents considered the implementation of combined IT and social driven KMS to be more important than implementing them separately. Cronbach alpha values ranged between 0.703 and 0.842, which were above the recommended minimum threshold of 0.7 (Malhotra, 2011), which confirms that the scales used in the study were reliable. Correlation Analysis Correlation analysis shows the strength and direction of association amongst the constructs under consideration in a research study (Genest, Kojadinovic, Neˇslehov´a & Yan, 2011). Table 2: Correlation Analysis The correlation analysis results are indicated in Table 2. In this study, the constructs were IT driven KMS, social driven KMS, Combined IT and Social 77 driven KMS, and export performance. A two-tailed Spearman Correlation Analysis was undertaken at a significance level of p<0.01 to establish the level of association between the hypothesised associations. In this study, positive interfactor correlations were observed between the constructs under consideration. The strongest correlation was observed between combined IT and social driven KMS and export performance (r = 0.623; p < 0.01) while the weakest correlation was observed IT driven KMS social driven KMS (r = 0.41; p < 0.01). This indicates that when one of these constructs either increases or decreases, the other constructs either increase or decrease correspondingly. Regression Analysis Since positive associations existed between KMS dimensions and export performance, it was necessary to establish whether KMS dimensions predicted export performance. This was achieved through application of the regression analysis procedure as illustrated in Table 3. Regression analysis is a statistical process for estimating predictive relationships amongst variables (Armstrong, 2012). To test predictive relationships, IT driven KMS, Social driven KMS, Combined IT and Social driven KMS were used as independent variables and export performance was used as a dependent variable. The results of the regression analysis are reported in Table 3. Table 3: Regression Model Summary Multicollinearity tests were conducted by calculating the tolerance value and variance inflation factor (VIF) associated with each independent variable. According to Tabachnick and Fidell, (2001) thresholds for testing for multicollinearity include a minimum of 0.1 for tolerance and a maximum of 10 for VIF. In the current study, tolerance and VIF values were within the recommended thresholds, indicating that multicollinearity did not constitute a problem in the study and the independent variables are not highly correlated (r= 0.90 and above). The regression analysis showed an R² of 0.168 which demonstrates that nearly 17 percent of the variation in manufacturing firms export performance is attributable to adoption and implementation of KMS. DISCUSSION OF RESULTS The purpose of the study was to investigate the relationship between KMS and export performance in manufacturing firms in Zimbabwe. To achieve this purpose, three hypotheses were put forward. The first hypothesis (H1) suggested 78 that there is a positive relationship between IT driven KMS and export performance. This hypothesis was accepted in this study because as revealed in Table 2, there was a strong positive correlation between IT driven KMS and export performance (r = 0.599; p <0.01). Moreover, in the regression analysis, IT driven KMS were statistically significant in predicting export performance (β = 0.267; t= 3.414; p=0.000). The second hypothesis (H2) indicated that there is a positive relationship between social driven KMS and export performance. This hypothesis was supported because a strong positive correlation was observed between social driven KMS and export performance (r = 0.587; p < 0.01). Also, analysis of the regression model shows that social driven KMS were statistically significant in export performance (β =0.143; t=3.012; p=0.002). The third hypothesis (H3) stated that there is a positive relationship between combined IT and social driven KMS and export performance. This hypothesis was supported because there was a strong positive correlation existed between combined IT and social driven KMS and export performance (r= 0.623; p<0.01). Regression analysis indicates that combined IT and social driven KMS problems were statistically significant in predicting export performance (β =0.577; t=3.124; p=0.000). These results illustrate that export performance is likely to increase with an increase in the use of KMS in Zimbabwean manufacturing firms. It is important then for manufacturing firms intending enhance their export performance to, amongst other things, adopt and implement effective KMS along the three dimensions proposed in this study. CONCLUSIONS The study concludes that firms in the Zimbabwean manufacturing sector could improve their export performance by adopting and effectively implementing KMS as part of their strategic ethos. The best model would be to use a combination of IT driven KMS and social driven KMS as this exerts a greater impact on export promotion when compared to applying the two systems separately. However, implementation of both IT driven and social driven KMS requires reliable ICT infrastructure backed by relevant information security policies. It is thus imperative that effective ICT policies and infrastructure be put in place to support the transfer and utilisation of knowledge by the firms in the manufacturing industry. It would also be useful for the Zimbabwean government, through its trade-agency: ZimTrade, to embark on a nationwide KMS awareness program aimed at educating firms on the importance of adopting and implementing KMS. 79 REFERENCES Abdullah, R., Selamat, M.H., Sahibudin, S. & Alias, RA. (2005). A framework for knowledge management systems implementation in collaborative environments for higher learning institutions. Journal of Knowledge Management Practices, 2(1), 4586. Alavi, M. & Leidner, D.E. (1999). Knowledge management and knowledge management systems: Conceptual foundations and research issues. INSEAD Working Paper: Oxford University. Alavi, M. & Leidner, D.E. (2001). Review: Knowledge management and knowledge management systems conceptual foundations and research issues. MIS Quarterly, 25(1), 107-136. Argote, L. & Ingram, P. (2000). Knowledge transfer: A basis for competitive advantage in firms. Organizational Behavior and Human Decision Processes, 82(1), 150-169. Armstrong, J. (2012). Illusions in regression analysis. International Journal of Forecasting, 28(3), 689-694. Assegaff, S. & Hussin, A.R.C. (2012). Review of knowledge management systems as socio-technical system. International Journal of Computer Science Issues (IJCSI), 9(5), 120-450. Barney, J.B. (1995). ìFirm Resources and sustained competitive advantage. Journal of Management, (17), 99-120. Bertelsmann Stiftung’s Transformation Index. 2016. Zimbabwe Country Report . https://www.btiproject.org/fileadmin/files/BTI/Downloads/Reports/2016/p df/BTI_2016_Zimbabwe.pdf. Accessed 2017/07/13. Bimha, M. (2013). Review of Zimbabwe’s Export Performance. ZimTrade Annual Conference, Harare. December 2013. Boehe D.M. & Cruz, L.B. (2010). Corporate social responsibility, product differentiation strategy and export performance. Journal of Business Ethics, 91, 325-346. Bostock, K. (2002). Avoiding information overload: Knowledge management on the internet. Journal of knowledge management, 3(3), 781-880. Brouthers, L.E., Nakos, G., Hadjimarcou, J. & Brouthers, K.D. (2009). Key factors for successful export performance for small firms. Journal of International Marketing, 17(3), 21-38. Carneiro, J., da Rocha, A. & da Silva, J.F. (2011). Determinants of export performance: A study of large Brazilian manufacturing firms. Brazilian Administration Review, 8(2), 107-132. 80 Chigumira, D.R. (2013). Role of value chains in export development and competitiveness. Harare: ZimTrade. Coff, R.W. (1997). Human assets and management dilemmas: Coping with hazards on the road to resource-based theory. Academy of Management Review, 22(2), 374-402. Dalkir, K. (2013). Knowledge management in theory and practice. California: Routledge. Davies, R. (1991). Trade, trade management and development in Zimbabwe. Trade and development in sub-Saharan Africa, 2(2), 281-313. Edwards, J.A. (2009). A process view of knowledge management: it ain’t what you do, it’s the way that you do it. Electronic Journal of Knowledge Management, 9(4), 297-306. Felix, A.S. (2007). Enhancing economic performance through regional intergration. Journal of International Marketing. 12(1), 332-358. Freeman, J., Styles, C. & Lawley, M. (2012). Does firm location make a difference to the export performance of SMEs? International Marketing Review, 29(1), 88-113. Gallupe, B. (2001). Knowledge management system: Surveying the landscape. International Journal of Management Reviewers, 3(1), 61-98. Genest, C., Kojadinovic, I., Neˇslehov´a, J. & Yan, J. (2011). A goodness-of-fit test for bivariate extreme-value copulas. Bernoulli, 17, 253-275. Halverson, C.A., Erickson, T. & Ackerman, M.S. (2004). Behind the help desk: Evolution of a knowledge management system in a large organistion. Proceedings of the 2004 ACM Conference on computer supportive cooperative work, pp. 304-313. ACM-Chicago. Hartzenberg, C. (2011). Transnational Communities: Shaping Global Economic Governance. London: Cambridge University Press. Hidayanto, A.N. & Efendy, R. (2010). Analysis and design of knowledge management system in product development. International Conference on Management and Information Engineering. 2(1), 104-107. Jain, P. (2007). An empirical study of knowledge management in academic libraries in East and Southern Africa. Library review, 56(5), 377-392. Kaniki, A.M. & Mphahlele, M. K. (2002). Indigenous knowledge for the benefit of all: Can knowledge management principles be used effectively? South African Journal of Libraries and Information Science, 68(1), 11-85. Katsikeas, C.S., Leonidas, C.L. & Neil A.M. (2000). Firm-level export performance assessment: Review, evaluation, and development. Journal of the Academy of Marketing Science, 28 (4), 493-511. 81 Kautz, K. & Mahnke, V. (2003). Value Creation through IT-supported knowledge management? The utilization of a knowledge management system in a global consulting company. Journal of Information Science, 6(1), 85-135. Kotler, P. (2011). Principles of marketing. 13th ed. USA: Pearson Education. Lages, L.F. (2004). A conceptual framework of the determinants of export performance: Reorganizing key variables and shifting contingencies in export marketing. Journal of Export marketing, 13(3), 202-451. Lages, L.F. & Lages, C.R (2004). The STEP scale: A measure of short-term export performance improvement. Journal of International Marketing, 12(1), 36-56. Lages, L.F., Silva, G. & Styles, C. (2009). Relationship capabilities, quality, and innovation as determinants of export performance. Journal of International Marketing, 17(4), 4770. Lowry, S. (2014). Small Business Administration Trade and Export Promotion Programs. January 2014, USA: Congressional Research Services. Maeir, R. & Lehner, F. (2003). Perspectives on knowledge management systems theoretical framework and design of an empirical study. White Paper, November 2003, Regensburg: University of Regensburg. Maier, R. (2007). Knowledge Management Systems: Information and Communication Technologies for Knowledge Management. 