Show simple item record

dc.contributor.authorKari, Tuomas
dc.contributor.authorMakkonen, Markus
dc.contributor.authorFrank, Lauri
dc.contributor.authorKettunen, Eeva
dc.date.accessioned2020-04-28T10:39:05Z
dc.date.available2020-04-28T10:39:05Z
dc.date.issued2020
dc.identifier.citationKari, T., Makkonen, M., Frank, L., & Kettunen, E. (2020). Expectations and Experiences of Implementing a Mobile Secure Communication Application. <i>International Journal of E-Services and Mobile Applications</i>, <i>12</i>(1), 80-96. <a href="https://doi.org/10.4018/IJESMA.2020010105" target="_blank">https://doi.org/10.4018/IJESMA.2020010105</a>
dc.identifier.otherCONVID_33312218
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/68745
dc.description.abstractThe privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Empirically, the study is qualitative and conducted in a governmental organization in Finland. The findings reveal the key user expectations and use experiences and their importance for users in terms of implementation and continued adoption of a mobile secure communication application.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherIGI Global
dc.relation.ispartofseriesInternational Journal of E-Services and Mobile Applications
dc.rightsIn Copyright
dc.titleExpectations and Experiences of Implementing a Mobile Secure Communication Application
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202004282950
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange80-96
dc.relation.issn1941-627X
dc.relation.numberinseries1
dc.relation.volume12
dc.type.versionpublishedVersion
dc.rights.copyright© 2020, IGI Global.
dc.rights.accesslevelopenAccessfi
dc.subject.ysoorganisaatiot
dc.subject.ysoorganisaatioviestintä
dc.subject.ysoodotukset
dc.subject.ysomobiilisovellukset
dc.subject.ysoturvallisuus
dc.subject.ysotietoliikenne
dc.subject.ysoyksityisyys
dc.subject.ysotietoturva
dc.subject.ysoviestintä
dc.subject.ysosovellusohjelmat
dc.subject.ysokokemukset
dc.subject.ysomobiililaitteet
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p272
jyx.subject.urihttp://www.yso.fi/onto/yso/p2777
jyx.subject.urihttp://www.yso.fi/onto/yso/p820
jyx.subject.urihttp://www.yso.fi/onto/yso/p27414
jyx.subject.urihttp://www.yso.fi/onto/yso/p7349
jyx.subject.urihttp://www.yso.fi/onto/yso/p5446
jyx.subject.urihttp://www.yso.fi/onto/yso/p10909
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p36
jyx.subject.urihttp://www.yso.fi/onto/yso/p8456
jyx.subject.urihttp://www.yso.fi/onto/yso/p3209
jyx.subject.urihttp://www.yso.fi/onto/yso/p4834
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.4018/IJESMA.2020010105
dc.type.okmA1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright