Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Hussein, KAN; Arayici, Y; Yusof, SA
Languages: English
Types: Unknown
Subjects: built_and_human_env
This research sets out to develop a framework for adopting Social Computing (SC) tools and platforms in Higher Education (HE) institutions in the Persian Gulf States in order to leverage teaching and learning processes. Among other things, it reviews the known problems in HE in the Gulf States, best practices for using Social Computing in Higher Education, and the available literature on user acceptance of technology. It then addresses the known problems in HE and identifies the proper SC platforms for solutions with the support of the approved theories of user acceptance of technology.\ud In order to achieve the goals of this study, a set of research methods has been implemented by taking samples from the different HE stakeholders in the Gulf States to collect data about the significant factors that affect user acceptance when using SC in an educational context. The aim of the data collection is to highlight these factors and link them with the behavioral intentions of using SC in HE in order to propose a framework for the effective implementation of SC in HE in Gulf State institutions.\ud Once that aim being achieved, the society benefits more from its individuals and move toward higher levels of education, innovation and development.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • o Ajzen, I. (1985) “From intentions to actions: A theory of planned behavior” in J. Kuhl & J. Beckmann (Eds.), Action control: From cognition to behavior, Berlin, Heidelber, NY.
    • o Ajzen, I., & Fishbein, M. (1980) “Understanding attitudes and predicting social behavior”, Englewood Cliffs, NJ: Prentice-Hall.
    • o Davis, F.D. (1989), “Perceived Usefulness, Perceived ease of use, and user acceptance of Information Technology”, MIS Quarterly, 13, 3, 319-339.
    • o Donath, J.S. (1999) “Identity and Deception in the Virtual Community”, in M. A. Smith & P. Kollock, Communities in Cyberspace, Routledge, NY, 29-59.
    • o Eastwood, M. (2009), “Preparing for the 2.0 world: How enterprises need to think about about emergent social technologies”, Available: http://searchstorage.bitpipe.com/detail/RES/1250191180_590.html, Retreived on 13th October, 2009.
    • o Fluss, Donna, Eisenfeld, Beth, February 2009, “Contact Centers in the Web 2.0 World”, DestinationCRM.com, Available: http://www.destinationcrm.com/Articles/ColumnsDepartments/Scouting-Report/Contact-Centers-in-the-Web-2.0-World--52466.aspx, Retreived on 13th October, 2009.
    • o Gliem & Gliem (2003), “Calculating, Interpreting, and Reporting Cronbach's Alpha Reliability Coefficient for Likert-Type Scales”, Midwest Research to Practice Conference in Adult, Continuing, and Community Education , The Ohio State University, Columbus, OH, October 8-10, 2003.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article