3rd ed. Berlin:Springer. Malhotra, Y. (2005). Integrating knowledge management technologies in organizational business processes: getting real time enterprises to deliver real business performance. Journal of knowledge management, 9(1), 7-28. Malik, K.P. & Malik, S. (2008). Value creation role of knowledge management: A developing country perspective. Electronic Journal of Knowledge Management,6(1), 4148. Man Li, R. (2012). Knowledge management, sharing and creation in developing countries’ banking industries. Advanced in Network and Communication. 1(1), 10-156. Mapuva, J. & Muyengwa-Mapuva, L. (2014). The SADC regional bloc: What challenges and prospects for regional integration? Law, Democracy and Development, 18, 22-36. Mau, M. & Mau, N. (2008). Requirements of knowledge management systems according to performance and risk related issues in global supply chains, IBIMA,6(1), 36-40. Moghaddam, F.M., Hamid, A.B.B.A., Rasid, S.Z.A. & Darestani, H. (2011). The influence of export marketing strategy determinants on firm export performance: a review of empirical literature between 1993-2010. International Journal of Fundamental Psychology and Social Sciences, 1(2), 26-34. 82 Namibia Statistics Agency. (2016). Annual trade statistics bulletin 2016. http://cms.my.na/assets/documents/Media-Release_15_March.pdf. Accessed 2017/07/13. Ngulube, P. (2002). Managing and preserving indigenous knowledge in the knowledge management era: Challenges and opportunities for information professionals. Information development, 18(2), 95-102. Nielsen, B,B. & Michailova, S. (2007). Knowledge management systems in multinational corporations: Typology and transitional dynamics long range planning. International Small Business Journal, 40(3), 314-340. Pawlowski, J. & Bick, M. (2012). The global knowledge management framework: Towards a theory for knowledge management in globally distributed settings. Electronic Journal of Knowledge Management, 10 (1), 92-108. Plessis, M.D. & Boon, J.A. (2004). Knowledge management in e-business and customer relationship management: South African case study findings. International Journal of Information Management, 24(1), 73-86. Robertson, S.L. (2000). Re‐imagining and re-scripting the future of education: Global knowledge economy discourses and the challenge to education systems. Comparative education, 41(2), 151-170. Shamsuddoha, A.K., Ali, M.Y. & Ndubisi, N.O. (2009). A conceptualisation of direct and indirect impact of export promotion programs on export performance of SMEs and entrepreneurial ventures. International Journal of Entrepreneurship, 13(1), 87-106. Singer, T.O. & Czinkota, M.R (1994). Factors associated with effective use of report assistance. Journal of International Marketing. 2(1), 53-71. Sousa, C.M.P. (2004). Export performance measurement: An evaluation of the empirical research in the literature. Academy of Marketing Science Review, 22(3), 231-458. Swan, J., Newell S. & Robertson, M. (2000). Limits of It-driven knowledge management systems initiatives for interactive innovation process: Towards a community based approach. The Journal of Development Studies, 5(2), 305-365. Sousa, C.M.P. & Bradley, F. (2008). Antecedents of international pricing adaptation and export performance. Journal of World Business, 43, 307-320. Tabachnick, B. G. & Fidell, L. S. (2001). Using multivariate statistics. 4th ed. Boston, MA: Allyn and Bacon. Trading Economics. (2017). South Africa balance of trade: https://tradingeconomics.com/south-africa/balance-of-trade. 2017/07/13. 83 1957-2017. Accessed Thierauf, R.J. (1999). Knowledge Management for Business. Connecticut: Quorum Books. United States Census Bureau. (2017). Trade in goods with https://www.census.gov/foreign-trade/balance/c7930.html. 2017/07/16. Botswana. Accessed Vijil, M. & Wagner, L. (2012). Does aid for trade enhance export performance? Investigating the infrastructure channel. The World Economy, 35(7), 838-868. World Economic Forum. (2013). Report on World Economic Performance. January 2013, USA: World Economic Forum. World Trade Organisation. (2013). Report on World Trade Statistics for 2013. London: WTO. Zhou, S., Taylor, C.R. & Osland, G.E. (1998). The EXPERF scale: A crossnational generalized export performance measure. Journal of International Marketing, 6(3), 3768. 84 Public finance support for digitalization implementation within the SME’s in Pelagonija region Anastas DJUROVSKI* Abstract The modern concept of SME development is based on the digital economy and its approach. Public finance as a vehicle for public policy management and its central part is widely accepting the concept on development based on several pillars- and among the others SME development. Yet most of the studies for SME development are including digitalization of the SME’s. Public finance support currently goes towards various sets of measures on expenditures and revenues budget side. The theory on regional growth is widely based on the SME development. Currently there are no studies on impact of the digital SME’s in Macedonia. In Pelagonija region there are 3790 active businesses out of which 32 are large enterprises and the rest are SME’s. GDP in 2016 was 1,078 billion EUR and on national level SME’s contribute with 64.5% of value added to the GDP. Survey was undertaken on 131 SME’s from Pelagonija region in order to determine the current level of SME digitalization within the region, to compare with EU average and to make conclusions on the impact of the SME digitalization to region GPD growth as well as revenues collection. Keywords: Fiscal Policies, SME’s development, Digitalization Jel Codes: H30, H32 DIGITALIZATION AND SME’S FROM PELAGONIJA REGION Digitalization is attracting widespread interest along various industries and politics. It can be defined as “ability to turn existing products or services into digital variants, and thus offer advantages over tangible product”. 1 Digital SME’s and its impact in regional development is widely recognized in many studies. There are examples of regions in most developed countries where regions are trying to provide greater level of incentives in order digitalization of SME’s to be achieved to the highest level 2.However there are still lack of studies that are establishing link between public finance spending towards digitalization of SME’s as well as measures on the revenues side like tax cut in favor of digitalization process implementation inside SME’s. Regional development processes in underdeveloped country such as Macedonia has to be one of the government public finance priorities. Investment decision making tool integrated into the regional development policy should be integral part. * PhD, Associate Professor, Faculty of Law, University St Kliment Ohridski Bitola, North Macedonia, Email: [email protected] Orcid: 0000-0002-2105-744X 1 Parviainen, Tihinen, Kääriäinen, Teppola, 2017:6-22; 2 Randall, Berlina, Teräs, Rinne, 2018:18; 85 Digitalization of the SME’s many times mean more cheap option as compared with Large enterprise. 3Digitalization of the SME’s Though the compelling economic factors as well as enforcement from the government in form of various schemes and programmes has led to greater adoption of digital technology by these firms. In our country there are approximately SME firms and traditionally these were exposed to an informal credit system due to lack of access to formal credit system. Productivity gap of SME’s can be overcome through intensive digitalization of SME;s.4 According to Financial Institutions Practice at Boston Consulting Group, this process will help increase the access to formal credit system among 85% of SMEs by 2023. As of now, low level of awareness, unavailability of talented human resource and cost of adoption etc. are the impeding factors in the process of digitalization. Apart from it, the absence of an understanding about the benefits that could be reaped through the use of technology, lack of guiding forces towards integration of technology and its institutionalization into the business, inhibitions towards upfront investment oriented costs have also been the causes that led to low adoption of digitalization among SMEs.5 In the area of ecosystem, most findings are consistent with previous research. The difficulty of defining the ecosystem’s borders is supported by the interviews as well as by literature 6. Though researchers analyzed this field for more than 20 years, its practical relevance is still low. Thus, we aim to bridge the gap and highlight the relevance of the topic for SMEs. Still, it needs to be considered, that these results describe the relation between roles in ecosystems and stages for digitalization in a qualitative way based on the findings of the case studies. Digital skills are crucial for SMEs if they are to improve their productivity and especially if they want to scale up. 7Digital technologies can allow SMEs to improve their relationship with their customers through customer relationship management (CRM), improve and speed up accounting, resource planning and people management processes, delivering efficiencies, especially in terms of staff time.8 LEVEL OF DIGITALIZATION OF PELAGONIJA REGION SME’S Trying to approach more widely local SME’s we have divided their core business into two basic segments products and services. Total of 36 production companies (that are producing physical products) and 95 services sector companies were surveyed. They were asked to provide answers about their level of digitalization as per the segments of business operations that they are dealing with. Both products and services sector are dealing with four core areas where they can implement digitalization solutions: General management, Finance, Production Pankaj,2019:5. ASEAN, 2018:10. 5 Pankaj, 2019:10-15. 6 Gawer, 2009:3. 7 Van Ark, 2014:15-20. 8 Enterprise Research Centre, 2018:30. 3 4 86 and Marketing. As shown within the table below level of the digitalization is higher within the General management business process and lowest level of digitalization is within the Production processes within the Production companies and for the Services companies the lowest level of digitalization can be found within the Marketing. Table 1. Survey on level of digitalization of Pelagonija SME’s answers Production Sector In which area do you use digitalization General 32 Management Finance 36 Production Marketing Production 4 20 n=36 88.89% 100.00% 11.11% 55.56% Services sector In which area do you use digitalization General Management Finance Service product preparation Marketing Services n= 95 85 89.47% 91 95.79% 22 23.16% 50 52.63% Next table shows the level of digitalization within the specific within the business sectors of the companies that are SME’s. At the General Management sector there is widespread use of digitalization tools. Mostly there is use of phone applications as well as e-mail (although not all of the respondents are using email both within the products and within the services sector). Very small percent of the respondent companies are using the special software for general management. Also within the general management only small portion of the companies are using platforms (which are very popular and commonly used by the competition abroad). Within the finance sector only in the field of accounting companies are 100% digitalized if we can agree on it that accounting software is a digitalization tool and it is used both insourced and outsources by the companies that are part of the survey. The situation is different within the other sectors like bank correspondence and money market. In the products sector 11.11% of the respondents are using digital means such are online account checking and payment orders processing. Within the services sector such percentage is 33.68%. Yet this cannot be seen only as tool of the companies but even most tool of the banks and respondents are only passive users. In the analysis of this part of business operations also Financial markets are included. Basically in this part companies were asked to answer whether they buy foreign exchange and the definition was given broader meaning by whether they communicate with stock exchanges through buying or selling stocks (of other companies). Here the digitalization is lower that is probably both due to the lower levels of money and financial markets development but also due to the low level of knowledge of digital tools. Within the field of production, the situation can be found as more relevant for explanation of the digitalization level within the Pelagonija region SME’s. These differences in the adoption of key digital technologies indicate that different needs are prioritized in each industry. For instance, the need for robotic and automated machinery is higher in the food sector than in the construction sector due to the nature of the production processes in this industry. Interestingly within EU industries adopt social media 87 technologies at a high rate, which may imply that there is a greater need to engage with customers than to improve production processes; while on the contrary, in both industries, 3D printing technology is only adopted by a low percentage of firms in each industry. 9. Hence, through the digitalization process within the product or services creation many of companies are building their competitive advantage and the same situation counts for the Pelagonija region SME’s. As expected more companies that are within the services sector are digitalized in the field of production process. The level of use of digitalized machines is 11.11% within the services sector while such figure is only 23.16% within the services sector. Probably the situation above is due to the fact that technology for services has advanced more it is easier to be implemented and costs are lower that the production sector. However, if regional and national economy wants to be more competitive it has to improve much more within the area considered. It the situation of digitalized machines companies are also technology takers. Those company owners that are following the technology, have access to it and can finance can decide to buy it. The situation is even worse within the field of use of automated software within the production process where only 11.11% of the production companies surveyed have provided answers that they are using automated software for the production process. Situation is not better within the services sector where 14.74% of the companies are using the automated software. Again here are used available software applications (for example Archicad within the construction design or Adobe illustrator within the graphic services), tools that are widely available and can be easily adopted to the services production. Situation can be different in the field of specially developed and tailored software for company’s purposes. The most symptomatic area is robotics where none of the companies surveyed responded positively – none of them are using robots although robotics are one of the key elements of the so called fifth technological revolution. Industry 4.0, which will be driven by a new generation of information technologies such as Internet of Things (IoT), cloud computing, big data and data analytics, robotics, artificial intelligence, machine learning, virtual reality and 3D printing.10 Certainly use of robots can be key competitive advantage element both for production and services companies within the Pelagonija region. The area of marketing is interesting not only for measurement of digitalization level but also for measurement of the overall marketing tools use for the companies surveyed. We have focused only of digitalization but we think that there is a strong correlation among the use of digital marketing tools and overall marketing tools, models and concepts implementation within the 4P concept. In this area companies are using mostly their own websites although still about 1/2 (50.00% are using) in the products area and 3/5 (40.00% are using) in the services area are not having web sites. Such situation within the products are can be related to low knowledge and need of a part of the companies while in the services sector can be related to moving towards more advanced ways for 9 European Comission, 2018: 22 European commission, Digitalisation Support to SMEs 2017a: 18 10 88 communication with stakeholders such as platforms (for example logistics companies are using platforms), business tools of social media etc. As expected companies are using free social media advertising tools (such as opening profiles under company name and posting products and services info) and they are also using paid advertising tools. Even all surveyed companies in the products sector are using free social media advertising tools and almost 9 out of 10 services companies are using the same media. But paid advertising tools such as google, facebook and Instagram ads are used to a lesser extent since there are about 1/4 of the companies that are surveyed. Table 2. Pelagonija SME’s digitalization by business processes Which tools do you use mostly? Production Which tools do you use mostly? Services General Management Phone apps E mail Special software (company tailored) Platforms Digital markets General Management Phone apps 36 100.00% E mail 31 86.11% Special software 4 11.11% (company tailored) Platforms 5 13.89% Digital markets 10 27.78% 47.78% Finance Finance Accounting Accounting software 36 100.00% software Bank Bank correspondence 32 88.89% correspondence Financial market 0 0.00% Financial market 62.96% Service product Production preparation Computerized Computerized 5 13.89% machines machines Automated Automated software 1 2.78% software Robots 0 0.00% Robots 5.56% Marketing Marketing Web sites 28 77.78% Web sites Free advertizing Free advertizing tools 36 100.00% tools Paid advertizing Paid advertizing tools 10 27.78% tools 68.52% Average Management 95 100.00% 100.00% 95 100.00% 93.06% 15 22 16 15.79% 23.16% 16.84% 51.16% 49.47% 13.45% 18.52% 22.31% Finance 95 100.00% 100.00% 95 100.00% 15 15.79% 71.93% 67.45% 94.44% 7.89% Products 28 29.47% 21.68% 39 0 41.05% 0.00% 23.51% 21.92% 0.00% 63 66.32% 72.05% 71 74.74% 87.37% 24 25.26% 55.44% 26.52% 14.53% Marketing 61.98% The graph below shows digitalization of the business operations of the products creating companies. 89 41,68% 45,00% 38,66% 40,00% 35,00% 33,69% 31,01% 30,00% 25,00% 20,00% 15,00% % of digitalization by Business Operations 10,02% 10,00% 5,00% 0,00% Graph 1. Product creating Pelagonija region SME’s Digitalization of Business processes 50,00% 45,00% 40,00% 35,00% 30,00% 25,00% 20,00% 15,00% 10,00% 5,00% 0,00% 46,32% 35,16% 34,74% Services 12,63% Doğrusal (Services) Graph 2. digitalization of the business operations of the services producing companies Graph 3 shows overall level of the digitalization by business operations. As it can be seen above the level of digitalization is highest within the finance departments. That is due to the fact that all of the companies that were surveyed are using software for accounting and even although the current law permits this part of finance to be kept in paper form the public revenue body is encouraging use of digital tools and communication more than 10 years ago and all of the companies and accountants have switched to the digital forms of accounting. The lower level of digital business operations can be found within the production processes that is 10%. 90 45,00% 40,00% 35,00% 30,00% 25,00% 20,00% 15,00% 10,00% 5,00% 0,00% 41,68% 38,66% 33,69% 31,01% % of digitalization by Business Operations 10,02% Graph 3. Level of digitalization by business operations among the Pelagonija region SME’s Table 3. Key indicators tracking digitalization processes Key Indicator Having a web site or homepage Website has some interactive functionalities Use any social media >50% of persons employed use computers and internet Fastest broadband connection is at least 30mbs Have ERP software package to share information Use Customer Relationship Management (CRM) >20% of workers with portable devices for business use Employ ICT specialist Selling online (at least 1% of turnover) Share electronically supply chain management data Exploit B2C eCommerce % of EU SME's that have adopted 76.00% 58.00% 47.00% 40.00% 37.00% 33.00% 32.00% 32.00% 18.00% 17.00% 17.00% 7.00% Data as of 2017 11 Source : European commission services based on Eurostat Data. If comparison is to be made with Compared with the EU DESI Business Digitalization Index where mean value is above 40%, SME’s Within Pelagonija region should significantly improve. If in particular comparison is to be made with key indicators for tracking o the digitalization processes where the average fo the SME;s is 34.72 % Pelagonija region SME’s are still below the EU average . There is a room for improvement and also state policy can benefit from it if proper measures are tailored and implemented in order SME’s to benefit towards digitalization improvement. Our 11 European commission, Europe's Digital Progress Report, 2017b:20 91 aim is to provide data on how much state budget is losing from the nonsatisfactory level of digitalization of the companies. IMPORTANCE OF SME DIGITALIZATION FOR PELAGONIJA REGION GPD AND ITS IMPACT TO REVENUES COLLECTION In order to show the financial cost for the state from the current non-acceptable level of the SME’s digitalization level provide data on the level of the GDP’s growth influence of the better digitalized companies at least to the EU average and to provide data on the tax lost due to such reasons we need data on the GPD growth with the current level of digitalization and to provide trend extrapolation of the GPD’s growth. Also we need data on the tax collection. Since there is no precise statistics on the level of the value added of the SME’s to GDP by region we have added the general ponder of the 64.5% level within the value added of Pelagonija region SME’s to the region GDP. Table 4. Level of contribution to GPD of SME’s in Macedonia Million EUR % of share Micro 818 Small 836 Medium 758 SMEs total 2412 Large 1327 Total 3739 Source: 2017 SBA Fact Sheet, Macedonia, European Comission 2017. 21.9 22.4 20.3 64.5 35.5 100 Table 5 shows the levels of GDP by regions in Macedonia in 2016. Table 5. Level of contribution to GPD of statistical regions in Macedonia Region GDP in MKD in million Macedonia 594 795 Vardar 46 172 East 46 975 Southwest 48 810 Southeast 59 332 Pelagonija 65 057 Polog 42 487 Northeast 29 655 Skopje 256 308 Source: Macedonian Statistics Office last available data for 2016 GDP in EUR in million 9671.46 750.7613 763.8264 793.655 964.7411 1057.835 690.8381 482.1924 4167.611 Table 6 shows an estimate of the contribution in GDP of the SME enterprises within the Pelagonija region. Table 6. SME contribution to GDP in Pelagonija region Gross domestic Gross domestic product (in product (in million denars) million EUR) Level Macedonia 594 795 9671.46 Pelagonija 65 057 1057.835 Source: DZS (Macedonian Statistics Office) 92 Estimate of share of SME into GPD,% 64.50% 64.50% Estimate of share of SME into GPD, millions of EUR 6238.09 682.30 In 2016 the level of the taxes collected by Public revenues office in Pelagonija region was 127.561 EUR. The table below shows the level of SME contribution towards public revenues collection: Table 7. Share of SME into all companies tax collection in Pelagonija region Total taxes collected from Pelagonija Total taxes collected from Pelagonija Contribution of Region in Millions of MKD Region in Millions of EUR the SME;s 7845 127.561 82.27683 Source: Macedonian Public revenues collection office Having considered the data below we have extrapolated trends in two fields for Pelagonija region: A) GDP growth with and without EU average level digitalized SME’s and B) Public revenues growth with and without EU average level digitalized SME’s. As a baseline value we have extrapolated the need for growth of digitalization. Supporting growth and development of SMEs as well as innovative policies targeted at fostering their growth should belong to the statelevel priorities.12 The graph below shows the level of GPD prediction with the current state of SME digitalization vs level of GPD prediction growth if the level of digitalization is to be upgraded to the EU average. Current SME digitalization in Pelagonija region is estimated at the level of 31.01% while the EU average is 34.72%. That says at least there is a need for 3.71% absolute improvement or 10.68% relative improvement. If it is assumed that at least for that level the company productivity will be increased (although there is data for higher company benefits and in particular profit). 1600,00 1400,00 1200,00 1391,80 1317,81 1354,30 1280,72 1282,30 1247,75 1212,64 1246,21 1148,17 1179,96 1000,00 800,00 With current level 600,00 With EU average 400,00 200,00 0,00 2019 2020 2021 2022 2023 Graph 4. Difference in GPD among current and potential level of digitalization meeting the EU average 12 Ruchkina Melnichuk, Frumina, Mentel, 2017:259-271 93 The graph above depends on the following basis for forecast: - Annual growth of GPD with no digitalization of SME’s of 2.7% taken as average of GPD growth of Pelagonija region for the years 2013,2014,2015 and 2016 as years for which the data is available. - 10,68% difference in the digitalization to be improved within local SME’s in order EU average of 2017 to be reached. 10.68% is current level of relative difference between level of digitalization of the Pelagonija SME’s and average level of EU SME’s digitalization - Relative contribution of SME’s to regions GDP at national average level of 64.5%. Above mentioned data shows that if the EU average level of SME digitalization is achieved GPD will grow for additional 94.2 million of EUR The table below shows the projection difference among the current contribution of SME’s within Pelagonija region GDP with current level of digitalization and contribution of SME’s within Pelagonija region GDP with EU SME digitalization average as of 2017 achieved. Table 8. Difference in GPD projection growth in Pelagonija region with EU average SME digitalization achieved in millions of EUR With current level With EU average Difference 2019 1148.17 1247.75 99.58 2020 1179.96 1282.30 102.34 2021 1212.64 1317.81 105.17 2022 1246.21 1354.30 108.09 2023 1280.72 1391.80 111.08 Lost GPD is shown at the Graph 5. 112,00 111,08 110,00 108,09 108,00 106,00 105,17 104,00 102,34 102,00 100,00 Lost GPD 99,58 98,00 96,00 94,00 92,00 2019 2020 2021 2022 2023 Graph 5. Lost GPD for Pelagonija region due to the current level of digitalization of the SME’s 94 As per the data of Public revenue collection office the level of taxes collected from business entities is 3.778 million of MKD or 61.43 million of EUR. Following the ratio of 64.5/35.5 of percentual contribution of SME’s and large companies the contribution of SME in revenues is 39.62 million of EUR that is 3.74% of the annual GPD. If we assume that this portion will not increase (by the means of higher level of tax burden), the last is taken as baseline amount that can be increased in revenues collection if Pelagonija region SME’s digitalization level is upgraded to EU average. The levels of the taxes lost due to the current level of SME’s digitalization are shown in Table 9. Table 9. Difference in taxes collected due to not reached EU average level of digitalization of SME’s in millions of EUR Difference in GDP due to not reached EU average level of digitalization Difference in taxes collected from digitalized SME's due to not reached EU average level of digitalization 2019 2020 2021 2022 2023 99.58 102.34 105.17 108.09 111.08 3.72 3.82 3.93 4.04 4.15 4,2 4,15 4,04 4 3,93 3,82 3,8 3,72 3,6 3,4 2019 2020 2021 2022 Difference in taxes collected from digitalized SME's due to not reached EU average level of digitalization 2023 Graph 6. Difference in taxes collected due to not reached EU average level of digitalization of SME’s in millions of EUR CONCLUSION There is great room for improvement of digitalization level of Pelagonija SME’s. Current state of digitializaion as per survey undertaken on total of 131 companies out of which 95 are from production sector and 36 are from services sector the overall level of digitalizaiton is 31.1%. Compared with EU average that is measured through EU SME digitalization index this level is lover than the average. Namely in 2017 this level was 34.72% . That shows the fact that there is a evident need for state and regional policy makers should act towards providing climate and incentives for digitalization improvement. Such incentives will not provide benefit only for SME’s and GDP. They will also provide direct financial revenues for the state since it is expected level of taxes that will be collected from SME’s that advanced in digitalization will bring additional 3.72 million EUR in the year 1 and 4.15 million EUR in the year 5 if the EU average level of digitalization is going to be achieved from the SME’s from Pelagonija region. That questions the debate on how incentives should be provided. Public finance 95 incentives are to be introduced and they should be considered as investments that will be returned within the budget on medium run. 96 REFERENCES Annabele Gawer (2009). Platforms, Markets and Innovation, Edward Edgar Publishing, 1031. ASEAN (2018). Study on MSMEs Participation in the Digital Economy in ASEAN, Nurturing ASEAN MSMEs to Embrace Digital Adoption, Economic Research Institute for ASEAN and East Asia ,18-21. Enterprise Research Centre (2018). State of small Business Britain Report 2018, Sage Group, p 30. European commission (2017a). Digitalisation Support to SMEs, European commission; 1831. European commission (2017b). Europe's Digital Progress Report 2017 European commission; 20-25. European commission, (2018). Digital Transformation Comission;10-22. Scoreboard, European Gierlich M., Schüritz R., Malte V., Hess T.(2019). SMEs’ Approaches for Digitalization in Platform Ecosystems, Proceedings from Twenty-Third Pacific Asia Conference on Information Systems, 8-11. Pankaj M (2019). Study on Impact of Digital Transformation on MSME Growth Prospects in India, PradeshIJRAR- International Journal of Research and Analytical Reviews, Amity Business School, 5-18. Parviainen P., Tihinen M., Kääriäinen J., Teppola S. (2017). Tackling the digitalization challenge: how to benefit from digitalization in practice, International Journal of Information Systems and Project Management, 6-22. Randall L, Berlina A, Teräs, J & Rinne T (2018). Digitalization as a tool for sustainable Nordic regional development: Preliminary literature and policy review. Discussion paper prepared for Nordic thematic group for innovative and resilient regions, 12-20. Ruchkina, G., Melnichuk, M., Frumina, S., & Mentel, G. (2017). Small and medium enterprises in regional development and innovations. Journal of International Studies, 10(4), 259-271. 2017; Van Ark B.(2014).Productivity and Digitalization in Europe: Paving the Road to Faster Growth, The Lisbon Council Think Thank, 15-20. 97 98 Structural Equation Modelling of Internet Banking Service Quality in South Africa: A Framework for Managers Ephrem Habtemichael Redda1, Jhalukpreya Surujlal2 Abstract A challenging global business environment has propelled banks across the world to be innovative and to use alternative delivery channels such as Internet banking, mobile banking and automated teller machine (ATM) banking. The purpose of this study was to develop a measuring and modelling framework/instrument of Internet banking service quality (IBSQ) for the South African banking sector. Snowball and convenience sampling, both non-probability techniques were used to recruit participants for the study. A total of 310 Internet banking customer responses were utilised in the analysis. Using exploratory factor analysis (EFA), eight determinant factors that explained IBSQ were extracted. Following this, the study determined the causal relationship amongst IBSQ, customer value, satisfaction and loyalty through correlation analysis and structural equation modelling (SEM). The proposed model indicates that IBSQ, comprising eight factors, positively influences customer value, satisfaction and loyalty. The model found customer satisfaction to be a predictor of customer loyalty in an Internet banking context. Contrary to the hypothesised model, the influence of customer value was limited to customer satisfaction. The influence of customer value on customer loyalty was found to be rather weak; it influenced customer loyalty only indirectly through customer satisfaction. Understanding the intricate relationships amongst service quality, customer value, satisfaction and loyalty will definitely enhance banks’ understanding consumer behaviour and decision making in this digital era. The model may assist bankers to measure, manage and improve IBSQ. Banks could utilise this measurement model to design and improve their Internet banking services. Keywords: IBSQ, customer value, satisfaction, loyalty, consumer behaviour, SEM Jel Codes: M3; M30; M31 EXECUTIVE SUMMARY Technological developments and financial liberalisation (deregulation) are considered as the main drivers influencing the developments in the banking sector around the world. South African banks are not immune to this phenomenon. With the introduction of these service outlets banks aim to attract more customers, deliver superior service (create value) for their customers, satisfy their customers and build long-lasting relationships with their customers. Banks 1 Associate Professor, School of Management Sciences, North-West University (Vanderbijlpark Campus), South Africa, Email: [email protected], Orcid: 0000-0002-0233-1968 2 Professor & Deputy Dean, Faculty of Economic and Management Sciences, North-West University (Vanderbijlpark Campus), South Africa, Email: [email protected], Orcid: 00000003-0604-4971 99 ultimately aim to create loyal customers who patronise their brand for benefits that come with it such as increased sales and profit, decreased sales and marketing costs and the generation of positive word of mouth. To achieve the afore-mentioned benefits, banks need to have a deeper understanding of the intricate relationship amongst certain crucial service marketing constructs, namely service quality, customer value, satisfaction and loyalty. The introduction of technology and machines in the delivery of Internet banking service means that traditional service quality measures such as SERVQUAL are not applicable in measuring service quality attributes in an online setting. Thus, industry specific measures of service quality are needed. Accordingly, the primary purpose of this study was to develop a measuring and modelling framework/instrument of Internet banking service quality for the South African banking sector. The study also sought to examine the relationships amongst the crucial marketing constructs mentioned earlier, viz. service quality, customer value, satisfaction and loyalty. Using exploratory factor analysis (EFA), eight determinant factors were extracted that explained the Internet banking service quality (IBSQ). Following this, the study determined the causal relations amongst IBSQ, customer value, satisfaction and loyalty through correlation analysis and structural equation modelling (SEM). The study has proposed a model that may assist bankers to measure, manage and improve Internet banking service quality at different levels. It has identified the building blocks for improving service quality and a mechanism to create value customers, enhance customer satisfaction and ultimately attain loyal customer in the relationship. INTRODUCTION A challenging global business environment has propelled banks across the world to be innovative and to use alternative delivery channels such as Internet banking, mobile banking and automated teller machine (ATM) banking. Technological developments and financial liberalisation (deregulation) are considered as the main factors influencing developments in the banking sector (Aziz, Elbadrawy & Hussien, 2014). With the introduction of these service outlets, banks aim to attract more customers, deliver superior service (create value) for their customers, satisfy their customers and build long-lasting relationships with their customers. Over the past few decades, several research studies have been conducted on service and service quality measurements on traditional forms of businesses (Adil, 2013), with limited attention to electronic services. The concept of service quality from an electronic service perspective is described as the clients’ overall evaluation and judgement of excellence and quality of electronic service offerings in the virtual marketplace (Santos, 2003). This description suggests that, unlike the evaluation of traditional service offerings, customers in an electronic environment are less likely to evaluate each sub-process in detail during a single visit to a bank’s website. Clients in an electronic banking environment are likely 100 to perceive the service as an overall process and outcome (Van Riel, Liljander & Jurriёns, 2001). There has been long-standing debate regarding the application of existing popular models such as the SERVQUAL model across a broad range of service categories. Dabholkar, Thorpe and Rentz (1996) argue that a single measure of service quality across industries is not feasible. These authors suggest that future research on service quality should involve the development of industry-specific measures of service quality. Such arguments signal a move from attempts to adapt the SERVQUAL to the development of alternative industry-specific measures. As a result, studies have been conducted in electronic service quality across different settings. However, there is increasing evidence of variation in the outcomes of studies on the dimensions of electronic service quality that have surfaced in an attempt to address the key attributes of service quality of online services, directly or indirectly (Jun & Cai, 2001; Barnes & Vidgen, 2003; Santos, 2003; Han & Baek, 2004; Parasuraman, Zeithaml & Malhotra, 2005; Narteh, 2013). The scale developed by Parasuraman et al. (2005) referred to as the Electronic Service Quality instrument (E-SQ) comprises seven dimensions, namely efficiency, fulfilment, system availability, privacy, responsiveness, compensation and contact. In a study conducted in the Irish online banking sector, Loonam and O’Loughlin (2008) identified ten dimensions, namely web usability, security, information quality, access, trust, reliability, flexibility, responsiveness, self-recovery and personalisation/customisation that are focal to e-service quality delivery, with the applicability of each of the proposed dimensions to e-banking. Currently, all major commercial banks in South Africa offer Internet banking facilities to their customers. Research in areas of service quality of Internet banking in South Africa is scant and limited in scope. Hence a research gap was identified that dealt with empirical work in the conceptualisation, measurement and modelling of the services of Internet banking. Therefore, the purpose of this study was to develop a measuring and modelling instrument of Internet banking service quality (IBSQ) for the South African banking sector. In addition, the study aimed to determine the relationships between the constructs of IBSQ, customer value, satisfaction and loyalty formed the empirical objectives of the study. LITERATURE REVIEW Service quality Many early models of service quality, including the Nordic Model of Service Quality (Grönroos, 1984) and SERVQUAL (Parasuraman, Zeithaml & Berry, 1985, 1988) were based on the disconfirmation model applied in the physical goods’ literature. The disconfirmation model is based on the premise that service quality is perceived through a comparison between expectations and experiences of a number of service quality dimensions (Grönroos, 2007). Cronin and Taylor (1994) were amongst the scholars who levelled serious criticism on the 101 SERVQUAL scale, and subsequently introduced their own performance-only scale called the SERVPERF. Cronin and Taylor (1994) questioned the conceptual basis of the SERVQUAL scale and found it confusing with the customer satisfaction construct. SERVPERF was developed by conducting research in four industries, namely banks, pest control, dry cleaning and fast foods. Service quality has been measured in businesses - ranging from financial services to restaurants. Customer value By introducing alternatives to traditional banking, banks aim to create value for their customers. Zeithaml (1988) describe customer value as “the consumer`s overall assessment of the utility of a product based on perceptions of what is received and what is given”. In this context value is, therefore, a trade-off between what the customer received such as quality, benefits, worth or utilities and what the customer gave up to acquire and use the product, for example, price or any other sacrifice. In literature focusing on the service industry, it is argued that customer value is the result of a customer’s perception of the value received, where value equals perceived service quality relative to price (Hallowell, 1996). It is a subjective norm since it involves an evaluative judgment of what is received and sacrificed (Ruiz-Molina & Gil-Saura, 2008). Customer satisfaction Customer satisfaction is a must-achieve objective for any business. In services marketing literature there has been a long-standing debate on the concept of satisfaction (Dong, 2003). Lovelock and Wright (1999:88) define satisfaction as “the outcome of the subjective evaluation that the chosen alternative meets or exceeds expectations”. This denotes that the two variables that determine satisfaction are expected and perceived service. The basis of this definition stems from the disconfirmation paradigm as a post-purchase evaluation (Torres, Summers & Belleau, 2001). Satisfaction is also considered from a perspective of cumulative satisfaction and is defined as the customers’ overall experience with the service provider after a series of service encounters (Johnson, Gustafsson, Andreassen, Lervik & Cha, 2001). The majority of the past studies view satisfaction from a cumulative perspective to measure the construct (Gupta & Zeithaml, 2006). Customer loyalty Customer satisfaction is closely related with customer loyalty. Loyalty can be described as a consumer’s inclination to patronise a given firm or chain of firms over time (Knox & Denison, 2000). Loyalty consists of two dimensions, namely behavioural and attitudinal aspects (Dong, 2003). The behavioural aspect of loyalty focuses on a measure of the proportion of purchase of a specific brand, while attitudinal loyalty is measured by a psychological commitment to a firm. Koo (2006) conducted a study to identify the variables that determine customer loyalty. The results revealed that customers’ favourable perceptions of website 102 design, visual appeal, well-organised hyperlinks, information quality, product assortment and after-sale services are positively associated with online store loyalty. The main advantages of having loyal customers include insensitivity of customers to price increases, possibility of cross-selling, resistance to competition, positive attitude, and of course increased revenue, profit and market share (Cronin, Brady & Hult, 2000; Iacobucci, 2016). The relationships between service quality, customer value, customer satisfaction and customer loyalty or behavioural intentions have stimulated interest among marketing scholars both in online and in offline service settings (Parasuraman et al., 1988; Cronin et al., 2000; Han & Baek, 2004; Kuo, Wu & Deng, 2009; Lee, 2010). Patterson and Spreng (1997) established that each performance dimension is positively linked to perceived value and in turn perceived value is linked positively to customer satisfaction and (re)purchase intentions. Similarly, other studies have indicated that service quality as a precondition for customer satisfaction (Boshoff & Du Plessis, 2009). The literature also suggests that there is a direct link between service quality and customer loyalty (Koo, 2006). A few studies also suggest a direct link between customer satisfaction and customer loyalty (Dong, 2003). In a study on the relationships between service quality, perceived value, customer satisfaction, and post-purchase intention of mobile value-added services, Kuo et al. (2009) found that service quality positively influences perceived value and customer satisfaction, suggesting that when companies provide good service quality, perceived value and customer satisfaction can be improved. The results further attest that perceived value and customer satisfaction directly and positively influence customer loyalty. In light of the research objective of this study and the literature reviewed, the proposed hypothesised research model is presented in Figure 1. Figure 1: Proposed research model The proposed research model hypothesises a set (N) of dimensions that determine IBSQ that positively influence customer value, customer satisfaction 103 and customer loyalty. Furthermore, the model also hypothesises that customer value influences both customer satisfaction and customer loyalty; while customer satisfaction is perceived to be a predictor of customer loyalty. To support the hypothesised research model, the following alternative hypotheses are formulated: H1: Internet banking service quality positively influences customer value. H2: Internet banking service quality positively influences customer satisfaction. H3: Internet banking service quality positively influences customer loyalty. H4: Customer value positively influences customer satisfaction. H5: Customer value positively influences customer loyalty. H6: Customer satisfaction positively influences customer loyalty. RESEARCH DESIGN The study adopted a sequential-mixed method approach to achieve the formulated objectives. Qualitative data were first collected and analysed. Thereafter, quantitative research was conducted. Use of the sequential-mixed method approach is in line with the practice of the development of a service model (or a scale) where a qualitative research is first conducted followed by quantitative research (Churchill, 1979; Parasuraman et al., 1988). Following a critical study of the extant literature (inductive analysis) and initial generation of a pool of items, a focus group interview comprising five participants and separate in-depth interviews with three participants were conducted to generate original items and descriptions of what constitutes service quality of Internet banking in a South African context (deductive analysis). The findings of the qualitative study (Redda, Surujlal & Leendertz, 2015) were used in compiling items for the questionnaire. This paper reports only the quantitative part of the study. The quantitative part of the research, which involved the use of a questionnaire to collect data, and refine and validate the scale through various statistical applications, was conducted in Southern Gauteng, South Africa in 2015. Since a sampling frame could not be obtained from banks for security and privacy reasons, a probability sampling could not be used in this study. Therefore, snowball and convenience sampling, both non-probability techniques were applied to conduct the study. Instrument and procedures A questionnaire requesting demographic information of participants and scaled items was developed for the study. The scaled items included service quality with eight latent factors collectively comprising of 31 items, five items for customer value, four items for satisfaction and five items for loyalty. All scaled responses were recorded on a six-point Likert-type scale ranging from strongly disagree (1) to strongly agree (6). The use of even number response categories is often preferred especially when the researcher wants to eliminate the neutral effect 104 (Garland, 1991). The questionnaire was pre-tested with three experts in the discipline to check whether any changes were required before administering it to Internet banking customers. Furthermore, to ensure reliability, the questionnaire was pilot-tested on a sample of 50 conveniently selected Internet banking customers that did not form part of the main study. Four hundred (N=400) questionnaires were administered over a one-month period through Survey monkey and self-administration to the identified sample. Of these data captured, 310 completed questionnaires were used in the final analysis. This sample size in this study (n=310) is consistent with similar previous studies conducted on Internet banking services using a non-probability sampling technique (Santos, 2003; Parasuraman, et al., 2005). DATA ANALYSIS The statistical programs IBM Statistical Packages for the Social Sciences (SPSS version 22.0) and the Analysis for Moment Structures (AMOS version 22.0) for Microsoft Windows, were used to perform analysis for the quantitative data. Descriptive statistics, exploratory factor analysis (EFA), correlation analysis and structural equation modelling (SEM) were computed to address the research objectives. RESULTS AND DISCUSSION Sample profile Of the 310 respondents, 53 percent (n=163) were male and 47 percent (n=144) were female. The majority of the respondents were aged between 25-34 (34%) followed by the 35-44 (33%) age cohort and the 45-54 (13%) age cohort. The youngest age cohort (18-25) and the oldest age cohort (54-64) were in the minority representing eight percent and 12 percent of the respondents respectively. The majority (31%; n=95) of respondents earned an annual income in the category R250 001 to R350 000, followed by 29 percent (n=89), R350 001 to R450 000, and 15 percent (n=46) in the R450 001 to R550 000 category. A majority (66%) of the respondents indicated that they use Internet banking for most of their banking needs suggesting that they had adequate knowledge and experience of the service provided. In terms of how long the respondents had been using Internet banking, 65 percent (n=199) of the respondents indicated that they had been using Internet banking for more than three years, which depicts a solid experience of usage of the service. Exploratory factor analysis (EFA) Exploratory factor analysis was conducted to identify the underlying service quality dimensions (factors) that influence Internet banking services and consumer decision making in South Africa. Furthermore, separate factor analyses were conducted on the other three constructs, namely value, satisfaction and loyalty to assess whether the items in each of the constructs adequately explained their respective constructs. Table 1 presents a summary pattern matrix of factors and constructs. 105 Table 1: Summary pattern matrix of factors and constructs Factors / Constructs Factor 1 Factor 2 Factor 3 Factor 4 Factor 5 Factor 6 Factor 7 Factor 8 Value Satisfaction Loyalty No. items 4 6 6 3 3 3 3 3 5 4 5 of Eigen value 11.7 3.2 2.2 1.9 1.8 1.5 1.3 1.1 3.4 3.0 3.2 % of variance 37.8 10.3 7.0 6.2 5.8 4.7 4.2 3.5 67.3 74.2 63.1 Cumulative% 37.8 48.1 55.2 61.4 67.2 71.9 76.1 79.7 67.3 74.2 63.1 Cronbach`s alpha 0.921 0.940 0.883 0.931 0.934 0.827 0.874 0.924 0.875 0.883 0.847 The dataset was assessed for its suitability for factor analysis using sample size determination, the Kaiser-Myer-Olkin (KMO) and the Bartlett’s test of sphericity. In terms of sample size, it is recommended that the size should be more than 150 and there should be ratio of at least five cases per variable (Pallant, 2013). In this study, the sample (310) yielded a ratio of ten cases for each variable. The result of the KMO measure of sampling adequacy indicated that the 31-item scale sufficiently meets the necessary threshold at 0.893 (Malhotra, 2010). Furthermore, the Bartlett’s test of sphericity was significant (p<.05) indicating the dataset was appropriate for the factor analysis (Pallant, 2013). The factor extraction method applied was principal component analysis (PCA) with Oblimin with Kaiser Normalisation. Factor loadings greater than 0.30 were used as a threshold for the extraction of factors. The eigenvalues and percentage of variance explained were used in determining the factors that influence IBSQ. The eigenvalue extraction indicated that the eight factors were appropriate and best fit for capturing and explaining the IBSQ construct. These eight factors are the building blocks upon which South African Internet banking customers base their decisions. The eight factors accounted approximately 79 percent of the variance (cumulative variance), which is considered more than acceptable (Hair, Black, Babin & Anderson, 2010). Thus, the IBSQ construct is explained collectively by eight factors. Furthermore, the Cronbach alpha reliability for each factor was above 0.8 portraying very good reliability (Hair et al., 2010). With respect to the other three constructs, a similar method was applied. The cumulative variance for customer value, satisfaction and loyalty were approximately 67 percent, 74 percent and 63 percent respectively. The Cronbach alpha reliability for these three constructs also portrayed very good reliability as illustrated on Table 1. After careful examination and scrutiny of the items that loaded together to describe the IBSQ construct, the factors were named and operational descriptions provided. Factor one, named efficiency refers to the speed at which the electronic banking facility enables customers to complete their banking 106 transactions. Factor two, labelled privacy and security refers to the degree to which customers find transacting through electronic banking safe and secure. Factor three, named contact and responsiveness refers to the ability of the bank to be contacted to and be responsive of when customers need it, encounter problems and/or to solve problems. Factor four, ease of use refers to the accessing and using the bank’s website for searching, navigating and transacting electronically with less effort. Factor five, named reliability, relates to the extent to which the bank keeps its promise with regard to electronic banking, provide dependable service and keep accurate records of transactions conducted over the Internet. Factor six named site aesthetics refers the extent to which customers find bank’s websites and designs to be visually appealing and attractive. Factor seven, labelled functionality, refers to the sum or any aspect of the electronic banking as a product can do for the customer. The last factor, named system availability, describes the operational availability of the bank’s website for electronic banking transactions. Determining the relationships between the constructs IBSQ, customer value, satisfaction and loyalty formed the empirical objectives of the study. To address these objectives, first correlation analysis was computed. Correlation analysis Table 2 provides the correlation between eight of the dimensions, IBSQ, customer satisfaction and customer loyalty. Table 2: Correlation matrix A two-tailed significance level is assumed at the cut off level p<0.01. On inspection of each pair of correlation, the Pearson’s correlation coefficient at p<0.01 level of significance indicates a positive linear association between each of the dimensions and constructs suggesting nomological validity, and none of the coefficients were above 0.9 so there were no multicollinearity issues (Hair et al., 2010). As can be seen from Table 2, the correlations between each pair of the eight dimensions that collectively explained IBSQ were significant, ranging from r=0.242 to r= 0.460 at p<0.01 level of significance, suggesting the existence of positive inter-factor associations. In addition, the correlations between each of 107 the eight dimensions that collectively constitute the IBSQ construct also showed statistically significant associations with customer value, satisfaction and loyalty. The relationship between IBSQ, customer value, satisfaction and loyalty was also found to be positive and significant. To assess the causal effect of the relationships detected through correlations analysis further, and to test the hypothesised research model specified earlier, structural equation modelling (SEM) was performed. The establishment of nomological validity and the absence of multicollinearity issues made it possible to perform SEM as a confirmatory factor analysis. Structural equation modelling (SEM) In line with the hypothesised research model, four constructs are identified in the model, namely IBSQ, customer value, satisfaction and loyalty. Following the recommendation of Malhotra (2010) and Hair et al. (2010) the measurement model was specified and identified, and the measured indicator items were assigned to latent constructs. Figure 2: Specified measurement model 108 Figure 2 depicts the hypothesised specified measurement model. IBSQ, with eight latent factors, collectively comprised 31 items, with five items for customer value (Val), four items for satisfaction (Sat) and five items for loyalty (Loy). The eight latent factors are the dimensions of IBSQ (extracted through EFA), namely reliability, system availability, privacy and security, website aesthetics, ease of use, functionality, efficiency, and contact and responsiveness. Reliability and validity of the measurement model Composite reliability (CR), average variance extracted (AVE) and the correlation coefficients were computed to determine the reliability and validity of the scale. The CR results were above the cut off 0.7 level, suggesting a good internal consistency of the scale. It must be borne in mind that the Cronbach alpha reliability, of the all the factors extracted that constituted the scale, were above 0.8 portraying very good reliability (Hair et al., 2010). In terms of validity, AVE values for all constructs were above 0.50 indicating evidence of convergent validity of the scale (Malhotra, 2010). In addition, an average inter-item correlation of the scale fell within the suggested range of 0.15 and 0.50 which indicates acceptable discriminant validity (Clark & Watson, 1995). Factor loadings of the items had absolute value scores above 0.5 which further confirms that convergent validity was acceptable in this study. Assessment of goodness-of-fit indices Four competing models were identified in order to test the hypothesised research model and identify the best model fit. Table 3 reports on the goodness-of-fit indices of the competing models. Structural Model A is a three-construct model that included IBSQ, customer value and loyalty. Similarly, Structural Model B is also a three-construct model that included IBSQ, customer satisfaction and loyalty. However, Structural Model C and D are models that included four of the constructs of this study, namely IBSQ, customer value, satisfaction and loyalty. Table 3: Goodness-of-fit indices for the competing models The chi-square test (X2) is viewed as an overly strict indicator of model fit, given its power to detect even trivial deviations from the proposed model. Mueller (1996) suggested that the chi-square test statistic be divided by degrees of freedom where an acceptable level is observed at <3. Interpretation of the size of this value depends largely on the viewpoint of the investigator, but in practice, some interpret ratios as high as three, four or even five as still representing a good model fit (Mueller, 1996). All the competing models exhibited good model fit with regard to the chi-square test. The indices used to assess the goodness-of109 fit of the structural models include incremental fit index (IFI), Tucker Lewis index (TLI) and comparative fit index (CFI). Indices values closer to one indicate a perfect fit and those closer to zero represent no fit (Malhotra, 2010; Hair et al., 2010:665). With regard to root mean square error of approximation (RMSEA), there is a good model fit if RMSEA is less than or equal to 0.05 and an adequate fit if RMSEA is less than or equal to 0.08 (Blunch, 2008). Blunch (2008) is of the view that models with RMSEA values of 0.10 and larger should not be accepted. Overall, Structural Model A exhibited poor goodness-of-fit indices while Structural Model B produced much improved and acceptable indices. Of the remaining two Structural Models (C & D) that included four of the constructs, Structural Model D provided better fit producing overall acceptable fit indices with the exception of Tucker Lewis index (TLI) missing the threshold with 0.010. On a scale of zero being no fit and one being perfect fit, Model D is still an acceptable model fit for the dataset and for purposes of testing the hypothesised research model. In the following section, analyses of the percentage of mediation effect and standardised regression weights are used to test the hypothesised research model further. Structural model and mediation effects Table 4 provides standardised regression weights of the four competing models. Table 4: Standardised regression weights: IBSQ, satisfaction, value & loyalty The causal effects are read in the direction of the arrows. In Structural Model A, the results suggest that IBSQ has a statistically significant positive influence on customer value and on loyalty, and customer value in return has positive effect on loyalty. In this three-construct model, the mediating effect of customer value on loyalty was calculated to be 27.86 percent. In Structural Model B, also a threeconstruct model, the results indicate that IBSQ has a statistically significant positive influence on satisfaction and on customer loyalty and customer satisfaction in return has significant positive effect on customer loyalty. In this three-construct model, the mediating effect of customer satisfaction on loyalty 110 was estimated to be 58.05 percent much higher than the percentage of mediation effect of customer value on loyalty. In Structural Model C, two constructs (customer satisfaction and loyalty) play a mediating role together. The regression path estimates suggested that IBSQ yields positive effect on three of the constructs, namely customer value, satisfaction and loyalty. However, the regression path estimate of customer value on loyalty was reduced by two thirds of its original effect without the intervention of customer satisfaction. In this four-construct model, the combined mediating effect of customer value and satisfaction on loyalty was estimated to be 60.16 percent, where once again a diminished effect is observed with regard to the influence of customer value on loyalty. In this Model, the influence of IBSQ on value, satisfaction and loyalty is significant. In turn, value also positively influenced satisfaction while satisfaction was found not to be a predictor of loyalty. Figure 3: Structural Model D: IBSQ Measurement Model Figure 3 exhibits the regression path estimates (coefficients) of the fourth competing Structural Model (D). The direct effect of customer value on loyalty was removed in light of the diminished mediation effect observed in Structural Model C. Moreover, Structural Model D did exhibit a better-fit indices compared to Structural Model C. The regression path estimates suggest that IBSQ yields positive effect on three of the constructs namely customer value, satisfaction and loyalty. Furthermore, the regression path estimates indicate that customer value in return has a positive effect on satisfaction but not on loyalty. Customer 111 satisfaction, in return, is indicated to have a positive effect on customer loyalty. The results of standardised regression weights also support these findings. The four-construct Structural Model D indicates that the model fits well in representing the dataset. Therefore, Structural Model (D) was identified and proposed yielding a better fit for the hypothesised research model. Hypotheses testing Hypotheses testing was carried out with a significance level set at the conventional p<0.05 level. The causal effects read in the direction of arrows indicate that IBSQ positively influences customer value significantly (0.936) at p<0.05 level; IBSQ positively influences satisfaction significantly (0.668) at p<0.05 level and IBSQ positively influences customer loyalty (0.410) at p<0.05 level. Accordingly, H1, H2, and H3 are supported. This finding corroborates the results of previous studies conducted in other contexts that found service quality to be a predictor of customer value (Patterson & Spreng, 1997; Cronin et al., 2000; Kuo et al., 2009), customer satisfaction (Cronin et al., 2000; Kuo et al., 2009) and customer loyalty (Parasuraman et al., 1988; Patterson & Spreng, 1997; Koo, 2006; Siddiqi, 2011). Similarly, the causal effects read in the direction of arrows suggest that customer value positively influences satisfaction significantly (0.534) at p<0.05 level, and customer satisfaction in turn positively influences loyalty significantly (0.529) at p<0.05 level. Hypotheses H4 and H6 are therefore supported. This result is consistent with other studies that established the positive influence of customer value on customer satisfaction (Anuwichanont & Mechinda, 2009), and the positive influence of customer satisfaction on loyalty (Dong, 2003; Siddiqi, 2011). It must be borne in mind that the direct effect of customer value on loyalty was removed in light of the diminished mediation effect observed in Structural Model C. The influence of customer value on customer loyalty is only indirect through its influence on customer satisfaction. Hypothesis H5 is therefore rejected. This finding corroborates the finding of Cronin et al. (2000) that loyalty does not directly influence customer satisfaction. However, it must be noted that a few previous studies conducted in other contexts have found customer value to have a direct and positive link with customer loyalty (Zeithaml, 1988; Patterson & Spreng, 1997; Lewis & Soureli 2006). Ultimately, a four-construct Structural Model (D) was identified and proposed as yielding a better fit for the hypothesised research model. It is the proposed IBSQ Measurement Model that can be used for measuring and modelling of IBSQ in the South African banking sector. CONCLUSIONS AND RECOMMENDATIONS Employing a sequential-mixed method approach in line with the practice of the development of a service model (or a scale) where a qualitative research is first conducted followed by quantitative research, the study has proposed a framework for internet banking service quality management in the context of South Africa. The proposed framework can easily be applied in other contexts as 112 is or with little adaptations. Eight determinant factors that explain IBSQ (reliability, system availability, privacy and security, website aesthetics, ease of use, functionality, efficiency, and contact and responsiveness) were identified. Furthermore, the model has determined the causal relationships among four important constructs, namely IBSQ, customer value, satisfaction, and loyalty. Understanding consumer behaviour and decision making in this digital era will enhance the banks` quest to provide quality services and devise appropriate customer service solutions. The research revealed that reliability, privacy and security are the top concerns customers have with regard to Internet banking. Therefore, it is recommended that banks invest in the robustness of the websites for banking transactions by using cutting-edge technology to protect their customers from illicit criminal activity, as security and trust are of crucial importance to customers when engaging in online transactions. To enhance efficiency of Internet banking, it is recommended that banks should ensure that the service delivered through the bank’s website is quick to access for transactions from any location and at any time, the bank’s website loads fast all the time and the bank’s website does not freeze during a transaction. With regard to contact, responsiveness and system availability, it is recommended that banks need to repair a breakdown on the website quickly as and when it occurs, promptly resolve serious problems that customer encounter, provide prompt feedback to customer requests by e-mail or other means, and improve and closely manage customer complaints. It must be emphasised that satisfying customers is a ‘must achieve’ objective for any bank that wishes to remain profitable and relevant in the competitive banking sector. This must be done by providing quality services that create value for customers. Achieving loyal customers who will patronise and associate themselves with the bank is of particular significance for market growth and success. In view of the relationship of IBSQ dimensions with customer value, satisfaction and loyalty, focus must be placed on the individual building blocks of service quality, inter alia the factors that influence Internet banking service quality. These are the factors that influence consumer behaviour and decision making in online banking environment. Periodic measurement of the levels of Internet banking service quality through valid and reliable measuring scale should become an integral part of any bank’s effort and strategy in improving service quality levels. Using the scale developed in this study, future studies could use a larger sample size to test the robustness of this scale, and obtain more exact result to draw wider generalisations. 113 REFERENCES Adil, M. (2013). Efficacy of SERVPERF in measuring perceived service quality at rural retail banks: Empirical evidences from India. International Journal of Business Insights and Transformation, 6(1), 52-63. Anuwichanont, J. & Mechinda, P. (2009). The impact of perceived value on spa loyalty and its moderating effect of destination equity. Journal of Business & Economics Research, 7(12), 73-90. Aziz, A.B., Elbadrawy, R. & Hussien, M.I. (2014). ATM, Internet Banking and Mobile Banking Services in a Digital Environment: The Egyptian Banking Industry. International Journal of Computer Applications, 90(8), 45-52. Barnes, S.J. & Vidgen, R. (2003). Measuring website quality improvements: a case study of the forum of strategic improvement. Industrial Management and Data Systems, 103(5), 297-309. Blunch, N.J. (2008). Introduction to structural equation modelling using SPSS and Amos. London: SAGE. Boshoff, C. & Du Plessis, P.J. (2009). Services marketing: a contemporary approach. Cape Town: Juta. Churchill, G.A. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16, 64-73. Clark, L.A. & Watson, D. (1995). Construct validity: Basic issues in objective scale development. Psychological assessment, 7(3), 309-319. Cronin, J.J., Brady, M.K. & Hult, G.T.M. (2000). Assessing the effects of quality, value, and customer satisfaction on consumer behavioural intentions in service environments. Journal of Retailing, 76(2), 193-218. Cronin, J.J. & Taylor, S.A. (1994). SERVERF versus SERVQUAL: reconciling performance based and perceptions minus expectations measurement of service quality. Journal of Marketing, 58(1), 125-33. Dabholkar, P.A., Thorpe, D.I. & Rentz, J.O. (1996). A measure of service quality for retail stores: scale development and validation. Journal of the Academy of Marketing Science, 24(1), 3-16. Dong, M.K. (2003). Inter-relationships among store image, store satisfaction, and store loyalty among Korea discount retail patrons. Asia Pacific Journal of Marketing and Logistics, 15(4), 42-71. Garland, R. (1991). The mid-point on a rating scale: Is it desirable? Marketing bulletin, 2, 66-70. 114 Grönroos, C. (1984). A service quality model and its marketing implications. European Journal of Marketing, 18(4), 36-44. Grönroos, C. (2007). Service management and marketing: Customer management in service competition. London: John Wiley. Gupta, S. & Zeithaml, V. (2006). Customer metrics and their impact on financial performance. Marketing Science, 25(6), 718-739. Hallowell, Roger. (1996). The Relationship of Customer Satisfaction, Customer Loyalty, and Profitability: An Empirical Study, The International Journal of Service Industry Management, 7 (4), 27-42. Hair, J.F., Black, W.C., Babin, B.J. & Anderson, R.E. (2010). Multivariate data analysis: a global perspective. 7th ed. New Jersey: Pearson Education. Han, S. & Baek, S. (2004). Antecedents and consequences of service quality in online banking: An application of the SERVQUAL instrument. Advances in Consumer Research, 31, 208-214. Iacobucci, D. (2016). Marketing Management. Boston: Cengage. Johnson, M., Gustafsson, A., Andreassen, T., Lervik, L. & Cha, J., (2001). The evolution and future of national customer satisfaction index models. Journal of Economic Psychology, 22(2), 217-245. Jun, M. & Cai, S. (2001). The key determinants of internet banking service quality: A content analysis. International Journal of Bank Marketing, 19(7), 276-291. Knox, S.D. & Denison, T.J. (2000). Store loyalty: Its impact on retail revenue, an empirical study of purchasing behaviour in the UK. Journal of Retailing and Consumer Services, 7, 33-45. Koo, D.M. (2006). The fundamental reasons of e-consumers’ loyalty to an online store. Electronic Commerce Research and Applications, 5(2), 117-130. Kuo, Y.F., Wu, C. & Deng, W.J. (2009). The relationships among service quality, perceived value, customer satisfaction, and post-purchase intention in mobile value-added services. Computers in Human Behaviour, 25, 887-896. Lee, H.S. (2010). Factors influencing customer loyalty of mobile phone service: Empirical evidence from Koreans. Journal of Internet Banking and Commerce, 15(2), 2-14. Lewis, B.R. & Soureli, M. (2006). The antecedents of consumer loyalty in retail banking, Journal of Consumer Behaviour, 5, 15-31. Loonam, M. & O’Loughlin, D. (2008). Exploring e-service quality: A study of Irish online banking. Marketing Intelligence & Planning, 26(7), 759-780. 115 Lovelock, C. & Wright, L. (1999). Principles of marketing and management. New York: Pearson Prentice-Hall. Malhotra, N.K. (2010). Marketing research: An applied orientation. 6th ed. Upper New Jersey: Pearson Education Prentice Hall. Mueller, R.O. (1996). Basic principles of structural equation modeling: An introduction to LISREL and EQS. New York, NY: Springer. Narteh, B. (2013). Service quality in automated teller machines: An empirical investigation. Managing Service Quality, 23(1), 62-89. Redda, E.H., Surujlal, J. & Leendertz, V. (2015). Internet Banking Service Quality Scale Development in South Africa: A Qualitative Approach. 27th Annual SAIMS Conference 2015, Cape Town, South Africa. Pallant, J. (2013). A step by step guide to data analysis using IBM SPSS: Survival manual. 5th ed. New York: McGraw-Hill. Parasuraman, A., Zeithaml V.A., & Berry, L.L. (1985). A conceptual model of service quality and its implications for future research. Journal of Marketing, 49, 41-50. Parasuraman, A., Zeithaml V.A., & Berry, L.L. (1988). SERVQUAL: a multiple-item scale for measuring consumer perceptions of service quality. Journal of Retailing, 64, 12-40. Parasuraman, A., Zeithaml, V. & Malhotra, A. (2005). E-S-QUAL: A multiple-item scale for assessing electronic service quality. Journal of Service Research, 7(3), 213-233. Patterson, P.G. & Spreng, R.A. (1997). Modeling the relationship between perceived value, satisfaction and repurchase intentions in a business-to-business, services context: an empirical examination. International Journal of Service Industry Management, 8(5), 414-434. Ruiz-Molina, M. & Gil-Saura, I. (2008). Perceived value, customer attitude and loyalty in Retailing. Journal of Retail and Leisure Property, 7, 305-314. Santos, F. (2003). E-service quality: A model of virtual service quality dimensions. Managing Service Quality, 13(3), 233-246. Siddiqi, K.M. (2011). The drivers of customer loyalty to retail banks: an empirical study in Bangladesh. Industrial Engineering Letter, 1(1), 40-50. Torres, M., Summers, T. & Belleau, D. (2001). Men’s shopping satisfaction and store references. Journal of Retailing and Consumer Services, 8, 205-212. Van Riel, A., Liljander, V. & Jurriens, P. (2001). Exploring consumer evaluations of eservices: a portal site. International Journal of Service Industry Management, 12(4), 359377. 116 Zeithaml, V.A. (1988). Customer perceptions of price, quality, and value: A measure-end model and synthesis of evidence. Journal of Marketing, (5), 2-22. 117